text
large_stringlengths
39
13.3M
id
large_stringlengths
36
47
repo_tree_path
large_stringclasses
20 values
source_dataset
large_stringclasses
1 value
lang
large_stringclasses
20 values
num_chars
uint32
39
13.3M
() OR Problems in BPO K. V. Subrahmanyam Talk Outline Traffic Estimation Resourcing Transport Scheduling () A BPO Outfit What do they do? - Technical support for foreign products. - Typical customers: Sun Microsystems, Norton Antivirus (Symantec). - Paid for calls answered. Big Issue: Calls missed. Staffing - 4000 employees all over Chennai. - 27 overlapping shifts of 8 hours each. - At one time, easily 2000 people can man the desks. - Different employees have different and possibly more than one skill-sets. - All employees must be picked up and dropped from home. () Traffic Loss of a call is revenue missed. Loss of an employee is $ 110 of revenue missed. Monthly salary about Rs. 5000 to Rs. 20000 (i.e., $ 120 to $ 500) Question 1: Estimate the traffic (calls/slot 1 ) per client, given past data. This helps in planning the staffing requirement for the slot. () Approach and Issues Past Data - data for 6 months, 24/7. - grouped client-wise and slot-wise. - later, client-side holidays. Observations - Two lean periods in a day and a bell-shaped peak period in the middle. - 10am to 4pm is peak. Peak is flat-top bell and has call-rate 20 times lean period. - Mondays and Fridays are different. - Pre- and Post-holiday is very different. () Solution Tackle Ordinary days - Peak-period observations taken as samples. - 3-piece polynomial curve fit for the peak period. Procedure - Compute the slot-mean and slot-variance. - throw away the vaiance and use the mean as sample. - fit a piece-wise polynomial. June 19, 2007 6 / 13 () Delicate matters Error estimation - this revealed a fewer piece approximation did not work. - fore-casting against observed data. Results - Ramping-up and Ramping-down accurate to 5 %. - Peak period variance too much. - For peak period, conservative estimates best, i.e., throw away points well below the mean. () Question 2: Resourcing Input - Slot-wise client requirement data. - Employee skill (client-handling) data. Constraints - 8 hour slots per employee with 16 hour off-time. - For every slot, a multi-skilled person MUST be committed to a particular skill. - staffing must match or exceed requirements. Costs: number of employees. June 19, 2007 8 / 13 () Single client When-ever need felt, call an employee. This greedy strategy is optimal. Proof: Postpone optimal strategy to get greedy. Traffic Employees Time Question: How to tackle multiple clients? June 19, 2007 9 / 13 () The Transport Problem Employees must be dropped and picked up at home. Women employees may need special care. Housing all over Chennai. Four office location, alas offices nearby. Cars, Vans, Sumos and Innovas to be deployed. Cost per employee about Rs. 2000 per month. About 270 employees per shift. Time taken during peak and non peak hours available. No employee to travel for much longer than if she were to come by herself. Employee to be at the desk at least 15 minutes before slot time. () June 19, 2007 10 / 13 A first approach Handle one office and only pick-ups. Note that this is a severe restriction. Divide the city into 7 sectors and each sector into 5 segments at increasing distance from the office. Proceed from outermost segment inwards. Minimize pickups across two segments. Possibly easier to model the drop and pick-up problem in this model. This is being implemented and tested against their past policy. () June 19, 2007 11 / 13 Issues with current solution How to better segment the city? Pick-up involves travelling to the door. This takes time. Routing within a segment is an issue. Any use for GPS data? Sensitivity of plan to sector marking. Is there a more global approach? One piece of data: 70% within 12km. Couple drop and pick-up. Couple different offices. () June 19, 2007 12 / 13 () Thank you. June 19, 2007 13 / 13
<urn:uuid:02f3b90a-6288-4f99-8f43-a7998642813b>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
3,800
14:00 Uhr Begrüßung Prof. Dr. Georgios Gounalakis Vorsitzender der KEK Staatssekretär Thorsten Bischoff Bevollmächtigter des Saarlandes beim Bund 14:10 Uhr Themenblock I Auswirkungen auf die Meinungsvielfalt durch KI Prof. Dr. Jan Krone Fachhochschule St. Pölten, Medien und Digitale Technologien, Digital Business und Innovation Moderation: Prof. Dr. Insa Sjurts KEK-Mitglied, Präsidentin der Beruflichen Hochschule Hamburg (BHH) 14:40 Uhr Prof. Dr. Alexander Godulla Universität Leipzig, Institut für Kommunikationsund Medienwissenschaft (IfKMW) Moderation: Prof. Dr. Rupprecht Podszun KEK-Mitglied, Heinrich-Heine-Universität Düsseldorf, Lehrstuhl für Bürgerliches Recht, deutsches und europäisches Wettbewerbsrecht, Direktor des Instituts für Kartellrecht 15:10 Uhr Prof. Dr. Michael Graßl Hochschule Macromedia München, Journalismus und Medienmanagement Moderation: Prof. Dr. Anne Paschke KEK-Mitglied, Technische Universität Braunschweig, Professur für Öffentliches Recht, Technikrecht und das Recht der Digitalisierung 4. Juni 2024 KI-Workshop der KEK Landesvertretung des Saarlandes in Berlin In den Ministergärten 4, 10117 Berlin 15:40 Uhr Prof. Dr. Sylvia Rothe Hochschule für Fernsehen und Film München, KI in der Medienproduktion Moderation: Ruth Meyer KEK-Mitglied, Direktorin der Landesmedienanstalt Saarland (LMS) 16:10 Uhr Pause 16:40 Uhr Themenblock II Ansätze für die Regulierung von KI Prof. Dr. Jan Oster Universität Osnabrück, Professur für Bürgerliches Recht, Wirtschaftsrecht, Medienrecht, Daten- und Digitalisierungsrecht Moderation: Prof. Dr. Ralf Müller-Terpitz KEK-Mitglied, Universität Mannheim, Lehrstuhl für Öffentliches Recht, Recht der Wirtschaftsregulierung und Medien 17:10 Uhr Dr. Matthias Knothe Staatskanzlei Schleswig-Holstein, Leiter der Stabsstelle für Medienpolitik Moderation: Prof. Dr. Georgios Gounalakis Vorsitzender der KEK, Philipps-Universität Marburg, Lehrstuhl für Bürgerliches Recht, Internationales Privatrecht, Rechtsvergleichung und Medienrecht 17:40 Uhr Wrap-up & Ausblick 17:45 Uhr Get together
<urn:uuid:257378ac-d03e-4d2a-b36b-7798a34f6261>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
2,096
YOUTH LEAGUE CHANGES STARKVILLE PARKS & RECREATION IS COMMITTED TO FAIRNESS. THE PURPOSE OF OUR YOUTH LEAGUES IS TO PROVIDE OUR PARTICIPANTS WITH A FUN EXPERIENCE THAT TEACHES SPORTSMANSHIP AND SPORTS SKILLS. WE RECOGNIZE THAT CHILDREN DEVELOP AT THEIR OWN INDIVIDUAL PACE. TO ENSURE THAT OUR LEAGUES ARE RUN FAIRLY AND THAT TEAMS ARE DIVIDED EVENLY, OUR TEAM IS IMPLEMENTING A SKILLS EVALUATION & DRAFT DAYS FOR EACH LEAGUE. EVALUATION DAYS OCCUR BEFORE TEAMS ARE SELECTED. EACH LEAGUE PARTICIPANT WILL BE SCHEDULED FOR A SKILLS EVALUATION, IN WHICH THEY WILL BE RATED BASED ON THEIR PERFORMANCE. EVALUATION DAYS TEAM DRAFTS WE RESERVE THE RIGHT TO ADD/REFUSE PLAYERS & COACHES AFTER THE REGISTRATION DEADLINE. TEAMS WILL BE SELECTED VIA DRAFT BASED ON EVALUATION RATINGS. ONLY HEAD COACHES & (1) ASSISTANT COACH OR THE HEAD COACH & TEAM SPONSOR MAY HAVE PREFERENCE IN SELECTING TEAMS. PLEASE REMEMBER * EACH PLAYER IS GUARANTEED A SPECIFIC AMOUNT OF PLAYING TIME. THIS INFORMATION WILL ALSO ALWAYS BE PROVIDED VIA OUR REGISTRATION PORTAL AND ON THE WEBPAGE DESIGNATED TO THAT LEAGUE. * IN EACH LEAGUE, EACH TEAM IS GUARANTEED A SPECIFIC NUMBER OF GAMES. THIS INFORMATION WILL ALWAYS BE PROVIDED VIA OUR REGISTRATION PORTAL AND ON THE WEBPAGE DESIGNATED TO THAT LEAGUE. * PARENTS ARE EXPECTED TO BE RESPECTFUL OF TEAM MEMBERS, PARTICIPANTS, OFFICIALS, COACHES, & OF OTHER PARENTS AT ALL TIMES. FAILURE TO ADHERE TO THIS RULE CAN RESULT IN REMOVAL FROM OUR FACILITIES AND/OR CONTACT WITH THE LOCAL AUTHORITIES. WE RECOGNIZE THAT UNFAVORABLE SITUATIONS ARE SOMETIMES INEVITABLE IN YOUTH SPORTS. IN THESE INSTANCES, PLEASE CONTACT ONE OF OUR TEAM MEMBERS, AND WE WILL WORK TO GET YOUR ISSUE RESOLVED AS SOON AS POSSIBLE.
<urn:uuid:5789cc55-500f-44e2-a8e5-9be9907f0ab0>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,727
Úspěšná prezentace na pařížském veletrhu Mezinárodní veletrh SIMA byl pro firmu Pöttinger nejen ve známení rozsáhlé expozice s prezentací techniky z celého výrobního programu, ale též přinesl významné ocenění. Novinka, žaci kombinace NovaCat A10 CrossFlow, obdržela titul Stroj roku 2019 ve své kategorii. Kategorii je celkem 17 a v roli hodnotitelů vystupují zástupci odborných periodik z celé Evropy. A právě originální řešení firmy Pöttinger, tedy šnekový shazovací dopravník na nesené žaci kombinaci, porotu vedl k tomu, že zvolila tento stroj v kategorii žaci stroje jako vítěze. Ještě před tím ocenil tento stroj i český trh – v roce 2018 se v České republice prodalo větší množství těchto strojů. Kompaktní a lehký systém shazování žaci kombinace NovaCat A10 Cross Flow je jednou z novinek firmy Pöttinger pro rok 2019. Představuje další aplikaci systému Cross Flow po úspěšném uvedení vzadu neseného žacího stroje NovaCat 352 CF na trh. Prostřednictvím příčných šnekových dopravníků je pice bezprostředně po posečení shazována na řádek. Činnosti šnekového dopravníku je pice na povrchu částečně narušena, takže efektu zrychlení zavadání se také docilíce, ale bez použití kondičerů (ať při shrnování na řádek, nebo i při ukládání na široko). To s sebou přináší značnou úsporu hmotnosti u žaci kombinace. Ve srovnání s variantou kombinace s kondičerem extra-dry a pásovými shazovacími dopravníky, kterou firma Pöttinger také nabízí, má NovaCat A10 CrossFlow nejen nižší hmotnost o patnáct procent, ale i kompaktnější rozměry, takže těžšte kombinace je v blízkosti traktoru. To znamená nižší utužování půdy, menší energetickou náročnost, nižší spotřebu paliva a jednodušší transport. Také pořizovací náklady jsou nižší. Variabilní ukládání hmoty Variabilitu při ukládání hmoty nový šnekový dopravník také umožňuje. Pokud budou oba dopravníky pracovat, tak bude hmota od žaci kombinace ukládána na středový řádek od čelně neseného žacího stroje. Poté lze přistoupit již rovnou ke sklizni. Díky uzavřenému provedení příčného šnekového dopravníku je hmota doprováděná na středový řádek zcela bez kontaktu s půdou, bez znečišťování a ztrát cenných částí. Firma Pöttinger připravila na veletrhu SIMA 2019 rozsáhlou výstavu své techniky, na kterou se přišly podívat davy zájemců. Kromě toho oslavila dceřiná společnost Pöttinger France 20 let trvání a dalším důvodem k oslavě bylo ocenění Stroj roku 2019 pro žaci kombinaci NovaCat A10 Cross Flow. Pro podniky, které využívají shazování hmoty na jeden řádek pouze při sklizni ožimého žita na GPS a u dalších plodin nikoli, nabízí žaci kombinace NovaCat A10 CrossFlow i možnost kombinovaného ukládání. Jednoduchým manuálním otevřením krycího plechu u jednoho ze dvou šneků se docílí kombinovaného ukládání hmoty. Revoluci ve shazování posečené pice na řádek přináší nová žaci kombinace NovaCat A10 Cross Flow. S kompaktními rozměry, sníženou hmotností i menší energetickou náročností nabízí možnost šetrného ukládání hmoty na jeden řádek bez odrolu a bez znečišťování. Průměr dopravníku Cross Flow a volný prostor pod kryty jsou zvoleny tak, aby nebyl problém dopravovat i velké množství pice. Jednoduchým manuálním otevřením (červeného) krycího plechu u jednoho ze dvou šneků se docílí kombinovaného ukládání hmoty.
239aaead-a69d-4326-8792-9c8ef8f911f5
HuggingFaceFW/finepdfs/tree/main/data/ces_Latn/train
finepdfs
ces_Latn
3,273
LITEL PARTICIPAÇÕES S.A. COMPANHIA ABERTA Nº CNPJ/MF 00.743.065/0001-27 NIRE 33300161899 COMUNICADO AO MERCADO A LITEL PARTICIPAÇÕES S.A . ("Companhia" e/ou "Litel") comunica aos seus acionistas e ao mercado que procederá a partir de 10 de maio de 2017 ao pagamento diretamente aos Acionistas de parcela dos proventos deliberados na Assembleia Geral Ordinária e Extraordinária realizada em 26 de abril de 2017, a saber: (b.i) Totalidade dos JUROS SOBRE CAPITAL PRÓPRIO no valor de R$ 162.000.000,00 (cento e sessenta e dois milhões), correspondente ao valor bruto de R$ 0,58799115 e ao valor líquido R$ 0,499792480 por cada ação ordinária e/ou preferencial de classes A e B do capital social aos acionistas detentores de ações ordinárias e/ou preferenciais de classes A e B em 30 de dezembro de 2016; e, DIVIDENDOS COMPLEMENTARES (b.ii) Parcela dos ao mínimo obrigatório no valor de R$ 75.958.566,43 (setenta e cinco milhões, novecentos e cinquenta e oito mil, quinhentos e sessenta e seis reais e quarenta e três centavos), equivalente a R$ 0,275697314 por cada ação ordinária e/ou preferencial de classes A e B aos acionistas detentores de todas as classes de ações em 04 de maio de 2017. Desta forma, restarão pendentes de pagamento o montante de R$ 421.160.184,92 (quatrocentos e vinte e um milhões, cento e sessenta mil, cento e oitenta e quatro reais e noventa e dois centavos), a ser corrigido pelo CDI da data da deliberação até a data do efetivo pagamento, que será definida oportunamente pela administração da Companhia. Ainda no que tange aos D IVIDENDOS C OMPLEMENTARES a serem pagos a partir de 10 de maio de 2017, no valor de R$ 75.958.566,43 (setenta e cinco milhões, novecentos e cinquenta e oito mil, quinhentos e sessenta e seis reais e quarenta e três centavos), a Companhia informa que: (i) R$ 75.767.950,18 (setenta e cinco milhões, setecentos e sessenta e sete mil, novecentos e cinquenta reais e dezoito centavos), equivalentes a R$ 0,275005459 por cada ação ordinária e/ou preferencial de classes A e B, representam o montante principal; e, (ii) R$ 190.616,25 (cento e noventa mil, seiscentos e dezesseis reais e vinte e cinco centavos), equivalentes a R$ 0,000691855 por cada ação ordinária e/ou preferencial de classes A e B, representam a correção monetária pelo CDI da data da deliberação ("AGOE de 28/04/2017") até o dia 09/05/2017. Rio de Janeiro, 09 de maio de 2017. GUEITIRO MATSUO GENSO Diretor de Relações com Investidores
<urn:uuid:225206d0-da14-4fb2-8f58-88941465ec22>
HuggingFaceFW/finepdfs/tree/main/data/por_Latn/train
finepdfs
por_Latn
2,492
Topics this week: * MN/ND/ SD R/S Meeting * CO/WY R/S Meeting * Western Risk & Insurance Association Meeting Contact us: NCIS 8900 Indian Creek Pkwy #600 Overland Park, KS  66210 913‐685‐2767 Questions/Comments/ Membership Info SherriS@ag‐risk.org NCIS Website www.ag‐risk.org Crop Insurance in America Website www.cropinsuranceinamerica.org Twitter @USCropInsurance Facebook CropInsuranceInAmerica What's Happening at NCIS January 9, 2017 Another active week at NCIS. With many new and important developments taking place in our industry, we bring you a "round-up" of NCIS activities, meetings, projects and progress. A list of future events will also be included in each edition. We welcome your comments and look forward to sharing this update with you. Minnesota/North Dakota/South Dakota Regional/State Meeting The MN/ND/SD Regional/State Committees held their annual meeting January 4 through 5 in Fargo, ND with approximately sixty participants. Dr. Mark Zarnstorff, NCIS, provided updates on changes to various crop policies, underwriting handbooks and loss adjustment manuals along with a presentation about ensuring program integrity. Dr. Harlene Hatterman – Valenti, Dr. Burton Johnson and Dr. Grant Mehring, Agronomic Researchers, North Dakota State University,provided updates on NCIS research projects. Dr. Marisol Berti gave a presentation on Cover Crop use in the Upper Great Plains.  RMA updates were provided by Duane Voy, St. Paul Regional Office. Colorado/Wyoming Regional/State Committee Meeting The CO/WY Regional/State Committee annual meeting was held in Denver, CO on January 5 with fourteen people attending. Topics of discussion included Whole Farm Revenue, Malting Barley Endorsement, professional conduct and program integrity. Mark Flohr, NCIS, provided MPCI and Crop‐Hail policy and procedure updates. Planning is underway for the Potato and Malting Barley Adjuster School to be held this August in Alamosa, CO. Shawn Beach, RMA Topeka Regional Office, presented an update on Colorado; and Jeremy Not Afraid, RMA Billings Regional Office, presented a Wyoming update. Jeremy also gave a short summary and led a discussion on Whole Farm Revenue Protection. Western Risk and Insurance Association Meeting Frank Schnapp, Senior Vice President, Actuarial, Statistical, and Information Systems Division of NCIS, participated in the Western Risk and Insurance Association (WRIA) annual meeting held last week in Santa Barbara, CA.  The WRIA is primarily interested in the application of statistics to business decisions but also provides a means of sharing new ideas and approaches on issues relating to risk and insurance among academics, economists, actuaries, risk management professionals, and financial professionals.  The presentation given by Mr. Schnapp reexamined the concept of systematic risk underlying the well‐known Capital Asset Pricing Model by applying the same approach to the pricing of insurance. Future Meetings and Events Calendar (Regional/State Meetings and Schoolsin Orange) | Event | | Date(s) | | Location | |---|---|---|---|---| | 2016 Meetings – Click Here to access | | | | | | meeting information. Registration | | | | | | open 4 to 6 weeks prior to date of | | | | | | meeting(s). | | | | | | 2017 Meetings | | | | | | NCIS 2017 Claims Managers’ | January 18‐19 | January 18‐19 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | Southwest R/S Meeting | | January 26‐27 | | Fredericksburg, TX | | KY/TN R/S Meeting | | February 2 | | Nashville, TN | | IN/MI/OH R/S Meeting | | February 2 | | Ft. Wayne, IN | | Crop Insurance Industry Convention | | February 5‐8 | | Bonita Springs, FL | | Board of Directors Meeting | | February 8 | | Bonita Springs, FL | | IL/WI R/S Meeting | | February 9 | | Springfield, IL | | Gulf States R/S Meeting | | February 9 | | Tunica, MS | | KS/OK R/S Meeting | | February 9 | | Oklahoma City, OK | | IA/NE R/S Meeting | | February 15‐16 | | Council Bluffs, IA | | MO R/S Meeting | | February 16 | | Columbia, MO | | AZ/CA/NV R/S Meeting | | February 21‐22 | | Monterey, CA | | MT/Northwest R/S Meeting | | Feb 28‐March 1 | | Missoula, MT | | East/Southeast R/S Meeting | | March 7 | | Savannah, GA | | Regional/State Chairman Training | | March 28‐29 | | Overland Park, KS | | Underwriting & Operations | April 4‐5 | April 4‐5 | Overland Park, KS | Overland Park, KS | | Committee Meeting | | | | | | NAIC Spring Meeting | | April 8‐11 | | Denver, CO | | MPCI PPLA Committee Meeting | | April 18‐19 | | Overland Park, KS | | Crop‐Hail PPLA Committee Meeting | | April 19‐20 | | Overland Park, KS | | Technology & Information | April 25‐26 | | Overland Park, KS | | |---|---|---|---|---| | Processing Committee Meeting | | | | | | Communications & Outreach | May 2‐3 | | Overland Park, KS | | | Committee Meeting | | | | | | Crop‐Hail A&S Committee Meeting | | May 4 | | Overland Park, KS | | Program Development Committee | May 23‐24 | May 23‐24 | Overland Park, KS | Overland Park, KS | | Meeting | | | | | | Board of Directors Meeting | | June 26‐27 | | TBD | | NCIS 2018 Train the Trainer Fall | July 18‐19 | July 18‐19 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | NAIC Summer Meeting | | August 5‐8 | | Philadelphia, PA | | Board of Directors Meeting | | September 20‐21 | | Overland Park, KS | | NCIS 2018 Train the Trainer Spring | November 8‐9 | November 8‐9 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | NAIC Fall Meeting | | December 2‐5 | | Honolulu, HI | | Board of Directors Meeting | | December 7‐8 | | TBD | | 2018 Meetings | | | | | | NCIS 2018 Claims Managers’ | January 17‐18 | January 17‐18 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | Crop Insurance Industry Convention | | February 4‐7 | | Scottsdale, AZ | | NAIC Spring Meeting | | March 24‐27 | | Milwaukee, WI | | NCIS 2019 Train the Trainer Fall | July 17‐18 | July 17‐18 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | NAIC Summer Meeting | | August 4‐7 | | Boston, MA | | NCIS 2019 Train the Trainer Spring | November 7‐8 | November 7‐8 | Overland Park, KS | Overland Park, KS | | Conference | | | | | | NAIC Fall Meeting | | November 15‐18 | | San Francisco, CA |
<urn:uuid:2075d5d2-aead-4ae5-9d89-7ec9cc4c3c90>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
6,381
Public Közlemény a K&H európai bankok rugalmas 2 származtatott zártvégű alap befektetési jegyeinek utolsó tőzsdei kereskedési napjáról A KBC Asset Management NV (székhely: 1080, Brüsszel, Havenlaan 2, Belgium), mint Alapkezelő nevében és képviseletében eljárva a KBC Asset Management N.V. Magyarországi Fióktelepe (székhelye: 1095 Budapest, Lechner Ödön fasor 9.), tájékoztatja a Tisztelt Befektetőket, hogy a K&H európai bankok rugalmas 2 származtatott zártvégű alap befektetési jegyeinek utolsó kereskedési napja: 2024. május 17. Budapest, 2024. május 9. KBC Asset Management N.V. Magyarországi Fióktelepe
<urn:uuid:b4fc45c7-d2f0-4f5d-9cc3-0caab2936bdd>
HuggingFaceFW/finepdfs/tree/main/data/hun_Latn/train
finepdfs
hun_Latn
612
OPTIFLUX 2000 Technical Datasheet Electromagnetic flow sensor * For all water and waste water applications * Wide range of approvals for potable water * Robust, fully welded construction The documentation is only complete when used in combination with the relevant documentation for the signal converter. 1 1.1 Solution for the water and wastewater industry The OPTIFLUX 2000 OPTIFLUX 2000 OPTIFLUX 2000 electromagnetic flow sensor is the specifially develloped for water and waste water applications. Its long-term reliability and durability make it the ideal flow sensor for the water industry for measuring abstraction water, drinking water, waste water, sewage and effluent. The sensor has the widest diameter range available in the market: from DN25 up to DN3000. 1 Robust fully welded construction 2 Installation length to ISO 13359 3 PP, PO and hard rubber liners Highlights * Drinking water approvals including KTW, KIWA, ACS, DVGW, NSF * Suitable for subsoil installation and constant flooding (IP68) * Bi-directional flow metering * Compliant with requirements for custody transfer (MID MI-001, OIML R49, ISO 4064, EN 14154) * Standard in house wet calibration of sensors up to diameter DN3000 * Easy installation and commissioning * No grounding rings required (with Virtual Reference option on IFC 300) * Rugged liners suitable for all water and waste water applications * In-situ verification with MagCheck * Extensive diagnostic capabilities * Maintenance-free * Proven and unsurpassed lifetime Industries * Water * Waste water * Pulp & Paper * Minerals & Mining * Iron, Steel & Metals * Power Applications * Water abstraction * Water purification and desalination * Drinking water distribution networks * Revenue metering or billing * Leakage detection * Irrigation * Industry water * Cooling water * Waste water * Sewage and sludge * Sea water 1.2 Features The solution for the water and wastewater industry Maintenance free The OPTIFLUX 2000 is designed to meet the demands for all water and waste water applications including groundwater, potable water, waste water, sludge and sewage, industry water and salt water. The OPTIFLUX 2000 has a field proven and unsurpassed lifetime assured by the fully welded housing, full bore pipe construction, absence of moving parts and wear resistant liner materials. Easy installation Fitting the OPTIFLUX 2000 is easy with the flanged design and standard ISO insertion lengths. But alternative lengths are also possible and can be offered on request. To further ease the operation, the OPTIFLUX 2000 can be installed without filters and straighteners. Even grounding rings are not required with the patented Virtual Reference option on the IFC 300 converter. Installation in measurement chambers subject to (constant) flooding is possible with the IP68 rated version. The chambers can even be completely surpassed if the IP68 version is combined with our special subsoil coating, allowing the OPTIFLUX 2000 to be installed directly in the ground. 1 1 Custody transfer In combination with the IFC 300 converter the OPTIFLUX 2000 can be used for custody transfer applications. It meets the requirements of OIML R49 and can be verified according to Annex MI-001 of the Measuring Instruments Directive (MID). All water meters for legal metrology purposes in Europe require certification under the MID. The EC type examination certificate for the OPTIFLUX 2300 is valid for the compact and the remote version and applies for forward and reverse flow. All flowmeters are wet calibrated by direct volume comparison at our officially certified calibration facilities. The performance of every OPTIFLUX 2000 is defined and documented in a calibration certificate. 1.3 Measuring principle An electrically conductive fluid flows inside an electrically insulated pipe through a magnetic field. This magnetic field is generated by a current, flowing through a pair of field coils. Inside of the fluid, a voltage U is generated: U = v * k * B * D in which: v = mean flow velocity k = factor correcting for geometry B = magnetic field strength D = inner diameter of flow meter The signal voltage U is picked off by electrodes and is proportional to the mean flow velocity v and thus the flow rate q. A signal converter is used to amplify the signal voltage, filter it and convert it into signals for totalising, recording and output processing. 1 Induced voltage (proportional to flow velocity) 2 Electrodes 3 Magnetic field 4 Field coils 2.1 Technical data * The following data is provided for general applications. If you require data that is more relevant to your specific application, please contact us or your local representative. * Additional information (certificates, special tools, software,...) and complete product documentation can be downloaded free of charge from the website (Download Center). Measuring system | Measuring principle | Faraday's law of induction | |---|---| | Application range | Electrically conductive fluids | | MMMMeeeeaaaassssuuuurrrreeeedddd vvvvaaaalllluuuueeee | | | Primary measured value | Flow velocity | | Secondary measured value | Volume flow | Design | | Large diameter range DN25...3000 | |---|---| | | Rugged liners approved for drinking water. | | | Large standard range but also available in customer specific diameter, length and pressure rating. | | Modular construction | The measurement system consists of a flow sensor and a signal converter. It is available as compact and as separate version. More information about the signal converter can be found in the relevant documentation. | | Compact version | With IFC 100 converter: OPTIFLUX 2100 C | | | With IFC 300 converter: OPTIFLUX 2300 C | | Remote version | In wall (W) mount version with IFC 100 converter: OPTIFLUX 2100 W | | | In field (F), wall (W) or rack (R) mount version with IFC 300 converter: OPTIFLUX 2300 F, W or R | | Nominal diameter | With IFC 100 converter: DN25...1200 / 1…48" | | | With IFC 300 converter: DN25...3000 / 1…120" | Measuring accuracy | Reference conditions | Flow conditions similar to EN 29104 | | |---|---|---| | | Temperature: +10...+30°C / +50...+86°F | | | | Electrical conductivity: ≥ 300 μS/cm | | | Maximum measuring error | IFC 100: down to 0.3% of the measured value ±1 mm/s | | | | IFC 300: down to 0.2% of the measured value ±1 mm/s | | | | The maximum measuring error depends on the installation conditions. | | | | For detailed information refer to Measuring accuracy on page 19. | | | Repeatability | ±0.1% of MV, minimum 1 mm/s | | | Calibration / Verification | SSSSttttaaaannnnddddaaaarrrrdddd:::: | | | | Each meter is standard calibrated by a direct volume comparison. | | | | OOOOppppttttiiiioooonnnnaaaallll:::: | | | | Verification to Measurement Instrument Directive (MID), Annex MI-001. Standard: Verification at Ratio (Q3/Q1) = 80, Q3 ≥ 2 m/s Optional: Verification at Ratio (Q3/Q1) > 80 on request | | | | Only in combination with the IFC 300 signal converter. | | | MID Annex MI-001 (Directive 2004/22/EC) | EEEECCCC----TTTTyyyyppppeeee eeeexxxxaaaammmmiiiinnnnaaaattttiiiioooonnnn cccceeeerrrrttttiiiiffffiiiiccccaaaatttteeee ttttoooo MMMMIIIIDDDD AAAAnnnnnnnneeeexxxx MMMMIIII----000000001111 | | | | Only in combination with the IFC 300 signal converter. | | | | Diameter range: DN25...500 | | | | Forward and reverse (bi-directional) flow | | | | Orientation: any | | | | Liquid temperature range: +0.1°C / 50°C | | | | For detailed information refer to Legal metrology on page 14. | | | OIML R49 | CCCCeeeerrrrttttiiiiffffiiiiccccaaaatttteeee ooooffff ccccoooonnnnffffoooorrrrmmmmiiiittttyyyy ttttoooo OOOOIIIIMMMMLLLL RRRR44449999 | | | | Only in combination with the IFC 300 signal converter. | | | | Diameter range | Class 1: DN80...500 | | | | Class 2: DN25...50 | | | Forward and reverse (bi-directional) flow | | | | Orientation: any | | | | Liquid temperature range: +0.1°C / 50°C | | | | For detailed information refer to Legal metrology on page 14. | | Operating conditions Installation conditions Materials Process connections | FFFFllllaaaannnnggggeeee | | |---|---| | EN 1092-1 | DN25...3000 in PN 2.5...40 | | ASME | 1…24" in 150 & 300 lb RF | | JIS | DN25…1000 in 10...20 K | | AWWA | DN700...2000 in 6...10 bar | | Design of gasket surface | RF | | | Other sizes or pressure ratings on request. | Electrical connections | | For full details, including power supply and power consumption etc., see technical datasheet of the relevant signal converter. | |---|---| | SSSSiiiiggggnnnnaaaallll ccccaaaabbbblllleeee (remote versions only) | | | Type A (DS) | IIIInnnn ccccoooommmmbbbbiiiinnnnaaaattttiiiioooonnnn wwwwiiiitttthhhh tttthhhheeee IIIIFFFFCCCC 111100000000 aaaannnndddd IIIIFFFFCCCC 333300000000 ssssiiiiggggnnnnaaaallll ccccoooonnnnvvvveeeerrrrtttteeeerrrr | | | Standard cable, double shielded. Max. length: 600 m / 1950 ft (dep. on electrical conductivity and measuring sensor). | | | For detailed information refer to the documentation of the relevant signal converter. | | Type B (BTS) | OOOOnnnnllllyyyy iiiinnnn ccccoooommmmbbbbiiiinnnnaaaattttiiiioooonnnn wwwwiiiitttthhhh tttthhhheeee IIIIFFFFCCCC 333300000000 ssssiiiiggggnnnnaaaallll ccccoooonnnnvvvveeeerrrrtttteeeerrrr | | | Optional cable, triple shielded. Max. length: 600 m / 1950 ft (dep. on electrical conductivity and measuring sensor). | | | For detailed information refer to the documentation of the relevant signal converter. | | I/O | For full details of I/O options, including data streams and protocols, see technical datasheet of the relevant signal converter. | Approvals and certificates | | This device fulfils the statutory requirements of the EC directives. The manufacturer certifies successful testing of the product by applying the CE mark. | |---|---| | Electromagnetic compatibility | Directive: 2004/108/EC, NAMUR NE21/04 | | | Harmonized standard: EN 61326-1 : 2006 | | Low voltage directive | Directive: 2006/95/EC | | | Harmonized standard: EN 61010 : 2001 | | Pressure equipment directive | Directive: 97/23/EC | | | Category I, II, III or SEP | | | Fluid group 1 | | | Production module H | 2.2 Legal metrology OIML R49 and MID Annex MI-001 is only only only available in combination with the IFC 300 signal converter! 2.2.1 OIML R49 The OPTIFLUX 2000 has a certificate of conformity with the international recommendation OIML R49. The certificate has been issued by NMi (Dutch board of weight and measures). The OIML R49 recommendation (2006) concerns water meters intended for the metering of cold potable and hot water. The measuring range of the flowmeter is determined by Q3 (nominal flow rate) and R (ratio). The OPTIFLUX 2000 meets the requirements for water meters of accuracy class 1 and 2. * For accuracy class 1, the maximum permissible error for water meters is ±1% for the upper flow rate zone and ±3% for the lower flow rate zones. * For accuracy class 2, the maximum permissible error for water meters is ±2% for the upper flow rate zone and ±5% for the lower flow rate zones. According to OIML R49, accuracy class 1 designation shall be applied only to flowmeter with Q3 ≥ 100 m 3 /h. Q1 = Q3 / R Q2 = Q1 * 1.6 Q3 = Q1 * R Q4 = Q3 * 1.25 X: X: X: X: Flow rate Y [%]: Y [%]: Y [%]: Y [%]: Maximum measuring error 1 ±3% for class 1, ±5% for class 2 devices ± 2 ± 1% for class 1, 2% for class 2 devices OIML R49 Class 1 | DN | Span (R) | Flow rate [m3/h] | | | | |---|---|---|---|---|---| | | | Minimum Q1 | Transitional Q2 | Permanent Q3 | Overload Q4 | | 80 | 640 | 0.25 | 0.40 | 160 | 200.0 | | 100 | 625 | 0.40 | 0.60 | 250 | 312.5 | | 150 | 667 | 0.60 | 1.00 | 400 | 500.0 | | 250 | 1000 | 1.60 | 2.60 | 1600 | 2000.0 | | 500 | 500 | 12.60 | 20.20 | 6300 | 7875.0 | OIML R49 Class 2 | DN | Span (R) | | | | |---|---|---|---|---| | | | Minimum Q1 | Transitional Q2 | Permanent Q3 | | 25 | 400 | 0.040 | 0.064 | 16 | | 50 | 400 | 0.100 | 0.160 | 40 | 2.2.2 MID Annex MI-001 All new designs of water meters that are to be used for legal purposes in Europe require certification under the Measurement Instrument Directive (MID) 2004/22/EC. Annex MI-001 of the MID applies to water meters intended for the measurement of volume of clean, cold or heated water in residential, commercial and light industrial use. An EC-type examination certificate is valid in all countries of the European Union. The OPTIFLUX 2300 has an EC-type examination certificate and can be verified to the MID Annex MI-001 for water meters with diameter DN25...DN300. The conformity assessment procedure followed for OPTIFLUX 2300 is Module B (Type Examination) and Module D (Quality Assurance of the Production Process). The maximim permissible error on volumes delivered between Q2 (transitional) flow rate and Q4 (overload) flow rate is ±2%. The maximum permissible error on volumes delivered between Q1 (minimum) flow rate and Q2 (transitional) flow rate is ±5%. Q1 = Q3 / R Q2 = Q1 * 1.6 Q3 = Q1 * R Q4 = Q3 * 1.25 X: X: X: X: Flow rate Y [%]: Y [%]: Maximum measuring error MI-001 certified flow characteristics | DN | Span (R) Q3 / Q1 | Flow rate [m3/h] | | | | |---|---|---|---|---|---| | | | Minimum Q1 | Transitional Q2 | Permanent Q3 | Overload Q4 | | 25 | 400 | 0.040 | 0.064 | 16 | 20.0 | | 32 | 400 | 0.063 | 0.100 | 25 | 31.3 | | 40 | 400 | 0.063 | 0.100 | 25 | 31.3 | | 50 | 400 | 0.100 | 0.160 | 40 | 50.0 | | 65 | 625 | 0.160 | 0.256 | 100 | 125.0 | | 80 | 640 | 0.250 | 0.400 | 160 | 200.0 | | 100 | 625 | 0.400 | 0.640 | 250 | 312.5 | | 125 | 667 | 0.600 | 0.960 | 400 | 500.0 | | 150 | 667 | 0.600 | 0.960 | 400 | 500.0 | | 200 | 1000 | 1.000 | 1.600 | 1000 | 1250.0 | | 250 | 1000 | 1.600 | 2.560 | 1600 | 2000.0 | | 300 | 1000 | 2.500 | 4.000 | 2500 | 3125.0 | | 350 | 500 | 5.000 | 8.000 | 2500 | 3125.0 | | 400 | 500 | 8.000 | 12.800 | 4000 | 5000.0 | | 450 | 500 | 8.000 | 12.800 | 4000 | 5000.0 | | 500 | 500 | 12.600 | 20.160 | 6300 | 7875.0 | Verification to MI-001 is carried out at the following values for R, Q1, Q2 and Q3. Verification at other values for R and Q3 available on request. Verification to MI-001 | DN | Span (R) Q3 / Q1 | | | |---|---|---|---| | | | Q1 | Q2 | | 25 | 80 | 0.050 | 0.080 | | 32 | 80 | 0.125 | 0.200 | | 40 | 80 | 0.125 | 0.200 | | 50 | 80 | 0.200 | 0.320 | | 65 | 80 | 0.313 | 0.500 | | 80 | 80 | 0.500 | 0.800 | | 100 | 80 | 0.788 | 1.260 | | 125 | 80 | 1.250 | 2.000 | | 150 | 80 | 2.000 | 3.200 | | 200 | 80 | 3.125 | 5.000 | | 250 | 80 | 5.000 | 8.000 | | 300 | 80 | 7.875 | 12.600 | | 350 | 80 | 12.500 | 20.000 | | 400 | 80 | 12.500 | 20.000 | | 450 | 80 | 20.000 | 32.000 | | 500 | 80 | 20.000 | 32.000 | 2.3 Measuring accuracy Each flowmeter is standard wet calibrated under reference conditions by direct volume comparison. The performance of the flowmeter is defined and documented in an individual water meter calibration certificate. Reference conditions * Medium: water * Temperature: +10...30 *C / +50...86°F * Operating pressure: 1 bar / 14.5 psi * Inlet section: ≥ 5 DN X [m/s] : flow velocity Y [%]: deviation from the actual measured value (mv) | DN25...1600 / 1...64" | 0.2% of mv + 1 mm/s | |---|---| | DN1600...3000 / > 64" | 0.3% of mv + 2 mm/s | | In combination with IFC 100 signal converter | Accuracy | |---|---| | DN25...1200 / 1...48" | 0.3% of mv + 1 mm/s | 2.4 Vacuum load 2.5 Dimensions and weights * All data given in the following tables are based on standard versions of the sensor only. * Especially for smaller nominal sizes of the sensor, the converter can be bigger than the sensor. * Note that for other pressure ratings than mentioned, the dimensions may be different. * For full information on converter dimensions see relevant documentation. EN 1092-1 | Nominal size DN [mm] | Dimensions [mm] | | | | Approx. weight [kg] | |---|---|---|---|---|---| | | Standard length | ISO Insertion length | H | W | | | 25 | 150 | 200 | 140 | 115 | 5 | | 32 | 150 | 200 | 157 | 140 | 6 | | 40 | 150 | 200 | 166 | 150 | 7 | | 50 | 200 | 200 | 186 | 165 | 11 | | 65 | 200 | 200 | 200 | 185 | 9 | | 80 | 200 | 200 | 209 | 200 | 14 | | 100 | 250 | 250 | 237 | 220 | 15 | | 125 | 250 | 250 | 266 | 250 | 19 | | 150 | 300 | 300 | 300 | 285 | 27 | | 200 | 350 | 350 | 361 | 340 | 34 | | 250 | 400 | 450 | 408 | 395 | 48 | | 300 | 500 | 500 | 458 | 445 | 58 | | 350 | 500 | 550 | 510 | 505 | 78 | | 400 | 600 | 600 | 568 | 565 | 101 | | 450 | 600 | - | 618 | 615 | 111 | | 500 | 600 | - | 671 | 670 | 130 | | 600 | 600 | - | 781 | 780 | 165 | | 700 | 700 | - | 898 | 895 | 248 | | 800 | 800 | - | 1012 | 1015 | 331 | | 900 | 900 | - | 1114 | 1115 | 430 | | 1000 | 1000 | - | 1225 | 1230 | 507 | | 1200 | 1200 | - | 1417 | 1405 | 555 | | 1400 | 1400 | - | 1619 | 1630 | 765 | | 1600 | 1600 | - | 1819 | 1830 | 1035 | | 1800 | 1800 | - | 2027 | 2045 | 1470 | | 2000 | 2000 | - | 2259 | 2265 | 1860 | ASME B16.5 / 150 lb flanges | Nominal size [inches] | Dimensions [inches] | | | Approx. weight [lb] | |---|---|---|---|---| | | L | H | W | | | 1" | 5.91 | 5.39 | 4.25 | 7 | | 1½" | 5.91 | 6.10 | 5.00 | 11 | | 2" | 7.87 | 7.05 | 5.98 | 18 | | 3" | 7.87 | 8.03 | 7.50 | 26 | | 4" | 9.84 | 9.49 | 9.00 | 44 | | 5" | 9.84 | 10.55 | 10.00 | 49 | | 6" | 11.81 | 11.69 | 11.00 | 64 | | 8" | 13.78 | 14.25 | 13.50 | 95 | | 10" | 15.75 | 16.30 | 16.00 | 143 | | 12" | 19.69 | 18.78 | 19.00 | 207 | | 14" | 27.56 | 20.67 | 21.00 | 284 | | 16" | 31.50 | 22.95 | 23.50 | 364 | | 18" | 31.50 | 24.72 | 25.00 | 410 | | 20" | 31.50 | 26.97 | 27.50 | 492 | ASME B16.5 / 300 lb flanges | Nominal size [inches] | Dimensions [inches] | | | |---|---|---|---| | | L | H | W | | 1" | 5.91 | 5.71 | 4.87 | | 1½" | 7.87 | 6.65 | 6.13 | | 2" | 9.84 | 7.32 | 6.50 | | 3" | 9.84 | 8.43 | 8.25 | | 4" | 11.81 | 10.00 | 10.00 | | 6" | 12.60 | 12.44 | 12.50 | | 8" | 15.75 | 15.04 | 15.00 | | 10" | 19.69 | 17.05 | 17.50 | | 12" | 23.62 | 20.00 | 20.50 | | 14" | 27.56 | 21.65 | 23.00 | | 16" | 31.50 | 23.98 | 25.50 | | 20" | 31.50 | 28.46 | 30.50 | | 24" | 31.50 | 33.39 | 36.00 | 3.1 Notes on installation Inspect the cartons carefully for damages or signs of rough handling. Report damage to the carrier and to the local office of the manufacturer. Do a check of the packing list to make sure that you have all the elements given in the order. Look at the device nameplate to ensure that the device is delivered according to your order. Check for the correct supply voltage printed on the nameplate. 3.2 Intended use Responsibility for the use of the measuring devices with regard to suitability, intended use and corrosion resistance of the used materials against the measured fluid lies solely with the operator. The manufacturer is not liable for any damage resulting from improper use or use for other than the intended purpose. The OPTIFLUX 2000 OPTIFLUX 2000 OPTIFLUX 2000 is designed exclusively to measure the flow of electrically conductive, liquid media. If the device is not used according to the operating conditions (refer to chapter Technical data), the intended protection could be affected. 3.3 Installation conditions 3.3.1 Inlet and outlet ≥ 1 5 DN ≥ 2 2 DN 3.3.2 Mounting position 3.3.3 Flange deviation Max. permissible deviation of pipe flange faces: L max - L min ≤ 0.5 mm / 0.02" 1 L max 2 L min 3.3.4 T-section ≥ 1 10 DN 3.3.5 Vibration 3.3.6 Magnetic field 3.3.7 Bends 3.3.8 Open discharge 3.3.9 Control valve 3.3.10 Air venting ≥ 1 5 m Air ventilation point 2 3.3.11 Pump 3.4 Mounting 3.4.1 Torques and pressures The maximum pressure and torques values for the flowmeter are theoretical and calculated for optimum conditions and use with carbon steel flanges. Tightening of bolts * Always tighten the bolts uniformely and in diagonally opposite sequence. * Do not exceed the maximum torque value. * Step 1: Apply approx. 50% of max. torque given in table. * Step 2: Apply approx. 80% of max. torque given in table. * Step 3: Apply 100% of max. torque given in table. 3 | Nominal size DN [mm] | Pressure rating | Bolts | Max. torque [Nm] 1 | | | |---|---|---|---|---|---| | | | | Polyolefin | Polypropylene | Hard rubber | | 25 | PN 40 | 4 × M 12 | - | 22 | 11 | | 32 | PN 40 | 4 × M 16 | - | 37 | 19 | | 40 | PN 40 | 4 × M 16 | - | 43 | 25 | | 50 | PN 40 | 4 × M 16 | - | 55 | 31 | | 65 | PN 16 | 4 × M 16 | - | 51 | 42 | | 65 | PN 40 | 8 × M 16 | - | 38 | 21 | | 80 | PN 40 | 8 × M 16 | - | 47 | 25 | | 100 | PN 16 | 8 × M 16 | - | 39 | 30 | | 125 | PN 16 | 8 × M 16 | - | 53 | 40 | | 150 | PN 16 | 8 × M 20 | - | 68 | 47 | | 200 | PN 10 | 8 × M 20 | 68 | - | 68 | | 200 | PN 16 | 12 × M 20 | 45 | - | 45 | | 250 | PN 10 | 12 × M 20 | 65 | - | 65 | | 250 | PN 16 | 12 × M 24 | 78 | - | 78 | | 300 | PN 10 | 12 × M 20 | 76 | - | 76 | | 300 | PN 16 | 12 × M 24 | 105 | - | 105 | | 350 | PN 10 | 16 × M 20 | 75 | - | 75 | | 400 | PN 10 | 16 × M 24 | 104 | - | 104 | | 450 | PN 10 | 20 × M 24 | 93 | - | 93 | | 500 | PN 10 | 20 × M 24 | 107 | - | 107 | | 600 | PN 10 | 20 × M 27 | 138 | - | 138 | | 700 | PN 10 | 24 × M 27 | 163 | - | 163 | | 800 | PN 10 | 24 × M 30 | 219 | - | 219 | | 900 | PN 10 | 28 × M 30 | 205 | - | 205 | | 1000 | PN 10 | 28 × M 33 | 261 | - | 261 | 1 The specified torque values are dependent on variables (temperature, bolt material, gasket material, lubricants, etc.) which are not within the control of the manufacturer. Therefore these values should be regarded as indicative only. Other sizes / pressure ratings on request. | Nominal size [inches] | Flange class [lb] | Bolts | Max. torque [lbf.ft] 1 | | | |---|---|---|---|---|---| | | | | Polyolefin | Polypropylene | Hard rubber | | 1 | 150 | 4 × 1/2" | - | 6.7 | 3.2 | | 1 1/2 | 150 | 4 × 1/2" | - | 13 | 9 | | 2 | 150 | 4 × 5/8" | - | 24 | 17 | | 3 | 150 | 4 × 5/8" | - | 43 | 29 | | 4 | 150 | 8 × 5/8" | - | 34 | 23 | | 6 | 150 | 8 × 3/4" | - | 61 | 38 | | 8 | 150 | 8 × 3/4" | 51 | - | 51 | | 10 | 150 | 12 × 7/8" | 58 | - | 58 | | 12 | 150 | 12 × 7/8" | 77 | - | 77 | | 14 | 150 | 12 × 1" | 69 | - | 69 | | 16 | 150 | 16 × 1" | 67 | - | 67 | | 18 | 150 | 16 × 1 1/8" | 105 | - | 105 | | 20 | 150 | 20 × 1 1/8" | 94 | - | 94 | | 24 | 150 | 20 × 1 1/4" | 133 | - | 133 | 1 The specified torque values are dependent on variables (temperature, bolt material, gasket material, lubricants, etc.) which are not within the control of the manufacturer. Therefore these values should be regarded as indicative only. Other sizes / pressure ratings on request. 4.1 Safety instructions All work on the electrical connections may only be carried out with the power disconnected. Take note of the voltage data on the nameplate! Observe the national regulations for electrical installations! Observe without fail the local occupational health and safety regulations. Any work done on the electrical components of the measuring device may only be carried out by properly trained specialists. Look at the device nameplate to ensure that the device is delivered according to your order. Check for the correct supply voltage printed on the nameplate. 4.2 Grounding The device must be grounded in accordance with regulations in order to protect personnel against electric shocks. 1 Metal pipelines, not internally coated. Grounding without grounding rings. 2 Metal pipelines with internal coating and non-conductive pipelines. Grounding with grounding rings. 1 Grounding ring number 1 2 Grounding ring number 2 3 Grounding ring number 3 Grounding ring number 1: * 3 mm / 0.1" thick (tantalum: 0.5 mm / 0.02") Grounding ring number 2: * 3 mm / 0.1" thick * Prevents damage to the flanges during transport and installation * Especially for flow sensors with PTFE liner Grounding ring number 3: * 3 mm / 0.1" thick * With cylindrical neck (length 30 mm / 1.25" for DN10...150 / 3/8...6") * Prevents damage to the liner when abrasive liquids are used 4.3 Virtual reference for IFC 300 (C, W and F version) The virtual reference option on the IFC 300 flow converter provides complete isolation of the measurement circuit. Benefits of virtual reference: * Grounding rings or grounding electrodes can be omitted. * Safety increases by reducing the number of potential leakage points. * The installation of the flowmeters is much easier. Minimum requirements: * Size: ≥ DN10 * Electrical conductivity: ≥ 200 µS/cm * Electrode cable: max. 50 m / 164 ft, type DS 4.4 Connection diagrams For the connection diagrams please refer to the documentation of the applicable converter. 5 5 KROHNE product overview * Electromagnetic flowmeters * Variable area flowmeters * Ultrasonic flowmeters * Mass flowmeters * Vortex flowmeters * Flow controllers * Level meters * Temperature meters * Pressure meters * Analysis products * Products and systems for the oil & gas industry * Measuring systems for the marine industry Head Office KROHNE Messtechnik GmbH Ludwig-Krohne-Str. 5 47058 Duisburg (Germany) Tel.:+49 (0)203 301 0 Fax:+49 (0)203 301 10389 email@example.com
<urn:uuid:989a0def-9572-43a0-b8c1-75c2a3136f45>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
25,140
QUINTA MARCIA PER IL CREATO Da Celano a Castelvecchio Subequo “LENTIUS, PROFUNDIUS, SUAVIUS” 19 agosto 2017 Dalla città natale di frate Tommaso (biografo di S. Francesco), passando per il “luogo del miracolo dell’acqua” a Baullo, sino al convento di Castelvecchio Subequo dove i frati conservano il reliquiario con il sangue delle stimmate di S. Francesco | LUOGO DI PARTENZA | ORARIO | ARRIVO a Fonte Cituro Ore 12,00 | ARRIVO a Gagliano Aterno Ore 16,30 | ARRIVO a Castelvecchio Subequo Ore 17,30 | |-------------------|--------|---------------------------------|----------------------------------|----------------------------------| | CELANO | | | | | | Piazza S. Maria Valleverde | RIMODO 07:30 PARTENZA 08:00 | Km. 11,70 | Km. 25,80 | Km. 27,30 | | AIELLI | | | | | | Torre osservatorio | 09:30 | Km. 6,00 | Km 18,10 | Km. 21,60 | | COLLARMELE | | | | | | Chiesa Madonna delle Grazie | 11:00 | Km. 2,50 | Km. 14,60 | Km. 18,10 | La percorrenza di tutto il tragitto è consigliata alle persone allenate. A seconda della età e delle possibilità fisiche è possibile scegliere di effettuare anche un solo tratto partendo dalle località indicate nella tabella e aspettando di ricongiungersi ai gruppi precedentemente partiti. Sono previsti bus navetta per il ritorno a Collarmele, Aielli e Celano, SOLO SU PRENOTAZIONE (entro il 17 agosto) ai seguenti numeri: Ufficio Turistico del Comune di Celano 0863 792184 - 0863 7954. Volontari del CAI accompagneranno i partecipanti per l’intero percorso che si svolge su strade con tratti asfaltati o sterrati e non presenta particolari asperità: vi sono inoltre tratti in salita tra Celano ed Aielli e tra Aielli e Fonte Cituro. I tempi sono calcolati in base ad esperienze passate e comprendono anche le sosta per i ristori. All’arrivo è previsto un pasto caldo. ABBIGLIAMENTO: scarponcini da escursionismo comodi, possibilmente non comprati per l’occasione, nello zaino borraccia con acqua, viveri e giacca a vento. INFO: Regione Abruzzo: Dipartimento Turismo Cultura e Paesaggio Dott. Pasquale Casale, Ufficio Parchi e Aree Protette firstname.lastname@example.org 338 3400921 Giuseppe Ruscio, Sottosociazione CAI Celano 335 8485278 Gaetano Falcone, CAI L’Aquila 339 6007648 Ezio Cicciotti, Vicesindaco del comune di Celano 333.3471929 Gli organizzatori non assumono responsabilità per eventuali incidenti o danni a cose o persone che si verificassero durante e dopo la marcia. I minorienni saranno ammessi esclusivamente se accompagnati da adulti.
<urn:uuid:117a3052-9f1f-4156-800b-8af73478cbda>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
3,058
PREDMET: Prijedlog odluke o usvajanju Strateške studije utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine Na temelju čl. 32. Statuta Krapinsko-zagorske županije («Službeni glasnik Krapinsko-zagorske županije» broj 13/01., 5/06., 14/09., 11/13. i 26/13. – pročišćeni tekst), Župan Krapinsko-zagorske županije dana 15. rujna 2016. godine donosi ZAKLJUČAK 1. Utvrđuje se Prijedlog odluke o usvajanju Strateške studije utjecaja na okoliš Strategije razvoja Krapinsko – zagorske županije do 2020. godine. 2. Prijedlog odluke i Strateška studija nalaze se u privitku i čine sastavni dio ovog Zaključka, te se upućuju Županijskoj skupštini na razmatranje i usvajanje. 3. Za izvjestiteljicu zadužuje se Karolina Barilar, direktorica Zagorske razvojne agencije d.o.o.. ŽUPAN Željko Kolar Dostaviti: 1. Županijska skupština, 2. Za zbirku isprava, 3. Pismohrana. PREDMET: Strateška studija utjecaja na okoliš Strategije razvoja i Prijedlog odluke o donošenju Strategije razvoja Krapinsko-zagorske županije do 2020. godine PRAVNI TEMELJ: čl. 32. i čl. 50. Statuta Krapinsko-zagorske županije („Službeni glasnik Krapinsko-zagorske županije“ broj 13/01., 5/06., 14/09., 11/13. i 26/13. – pročišćeni tekst) NADLEŽNOST ZA DONOŠENJE: Županijska skupština PREDLAGATELJ: Upravni odjel za gospodarstvo, poljoprivredu, promet, komunalnu infrastrukturu i EU fondove mr. Sanja Mihovilić, pročelnica IZVJESTITELJ: Predstavnik Ires ekologije d.o.o. za Stratešku studiju utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020, Karolina Barilar, direktorica Zagorske razvojne agencije d.o.o., za Strategiju razvoja Krapinsko-zagorske županije do 2020. OBRAZLOŽENJE: Krapinsko-zagorska županija je sredinom 2013. godine inicirala izradu Strategije razvoja Krapinsko-zagorske županije do 2020. godine (Strategija). Koordinator izrade strategije i njezinog prethodnog vrednovanja je Zagorska razvojna agencija d.o.o. za promicanje regionalnog razvoja. Strategija razvoja Krapinsko-zagorske županije predstavlja temeljni strateški planski dokument koji određuje ciljeve, prioriteti i mjere razvoja Krapinsko-zagorske županije. Strateški dokument sastavljen je u skladu sa smjernicama politike regionalnog razvoja Republike Hrvatske (Zakon o regionalnom razvoju Republike Hrvatske, »Narodne novine«, broj 147/14). Sukladno načelima politike regionalnog razvoja te zakonskim odredbama, Krapinsko-zagorska županija donijela je Odluku o izradi Županijske razvojne strategije Krapinsko-zagorske županije za razdoblje 2016. – 2020. godine. Za izradu Strategije imenovane su tematske radne skupine za gospodarstvo, razvoj ljudskih potencijala i unapređenje kvalitete života te održivi razvoj prostora, okoliša i prirode koje su sudjelovale u koordinaciji procesa izrade Strategije. Županijsku razvojnu strategiju donosi jedinica područne (regionalne) samouprave u skladu s načelom partnerstva i suradnje nakon prethodno pribavljenog mišljenja Partnerskog vijeća za područje županije, uzimajući u obzir potrebu osiguranja ravnomernog razvoja svih dijelova županije. Strateška procjena utjecaja na okoliš je postupak kojim se procjenjuju vjerojatno značajni utjecaji na okoliš koji mogu nastati provedbom strategije, plana ili programa. Strateškom procjenom stvara se osnova za promicanje održivog razvitka kroz objedinjavanje uvjeta za zaštitu okoliša u strategije, planove i programe pojedinog područja. Time se omogućava da se mjerodavne odluke o prihvaćanju strategija, plana i programa donose uz poznavanje mogućih značajnih utjecaja koje bi strategija, plan i program svojom provedbom mogao imati na okoliš, a nositeljima zahvata pružaju se okviri djelovanja i daje se mogućnost uključivanja bitnih elemenata zaštite okoliša u donošenju odluka (Zakon o zaštiti okoliša NN 80/13, 78/15). Postupak strateške procjene utjecaja na okoliš za Strategiju provodi se temeljem odredbi Zakona o zaštiti okoliša (NN 80/13, 78/15), Uredbe o strateškoj procjeni utjecaja plana i programa na okoliš (NN 64/08) i Pravilnika o povjerenstvu za stratešku procjenu (NN 70/08). Ovim postupkom se procjenjuju, u najranijoj fazi izrade nacrta Strategije, vjerojatno značajni utjecaji na okoliš i zdravlje ljudi koji mogu nastati provedbom iste. Za Strategiju je proveden postupak Ocjene prihvatljivosti za ekološku mrežu te je Rješenjem Ministarstva zaštite okoliša i prirode (KLASA: UP/I 612-07/15-71/199, URBROJ: 517-07-2-1-15-4) zaključeno da je Strategija prihvatljiva za ekološku mrežu. Iz tog razloga Strateška studija utjecaja na okoliš Strategije (u daljnjem tekstu: Studija) ne uključuje poglavlje koje utvrđuje utjecaje na ekološku mrežu, sukladno posebnim propisima kojima se uređuje zaštita prirode. Studija je stručna podloga koja se prilaže uz Strategiju te obuhvaća sve potrebne podatke, obrazloženja i opise u tekstualnom i grafičkom obliku. Studijom se određuju, opisuju i procjenjuju vjerojatno značajni utjecaji na okoliš i zdravlje koji mogu nastati provedbom Strategije. Namjera je osigurati da posljedice po okoliš i zdravlje budu ocijenjene za vrijeme pripreme Strategije, prije utvrđivanja konačnog prijedloga i upućivanja u postupak njezina donošenja. Postupak provedbe strateške procjene utjecaja na okoliš također pruža priliku dionicima da sudjeluju u postupku, a osigurava se i informiranje i sudjelovanje javnosti za vrijeme postupka donošenja odluka. Nositeljima zahvata pružaju se okviri djelovanja i daje se mogućnost uključivanja bitnih elemenata zaštite okoliša u donošenje odluka. **POTREBNA FINANCIJSKA SREDSTVA:** Za razmatranje i usvajanje Strateške studije utjecaja na okoliš i Odluke o donošenju Strategije razvoja Krapinsko-zagorske županije do 2020. godine nisu potrebna financijska sredstva. **PROČELNICA** mr. Sanja Mihovilić Prilog: 1. Strateška studija utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020., 2. Zaključak župana, 3. Prijedlog zaključka Županijske skupštine. Strateška studija utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine Netehnički sažetak Zagreb, lipanj 2016. | NOSITELJ IZRADE: | Upravni odjel za gospodarstvo, poljoprivredu, promet, komunalnu infrastrukturu i EU fondove, Magistratska ulica 1, 49000 Krapina | |-----------------|------------------------------------------------------------------------------------------------------------------| | IZRAĐIVAČ STUDIJE: | Ires ekologija d.o.o. za zaštitu prirode i okoliša, Prilaz baruna Filipovića 21, 10000 Zagreb | | VODITELJ STUDIJE: | Mirko Mesarić, dipl. ing. biol. | | KOORDINATORICA: | Petra Peleš, mag. oecol. et prot. nat., mag. ing. agr. | **ODGOVORNA OSOBA IZRAĐIVAČA:** Ires ekologija d.o.o. Mr. sc. Marijan Gredelj Zagreb, lipanj 2016. Sadržaj 1. Uvod ........................................................................................................................................... 1 1.1 Strateška procjena utjecaja na okoliš .................................................................................. 1 1.2 Svrha i ciljevi izrade Strategije ............................................................................................ 2 2 Okolišne značajke područja na koja provedba Strategije može utjecati ..................................... 5 3 Utjecaji Strategije na okoliš ....................................................................................................... 6 3.1 Metodologija procjene utjecaja ............................................................................................ 6 3.2 Procjena utjecaja na okoliš .................................................................................................. 8 4 Mjere zaštite okoliša .................................................................................................................. 19 5 Zaključak ...................................................................................................................................... 21 1. Uvod 1.1 Strateška procjena utjecaja na okoliš Strateška procjena utjecaja na okoliš je postupak kojim se procjenjuju vjerojatno značajni utjecaji na okoliš koji mogu nastati provedbom strategije, plana ili programa. Strateškom procjenom stvara se osnova za promicanje održivog razvitka kroz objedinjavanje uvjeta za zaštitu okoliša u strategije, planove i programe pojedinog područja. Time se omogućava da se mjerođavne odluke o prihvaćanju strategija, plana i programa donose uz poznavanje mogućih značajnih utjecaja koje bi strategija, plan i program svojom provedbom mogao imati na okoliš, a nositeljima zahvata pružaju se okviri djelovanja i daje se mogućnost uključivanja bitnih elemenata zaštite okoliša u donošenju odluka (Zakon o zaštiti okoliša NN 80/13, 78/15). Izradača i koordinator Strategije razvoja Krapinsko-zagorske županije do 2020. godine (u daljnjem tekstu: Strategija) je Zagorska razvojna agencija d.o.o. (u daljnjem tekstu: Naručitelj). Postupak strateške procjene utjecaja na okoliš za Strategiju provodi se temeljem odredbi Zakona o zaštiti okoliša (NN 80/13, 78/15), Uredbe o strateškoj procjeni utjecaja plana i programa na okoliš (NN 64/08) i Pravilnika o povjerenstvu za stratešku procjenu (NN 70/08). Ovim postupkom se procjenjuju, u najranijoj fazi izrade nacrta Strategije, vjerojatno značajni utjecaji na okoliš i zdravlje ljudi koji mogu nastati provedbom iste. Za Strategiju je proveden postupak Ocjene prihvatljivosti za ekološku mrežu te je Rješenjem Ministarstva zaštite okoliša i prirode (KLASA: UP/I 612-07/15-71/199, URBROJ: 517-07-2-1-15-4) zaključeno da je Strategija prihvatljiva za ekološku mrežu. Iz tog razloga Strateška studija utjecaja na okoliš Strategije (u daljnjem tekstu: Studija) ne uključuje poglavle koje utvrđuje utjecaje na ekološku mrežu, sukladno posebnim propisima kojima se uređuje zaštita prirode. Studija je stručna podloga koja se prilaže uz Strategiju te obuhvaća sve potrebne podatke, obrazloženja i opise u tekstualnom i grafičkom obliku. Studijom se određuju, opisuju i procjenjuju vjerojatno značajni utjecaji na okoliš i zdravlje koji mogu nastati provedbom Strategije. Namjera je osigurati da posljedice po okoliš i zdravlje budu ocijenjene za vrijeme pripreme Strategije, prije utvrđivanja konačnog prijedloga i upućivanja u postupak njezina donošenja. Postupak provedbe strateške procjene utjecaja na okoliš također pruža priliku dionicima da sudjeluju u postupku, a osigurava se i informiranje i sudjelovanje javnosti za vrijeme postupka donošenja odluka. Nositeljima zahvata pružaju se okviri djelovanja i daje se mogućnost uključivanja bitnih elemenata zaštite okoliša u donošenje odluka. Direktiva 2001/42/EZ Europskoga parlamenta i Vijeća o procjeni učinaka određenih planova i programa na okoliš (SEA direktiva) je na snazi od 2001. godine. U RH zakonski okvir za izradu strateških studija usklađen sa SEA direktivom čini sljedeća legislativa: Zakon o zaštiti okoliša (NN 80/13, 78/15), Uredba o strateškoj procjeni utjecaja plana i programa na okoliš (NN 64/08) i Pravilnik o povjerenstvu za stratešku procjenu (NN 70/08). Navedeni propisi su u skladu i s Konvencijom o procjeni utjecaja na okoliš preko državnih granica (Espoo, 1991), koja obvezuje države da obavještavaju i konzultiraju se u svim velikim projektima koji bi mogli imati utjecaj na okoliš preko državnih granica te s Protokolom o strateškoj procjeni okoliša (Kijev, 2003). Konvencija o procjeni utjecaja na okoliš preko državnih granica usvojena je Odlukom o proglašenju Zakona o potvrđivanju Konvencije o procjeni utjecaja na okoliš preko državnih granica (NN 06/96), a Protokol o strateškoj procjeni okoliša usvojen je Odlukom o proglašenju Zakona o potvrđivanju Protokola o strateškoj procjeni okoliša uz Konvenciju o procjeni utjecaja na okoliš preko državnih granica (NN 07/09). U slučaju postupka strateške procjene utjecaja na okoliš za Strategiju, za njezinu je provedbu, prema Zakonu o zaštiti okoliša (NN 80/13, 78/15), nadležan Upravni odjel za gospodarstvo poljoprivredu, promet, komunalnu infrastrukturu i EU fondove Krapinsko-zagorske županije. Upravni odjel proveo je postupak analitičkog pregleda te je 28. listopada 2015. godine donio Odluku o započinjanju postupka strateške procjene utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine (KLASA: 340-01/15-01/59; URBROJ: 2140/1-02-15-04). 1.1.1 Utvrđivanje sadržaja Studije MZOIP je postupkom prethodne ocjene prihvatljivosti Programa za ekološku mrežu 25. svibnja 2015. godine donijelo Rješenje (Klasa: 612-07/15-71/101, UrBroj: 517-07-2-1-1-15-4), da je Strategija razvoja Krapinsko-zagorske županije do 2020. godine prihvatljiva za ekološku mrežu te nije potrebno provesti Glavnu ocjenu Programa. Na temelju članka 68. Zakona o zaštiti okoliša (NN 80/13, 78/15) i članka 9. Uredbe, Upravni odjel za gospodarstvo poljoprivredu, promet, komunalnu infrastrukturu i EU fondove Krapinsko-zagorske županije (u daljnjem tekstu: Upravni odjel) donio je 7. prosinca 2015. godine Odluku o sadržaju Studije (KLASA: 340-01/15-01/59, URBROJ: 2140/1-06-15-25) (Prilog 3). Upravni odjel proveo je postupak određivanja sadržaja Studije, sukladno članku 7. Uredbe, na način da je pribavlje mišljenja tijela određenih posebnim propisima o sadržaju Studije i razini obuhvata podataka koji se moraju obraditi u Studiji, vezano na područje iz djelokruga toga tijela. Pristigla su mišljenja i/ili prijedlozi sljedećih tijela: Ministarstvo unutarnjih poslova, Krapinsko-zagorski aerodrom d.o.o., Policajsko uprava Krapinsko-zagorska, Općina Stubičke Toplice, Ministarstvo kulture, Ministarstvo gospodarstva, Plin Konjiščina d.o.o., Elektra Zabok d.o.o., VIOP d.o.o., Grad Zabok, Ministarstvo poljoprivrede, Općina Veliko Trgovišće, Komunalno Zabok d.o.o., Zagorski metalac d.o.o. za distribuciju plina i opskrbu plinom, Gradska plinara Krapina za distribuciju plina i opskrbu plinom te Hrvatske vode – Vodrogospodarski odjel za Gornju Savu. U svrhu informiranja javnosti, informacija o provedbi postupka određivanja sadržaja Studije objavljena je na internetskoj stranici Krapinsko-zagorske županije (u daljnjem tekstu: KZZ) u razdoblju od 29. listopada do 29. studenog 2015. 1.2 Svrha i ciljevi izrade Strategije Donošenjem Zakona o regionalnom razvoju Republike Hrvatske (NN 153/09), usvajanjem Strategije regionalnog razvoja Republike Hrvatske 2011. – 2013. i donošenjem Pravilnika o obveznom sadržaju, metodologiji izrade i načinu vrednovanja županijskih razvojnih strategija (NN 53/10), pokrenut je sustavan proces strateškog planiranja razvoja na razini županija u Republici Hrvatskoj. U svim županijama osnovane su županijske razvojne agencije, usvojena je prva generacija županijskih razvojnih strategija izrađenih na načelu partnerstva, uspostavljena su županijska partnerstva radi postizanja konsenzusa oko definiranja razvojnih prioriteta županija i identifikacije prioritetnih razvojnih projekata. Od tada kontinuirano jačaju administrativni kapaciteti za strateško planiranje i upravljanje razvojem na županijskoj razini. Usporedno s pripremama za korištenje EU fondova, županije i njihove razvojne agencije inicirale su koordinaciju županija na razini statističkih regija i počele ostvarivati suradnju. Spomenuti procesi na županijskoj razini poticani su i podupirani sa središnje razine, više kroz tehničku, a manje financijsku pomoć, u pravilu kroz projekte financirane iz pretpristupnih fondova EU (MRRFEU, 2015.). Sukladno Zakonu o regionalnom razvoju Republike Hrvatske (NN 147/14) koji je stupio na snagu u siječnju 2015. godinu, KZZ započela je proces izrade nove Strategije. Odluka o početku postupka izrade Strategije usvojena je dana 28. listopada 2015. godine. Zagorska razvojna agencija, kao regionalni koordinator i tijelo imenovano od strane KZZ za koordinaciju izrade, praćenje i vrednovanje izrade Strategije, započela je postupak izrade Strategije sukladno navedenim Smjernicama. Strategija je temeljni strateški planski dokument jedinice područne (regionalne) samouprave (JP(R)S) u kojem se određuju ciljevi i prioriteti razvoja za područje JP(R)S u svrhu jačanja njenih razvojnih potencijala, s posebnim naglaskom na ulogu velikih gradova i gradova sjedišta županija u poticanju razvoja te na razvoj slabije razvijenih područja. Strategiju donosi JP(R)S u skladu s načelom partnerstva i suradnje nakon prethodno pribavljenog mišljenja partnerskog vijeća za područje županije, uzimajući u obzir potrebu osiguranja ravnomernog razvoja svih dijelova županije. Plan razvojnih programa koji JP(R)S donose sukladno posebnom zakonu kojim se uređuje proračun mora biti u suglasju sa Strategijom. Predmetna Strategija definira tri cilja: Konkurentno gospodarstvo, Razvoj ljudskih potencijala i unapređenje kvalitete života te Održivi razvoj prostora, okoliša i prirode. Svaki cilj podijeljen je na razvojne prioritete KZZ koji sadrže razradu ciljeva, a logično proizlaze iz vizije i ciljeva. Razvojni prioriteti konkretiziraju i utvrđuju sve sastavnice ciljeva. Prioriteti moraju biti: mjerljivi, ostvarivi, jasno formulirani, određeni rokom ostvarenja, međusobno sukladni (ne smiju se preklapati), sveobuhvatni, društveno i okolišno prihvatljivi, u skladu s prioritetima statističkih regija utvrđenih u Strategiji regionalnog razvoja Republike Hrvatske kao i s ciljevima u drugim relevantnim strateškim županijskim i državnim strategijama. Tri specifična cilja s pripadajućim razvojnim prioritetima definirani su kako slijedi: **Cilj 1** **KONKURENTNO GOSPODARSTVO** - **1.1. PRIORITET** Razvoj i unapređenje gospodarske i poduzetničke infrastrukture - **1.2. PRIORITET** Tehnološka modernizacija i jačanje uloge istraživanja i razvoja - **1.3. PRIORITET** Razvoj turizma - **1.4. PRIORITET** Razvoj poljoprivredne proizvodnje **Cilj 2** **RAZVOJ LJUDSKIH POTENCIJALA I UNAPREĐENJE KVALITETE ŽIVOTA** - **2.1. PRIORITET** Izvršnost u odgojno-obrazovnom sustavu - **2.2. PRIORITET** Dostupno i otvoreno zdravstvo i socijalna skrb - **2.3. PRIORITET** Razvoj ljudskih potencijala - **2.4. PRIORITET** Povećanje kvalitete stanovanja i sigurnosti stanovništva - **2.5. PRIORITET** Jačanje kapaciteta organizacija civilnog društva i civilnih inicijativa **Cilj 3** **ODRŽIVI RAZVOJ PROSTORA, OKOLIŠA I PRIRODE** - **3.1. PRIORITET** Očuvanje biološke i krajobrazne raznolikosti u funkciji razvoja - **3.2. PRIORITET** Očuvanje okoliša i održivi razvoj - **3.3. PRIORITET** Razvoj komunalne, prometne infrastrukture i uređenje prostora - **3.4. PRIORITET** Održivo upravljanje prirodnom i kulturnom baštinom Slika 1.1 Pregled ciljeva i prioriteta Strategije razvoja KZŽ Za svaki razvojni prioritet Strategijom su određene mjere organizirane unutar pojedinog razvojnog prioriteta. Pojedinačne mjere za svaki razvojni prioritet prikazane su u nastavku: **CILJ 1: KONKURENTNO GOSPODARSTVO** **Razvojni prioritet 1.1. Razvoj i unapređenje gospodarske i poduzetničke infrastrukture** 1.1.1. Razvoj poduzetničke i gospodarske infrastrukture za podršku tehnološkom razvoju 1.1.2. Proaktivno ulaganje u izgradnju i međusobno povezivanje poduzetničkih zona 1.1.3. Unapređenje kvantitete i kvalitete investicijskih i kreditnih ponuda za poduzetništvo 1.1.4. Poticanje cjeleživotnog obrazovanja i izobrazbe poduzetnika 1.1.5. Poticanje međusobnog povezivanja gospodarskih subjekata i suradnje s lokalnim vlastima 1.1.6. Poticanje razvoja socijalnog (društvenog) poduzetništva 1.1.7. Povećanje razine konkurentnosti i izvoza proizvoda **Razvojni prioritet 1.2. Tehnološka modernizacija i jačanje uloge istraživanja i razvoja** 1.2.1. Poticanje sektora istraživanja i razvoja patenata i inovacija 1.2.2. Modernizacija tehnoloških kapaciteta i poslovnih procesa 1.2.3. Poticanje ulaganja u istraživanje i razvoj, te primjenu znanja **Razvojni prioritet 1.3. Razvoj turizma** 1.3.1. Razvoj selektivnih oblika turizma 1.3.2. Razvoj turističke infrastrukture 1.3.3. Poboljšanje usluga i kapaciteta postojećih turističko-informativnih centara 1.3.4. Brendiranje i promocija Krapinsko-zagorske županije kao poželjne turističke destinacije **Razvojni prioritet 1.4. Razvoj poljoprivredne proizvodnje** 1.4.1. Usklađivanje poljoprivredne infrastrukture za tržište EU 1.4.2. Poticanje okruživanja poljoprivrednih posjeda 1.4.3. Povećanje proizvodne učinkovitosti voćarstva, vinogradarstva i povrćarstva 1.4.4. Poticanje razvoja stočarstva i mljekarstva 1.4.5. Promocija i poticanje ekološke poljoprivredne proizvodnje **CILJ 2. RAZVOJ LJUDSKIH POTENCIJALA I UNAPREĐENJE KVALITETE ŽIVOTA** **Razvojni prioritet 2.1. Izvrsnost u odgojno-obrazovnom sustavu** 2.1.1. Poboljšanje kvalitete usluga sustava odgoja i obrazovanja 2.1.2. Pedagoška standardizacija uvjeta rada i kurikuluma u odgojno-obrazovnim ustanovama 2.1.3. Sustavno ulaganje u ljudske potencijale u obrazovanju 2.1.4. Usklađivanje mreže srednjoškolskih i visokoškolskih programa s potrebama tržišta rada **Razvojni prioritet 2.2. Dostupno i otvoreno zdravstvo i socijalna skrb** 2.2.1. Unapređenje kvalitete i uvjeta rada u zdravstvenim ustanovama 2.2.2. Povećanje konkurentnosti i otvorenosti zdravstvenih ustanova 2.2.3. Razvoj institucija i mreže za brigu o ranjivim skupinama 2.2.4. Razvoj izvaninstitucionalnih i novih oblika podrške osobama kojima prijeti socijalna isključenost 2.2.5. Borba protiv siromaštva i socijalne isključenosti **Razvojni prioritet 2.3. Razvoj ljudskih potencijala** 2.3.1. Integracija osoba u nepovoljnoj poziciji na tržište rada 2.3.2. Jačanje kompetencija stanovništva kroz cjeloživotno učenje 2.3.3. Razvoj sustava poticanja upisa u deficitarna zanimanja 2.3.4. Razvoj programa za mlade 2.3.5. Jačanje kompetencija djelatnika u javnim djelatnostima 2.3.6. Organizacija edukacija ljudskih resursa o EU fondovima i projektima **Razvojni prioritet 2.4. Povećanje kvalitete stanovanja i sigurnosti stanovništva** 2.4.1. Poticanje nastanjuvanja postojećih napuštenih stambenih kapaciteta 2.4.2. Razvoj sustava civilne zaštite 2.4.3. Promocija i jačanje kapaciteta vatrogasnih službi i udruga **Razvojni prioritet 2.5. Jačanje kapaciteta organizacija civilnog društva i civilnih inicijativa** 2.5.1. Unapređenje sposobnosti organizacija civilnog društva za sudjelovanje u upravljanju lokalnim razvojem 2.5.2. Jačanje međusektorske suradnje na svim razinama (civilnog, privatnog i javnog sektora) 2.5.3. Poticanje razvoja volonterstva 2.5.4. Promicanje uključivanja osoba u nepovoljnom položaju u djelovanje OCD-a **CILJ 3. ODRŽIVI RAZVOJ PROSTORA, OKOLIŠA I PRIRODE** **Razvojni prioritet 3.1. Očuvanje biološke i krajobrazne raznolikosti u funkciji razvoja** 3.1.1. Zaštita, očuvanje i jačanje svijesti o prirodnim vrijednostima i bioraznolikosti 3.1.2. Promocija pravilnog gospodarskog korištenja područja pod Natura 2000 3.1.3. Održivo upravljanje i korištenje prirodnih resursa **Razvojni prioritet 3.2. Očuvanje okoliša i održivi razvoj** 3.2.1. Povećanje energetske učinkovitosti u sektoru zgradarstva i javne rasvjete 3.2.2. Korištenje energije iz obnovljivih izvora 3.2.3. Izrada i implementacija programa zaštite i poboljšanje kvalitete zraka, vode, tla, buke i ostalih sastavnica okoliša **Razvojni prioritet 3.3. Razvoj komunalne, prometne infrastrukture i uređenje prostora** 3.3.1. Unapređenje sustava gospodarenja otpadom 3.3.2. Izgradnja i unapređenje sustava vodoprskbe i sustava odvodnje 3.3.3. Zaštita i saniranje klizišta 3.3.4. Poboljšanje prometne infrastrukture 3.3.5. Zaštita od elementarnih nepogoda (poplava, tuče, suše) 3.3.6. Poboljšanje energetskog i komunikacijskog sustava **Razvojni prioritet 3.4. Održivo upravljanje prirodnom i kulturnom baštinom** 3.4.1. Unapređenje sustava planiranja i upravljanja u zaštiti i održivom koristenju prirodne i kulturne baštine 3.4.2. Podizanje razine svijesti stanovništva o važnosti očuvanja prirodne i kulturne baštine 3.4.3. Održavanje kulturne baštine i razvoj kulturnih i kreativnih djelatnosti ## 2 Okolišne značajke područja na koja provedba Strategije može utjecati U nastavku se daje pregled onih komponenti okoliša na koje provedba Strategije može imati utjecaj. | Komponenta okoliša | Analiza provedbe Strategije na pojedinu komponentu okoliša | |-------------------|----------------------------------------------------------| | **Priroda** | Provedba Strategije može imati pozitivne učinke na prirodu u vidu unapređenja zaštite i očuvanja prirode. Revitalizacijom ekološki važnih područja te različitim istraživačkim projektima pozitivno se utječe na prirodne vrijednosti i njihovo očuvanje. Otpad predstavlja jedan od pritisaka na prirodu, odnosno divlje vrste i staništa. To se ogleda u zauzimanju staništa i njihovom onečišćenju uslijed odloženog otpada na divljim odlagalištima, ali i legalnim ali nesanitarnim odlagalištima. Onečišćenjem tla i vode ugrožava se i divlja flora i fauna. Sanacijom divljih odlagališta te samim uređenjem sustava za gospodarenje otpadom uvodenjem recikliranja, doprinosi se smanjenju negativnih pritisaka na prirodu. | | **Tlo** | Odvojenim skupljanjem te recikliranjem otpada smanjuju se količine otpada koje se odlažu na odlagališta, čime se doprinosi smanjenju pritisaka na tlo. Također, sanacijom divljih odlagališta pobjošat će se stanje tla koje je bilo kontaminirano otpadom. Uspostavom sustava za praćenje stanja tla moguće je dobivanje informacija o degradiranosti tla, stvarnom riziku od erozije i onečišćenosti tla što omogućava pravovremenu sanaciju tla i dobivene informacije se mogu koristiti prilikom prostornog planiranja u vidu neplaniranja izgradnje objekata na potencijalnim klizištima. | | **Površinske i podzemne vode** | Sanacijom odlagališta otpada (posebno divljih odlagališta), koja mogu uzrokovati onečišćenje površinskih i podzemnih voda, doprinosi se smanjenju pritiska otpada na kakvoću voda. Priklučenjem većeg broja stanovnika na sustav odvodnje i pročišćavanja otpadnih voda doprinosi se smanjenju opterećenja na površinske i podzemne vode KKŽ. Recikliranje i odvojeno sakupljanje otpada moglo bi pozitivno utjecati na površinske i podzemne vode kroz smanjenje nastalog otpada. Na taj se način smanjuje potrošnja sirovina i energije čime se indirektno utječe na navedenu sastavnicu. Izgradnja fotonaponskih elektrana može predstavljati potencijalnu opasnost vodotocima jer postoji mogućnost da se okoliš elektrana održava pesticidima i da se solarni paneli peru kemijskim sredstvima koja će završiti u tlu i da se na taj način onečiste površinske i podzemne vode. | | **Šumsko područje** | Recikliranje i odvojeno sakupljanje otpada moglo bi pozitivno utjecati na šumsko područje kroz smanjenje nastalog otpada. Na taj se način smanjuje potrošnja sirovina i energije čime se indirektno utječe na navedenu sastavnicu. Kroz kontrolirano održavanje i iskorištavanje šumskih površina, uređivanje šumskih puteva i očuvanje bioraznolikosti šuma očekuje se pozitivan utjecaj na šumsko područje i njegovo očuvanje kao i na očuvanje vrsti koje se nalaze na šumskih staništima. | | **Kvaliteta zraka i klimatološke značajke** | Pozitivno djelovanje na zrak očituje se u vidu poboljšanja gospodarenja otpadom jer bolja obrada otpada dovodi do manjih emisija u okoliš. Uspostavom sustava za mjerenje kakvoće zraka dobio bi se jasniji uvid u stanje onečišćenosti zraka i moguće je pravovremeno reagiranje na povećanje količine onečišćujućih tvari u KZŽ. Poticanjem korištenja sustava OIE na javnim objektima smanjuje se korištenje fosilnih goriva i emisija CO₂. | | **Kulturno-povijesna baština** | Prema podacima KZŽ potrebna je nova sistematizacija zaštićenih i evidentiranih kulturnih dobara, budući da su mnogi devastirani, ruševni ili potpuno nestali te izgubili svojstva po kojima su bili proglašeni zaštićenima. | 7.1.1. Kriteriji za procjenu utjecaja Prilikom procjene utjecaja mjera predloženih Strategijom, koriste se četiri kategorije utjecaja: **Pozitivan utjecaj (+):** Utjecaj je pozitivan ako predložena mjera poboljšava postojeće stanje komponenti okoliša u odnosu na sadašnje stanje ili trend. Do poboljšanja može doći uslijed rješavanja nekog od postojećih okolišnih problema ili uslijed pozitivne promjene postojećeg negativnog trenda. **Negativan utjecaj (-):** Utjecaj se ocjenjuje kao negativan ako se procijeni da se provedbom mjera značajno negativan utjecaj ne može isključiti. Za ovu kategoriju utjecaja definiraju se mjere zaštite okoliša koje mogu isključiti/umaniti mogućnost značajno negativnog utjecaja. **Pozitivan/negativan utjecaj (+/-):** Utjecaj je pozitivan/negativan ako mjera djeluje i pozitivno i negativno na komponentu okoliša, odnosno utjecaj ima značajke pozitivnog i negativnog utjecaja (opisano u tekstu iznad). Za ovu kategoriju utjecaja također se definiraju mjere zaštite okoliša. **Neutralan utjecaj (/):** Utjecaj je neutralan ukoliko mjere na strateškom nivou na komponente okoliša ne generiraju ni pozitivne niti negativne utjecaje. Za ovu kategoriju utjecaja mogu se definirati mjere poboljšanja. Prilikom opisa utjecaja predloženih mjera na okoliš i prirodu, koriste se sljedeći termini koji služe za detaljnije definiranje vrste i opsega pojedinačnih utjecaja: **Neposredan utjecaj** – ako je predložena mjera direktni izvor opisanog utjecaja **Posredan utjecaj** – ako predložena mjera generira promjenu koja je izvor opisanog (budućeg) utjecaja **Kratkoročan utjecaj** – ako djelovanje utjecaja na okoliš/prirodu prestaje unutar 5 godina **Srednjoročan utjecaj** – ako djelovanje utjecaja na okoliš/prirodu prestaje između 5. i 10. godine od početka razvoja utjecaja **Trajan utjecaj** – ako utjecaj ima trajne posljedice po okoliš/prirodu te ne prestaje ni nakon 10 godina **Kumulativan utjecaj** – ako predložena mjera može međudjelovati s drugim predloženim mjerama Strategije ili postojećim ili planiranim aktivnostima, trendovima i zahvatima u prostoru, što generira utjecaje čije je zajedničko djelovanje veće od sume djelovanja pojedinačnih utjecaja **Prekograničan utjecaj** – ako predložena mjera može utjecati na okoliš/prirodu drugih država. | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 1.2.1. Poticanje sektora istraživanja i razvoja patenata i inovacija | Provođenjem mjera ovog prioriteta poboljšat će se uloga istraživanja i razvoja, te primjena znanja u tehnologiji. Uvođenjem poticaja za inovativna rješenja, posredovanjem u povezivanju u inovativna partnerstva, te pomaganjem u prijavljivanju inovativnih projekata na natječaje ojačat će se svijest lokalne zajednice o koristima inovacija. Umrežavanjem poslovnog sektor s istraživačkim institucijama i drugim potpornim institucijama bolje će se iskoristiti postojeći razvojni resursi i potencijali za gospodarski razvoj. Provedbom navedenim mjera modernizirat će se i osnažiti kapaciteti istraživanja i razvoja, potaknuti suradnja između istraživačkih institucija i privatnih poduzeća, te potencijalno ostvariti veća ulaganja u ovaj sektor što će imati pozitivan utjecaj na gospodarstvo KZŽ. | P | T | / | | 1.2.2. Modernizacija tehnoloških kapaciteta i poslovnih procesa | | P P N | T | / | | 1.2.3. Poticanje ulaganja u istraživanje i razvoj, te primjenu znanja | | N | T | / | | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 1.3.1. Razvoj selektivnih oblika turizma | Kroz definiranje razvojnih planova za svaki od selektivnih oblika turizma omogućit će se jasniji uvid u potencijal za razvoj turizma KZŽ kroz mogućnost segregiranog pristupa određenoj problematice te poboljšanjem svakog plana pojedinačno. Redovitim organiziranjem kulturnih događaja radi se na | P N | T | / | | 1.3.2. Razvoj turističke infrastrukture* | | N | T | / | | 1.3.3. Poboljšanje usluga i kapaciteta postojećih turističko- | | N | T | / | | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 1.3.4. Brendiranje i promocija Krapinsko-zagorske županije kao poželjne turističke destinacije | brendiranju turističkog proizvoda KZŽ. S obzirom na navedeno, realizacijom ovih mjera očekuje se pozitivan utjecaj na turizam, odnosno tercijarne djelatnosti gospodarstva KZŽ. Prenamjenom zapuštenih infrastrukturnih objekata u turističke svrhe te ulaganjem u kapacitete turističko-informativnih centara očekuje se poboljšanje turističke ponude kroz bolju opremljenost prostora potrebnom infrastrukturom za turistički razvoj, što pozitivno djeluje na gospodarstvo KZŽ. Provedbom odredbi Master plana razvoja turizma očekuje se pozitivan iskorak k sveobuhvatnom pristupu razvoja turizma u KZŽ što će pozitivno djelovati na brendiranje i promociju KZŽ kao poželjne turističke destinacije. | P | T | / | | *Razvojem turističke infrastrukture zahtijevat će se izgradnja i/ili unapređenje postojeće infrastrukture što potencijalno može imati negativan utjecaj na prirodu, šumsko područje i kulturno-povijesnu baštinu ukoliko će se turistička infrastruktura razvijati kroz izgradnju nove. Iako su planirane aktivnosti kojima se mjera 1.3.2. želi ostvariti unaprijeđenje postojeće infrastrukture te prenamjena zapuštenih infrastrukturnih objekata u turističke svrhe, potencijalno negativan utjecaj u vidu prenamjene staništa te promjene vizura ne može se zanemariti. Također, prilikom izgradnje turističke infrastrukture i popratne komunalne infrastrukture (cesta, vodovod, plinovod..) potencijalno može doći do negativnog utjecaja na kulturno-povijesnu baštinu ukoliko se ona nalazi na području palinarom za prenamjenu/unaprijeđenje/izgradnju. | **Razvojni prioritet 1.4. Razvoj poljoprivredne proizvodnje** | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 1.4.1. Usklađivanje poljoprivredne infrastrukture za tržište EU | Kroz usklađivanje poljoprivredne infrastrukture otvara se mogućnost unaprijeđenja gospodarske infrastrukture u KZŽ. Okrupnjavanjem poljoprivrednih posjeda smanjuje se cijena proizvodnje zbog mogućnosti efektivnog korištenja mehanizacije u poljoprivrednoj proizvodnji. Okupljanjem poljoprivrednih proizvođača u udruge otvara se mogućnost boljeg plasmana na tržištu kroz konkurentnije cijene s obzirom na količinu ponuđenog proizvoda. Kroz | N | T | / | | 1.4.2. Poticanje okrupnjavanja poljoprivrednih posjeda | | P | T | / | | 1.4.3. Povećanje proizvodne učinkovitosti voćarstva, vinogradarstva i povrтарstva | | P | T | / | | 1.4.4. Poticanje razvoja stočarstva i mljekarstva | | P | T | / | | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 2.1.1. Poboljšanje kvalitete usluga sustava odgoja i obrazovanja | Modernizacijom, izgradnjom i obnovom odgojno-obrazovnih ustanova pozitivno će se utjecati na društvenu infrastrukturu te posljedično na odgojno-obrazovne djelatnike (javni/privatni sektor) dok će se podizanjem kvalitete odgojno-obrazovnog sustava pozitivno utjecati na korisnike navedenog sustava (djeca predškolske dobi, učenici i studenti). Pedagoškom standardizacijom prilagodit će se odgojno-obrazovni i nastavni oblici pojedinačnim potrebama svakog učenika. Provedba navedene mjere imat će pozitivan utjecaj na sve skupine odgojno-obrazovnih korisnika – od djece predškolske dobi do učenika srednjih škola. Mjere 2.1.3. i 2.1.4. obuhvaćaju poboljšanje sustava obrazovanja kako bi se poboljšala njegova relevantnost na tržištu rada - mlade je potrebno informirati o prilikama na tržištu rada i usmjeriti ih prema deficitarnim zanimanjima. Sve navedene mjere pozitivno će utjecati na kvalitetu života ljudi dok će mjere 2.1.1. i 2.1.3. pozitivno utjecati na razvoj gospodarstva (privatni i javni sektor). Izgradnjom Regionalnog centar izvrsnosti za turizam i ugostiteljstvo poboljšat će se kvaliteta pružanja turističko-ugostiteljskih usluga, unaprijediti vještine | N P N N | T T T T | / / / / | CILJ 2. RAZVOJ LJUDSKIH POTENCIJALA I UNAPREĐENJE KVALITETE ŽIVOTA Razvojni prioritet 2.1. Izvršnost u odgojno-obrazovnom sustavu | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | Kratkoročan (K), Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 2.1.1. Poboljšanje kvalitete usluga sustava odgoja i obrazovanja | Modernizacijom, izgradnjom i obnovom odgojno-obrazovnih ustanova pozitivno će se utjecati na društvenu infrastrukturu te posljedično na odgojno-obrazovne djelatnike (javni/privatni sektor) dok će se podizanjem kvalitete odgojno-obrazovnog sustava pozitivno utjecati na korisnike navedenog sustava (djeca predškolske dobi, učenici i studenti). Pedagoškom standardizacijom prilagodit će se odgojno-obrazovni i nastavni oblici pojedinačnim potrebama svakog učenika. Provedba navedene mjere imat će pozitivan utjecaj na sve skupine odgojno-obrazovnih korisnika – od djece predškolske dobi do učenika srednjih škola. Mjere 2.1.3. i 2.1.4. obuhvaćaju poboljšanje sustava obrazovanja kako bi se poboljšala njegova relevantnost na tržištu rada - mlade je potrebno informirati o prilikama na tržištu rada i usmjeriti ih prema deficitarnim zanimanjima. Sve navedene mjere pozitivno će utjecati na kvalitetu života ljudi dok će mjere 2.1.1. i 2.1.3. pozitivno utjecati na razvoj gospodarstva (privatni i javni sektor). Izgradnjom Regionalnog centar izvrsnosti za turizam i ugostiteljstvo poboljšat će se kvaliteta pružanja turističko-ugostiteljskih usluga, unaprijediti vještine | N P N N | T T T T | / / / / | | Razvojni prioritet 2.2. Dostupno i otvoreno zdravstvo i socijalna skrb | |---------------------------------------------------------------| | **Mjere** | **Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja)** | **Neposredan Posredan (P)** | **Kratkoročan (K), Srednjoročan (S), Trajan (T)** | **Kumulativan (K) Prekograničan (P)** | | 2.2.1. Unapređenje kvalitete i uvjeta rada u zdravstvenim ustanovama | Povećanje kvalitete zdravstvenih ustanova izravno utječe na građane i potrebno je razviti stabilne temelje njegovog funkcioniranja. Obnovom i izgradnjom ustanova za skrb i njegovanje ranjivih skupina utjecat će pozitivno na društvenu infrastrukturu kao i na zaposlenike u navedenim ustanovama (javni i privatni sektor) te život ranjivih skupina bez adekvatne skrbi (starije i nemoćne osobe, osobe s invaliditetom, osobe s posebnim potrebama, djeca i mlađi bez odgovarajuće skrbi). Sve mjere ovog priorитетa utjecat će pozitivno na kvalitetu života ljudi u KZZ | N | T | / | | 2.2.2. Povećanje konkurentnosti i otvorenosti zdravstvenih ustanova | | N | T | / | | 2.2.3. Razvoj institucija i mreže za brigu o ranjivim skupinama | | N | T | / | | 2.2.4. Razvoj izvaninstitucionalnih i novih oblika podrške osobama kojima prijeti socijalna isključenost | | N | T | / | | 2.2.5. Borba protiv siromaštva i socijalne isključenosti | | N | T | / | | Razvojni prioritet 2.3. Razvoj ljudskih potencijala | |---------------------------------------------------| | **Mjere** | **Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja)** | **Neposredan Posredan (P)** | **Kratkoročan (K), Srednjoročan (S), Trajan (T)** | **Kumulativan (K) Prekograničan (P)** | | 2.3.1. Integracija osoba u nepovoljnoj poziciji na tržište rada | Pružanjem financijske podrške za realizaciju poduzetničkih ideja, poticanjem samozaopšljavanja nezaposlenih osoba te financijskim potporama poslodavcima za zapošljavanje istih pozitivno će se utjecati na osobe u nepovoljnoj poziciji na tržištu rada dok će se drugom mjerom kroz poticanje cijeloživotnog učenja utjecati na povećanje mogućnosti samozaopšljavanja i zapošljavanja općenito. Cilj mjera 2.3.3. i 2.3.4. je da se kadrovski potencijali pravilno i pravodobno informiraju o potrebama tržišta rada i usmjeri prema deficitarnim zanimanjima koja su aktualna na tržištu. Mjera 2.3.5. je usmjerenja jačanju kapaciteta javne službe kroz podizanje razine znanja i | N | T | / | | 2.3.2. Jačanje kompetencija stanovništva kroz cijeloživotno učenje | | N | T | / | | 2.3.3. Razvoj sustava poticanja upisa u deficitarna zanimanja | | N | T | / | | 2.3.4. Razvoj programa za mlade | | N | T | / | | 2.3.5. Jačanje kompetencija dječjelatnika u javnim djelatnostima | | N | T | / | | 2.3.6. Organizacija edukacija ljudskih resursa o EU fondovima i polaznika programa iz područja turizma i ugostiteljstva. Rekonstrukcijom i nadogradnjom postojeće zgrade Srednje škole Bedekovčina i izgradnjom poligona za nastavu poljoprivrednih usmjerenja doprinijet će kvalitetnijoj provedbi praktične nastave, svladavanju novih tehnologija u poljoprivredi za srednjoškolske programe i izlazak kvalitetnog i konkurentskog kadra na tržište rada u skladu s potrebama gospodarstva. | N | T | / | | Razvojni prioritet 2.4. Povećanje kvalitete stanovanja i sigurnosti stanovništva | |---------------------------------|---------------------------------|-----------------|-----------------|-----------------| | **Mjere** | **Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja)** | **Neposredan Posredan (P)** | **Kratkoročan Srednjoročan (S), Trajan (T)** | **Kumulativan (K) Prekograničan (P)** | | 2.4.1. Poticanje nastanijevanja postojećih napuštenih stambenih kapaciteta | Mjere iz prioriteta 2.4. odnose se na povećanje kvalitete stanovanja i sigurnosti stanovništva KZZ. Izrada plana zaštite i intervencija omogućit će bolje djelovanje institucija za spašavanje u opasnim situacijama. Mjere 2.4.2. i 2.4.3. su usmjerene na razvoj sustava zaštite i spašavanja čime će se podići kvaliteta i sigurnost života stanovništva dok se provedbom mjere 2.4.1. ne očekuje utjecaj na sastavnice okoliša. Izgradnja i ustrojavanje Vatrogasnog vježbališta omogućit će osposobljavanje i usavršavanje vatrogasnih kadrova. | / | / | / | | 2.4.2. Razvoj sustava civilne zaštite | | P N | T | / | | 2.4.3. Promocija i jačanje kapaciteta vatrogasnih službi i udruga | | P N | T | / | | Projekt Vatrogasno vježbalište | | N | T | / | | Razvojni prioritet 2.5. Jačanje kapaciteta organizacija civilnog društva i civilnih inicijativa | |---------------------------------|---------------------------------|-----------------|-----------------|-----------------| | **Mjere** | **Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja)** | **Neposredan Posredan (P)** | **Kratkoročan Srednjoročan (S), Trajan (T)** | **Kumulativan (K) Prekograničan (P)** | | 2.5.1. Unapređenje sposobnosti organizacija civilnog društva za sudjelovanje u upravljanju lokalnim razvojem | Mjere iz ovog prioriteta usmjerene su jačanju civilnog sektora i kapaciteta organizacija civilnog društva u KŽŽ. Mjerama 2.5.1. i 2.5.2. potiče se partnerstvo između sektora, a izradom plana njihovo daljnje djelovanje i suradnju. Volonterstvo predstavlja odgoj mladih kojima ih se priprema za aktivnu građansku ulogu čime će oni stvoriti društvenu solidarnost te se mjerom 2.5.3. potiče na ovakav tip aktivnosti. Organizacije civilnog društva će preuzeti na sebe odgovornost promicanja nediskriminacije i osviještavati će lokalno stanovništvo o njojenoj važnosti za bolji takt cjelokupne zajednice. Mjera 2.5.4. potiče | P P | T | / | | 2.5.2. Jačanje međusektorske suradnje na svim razinama (civilnog, privatnog i javnog sektora) | | P P | T | / | | 2.5.3. Poticanje razvoja volonterstva | | P | T | / | | 2.5.4. Promicanje uključivanja osoba u nepovoljnom položaju u djelovanje OCD-a | | P | T | / | nediskriminaciju i uključivanje osoba u nepovoljnom položaju u civilno društvo što će pozitivno djelovati na kvalitetu života stanovništva. **CILJ 3. ODRŽIVI RAZVOJ PROSTORA, OKOLIŠA I PRIRODE** **Razvojni prioritet 3.1. Očuvanje biološke i krajobrazne raznolikosti u funkciji razvoja** | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) (N), | Kratkoročan Srednjoročan (S), Trajan (T) (K), | Kumulativan (K) Prekograničan (P) | |-------|---------------------------------------------------------------|-----------------------------|---------------------------------|----------------------------------| | 3.1.1. Zaštita, očuvanje i jačanje svijesti o prirodnim vrijednostima i bioraznolikosti | Edukacija i poticanje lokalnog stanovništva na pomoć u planiranim akcijama zaštite okoliša uvelike mogu utjecati na očuvanje bioraznolikosti i zaštićenih područja KZŽ. Revitalizacijom uništenih i degradiranih staništa obnovit će se karakteristični prirodni uvjeti te prilagoditi stanje prvotnom stanju staništa. Očekuje se pozitivan utjecaj revitalizacije na prirodu i na očuvanje prirodnosti područja te kvalitetu života lokalnih zajednica, s obzirom da se kroz zaštitu okoliša štiti i životni prostor ljudi. S obzirom da površina Natura 2000 područja u KZŽ iznosi 10 % te predstavlja mrežu posebnih stanišnih tipova i osmišljena je za njihovo očuvanje te očuvanje rijetkih, ugroženih i endemičnih vrsta divljih životinja i biljaka, važno je prepoznati ova područja kao područja iznimne vrijednosti KZŽ i kao takve ih prezentirati turistima i izletnicima kako bi i oni pridonijeli zaštiti i očuvanju. Informiranjem i edukacijom ukazalo bi se na važnost pravilnog gospodarskog korištenja unutar mreže Natura 2000 kako bi se izbjegle štetne aktivnosti koje bi mogle značajno uznetmiriti vrste ili narušiti staništa zbog kojih je to područje odabrano. Uređivanje šumskih tematskih puteva u KZŽ, održivim gospodarenjem i iskorištavanje šumskih površina moglo bi se pozitivno odraditi, osim na bioraznolikost, i na razvoj turističke ponude u KZŽ čime bi se povećao gospodarski doprinos turizma. Valorizacijom prirodnih resursa stekao bi se jasan uvij u kvantitetu i kvalitetu prirodnih resursa, a pametnim i optimalnim korištenjem očuvat će se dobro stanje okoliša. Sukladno tome, provedba ove mjere imat će pozitivan utjecaj na sastavnice okoliša šumsko područje i tunzam. | N P | T | / | | 3.1.2. Promocija pravilnog gospodarskog korištenja područja pod Natura 2000 | | N | T | / | | 3.1.3. Održivo upravljanje i korištenje prirodnih resursa | | N P | T | / | | Razvojni prioritet 3.2. Očuvanje okoliša i održivi razvoj | |--------------------------------------------------------| | **Mjere** | **Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja)** | **Neposredan Posredan (P)** | **(N), Kratkoročan Srednjoročan (S), Trajan (T)** | **Kumulativan (K) Prekograničan (P)** | | 3.2.1. Povećanje energetske učinkovitosti u sektoru zgradarstva i javne rasvjete | Kroz ulaganje u energetsku obnovu zgradarstva i provođenje projekata za energetska učinkovitost u KZZ smanjit će se nepotrebni gubitak energije, a time i poboljšati kvalitetu života lokalnog stanovništva smanjenjem troškova stanovanja. Zamjenom neučinkovitih rasvjetnih tijela energetski učinkovitim smanjit će se troškovi održavanja osvjetljenih javnih gradskih površina i razina svijetlosnog zagadenja, što će pozitivno utjecati na kvalitetu života u KZZ. Poticanjem korištenja sustava OIE na javnim objektima smanjuje se korištenje fosilnih goriva i emisija CO₂. Realizacijom mjere 3.2.3. dobio bi se jasniji uvid u stanje tla, kakvoću zraka, zdravstvenu ispravnost vode te razinu buke u KZZ. Uspostavom sustava za praćenje stanja i promjene svojstava tla u KZZ ostvario bi se prvi korak u zaštiti i očuvanju prirodnih funkcija tla te sprečavanju degradacijskih procesa. Pravovremeno otkrivanje povećanih koncentracija teških metala i potencijalno toksičnih elemenata te mjerenje postojećih organskih onečišćivača (pesticidi, herbicidi) u poljoprivrednim tlima, potaknuло bi poduzimanje određenih mjera i sanaciju tla prije nego postane ozbiljna prijetnja za okoliš i počne negativno utjecati na kvalitetu života ljudi. Također, identifikacijom degradiranih tla i tla kojima prijeti opasnost od nastanka klizišta spriječilo bi se buduće prostorno planiranje i izgradnja objekata na područjima potencijalnih klizišta i erozivnim područjima, čime se direktno smanjuje mogućnost nesreća i novčanih gubitaka. Suzbijanje ovih problema moguće je uz razvoj i primjenu sustava za kontinuirano praćenje kakvoće tla pa se provedbom ove mjere očekuje pozitivan utjecaj na sastavnicu tlo. Provedbom mjere 3.2.3. očekuje se pozitivan utjecaj na kvalitetu zraka i klimatske značajke. Poboljšanjem | P | T | / | | Projekt NEWLIGHT - Masterplan javne rasvjete | N | T | / | | Projekt Energetski centar Bračak | N | T | / | | 3.2.2. Korištenje energije iz obnovljivih izvora | / | / | / | | 3.2.3. Izrada i implementacija programa zaštite i poboljšanje kvalitete zraka, vode, tla, buke i ostalih sastavnica okoliša | P | P | P | P | T | / | | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | (N), Kratkoročan Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|-----------------------------------------------|-----------------------------------| | 3.3.1. Unaprijeđenje sustava gospodarenja otpadom | Odvojenim skupljanjem te recikliranjem otpada smanjuju se količine otpada koje se odlazu na odlagališta, čime se smanjuje pritisak na tlo. Sanacijom divljih odlagališta u KZŽ poboljšat će se opće stanje tla koje je bilo kontaminirano otpadom. Provedbom mjere očekuje se pozitivan utjecaj na sastavnicu tlo, ali i na sastavnicu priroda. Sanacijom odlagališta otpada (posebno divljih odlagališta), koja mogu uzrokovati onečišćenje voda, doprinosi se smanjenju pritiska otpada na kakvoću površinskih i podzemnih voda. | P P P N N N N | T T T T | / / / / | Realizacijom projekta NEWLIGHT - Masterplan javne rasvjete povećat će se sigurnost u prometu (povećanje kvalitete rasvijetljenosti prometnica i pijesčkih zona), smanjiti svjetloonečišćenje te postići energetske i novčane uštede. Drugi projekt povezan s ovim prioritetom je uspostava Energetskog centra Bracak kao regionalnog centra izvrsnosti i znanja za energetsku učinkovitost i obnovljive izvore energije. Energetski centar bio bi stručna potpora svim županijama, gradovima i općinama u realizaciji energetskih i razvojnih strategija. Neke od aktivnosti u okviru Energetskog centra su poticanje razvoja malog i srednjeg poduzetništva kroz edukativno-prezentacijski centar i poduzetnički inkubator za mlade tvrtke iz područja energetike i održive gradnje. | Marija Bistrica – Zlatar Bistrica – Zabok (Mokrice) sa spojem na Breznički Hum | Na području KZZ na sustav odvodnje otpadnih voda priključeno je tek oko 20% stanovništva. Većina naselja i kućanstava nema riješenu odvodnju te svoje otpadne vode ispuštaju u sabirne jame ili na druge načine dovode do prirodnih recipijenata. Time se uzrožava i mijenja kakvoća površinskih i podzemnih voda. Provedbom mjere 3.3.2. i priključenjem većeg broja stanovnika na sustav odvodnje i pročišćavanja otpadnih voda doprinosi se smanjenju opterećenja na površinske i podzemne vode KZZ, što pozitivno utječe na iste. Mjera 3.3.3. predlaže identifikaciju potencijalnih kritičnih područja klizišta. Omogući će se pravovremena reakcija te izbjegavanje gradnje objekata i prometnica na rizičnim područjima, što će kao posljedicu imati smanjenje troškova KZZ. Sanacijom klizišta povećat će se sigurnost na prometnicama, kako za sudionike u prometu, tako i za samu očuvanost infrastrukture. Modernizacijom i obnovom prometne infrastrukture pozitivno se utječe na sastavnicu okoliša ostala materijalna dobra. Realizacijom mjere 3.3.5., identifikacijom kritičnih područja u KZZ i sanacijom područja pogodjenih elementarnim nepogodama, doprinosi se poboljšanju kvalitete života stanovništva u tim područjima. Provedbom mjere 3.3.6. i modernizacijom ove infrastrukture može se doprinijeti efikasnijem korištenju usluga koje nude elektroenergetski i komunikacijski sustavi. Izgradnjom brze ceste Popovec – Marija Bistrica – Zlatar Bistrica – Zabok (Mokrice) sa spojem na Breznički Hum podići će se kvaliteta prometne infrastrukture jugoistočnog dijela KZZ, rasteraćenje prometnica u Zagrebu i povezanost autocesta A2 Zagreb – Macej i A3 Zagreb – Varaždin – Goričan. Osigurat će se brza i sigurnija vožnja za korisnike uz Brzu cestu te za razvoj gospodarstva ovog područja KZZ. | | --- | --- | | 3.3.5. Zaštita od elementarnih nepogoda (poplava, tuče, suše) | N P | T | / | | 3.3.6. Poboljšanje energetskog i komunikacijskog sustav* | P N | T | / | *Aktivnosti predložene mjerama Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, Poboljšanje prometne infrastrukture te Poboljšanje energetskog i komunikacijskog sustava najvjerojatnije će zahtijevati izgradnju i/ili proširenje infrastrukture što vjerojatno u kasnijim fazama projekta može imati negativan utjecaj na prirodu, šumsko područje, vode, tlo, krajobrazne značajke i kulturno-povijesnu baštinu ali se njegov značaj na razini strateške procjene ne može odrediti. | Mjere | Komponente okoliša na koje je moguć utjecaj (kategorija utjecaja) | Neposredan Posredan (P) | (N), | Kratkoročan Srednjoročan (S), Trajan (T) | Kumulativan (K) Prekograničan (P) | |----------------------------------------------------------------------|------------------------------------------------------------------|--------------------------|------|------------------------------------------|-----------------------------------| | 3.4.1. Unaprijeđenje sustava planiranja i upravljanja u zaštiti i održivom korištenju prirodne i kulturne baštine | Provedba mjera Unaprijeđenje sustava planiranja i upravljanja u zaštiti i održivom korištenju prirodne i kulturne baštine, Podizanje razine svijesti stanovništva o važnosti očuvanja prirodne i kulturne baštine i Održavanje kulturne baštine i razvoj kulturnih i kreativnih djelatnosti pozitivno će utjecati na prirodnu i kulturnu baštinu kroz aktivnosti kao što su -uspostava sustava praćenja ugroženosti prirodne i kulturne baštine, ubrzavanje donošenja planova upravljanja za navedenu baštinu, unaprijeđenje mehanizama financiranja, uspostava mehanizma za regionalno i lokalno sufinanciranje projekata za održivo upravljanje prirodnom i kulturnom baštinom, edukacija lokalnih i regionalnih vlasti o važnosti prirodne i kulturne baštine, podizanje razine svijesti učenika i studenata o temi održivog korištenja prirodne i kulturne baštine, poduzimanje mjera i radova nužnih za očuvanje prirodne i kulturne baštine te obnova i opremanje postojeće objekte kulturne infrastrukture. | P P | | T | / | | 3.4.2. Podizanje razine svijesti stanovništva o važnosti očuvanja prirodne i kulturne baštine | | P P | | T | / | | 3.4.4. Održavanje kulturne baštine i razvoj kulturnih i kreativnih djelatnosti | | N P | | T | / | 3.2.2 Opis mogućih negativnih utjecaja mjera na komponente okoliša U nastavku se prikazuju mogući negativni utjecaji mjera na komponente okoliša. | Komponenta okoliša | Analiza provedbe Strategije na pojedinu komponentu okoliša | |--------------------|----------------------------------------------------------| | Priroda | Aktivnosti predložene mjerama Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, Poboljšanje prometne infrastrukture te Poboljšanje energetskog i komunikacijskog sustava najvjerojatnije će zahtijevati izgradnju i/ili proširenje infrastrukture što može u kasnijim fazama imati negativan utjecaj na prirodu ali se njegov značaj na strateškoj razini ne može predvidjeti. Razvojem turističke infrastrukture zahtijevat će se izgradnja i/ili unapređenje postojeće infrastrukture što će potencijalno imati negativan utjecaj na prirodu ukoliko će se turistička infrastruktura razvijati kroz izgradnju novih kapaciteta. | | Tlo | Aktivnosti predložene mjerama Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, Poboljšanje prometne infrastrukture te Poboljšanje energetskog i komunikacijskog sustava najvjerojatnije će zahtijevati izgradnju i/ili proširenje infrastrukture što može u kasnijim fazama imati negativan utjecaj na tlo i vode ali se njegov značaj na strateškoj razini ne može predvidjeti. | | Površinske i podzemne vode | Aktivnosti predložene mjerama Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, Poboljšanje prometne infrastrukture te Poboljšanje energetskog i komunikacijskog sustava najvjerojatnije će zahtijevati izgradnju i/ili proširenje infrastrukture što može u kasnijim fazama imati negativan utjecaj na šumsko područje (fragmentacija, otvaranje novih rubova šuma, onečišćenje) ali se njegov značaj na strateškoj razini ne može predvidjeti.. Razvojem turističke infrastrukture zahtijevat će se izgradnja i/ili unapređenje postojeće infrastrukture što će potencijalno imati negativan utjecaj na šumsko područje ukoliko će se turistička infrastruktura razvijati kroz izgradnju novih kapaciteta. | | Šumsko područje | Aktivnosti predložene mjerama Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, Poboljšanje prometne infrastrukture te Poboljšanje energetskog i komunikacijskog sustava najvjerojatnije će zahtijevati izgradnju i/ili proširenje infrastrukture što može u kasnijim fazama imati negativan utjecaj na šumsko područje (fragmentacija, otvaranje novih rubova šuma, onečišćenje) ali se njegov značaj na strateškoj razini ne može predvidjeti.. Razvojem turističke infrastrukture zahtijevat će se izgradnja i/ili unapređenje postojeće infrastrukture što će potencijalno imati negativan utjecaj na šumsko područje ukoliko će se turistička infrastruktura razvijati kroz izgradnju novih kapaciteta. | | Krajobrazne značajke | Aktivnosti predložene mjerom Poboljšanje prometne infrastrukture može ovisno o lokaciji prometnica imati nepovoljan utjecaj na vizualni identitet prostora kojim prometnica prolazi, a time i utjecati na prirodni i kulturni krajolik. | | Kulturno-povijesna baština | Razvoj turističke infrastrukture zahtijevat će se izgradnja i/ili unapređenje postojeće infrastrukture što će potencijalno imati negativan utjecaj na kulturno-povijesnu baštinu ukoliko će se turistička infrastruktura razvijati kroz izgradnju nove. Prilikom izgradnje turističke infrastrukture i popratne komunalne infrastrukture (cesta, vodovod, plinovod..) potencijalno može doći do negativnog utjecaja na kulturno-povijenu baštinu ukoliko se ona nalazi na području palniranom za prenamjenu/unaprijedenje/izgradnju. | 4 Mjere zaštite okoliša Analizirane mjere pozitivno će djelovati na komponente okoliša, dok su za manji broj mjera mogući potencijalno negativni utjecaji u kasnijoj provedbi. To su mjere cilja Konkurentno gospodarstvo – 1.3.2. Razvoj turističke infrastrukture te cilja Održivi razvoj prostora, okoliša i prirode – 3.3.2. Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, 3.3.4. Poboljšanje prometne infrastrukture i 3.3.6. Poboljšanje energetskog i komunikacijskog sustava te se za njih predlažu mjere ublažavanja mogućeg nepovoljnog utjecaja. 1) Planirati korištenje već postojećih putova i cesta za pristup gradilištima kako bi se umanjila degradacija tla i postojećeg vegetacijskog pokrova. U slučaju potrebe probijanja novih cesta, raditi to u prostorima gdje je vegetacija rjeđe zastupljena. Korištenu mrežu puteva nakon završetka građevinskih radova sanirati. Prilikom izvođenja radova gradilišta prostorno ograničiti samo na nužno potrebne površine. 2) Za vrijeme izgradnje prometnica posebnu pažnju usmjeriti pravilnoj organizaciji gradilišta te izraditi projekt privremene regulacije prometa s jasno definiranim točkama na postojeći prometni sustav i osiguranjem svih kolizionih točaka tijekom izvođenja zahvata. 3) Na površinama koje neće biti neposredno zahvaćene građevinskim radovima zadržati postojeću vegetaciju, posebno autohtono drveće i grmlje, kao staništa gmazova, gnijezdilišta ptica i sklioništa malih sisavaca, te zbog vizualne barijere prema predmetnom zahvatu. Za iste predvidjeti sanaciju u fazi biološke rekultivacije ukoliko dođe do oštećenja na širem području obuhvata. 4) Nadzemne dijelove pripadajućih objekata prilagoditi prostoru uvažavajući elemente tradicionalne arhitekture kako bi što manje odudarali od okoline, a pozicioniranje zahvata maksimalno prilagoditi reljefnim karakteristikama područja kako bi se promjene svele na najmanju moguću mjeru. Teren oko previdenih zahvata urediti u skladu s lokalnim, krajobraznim obilježjima, koristeći autohtonu vegetaciju. Za rekultivaciju koristiti tlo prikupljeno s lokacije zahvata. 5) Gradnju infrastrukturnih i gospodarskih objekata u šumskim područjima usmjeravati na manje vrijedne zone a eventualno zauzimanje šumskih područja treba ići na račun neobraslih te djelomično obraslih šumskih zemljišta, šikara i lošijih panjača. 6) Lovno gospodarske osnove gospodarenja lovisti ma uskladiti s novonastalim lovoproduktivnim površinama i s pripadajućim bonitetima za sve vrste divljači. 7) Zaštititi sva tla bez obzira na način korištenja i bonitetnu vrijednost. 8) Radi izbjegavanja potencijalno negativnih utjecaja na nepokretnu kulturnu baštinu, prilikom odabira lokacije za zahvate u prostoru zatražiti mišljenje nadležnog Konzervatorskog odjela. Infrastrukturne zahvate planirati izvan prostornih međa kulturnog dobara, a unutar prostornih međa u postojećim koridorima. Nadzemne dijelove planiranih objekata uskladiti s obilježjima zatečenih povijesnih građevina i neposredne okoline, kulturno-povijesnih cjelina i krajobraza, kako bi se umanjile vizualno konfliktnе situacije. 9) Radi prevencije negativnog učinka čl. 45. Zakona o zaštiti i očuvanja kulturnih dobara na provedbu Strategije, prije poduzimanja planiranih zahvata u prostoru potrebno je za svaki zahvat provesti arheološki pregled terena i po potrebi probna arheološka istraživanja kojima će se odrediti opseg zaštitnih arheoloških istraživanja, dokumentiranja i konzervacija nalaza i nalazišta. 10) Radi osiguranja opstojnosti nematerijalne kulturne baštine, potrebno je osigurati njeno poštivanje i uvažavanje te podizanje svijesti o njoj važnosti. 11) Prilikom izgradnje i unapređenja sustava vodoopskrbe i sustava odvodnje koristiti koridore postojećih prometnica i drugih infrastrukturnih vodova te preferirati izgradnju u izgrađenom građevinskom području. 12) Za svaki planirani zahvat ishoditi vodopravne uvjete. 13) Predvidjeti praćenje sastava i kvalitete otpadnog mulja iz uređaja za pročišćavanje otpadnih voda te u skladu s rezultatima predložiti njegovo zbrinjavanje. 5 Zaključak Nakon provedene procjene utjecaja, kako svake mjere posebno, tako i grupiranih unutar razvojnih prioriteta, ustanovljeno je da je predmetna Strategija dokument koji uključuje predložene razvojne potrebe KZŽ i područja prirodnih i demografskih resursa, zaštite okoliša, gospodarstva, poslovne i tehnološke infrastrukture, tržišta rada, društvenih djelatnosti i upravljanja razvojem bez konkretnih intervencija u okolišu. Zbog svega navedenog, u ovoj fazi za većinu od 56 predloženih mjera možemo isključiti mogućnost značajnih negativnih utjecaja na komponente okoliša. Za 4 mjere (1.3.2. Razvoj turističke infrastrukture, 3.3.2. Izgradnja i unapređenje sustava vodoopskrbe i sustava odvodnje, 3.3.4. Poboljšanje prometne infrastrukture i 3.3.6. Poboljšanje energetskog i komunikacijskog sustava ne može se isključiti nepovoljan utjecaj na okoliš, ali se njegov značaj na strateškoj razini ne može procijeniti s obzirom da nisu poznate lokacije aktivnosti koje će se provoditi realizacijom navedenih mjera. Na temelju članka 68. Zakona o zaštiti okoliša („Narodne novine“, broj 80/13, 153/13 i 78/15) i članka 17. Statuta Krapinsko-zagorske županije („Službeni glasnik Krapinsko-zagorske županije“, broj 13/01, 5/06, 14/09, 11/13 i 26/13-pročišćeni tekst), Županijska skupština Krapinsko-zagorske županije na 21. sjednici održanoj dana __. rujna 2016. godine donijela je **O D L U K U** o usvajanju Strateške studije utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine I. Usvaja se Strateška studija utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine. II. Strateška studija utjecaja na okoliš Strategije razvoja Krapinsko-zagorske županije do 2020. godine čini sastavni dio ove Odluke. III. Ova Odluka objaviti će se u „Službenom glasniku Krapinsko-zagorske županije.“ **PREDsjEDNICA** **ŽUPANIJSKE SKUPŠTINE** Vlasta Hubicki, dr.vet.med. Dostaviti: 1. Zagorska razvojna agencija d.o.o., 2. Upravni odjel za gospodarstvo, poljoprivredu, promet, komunalnu infrastrukturu i EU fondove, 3. „Službeni glasnik Krapinsko-zagorske županije“, za objavu, 4. Za zbirku isprava, 5. Za prilog zapisniku, 6. Pismohrana.
<urn:uuid:d0223040-c53b-4e62-a700-6183fe71d7ab>
HuggingFaceFW/finepdfs/tree/main/data/hrv_Latn/train
finepdfs
hrv_Latn
67,934
People want a Progressive, Growing and Vibrant community. THEIR CONCERNS * The lack of upwardly mobile jobs * The lack of organized activities for kids * Kids graduate and leave the community (and aren't returning) * The need for better and more accessible internet service * The (lack of) availability of a stronger workforce (skills matched with emerging technology and workforce needs) * The lack of a shared vision for the community * Resistance to change * The housing shortage * The need for community pride and engagement * Lack of access to (affordable public) transportation * The struggle of small businesses 1 "The older generation is resistant to change and bringing new (ideas and businesses) to the community; and the younger generation doesn't want to stay because there is nothing here." "We have an identity crisis both as individuals and a community. We don't like change, but we want different results." Carroll County Residents, 2019 2 3 People and organizations they trust: * Carroll County Chamber of Commerce * Flora Community Club * Redevelopment Commission (whether this was city or county wasn't specified) * Carroll County Community Foundation Additional Notes from Research Sessions for the Community Foundation's Reference: * Reference the Community Conversation Report for Carroll County for additional information from Community Strategic Plan Summaries for other proposed actions in this Aspiration. We asked each member of the group where the community foundation could make the most impact regarding this aspiration? * Help with residential development to create quality of life and place-making. * Help develop leadership. 4 Progressive, Growing and Vibrant community Harwood stage of community life is Undetermined, due to the various issues this aspiration covers. Discussion on what role the Community Foundation could play in this Aspiration: * The challenge in Carroll County is that many individuals are interested, but they don't have a good understanding of the metrics reflected in 'vibrant/growing.' There are still a lot of silos in this area, as well. * Some of these efforts could be seeded and worked on by Community Foundation, like the Leadership and Work Ethic Certificate Programs. CF could facilitate a discussion among the Superintendent and Principal of Delphi School on the Work Ethic Certificate Program and maybe offer to present it to the school board, as well. * The Community Foundation could help with getting some unrestricted funds dedicated to Work Ethic Certificate Program in Delphi. * There was also discussion of the Innovation Center's needs. They will be applying for a Community Foundation Special Grant to repair their roof. The community foundation will focus on the following actions: * Facilitating a discussion among Delphi School Administrators and Ivy Tech (Jake Adams) about the Work Ethic Certificate Program to see how all parties could work together to bring Work Ethic Certificate Program into the Delphi schools. * Contact and discuss with Julia Leahy about what it would take to get the Leadership Development program re-activated. And this role: * Convener * Possible funder. 5 Action Plan for Progressive, Growing and Vibrant Community NOTE: Funds for these Actions would not be from the GIFT VII monies but would come from the Community Foundation's regular funds.
<urn:uuid:401dbdc2-7d97-4f67-9602-cffd8a9dea27>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
3,381
Investors Group Women's Mid-Amateur Championship Bay of Quinte Golf & Country Club, Belleville, ON Tuesday, August 30 - Thursday, September 1, 2005 Overall Results for Low Gross Score | Place | Name | Club Affiliation | Rnd. 1 | Rnd. 2 | Rnd. 3 | Total | |---|---|---|---|---|---|---| | 1 | Mary Ann Lapointe | The Club at North Halton | 67 | 68 | - | 135 | | 2 | Terrill Samuel | Weston G&CC | 75 | 78 | - | 153 | | 3 | Jeanne Beaith | Dalewood GC | 75 | 79 | - | 154 | | 4 | Jennifer Lochhead | Hamilton G & CC | 77 | 78 | - | 155 | | 5 | Allison Kim | Donalda Club | 81 | 75 | - | 156 | | 6 | Susan Wickware | Ladies GC of Toronto | 81 | 76 | - | 157 | | 7 | Laila Rintamaki | Mill Run GC | 76 | 82 | - | 158 | | 8 | Judy Dotten | Public Player | 79 | 80 | - | 159 | | T9 | Ivy Steinberg | Granite GC | 77 | 83 | - | 160 | | T9 | Virginia Mawer | Westmount Golf & Country Club | 78 | 82 | - | 160 | | T11 | Jennifer Lavis | Tarandowah GC | 78 | 83 | - | 161 | | T11 | Julie Jarvis | Barcovan Golf Club | 78 | 83 | - | 161 | | 13 | Sandy Billyard | Port Colborne Golf & Coun | 75 | 87 | - | 162 | | T14 | Jean Boynton | Ladies GC of Toronto | 80 | 84 | - | 164 | | T14 | Shirley Ann Gowing | Stratford Golf & CC | 84 | 80 | - | 164 | | T14 | Angela Colm | Whitevale GC | 84 | 80 | - | 164 | | T17 | Jennifer Kuntz | Public Player | 81 | 84 | - | 165 | | T17 | Carol Quan | Highland Gate Golf Club | 80 | 85 | - | 165 | | T17 | Kathy Pilkey | Sarnia G&CC | 80 | 85 | - | 165 | | T20 | Debbie Mcdonald | Sarnia G&CC | 80 | 86 | - | 166 | | T20 | Catherine Butler | Georgian Bay Club | 78 | 88 | - | 166 | | T20 | Rosemary Salvatore | Markland Wood GC | 83 | 83 | - | 166 | | 23 | Sarah-Anne Smurlick | Freedom Oaks Golf Club | 83 | 84 | - | 167 | | T24 | Julie Green | The Club at North Halton | 84 | 84 | - | 168 | | T24 | Margo McGeorge-Dolsen | Beach Grove G&CC | 84 | 84 | - | 168 | | T26 | Cathy Thomas | Craigowan G & CC | 84 | 85 | - | 169 | | T26 | Pamela Welsh | Royal Ashburn Golf Club | 82 | 87 | - | 169 | | T26 | Susan Pearl | Public Player | 86 | 83 | - | 169 | | T29 | Kim Davis | Garrison Golf & Curling C | 82 | 88 | - | 170 | | T29 | Dessa Kaspardlov | Essex G & CC | 83 | 87 | - | 170 | | 31 | Betty Divok | Rockway Vineyards | 83 | 88 | - | 171 | | T32 | Kelli Dingle | Barcovan Golf Club | 81 | 91 | - | 172 | | T32 | Lisa Strutt | Markland Wood GC | 84 | 88 | - | 172 | | T32 | Jo Ann Smith | Garrison Golf & Curling C | 84 | 88 | - | 172 | | 35 | Ann Griffin | Whitevale GC | 87 | 86 | - | 173 | | 36 | Judy Stewart | Barrie CC | 79 | 95 | - | 174 | | T37 | Helene Corcoran | Garrison Golf & Curling C | 86 | 89 | - | 175 | | T37 | Helen Williams | Station Creek GC- North | 83 | 92 | - | 175 | | T37 | Diane Fitzpatrick | Deer Ridge Golf Club | 89 | 86 | - | 175 | | T40 | Susan Armstrong | Stratford Country Club | 91 | 85 | - | 176 | | T40 | Katherine Cartwright | Public Player | 88 | 88 | - | 176 | | T40 | Susan Bell | The Summit G&CC | 83 | 93 | - | 176 | | T40 | Deena Hugh-Yeun | Station Creek GC- North | 87 | 89 | - | 176 | | T44 | Cindy Hanstke | Deer Ridge Golf Club | 89 | 88 | - | 177 | https://gao.bluegolf.com/manage/gao5/event/gao566/report/resoverall.htm?sort=place&next=%2Fmanage%2Fgao5%2Fevent%2Fgao566%2Freport%2Findex.htm 1/4 Investors Group Women's Mid-Amateur Championship Bay of Quinte Golf & Country Club, Belleville, ON Tuesday, August 30 - Thursday, September 1, 2005 Overall Results for Low Gross Score https://gao.bluegolf.com/manage/gao5/event/gao566/report/resoverall.htm?sort=place&next=%2Fmanage%2Fgao5%2Fevent%2Fgao566%2Freport%2Findex.htm 2/4 Investors Group Women's Mid-Amateur Championship Bay of Quinte Golf & Country Club, Belleville, ON Tuesday, August 30 - Thursday, September 1, 2005 Overall Results for Low Net Score | Place | Name | Club Affiliation | Rnd. 1 | Rnd. 2 | Rnd. 3 | Total | |---|---|---|---|---|---|---| | 1 | Mary Ann Lapointe | The Club at North Halton | 69 | 70 | - | 139 | | 2 | Carol Quan | Highland Gate Golf Club | 71 | 76 | - | 147 | | T3 | Deena Hugh-Yeun | Station Creek GC- North | 73 | 75 | - | 148 | | T3 | Jeanne Beaith | Dalewood GC | 72 | 76 | - | 148 | | T5 | Jennifer Kuntz | Public Player | 73 | 76 | - | 149 | | T5 | Julie Jarvis | Barcovan Golf Club | 72 | 77 | - | 149 | | T7 | Sandy Billyard | Port Colborne Golf & Coun | 69 | 81 | - | 150 | | T7 | Jean Boynton | Ladies GC of Toronto | 73 | 77 | - | 150 | | T7 | Allison Kim | Donalda Club | 78 | 72 | - | 150 | | T10 | Helen Williams | Station Creek GC- North | 71 | 80 | - | 151 | | T10 | Ann Griffin | Whitevale GC | 76 | 75 | - | 151 | | T12 | Laila Rintamaki | Mill Run GC | 73 | 79 | - | 152 | | T12 | Virginia Mawer | Westmount Golf & Country Club | 74 | 78 | - | 152 | | T12 | Angela Colm | Whitevale GC | 78 | 74 | - | 152 | | T15 | Sarah-Anne Smurlick | Freedom Oaks Golf Club | 76 | 77 | - | 153 | | T15 | Jennifer Lavis | Tarandowah GC | 74 | 79 | - | 153 | | T15 | Terrill Samuel | Weston G&CC | 75 | 78 | - | 153 | | T18 | Julie Green | The Club at North Halton | 77 | 77 | - | 154 | | T18 | Jo Ann Smith | Garrison Golf & Curling C | 75 | 79 | - | 154 | | T18 | Catherine Butler | Georgian Bay Club | 72 | 82 | - | 154 | | T21 | Betty Divok | Rockway Vineyards | 75 | 80 | - | 155 | | T21 | Judy Dotten | Public Player | 77 | 78 | - | 155 | | T21 | Kathy Pilkey | Sarnia G&CC | 75 | 80 | - | 155 | | T24 | Kim Davis | Garrison Golf & Curling C | 75 | 81 | - | 156 | | T24 | Kelli Dingle | Barcovan Golf Club | 73 | 83 | - | 156 | | T24 | Lisa Strutt | Markland Wood GC | 76 | 80 | - | 156 | | T24 | Katherine Cartwright | Public Player | 78 | 78 | - | 156 | | T28 | Cathy Thomas | Craigowan G & CC | 78 | 79 | - | 157 | | T28 | Connie McRae | Glen Lawrence Golf Club | 75 | 82 | - | 157 | | T28 | Donna Power | Whitevale GC | 78 | 79 | - | 157 | | T28 | Susan Wickware | Ladies GC of Toronto | 81 | 76 | - | 157 | | T32 | Shirley Ann Gowing | Stratford Golf & CC | 81 | 77 | - | 158 | | T32 | Margo McGeorge-Dolsen | Beach Grove G&CC | 79 | 79 | - | 158 | | T34 | Helene Corcoran | Garrison Golf & Curling C | 78 | 81 | - | 159 | | T34 | Cindy Hanstke | Deer Ridge Golf Club | 80 | 79 | - | 159 | | T34 | Jennifer Lochhead | Hamilton G & CC | 79 | 80 | - | 159 | | T37 | Susan Armstrong | Stratford Country Club | 83 | 77 | - | 160 | | T37 | Susan Goheen | Public Player | 81 | 79 | - | 160 | | T37 | Ivy Steinberg | Granite GC | 77 | 83 | - | 160 | | T37 | Rosemary Salvatore | Markland Wood GC | 80 | 80 | - | 160 | | T41 | Cindy Antico | Weston G&CC | 77 | 84 | - | 161 | | T41 | Pamela Welsh | Royal Ashburn Golf Club | 78 | 83 | - | 161 | | T43 | Judy Stewart | Barrie CC | 73 | 89 | - | 162 | | T43 | Betty Ingram | Bay of Quinte Golf & CC | 80 | 82 | - | 162 | | T43 | Debbie Mcdonald | Sarnia G&CC | 78 | 84 | - | 162 | https://gao.bluegolf.com/manage/gao5/event/gao566/report/resoverall.htm?sort=place&next=%2Fmanage%2Fgao5%2Fevent%2Fgao566%2Freport%2Findex.htm 3/4 Investors Group Women's Mid-Amateur Championship Bay of Quinte Golf & Country Club, Belleville, ON Tuesday, August 30 - Thursday, September 1, 2005 Overall Results for Low Net Score | Place | Name | Club Affiliation | Rnd. 1 | Rnd. 2 | Rnd. 3 | Total | Overall +/- | |---|---|---|---|---|---|---|---| | T46 | Mina Wilson | St. Andrew's East Golf Cl | 79 | 84 | - | 163 | +19 | | T46 | Susan Pearl | Public Player | 83 | 80 | - | 163 | +19 | | T48 | Dessa Kaspardlov | Essex G & CC | 80 | 84 | - | 164 | +20 | | T48 | Susan Bell | The Summit G&CC | 77 | 87 | - | 164 | +20 | | T50 | Anya Liaw | Station Creek GC- North | 81 | 84 | - | 165 | +21 | | T50 | Diane Fitzpatrick | Deer Ridge Golf Club | 84 | 81 | - | 165 | +21 | | 52 | Linda Samuel | Weston G&CC | 81 | 85 | - | 166 | +22 | | T53 | Suzanne McBride | Borden Golf Club | 84 | 83 | - | 167 | +23 | | T53 | Karen Vamplew | Twenty Valley Golf & Coun | 81 | 86 | - | 167 | +23 | | 55 | Karen Holthus | Amherstview Golf Club | 83 | 86 | - | 169 | +25 | | T56 | Joy Evans | Loyalist CC | 85 | 85 | - | 170 | +26 | | T56 | Joy Bradford | Ladies GC of Toronto | 82 | 88 | - | 170 | +26 | | T58 | Cindy Bodak | Heritage Hills GC | 82 | 89 | - | 171 | +27 | | T58 | Jacqueline Kirkland | Meadowbrook Golf & Countr | 89 | 82 | - | 171 | +27 | | DID NOT FINISH | | | | | | | | | WD | Sylvia Bethlenfalvy | GAO Public Player | 78 | - | - | 78 | +6 | | WD | Gail Pimm | Mill Run GC | 79 | - | - | 79 | +7 | | WD | Denise Schaefer | Rockway Golf Course | 88 | - | - | 88 | +16 | | WD | Judith Allan-Kyrinis | Thornhill Club | - | - | - | - | E | | WD | Andrea Hussey | Rebel Creek | - | - | - | - | E | | WD | Lynn Morrison | Oshawa Golf & Curling | - | - | - | - | E | | WD | Susan Mackenzie | St. Catharines Golf & Cou | - | - | - | - | E | | WD | Sandy Byckowski | Brampton GC | - | - | - | - | E | | WD | Kelly Koselek | Cedar Brae GC | - | - | - | - | E | https://gao.bluegolf.com/manage/gao5/event/gao566/report/resoverall.htm?sort=place&next=%2Fmanage%2Fgao5%2Fevent%2Fgao566%2Freport%2Findex.htm 4/4
<urn:uuid:8f154ab4-e0bd-4c35-bae5-e0659795fd90>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
9,026
Copyright : raphael.tfo.org Free Microsoft Certification Study Guides As recognized, adventure as capably as experience virtually lesson, amusement, as skillfully as contract can be gotten by just checking out a books free microsoft certification study guides also it is not directly done, you could give a positive response even more concerning this life, just about the world. We have enough money you this proper as with ease as simple showing off to acquire those all. We provide free microsoft certification study guides and numerous books collections from fictions to scientific research in any way. accompanied by them is this free microsoft certification study guides that can be your partner. OHFB is a free Kindle book website that gathers all the free Kindle books from Amazon and gives you some excellent search features so you can easily find your next great read. Browse Certifications and Exams | Microsoft Docs An MTA certification proves that the certification holder has fundamental knowledge in a wide range of technical concepts. The MTA certification is the first certification you can get to become Microsoft Certified.. Once you pass ANY of the available Microsoft exams, then you become an MTA holder for the particular product or technology. MCSA Microsoft Windows 10 Study Guide - PDF eBook Free ... This is a free MS-700 Study Guide for the Managing Microsoft Teams certification exam! It includes books, blogs, & more free and paid ressources! 15 49.0138 8.38624 1 0 4000 1 https://vladtalkstech.com 300 1 Free Microsoft Certification Study Guides Real Microsoft Word Exam Dumps & Certification Training Courses With Updated, Latest Questions & Answers From PrepAway. Best Practice Test PDF Questions To Pass Microsoft Microsoft Word Certification Exam with 100% Free Real Dumps Files. Exam MS-700 Study Guide - Managing Microsoft Teams Free Certification Study Guides and Tutorials Below you will find a list of the free study notes that we have written for MCSE, CompTIA, Cisco, LPI, and CIW certifications. If you are looking for free practice exams, click here . Free Certification Study Guides and Tutorials - MC MCSE Our free manuals page is updated regularly with the latest training aids, so be sure to check back regularly for new guides. Visit the free Microsoft Office Training Manuals page Categories MS Office Resources , Office , Office 365 , Technology , Uncategorized Tags free , microsoft , office , training manuals Microsoft Excel Certification: Practice & Study Guide ... Free Microsoft Certification Study Guides This is likewise one of the factors by obtaining the soft documents of this free microsoft certification study guides by online. You might not require more grow old to spend to go to the books instigation as capably as search for them. In some cases, you likewise do not discover the broadcast free ... Microsoft Excel Certification: Practice & Study Guide ... Free Microsoft Azure Fundamentals (AZ-900) Certification Sample Questions with Online Practice Test, Study Material, Preparation Guide and PDF Download. Download your FREE Microsoft Office Training Manuals Today There are many Microsoft certifications that one may acquire and many free online training centers that also have pay certification tutoring, free study guides and free practice exam questions to help you pass your IT certification exam. The Microsoft Certified Professional has many different certifications that represent specialized fields of ... Free Microsoft Certification Study Guides Microsoft understands everyone has different learning preferences so we provide certifications and training options throughout your certification journey. Free learning paths to prepare With Microsoft Learn, anyone can master core concepts at their speed and on their schedule. Microsoft Certification Study Guides MCSA Microsoft Windows 10 Study Guide Book Description: Master 100 percent of Microsoft Windows 10 exam with real-world hands-on practice. MCSA: Microsoft Windows 10 Complete Study Guide is your ultimate preparation resource for the new Windows 10 certification. Fully updated to align with the latest version of the exam, this new edition digs deeper into the intricacies of the Windows OS and ... Microsoft Certifications | Microsoft Docs This page contains quick links to all of the Microsoft Certification Study Guides on this site! 15 49.0138 8.38624 1 0 4000 1 https://vladtalkstech.com 300 1 About Vlad Microsoft Certification Training: The Complete Guide ... This free study guide is for Microsoft's 70-680 exam, Windows 7, Configuring. This guide is intended to be supplemental to your books and other study materials. If you find any corrections or would like to suggest additions, please contact us. Free Study Guide for Microsoft's 70-680 certification exam Microsoft In this section of the page you will find Microsoft Certification Study Guides, for major exams such as MCP, MCSE, MCSA, Microsoft Project 2010. We have various types of Microsoft vendor certficiation test prep material, in the form of flash cards, exam secrets, primers, video tutorials, practice tests and many other material information which would help you prepare for Microsoft ... Microsoft Certification Study Guides - Vlad Talks Tech Browse Certifications and Exams. Learn new skills to boost your productivity and enable your organization to accomplish more with Microsoft Certifications. 100% Free Microsoft Word Exam Questions & Microsoft Word ... Learn how Microsoft Advertising works. Our PPC advertising courses cover everything you need to know to become a Microsoft Advertising Certified Professional.We'll guide you through the fundamentals of search engine marketing, from starting your first search advertising campaign to optimization and managing your budget. Microsoft Certified Professional Free Online Training Read Free Microsoft Office Certification Study Guides Exam 77-727: Excel 2016: Core Data ... - docs.microsoft.com Joan is the author or coauthor of more than three dozen books about Windows and Office (for the Windows, Mac, and iPad platforms) and three generations of Microsoft Office Specialist certification study guides. Joan is a Microsoft ... Microsoft Advertising Training Courses - Training ... MOS Study Guide. In-depth exam prep, practice, and review to help advance proficiency with Microsoft Office—and earn Microsoft Office Specialist (MOS) certification credentials. The MOS Study Guide is designed to help readers practice and prepare for the skills and knowledge measured by the MOS certification exams. MOS Study Guide Series | Microsoft Press Store Microsoft Excel Certification: Practice & Study Guide Final Free Practice Test Instructions. Choose your answer to the question and click 'Continue' to see how you did. Microsoft Office Certification Study Guides Try it risk-free for 30 days Create an account ... Try it risk-free for 30 days 4 chapters in Microsoft Excel Certification: Practice & Study Guide. ... Online Microsoft Excel Certification Courses; Copyright code : 4579b55c469caa54ef5309a7861f5b88 Page 1/1
<urn:uuid:d1228aae-198d-4ccf-836e-a7ce40e37fd5>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
7,133
Entry to Teaching for Graduates Glasgow Clyde College Venues Anniesland Campus Content If you wish to apply for the Post Graduate Diploma in Education (PGDE) and already possess a relevant degree but do not have the course entry requirements (Higher English and Nat 5 Maths), this NQ Entry to Teaching for Graduates course is for you. Entry to Teaching for Graduates will also provide you with a knowledge of the Scottish education system and key policy drivers. You will learn about mental health and wellbeing and how it relates to learning and teaching. You will also be introduced to some key teaching theories which will provide a good foundation for the PGDE. Contents Include: NC Comms/Lit 1 (Higher English 'C' equivalent); Applications of Mathematics (National 5 Maths); A range of units covering aspects of learning, teaching and behaviour support; Interview preparation Start Date August Qualification NQ Study Method Full time Course Length 1 year Department Highers, National 4s and National 5s Entry Requirements National 4 Maths, National 5 English. A degree in a subject acceptable for admission to the PGDE course. Interview. SCQF Level Date Updated: 10/02/2023 6 SCQF Points «SCQFPoints» Combination Courses «htmlCombinationCourse» Address «Address» Website www.glasgowclyde.ac.uk «htmlCombinationUCASCode» Date Updated: 10/02/2023
<urn:uuid:076e461e-6408-4afc-b075-41d3978faf43>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,382
On-Site Programs The Historical Society of Moreau and South Glens Falls regularly hosts a number of On-Site Programs that bring history to life for our visitors. Scheduled throughout our season, you may choose to attend any of the listed programs or, if you have a large group, arrange for a private presentation. Contact us at firstname.lastname@example.org for details. Tours of Parks-Bentley Place Tours of the Main House and grounds, as well as the 1812 School House, our Simpler Time tool shed, and the Summer Kitchen are available from April through early October on Saturdays from 1 – 4 pm. Tours are also available in July and August from 1-4 pm. Have a large group? Want a detailed tour of a specific area on the grounds? Group tours may be arranged by appointment. Call 518-636-3856 or 518-792-1850 for more information. Underground Railroad Escape Program You are a slave, escaping from a plantation to freedom, fighting the perils of slave catchers, unknown destinations, and natural barriers along the Underground Railroad. Find out about the intricate system of “stations” and “signals” that helped many along their journey. This program is designed for use with fourth and fifth grade students but is easily modified for older students. It is also best enjoyed as a sequel to our “Communication Without Words program, and, because much of the Escape Program takes place outdoors, groups should schedule a rain date. World of Nativities Each year from late November through December, Parks-Bentley Place is transformed into a showcase for more than 100 nativity sets from around the globe. The exhibit changes annually and often includes other holiday related items, such as miniature Christmas villages and traditional holiday decorations provided by local families. The main fundraiser for the year, adult admission is $5 per person. Children 12 years and under - $3 each. Outreach Programs The Historical Society of Moreau and South Glens Falls offers a variety of Outreach Programs that bring history to you. These programs can normally be arranged to meet your class or group’s schedule and provide interesting facts and insights into life in days gone by. Contact us at email@example.com for details or complete and email a Group Registration form to firstname.lastname@example.org. Communication without Words History tells us that the Underground Railroad ran along the Hudson River from New York City, with one of the three routes north from the Capital District running through our area. To get this far north, escapees needed to learn signs and signals developed to help them journey safely. Groups can learn the unique quilt signals and songs used by freedom seekers and “walk the road to freedom”, too. (Weather permitting). History Mystery Test your detective skills as you try and determine the uses of artifacts from days gone by. Whether the items relate to farming, cooking, household tasks, work, or business, you will be using the process of elimination to discover the every-day uses of sometimes strange-looking items from the past. This hands-on program, aligned with the New York State Standards in Social Studies and the Humanities, is both a learning experience and great fun for students and adults alike. The Games Grandma and Grandpa Played – Us, Too! When there were no electronics and few places to go for entertainment, our forefathers – and their children – got creative. Many games we play today have their roots in ancient places like Phoenicia and Egypt. Learn about the history of games including dominoes, hopscotch, checkers, cards, etc. and discover their “roots”. General Moreau: Who Was He and Why Was Moreau Named for Him? Find out about a famous Frenchman who was exiled by Napoleon and how a small town in the Adirondacks of New York State came to be named for him. The program provides great insights into world and local history for 5th graders and up… that means adults, too! On-Site Programs, continued Food for Thought Preparing meals today is as simple as ordering pizza or buying prepared food at the local grocery store. But in the 1800s, feeding a family was not such an easy task. Learn the types of ingredients that were used, how they were prepared – sometimes using a fireplace, and how our ancestors made it through the winter months. Request in advance and, for an extra $3 per person, groups can make jam to take home, too. Indian to Native American to First Nation Picture our country as a new nation with native peoples still inhabiting and traveling through our area. This hands-on program will shed new light on the people indigenous to the region through authentic artifacts and reproductions that give clues to how these early inhabitants lived. Programs: Coming Soon Back on the Farm Parks-Bentley volunteers are currently developing an off-shoot of a farm program, presented at the historic house several years ago. Stay tuned for this exciting new addition to our programs that make history fun for children of all ages. Practical but Beautiful Learn how generations before us created objects that not only were useful in their everyday lives, but also simply beautiful to look at. From hairbrushes, to water pitchers, to storage chests ... Who says useful can’t be gorgeous? To register your group for any of these programs, visit parksbentleyplace.org or complete the form on the next page, then mail it to 53 Ferry Boulevard, South Glens Falls, NY 12803. You are also welcome to scan your completed form and email it to email@example.com. Group Tour/Program Registration Form To schedule group programs to be presented on-site at Parks-Bentley Place or at your own location, or to arrange a group tour, please contact us at firstname.lastname@example.org or call Nancy Purinton at 518-636-3856 (email@example.com). The following information is needed for scheduling. We ask that you complete this form, save a copy for your records, then email to firstname.lastname@example.org. Desired Program or Tour: ____________________________________________________________ Requested Program Date: ___________________________________________________________ Preferred Presentation Time: _________________________________________________________ Number in Group: _________________________________________________________________ Place Program is to be Presented: Please check one. ___ Parks-Bentley Place or ___ Name of Organization: ________________________________________________________ Street Address: _________________________________________________________________ City: _______________________________ ST : _____ Zip: ________________ Contact Name: _________________________________________________________________ Phone: _______________________________ Email: ________________________________ The cost for each group program or group tour is as follows: School other children’s groups: $1.00 per person Adult Groups: $1.00 per person - Minimum of $25 (maximum 35 individuals) Note: For groups wishing to make jam as part of the “Food for Thought” Program, there is an additional fee of $3 per person to cover the cost of supplies.
a04ed1de-1635-4c16-8001-b2b1e6aedd42
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
7,212
Table 36. Farms Operated by Black and Other Races by Tenure: 1992 and 1987 [For classification of social and ethnic groups, see text. For meaning of abbreviations and symbols, see introductory text] Table 37. Operators by Selected Racial Groups: 1992 and 1987 [For meaning of abbreviations and symbols, see introductory text] 518 OHIO 1992 CENSUS OF AGRICULTUREmCOUNTY DATA – – – – – – – – – – – – – – Table 37. Operators by Selected Racial Groups: 1992 and 1987 mCon. [For meaning of abbreviations and symbols, see introductory text] Table 38. Operators of Spanish Origin: 1992 and 1987 [For classification of Spanish origin, see text. For meaning of abbreviations and symbols, see introductory text] Table 39. Farms With Grazing Permits: 1992 and 1987 [For meaning of abbreviations and symbols, see introductory text] 4 3 5 2 4 1 3 4 3 1 4 3 1 5 2 2 2 1 6 2 1 3 8 4 1 5
<urn:uuid:fd179cef-06e5-4f78-ac45-503ab30849ed>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
931
Vedecko-výskumné útvary Ústavu experimentálnej fyziky SAV Košice: - Oddelenie kosmickej fyziky - Oddelenie subatomovej fyziky - Oddelenie magnetických javov - Oddelenie fyziky nízkych teplôt - Oddelenie fyziky kovov - Oddelenie biotvých - Oddelenie teoretickej fyziky - Laboratórium experimentálnej chemickej fyziky - Laboratórium materiálovej fyziky - Laboratórium nanomateriálov a aplikovaného magnetizmu Kontakt: Ústav experimentálnej fyziky SAV Watsmonova 47, 040 01 Košice Slovenská republika Telefón: +421 55 638 92 201 Fax: +421 55 638 92 92 e-mail: email@example.com web: http://uef.saske.sk Publikáciu vydal: © Ústav experimentálnej fyziky SAV Košice | Texty: © Oddelenia a laboratória Ústavu experimentálnej fyziky SAV Košice | Fotografie: © Juraj Siasák | Grafická úprava: www.kpex.sk – © Juraj Siasák | Jazyková redakcia: Richard Kita | Tel.: H-REKLAMA, Košice | Môja vydavalia: © 2009 Čínsko-európsky satelit Double Star TC-2 nesie na palube detektor NUADU, z podstatnej časti vyvinutý na Oddelení kozmickej fyziky UEF. Detektor zabezpečuje panoramatické snímkanie magnetoféry Zeme pomocou energeticky neutrálnych atomov. Výskum je zameraný na štúdium fyzikálnych procesov v kozme, ktoré sa odohrávajú v extenzívnych pozmienkách a neodlúžajú ich sledovať v laboratórnych pomienkach, a o ktorých energeticke kozmické žiarenia všetkého kozmického žiarenia predávajú informácie. Výsledky výskumu sú používané pri plánovaní vlastných pozorovaní, simulácii kozmofyzikálnych procesov v heliosfére a magnetosfére Zeme a príprave nových kozmických experimentov. Doteraz sa oddelenia zúčastnilo na viacero častí experimentálnych zariadení, ktoré pristáli umiestnené na 14 odúčastnených kozmických sondách a dvoch výskumných rakietách. Pozemné stanice neutronovým monitorom prebiehajú spojite na Lorníkom štítu, dáta v reálnom čase nájdete na http://neutronmonitor.ia3.sk. Viac informácií o oddelení je na http://space.saske.sk. Hlavné oblasti výskumu: • variácie nízkosnergiejnej zložky kozmického žiarenia a vplyvy procesov v heliosfére a zemskej magnetosfére • uchovávanie, transport a straty častic stredných energií (medzi súrčeným vetrom a kozmickým žiarením) v zemskej magnetosfére a v blízkosti jej hranícnych oblastí • procesy uchovávania na súrčenom povrchu a ich odzory v medziplanetárnom prostredí a v blízkosti Zeme s osobitným zreteľom na neutralné ámiele (neutróny, gama žiarenie) vysokých energií • súvislosti medzi energetickými kozmickými časticami a kozmickým pohádom • procesy v plazmových útvoroch v blízkosti iných planét Laboratórne testovanie kozmickej techniky v simulátore kozmickeho prostredia SPACEVAC Spektrometer kozmických energetických častíc DOK-2, vyvinutý na Oddelení kozmickej fyziky UEF, poskytol množstvo cenných vedúcich dát o magnetosfére Zeme. Top kvark Poznávanie základných elementárnych jednotiek štruktúry materie je často považované už od Ema Demokritu, teda viac ako 2000 rokov. Avšak iba za posledných 100 rokov dostala táto snaha reálny oblasť, ktorý za rovnaké obdobie prechádzal radikálnymi zmenami. Za najzáujemnejšie jednotky materie boli považované atómy, no čoskoro sa zistilo, že vnútri atómov existujú jadrá, v jadrách nukleárne, v nukleonoch kvarky. Oddelenie subjadrovej fyziky (OSF) sa aktívne podieľalo na najvýznamnejšom objave vo fyzike vysokých energií za posledných dvadsať rokov – objave top kvarku a skúmaniu jeho vlastností. Top kvark bol experimentálne objavený v roku 1995 kolaboráciami CDF a D0 na urýchľovacom komplexe TEVATRON v Batavi, USA. Top kvark má v porovnaní s ostatnými kvarkmi rad unikátnych vlastností. Jeho hmotnosť je zhruba rovnaká ako u jutra wolframu. Rozsádza sa veľmi rýchlo, takže podcas života neoblieká výborný s ním kvarkom vzájomný stav. Z rozpadových produktov top kvarku je možné zrekonštruovať jeho pôvodné parametre, ktoré nie sú deformované viazaným stavom. Presné meranie hmotnosti top kvarku napríklad urovná oblasť hmotnosti, kde by sa mohla nachádzať Higgsova časticá a dopomôcť k jej objavu na LHC. Skupina z OSF sa zameriala na meranie parametrov top kvarku - hmotnosti, naboja, spinových vlastností. Vynutila si originálnych metód merania týchto parametrov. V dvoch článkoch v prestížnom publikácii v renomovaných časopisoch získali aj niekoľkokrát ocenenie "Výsledok týždňa" v časopise Fermilab Today. Oddelenie subjadrovej fyziky Oddelenie sa orientuje na výskum štruktúry elementárnych častíc a jadrovej hmoty v ambiciozných experimentálnych projektoch svetových urýchľovačových centier: akými boli Spojený ústav Jadrových výskumov v Dubne pri Moskve alebo ústav Deutsches Elektronen Synchrotron v Hamburgu. V súčasnosti je to ústav Fermilab v Batavi v USA a hlavné CERN v Ženeve. Momentálne profiluje oddelenie dve hlavne výskumné témy a to štúdium vlastností top kvarku a skúmanie vlastností jadrovej hmoty v extrémnych podmienkach. Skúmanie nového stavu jadrovej hmoty Problémy a nedostatky sú zrušené kvarkmi, ktoré spolu drží sila známa ako silná interakcia. Jej dôsledkom je výmena častíc zváraných gluóny. Doposiaľ neboli pozorovaný žiadne izolované kvark ani gluon - sú navzájom vzájomne vnútri kompozitných častíc, ako sú protony a neutrina. Súčasná teória silnej interakcie predpovedá "složitejšie" kvarkov a gluónov pri teplotách prevyšujúcich 2000 milión K a prechod jadrovej hmoty do stavu kvarkovo-gluónovej plazmy. Také extrémne podmienky existovali v prírode niekoľko miliónov sekund po Veľkom trestku. Zrážka dvoch jader obova urýchlených v LHC na rýchlosti blízkej rýchlosti svetla nám umožní zistiť kvarku hotovú hmotu velkých energií, a preto aj jadrovú hmotu v extrémnych podmienkach rozptíjenia a ochrannia do stavu normálnej hmoty. Štúdiom takýchto zrážok na LHC nám experiment ALICE dovol názreti hlboko do procesov vyvolaných silnou interakciou a nakrátko zahliadnuť hmotu takú, ako bola okamžite po Veľkom Trestku. Naša účasť v experimente ALICE je pokračovaním 20-ročnej spolupráce na urýchľovači protonov LHCIS, WA-94/3, WA-37 a NA-57. Aj vďaka našim výsledkom môžu CERN v roku 2000 oficiálne označiť, že nový stav hmoty s charakteristikami kvarkovo-gluónovej plazmy bol laboratórne vyvolený. Naše výsledky boli odmenené v roku 2002 Cenou SAV. Urýchľovač Tevatron v ústave Fermilab v Batavi pre štúdium proton antiprotonových zrážok - miesto objavu top kvarku 1. Magnetické kvapaliny Dnes je v oddelení zvláštná priprava magnetických kvapalin na báze různých rostných kvapalin (voda, petrolej, minerálny olej, vosk atď.) s magnetismem k nástroji magnetického momentu. Okrem samotné připravy magnetických částic různých vzorů a rozmerů (5-30 nm) se také studují základní fyzikální vlastnosti, jako například magnetické a elektrické neolitopické a magnetoelektrické vlastnosti magnetických kvapalin a jejich kompozitních systémů s kvapalinými krystaly. Vzhledem na fakt, že vlastnosti magnetických kvapalin sa dajú "ľahko ovládať" vonkajším magnetickým polom, majú široké uplatnenie v chemoterapii ako aj diagnostice, predevšetkým v elektromagnetickém léčení v onkologii a léčení kardiovaskulárnych chorôb v radiodiagnostike atď. Za dosiahnutie výsledku bola kolektív magnetických kvapalin udeľená cena SAV za významný príspevok v medzinárodnej spolupráci a pridelené právo organizovať celosvetovú konferenciu o magnetických kvapalinách (ICMF 11) v Košiciach v roku 2007. 2. Molekulárne magnety V oblasti molekulárneho magnetizmu sa intenzívne štúdia vlastností ferrokvapalin vysokých zemin. Podrobné poznanie kvapalovej štruktúry týchto látek môže výrazne prispať k poznaniu fyzikálnych procesov a javov v nich prebiehajúcich a k ich interpretácii v oblasti základného výskumu, ale tiež k optimalizácii úžitkových vlastností pripravovaných materiálov pre praktické aplikácie. 3. Intermetalické zlúčeniny V oblasti intermetalických zlúčenín je výskum zamretaný hlavne v oblasti biomedicínských javov a silných elektrodynamických korózií vo vybraných systémoch obsahujúcich 41 a 5f prvky s cieľom prispieť k pochopeniu takých javov ako je faško-fermionové správanie. Kondo mrežky, spôsob fluktuácie a dlhodobošie magnetické usporiadanie prostrednictvom štúdia štruktúry, magnetických, elektronových a transportných vlastností v zúčastnách d- kovov s f-kovmi. 4. Elektronový transport a tunelová spektroskopia Skupina sa zaobrába najmä experimentálnym štúdiom vybraných silne korelovaných elektrických systémov vyznačujúcich sa anomálnymi transportnými vlastnosťami súvisiacimi s prechodom kov-zolátor, faškofermiónovou supravodivostou alebo kolášinovým magnetoresistenciou. K zajímavým výsledkom skupiny patrí aj navrhnutie novej experimentálnej metódy – tunelovej kalometrie – umožňujúcej presné určenie tepla generovaného v jednotlivých tunelových elektróch. Výsledky systémových štúdií naznačujú, že generované teplo reprezentuje energiu, ktorá sa pohybuje z neelastických procesov spravidlážujúcich proces elastického tunelovania. Tak ako krv je životodarnou tekutinou pre naše telo, tak je kvapalné helium dôležité pre experimenty pri veľmi nízkych teplôtach. Kvapalné helium (T = 4.2 K) sa získava v skvapatoči, ktorý je súčasťou infraštruktúry OFNT - Oddelenia fyziky nízkych teplôt, pritom ročne sa ho vyrábi okolo 3000 litrov. Distribuuje sa nie len do jednotlivých laboratórií centra, ale aj do nemocníc, kde slúži na chladenie magnetov tomografov magnetickej rezonancie (MRT). Spomínane magnety, ale aj tie, ktoré sa používajú pri rôznych výskumných úpravách v Česku sú vyrobené zo supravodcov. Fyzikálne vlastnosti supravodcov sa u nás intenzívne študujú už niekoľko rokov rôznymi metódami (mikrokontaktná elektrokonduktivita, kalórimetria, či najnovšie skenovacia tunelová mikroskopia - STM). Ažďa najvýznamnejšie výsledky boli dosiahnuté pri štúdiu supravodových materiálov, ktoré vznikajú prostredníctvom hrozitej kritickej teploty a magnetického pôda našiel rýchle uplatnenie práve v spominaných supravodových magnetoch. Vlastnosti vesmíru je možné skúmať aj registrať v laboratóriu pri ultrafríznych teplotách (pod 1mK), pri ktorých sa vzácny izotop He sláva supratekutým. V takomto makroskopickom kvantovom systéme sa dajú reálne simulovať a pozorovať napríklad turbulencie a fluktuácie fyzikálneho vákuu, javy súvisiacie s horizontom udalostí čiernych dier, narušenie symetrie vesmíru po Veľkom tresku, javy vo vnútri neutrónových hviezdi a iné fundamentálne otázky. Ultraznižné teploty poskytujú vhodné podmienky aj na experimentálne štúdium kvantových efektov v supravodných či uzlých materiáloch, ktoré sa realizujú na tåze nano-SQUID-och. Okrem toho sa študujú teplôt v vysokých magnetických poli sa oddelenie orientuje aj na výskum silne korelovanych systémov pri extrémne vysokých tlakoch (do cca 10 GPa), pri ktorých sa počítaju neocakávane vlastnosti. Najnovším smerom výskumu OFNT je štúdium vlastností látok redukované dimenzie. Všetky spomínane oblasti výskumu našeho centra sa nezabúdajú bez spolupráce s inými laboratóriami (napríklad v Cambridge, Berlin, Grenoble, Lancaster, Madrid, Viedeň, Santander, Ames, Pohang, Shanghai, Helsinki a t.) a naše výsledky sú prezentované v najprestížnejších fyzikálnych časopisoch. Oddelenie fyziky kovov Výskumná činnosť na oddelení sa zamierava na štúdium vlastností a vlastnosťí kovových materiálov. Metastabilné amorfné kovové materiály pripravované najčastejšie rýchlým ochladnením tavenín sa po svojom objavení v r. 1960 stali postupne predmetom intenzívneho záujmu fyzikov, technologov, vývojových a konštrukčných pracovníkov. V súčasnosti je nosným výskumným smereom oddelenia štúdium mechanických vlastností, plasticitu a neelastickej deformácie amorfných prvkov a stabilite amorfných kovových materiálov pripravovaných rýchlým ochladnením. Metódy fraktografickej analýzy a kvantitatívnej štatistikej fraktografie sa využívajú pri štúdiu lomových ploch amorfných kovov v bare tenkých pások i objemových telies porušovaných v širokom intervale teplôt, rýchlostí deformácie a rôznych spôsoboch namáhania. Mechanickým skúšaním amorfných kovových materiálov v intervale teplôt od 4,2 K výššie a aplikáciou metód lineárnej lomovej mechaniky sa štúdujú procesy vzniku a šírenia neelastickej hrízky v amorfné kovovej štruktúre. Ďalej sa štúdia homogénna plastická deformácia amorfné kovovej štruktúry a vlastnosti deformovaných štruktúr. Štúdia mechanickej elastickej deformácie a tečenia pod vplyvom mechanického napätia a analýzu týchto procesov numerickými metodami, ktoré predpokladajú existenciu spektra aktivných energií tepelne aktivovaných procesov. Zvláštnu skupinu kovových materiálov, ktorých štruktúmy stavy je znatne vzdelaný od rovnovážneho stavu, tvoria nanokryštallické materiály. Oddelenie sa venuje štúdiu zakončenosti porúšovania týchto materiálov. Metódam termickej analýzy je štúdovaná štruktúma stabilita týchto látek. Pri štúdiu súvisia vlastnosti kryštalických látek a ich štruktúry sa venujeme hlavne správananiu štruktúry na základe výsledkov experimentov s difraciou neutrónov a RTG žiarenia. Pri riešení uvedených problémov oddelenie aktívne a dlhodobo spolupracuje s Fyzikálnym ústavom nízkych teplôt B. Verkinia Ukrajinská AV (FTINT) v Char’kove, so Štátnou polytechnickou univerzitou (GPU) Voronež (Ruská federácia) a Univerzitou v Groningene (Holandsko). Oddelenie biofyziky predmet výskumu: - amyloidné štruktúry - nanocastice - stabilita proteinov - obrazová analýza - molekulárne modelovanie V dôsledku zmien v štruktúre proteinov dochádza k ich vzájomným interakciám, výsledkom ktorých je vznik proteinových zlúčov - amyloidných agregátov. Ich vznik je spojený s mnohými závažnými neurodegeneratívnymi ochoreniami (Alzheimerova choroba) a ďalšími chorobami (cukrovka typu II a pod.). Alzheimerova choroba V súčasnosti vo svete trpí Alzheimerovou chorobou 40 miliónov ľudí (každý štvrtý nad 85 rokov). Bez objavenia lieku sa do roku 2050 počet zvýši štvornásobne. Aplikácie: Podtopenie premeny proteinov na amyloidné agregáty ako príčiny chorób umožní vývoj účinných liekov. Rakovina Vo svete sa každoročne diagnostikuje zhruba 10 miliónov nových prípadov rakoviny (podľa údajov WHO). Detailnejšie znalosti o biologickej funkcií a specifite súkumianých molekul by mohli slúžiť ako základ pre vývoj efektívnejších liekov, vyvinutých na ich báze. Karbónové nanostruktúry Medzi najkánonamajšie nanomateriály dnešnej doby patria karbónové zlúčeniny. Tieto štruktúry majú jedinečné vlastnosti v rámci luhých látok, ich geometrická štruktúra siene ovplyvňuje fyzikálne vlastnosti týchto zlúčení. Tieto ich vlastnosti môžu byť tiež ovplyvňované elektromagnetickým poľom. Medzi najzaujímavejšie a najpopulárnejšie patrí karbónové nanorodinky a fullerény. Karbónové nanorodinky boli objavené a popísané prvýkrát v roku 1991 a fullerén C60 bol prvýkrát objavený už v roku 1985. Za tento objav bola udelená Nobelova cena. Karbónové nanorodinky majú priemer v rozmedzí nanometrov, pritom ich dĺžka môže byť až niekoľko mikrometrov a su 100-krát pevnšie ako oceľ. V závislosti od ich priemeru môžu mať vlastnosti kovu alebo polovodiča, pritom nové záujmy sú spojené s ich možnosťou vytvárať pásové a polovodičových nanorodinkov závisí od jej priemeru a chirality. Vieme si predstaviť, že najmenšie polovodičové prístroje môžu byť zestrojené na báze karbónových nanomateriálov. Podobné vlastnosti majú aj iné štruktúry karbónových zlúčení, ako sú kohány a fullerény vytvorené z mriežky všetého plášťu grafitu. Aby sme dostali takéto štruktúry je potrebné vytvoriť jeden alebo niekoľko topologických defektov (napr. päťuhelníkov alebo sedemuhelníkov) v šestuhelníkovej mriežke grafitu, alebo ju deformovať, napr. zdroblením mriežky (vid obr. 1). Topologické defekty vyvolávajú zmene geometrie karbónových materiálov a spoločne môžu siene ovplyvniť elektronové vlastnosti týchto materiálov. 12 päťuhelníkov v mriežke grafitu spolu s 20 šestuhelníkmi vytvára molekulu fullerenu C60. Fullerény majú zaujímave vlastnosti, ktoré by mohli byť využité v rôznych oblastiach nanoprémery. Fullerén C60 sa dá zavázať na magnetické materiály, napríklad na magnetické kladlo železo alebo kobalt, či železokobaltová zlatina, pomocou ktorej sa vytvárajú tenké filmy s pozostávajúcimi magnetickými vlastnosťami. Niektoré fullerény vytvorené zlúčeniny vykazujú suprovdové charakteristiky. Zaujímave vlastnosti majú aj vacroštvoté nanorodinky a fullerény (vid obr. 2), v ktorých sa vznikajú vrstvy nabijania kladne a vrtuorná záporne v dôsledku rozlietaných Fermi hladín individuálnych nanoštruktúr a tiež v dôsledku interakcii medzi jednotlivými vrstvami. Karbónové nanočastice môžu byť v budúcnosti nájomnou pri vývoji technológií, ktoré budú slúžiť na využitie smieche energie, ako aj v mikroelektronike a nanomedicíne. Naša skupina z oddelenia teoretickej fyziky sa aktívne podielala na teoretickom výskume elektronových vlastností mikro- a nanoštruktúr a ich využití v nanoelektronike, publikovala v renomovaných zahraničných časopisoch ako aj získanie ocenenia za najlepší teoretický výsledok v roku 2007 v Spojenom ústave jadrového výskumu v Dubne v Moskovskej oblasti, s ktorým dlhoročne spolupracujeme. Laboratórium experimentálnej chemickej fyziky Tažiskovými metodami v Laboratóriu experimentálnej chemickej fyziky sú metódy laserového rozptylu (statický, dynamický a elektroforetický), vizualizácia molekul (laserské spektroskopie vlnovej dĺžky rádovo stovky nanometrov, monochromatickost a koherencia). Statický rozptyl poskytuje strukturálnu informáciu v oblasti vysokých frekvencií (od 100 MHz do 10 GHz). V kombinácii s metódou fotovonej koreláčnej spektroskopie získava informácie o dynamických procesoch s relaxačnými časmi v intervalech mnohých radov (od submikrosekundové skaly po sekundy). Chemická fyzika je vedný odbor zaoberajúci sa použitím fyzikálnych metód na výskum molekul, od najmenšoduchých typu vody (H₂O), po makromolekuly (polymery) až po komplexné biologické systémy (roztoky, suspenzie, gely, polymerné taveniny). Oblasť záberu chemickej fyziky je široká, pojmú sa tu aj fyzika materiálov (mäkkých látok). V našom laboratóriu sa zameriame predovšetkým na polymery. Začal čo biologické polymery (molekule kysenej, cukrov, polisacharidov) sa integrovanou súčasťou živých organizmov, a sú na Zemi veľmi dávno syntetické polymery užívajú svetlo svoju základnú funkciu. Naša štúdia a začal čo prvý syntetický polymer (bakelit) bol vyvinutý v r. 1907, až pozdniešie neskôr vznikla predstava, čo polymer vobec môže byť definovaný ako úzkej atomov pripojených kovalentnými vazbami (1922 Hermann Staudinger, neskôr Nobelova cena). Skutočný rozvoj polymérov chvílie sa začal v druhej polovici 20. storočia (Nobelské ceny - chemici Giulio Natta a Karl Ziegler, 1963, fizici Paul Flory, 1974 a Pierre-Gilles de Gennes, 1991). Polymére makromolekuly majú vlastnosti a vlastnosti, ktoré sa odlišujú od tých, ktoré majú jednotlivé molekuly. Aj keď výskum v oblasti syntetických a biologických polymerov beží dlhú dobu paralelne a oddelenie, ukazuje sa, že mnohé javy a vlastnosti sú spoločné. Speciálne zameranie v LECIF je na íonové polymery (polyelektrolyty). Prítomnosť nábojov v týchto molekulách umožňuje rozpustnosť vo vodnom prostredí, ekologické aplikácie a u biopolymerov biologicke funkcie. Na druhej strane pre fyzikov predstavujú takéto makromolekuly a oblasti ich sústavy (roztoky) zložitý mnogohmotový problém. Mnogocastotové spektroskópia je v tomto kontexte významnou technikou, ale nie len o štruktúru a dynamiku takýchto systémov, ktoré získavame experimentálne v našom laboratóriu, prispievajú k ich poznaniu. Okrem článkov v odborných periodikách a reviároch sa súčasťou sme publikovali kapitoly v monografiách a monografických vydavateľstvách (Clarendon Oxford, Marcel Dekker New York). V nedávnej minulosti sa nám podarilo poznamky z dnešného výskumu využiť na vývoj nových teoretických modelov a smerek s aplikáciami. Vytvorili sme a patentovali nový mechanizmus ako z ionicových polymericných reťazcov (polyelektrolyty) a využili sme ho na výskum vlastností elektrických vlasiek (nie chemických reakcií) polymerné nanočasticie s ovádajateľnými rozmery. Polymerné nanočasticie v súčasnosti nachádzajú aplikácie v medicíne, biotechnológii, optike, elektrotechnike a in., kde sa používajú čielený transport liečov, medicínske zabrázovanie a pod. Laboratórium materiálovej fyziky Laboratórium je zamerané na prípravu a výskum oxidických funkčných keramických materiálov. V súčasnosti je nosným programom LMF príprava a štúdium súvisu mikroštruktúr a supravodivých vlastností YBCO masívnych monokryštálických supravodícov (MMS). V tejto oblasti získalo LMF vedeckej výsledok, ktorý oceňovali doma i v zahraničí, naviazalo širokú medzinárodnú spoluprácu s priemyselnými partnermi vo svete (ISTEC Tokyo, Argonne National Laboratory, USA, Oxford University, Cambridge University, IPHT Jena, IFW Dresden, ATI Vienna, ICMB Barcelona, CREAT-CNRS Grenoble) v rámci projektov vďaka svojej možnosti hmotnejnej spolupráce (projekty 5RP a 6RP) a vybudovalo infraštruktúru potrebnú na výskum a vývoj týchto materiálov. YBCO MMS (YBCO) je skratka pre vysoko-teploútne supravodík YBa$_2$Cu$_3$O$_{7-\delta}$, ďalej ako Y123, sú vhodné pre praktické aplikácie hlavne ako supravodce permanentného magnetu. Medzi ich unikátne vlastnosti patrí, že s dosiahnutím silného pritomného kutového toku, môže tokový prúd udržať aj po výstupe magnetického pole ako najväčšej permanentné magnety (az 17 Tesla pri teplote 30 K, az 100-krať vyššia hustota energie), stabilne sa vzrástajú alebo visia v nehomogénnom magnetickom poli (vysoká levitačná síla) a potyčujú sa bez treria v homogénnom magnetickom poli. Ako všetky materiály su prípravu pri konštrukcii výrobkových elektrických točidiel, silných magnetových separátorov, levitačných zariadení ako aj lóžska bez zadržania, zotrvačňovacie rezervoárne energie, levitačné dopravníky, vlaky, atď. Vysoko-teploútne supravodíky sa všeobecne vyznačujú nízkou koherentnou dĺžkou, parametrov, ktorý limituje maximálnu rozšírenosť elektronov v covo-ponorovom pásme (2,7 nm pri 77 K, pre Y123 v alfa-vrstve). Tento parameter zásadne vymedzuje požiadavky na technológiu prípravy supravodíca, ktorá musí po- skytovať monokryštálky materiál s nanorzomerovými piningovými centrami. Súčasné YBCO MMS (supravodivý magnet) si ideálne odporúčame predstaviť ako monokryštál Y123 supravodivý/fázový/čistotový/hovarový s priemerom 30 až 100 mm, v ktorom sa rozptýlené centrá uchytávajú na magnetických točidlách. Centrá môžu byť suintrikrové časti- ce nesupravodivé (YBa$_2$Cu$_3$O$_{7-\delta}$, (211) fázy (Obr. 1), resp. tzv. chemické piningové centrá: nanorzomerové oblasti s narušenou kryštalovou mriežkou vylorené substitučnými átomami. YBCO MMS sú monokryštály pripravené tzv. Top-Spinning/Melt-Growth metódou, majú nízky obsah kyslíka a sú nesupravodivé. Musia sa oxidačné zhlášť a ako sme ukázali vznikajú pritom oxidáčne trhliny v dôsledku skracovania paramet- rov mriežky (Obr. 2). Tieto trhliny zmenšujú účinný priestor vzorky na jednu fázu, ale sú nevyhnutné pri výrobe oxidáčnych trhlin. Ak by sme chceli ob- jemovú difúziu kyslíka tak tyto odtáčacie MMS trvala viac ako tisíc rokov. Nedávno sme demonštrovali, že vysokotlaková vysoko-teploútne oxidáciou je možné počítať tvorbu oxidáčnych trhlin a zvyšiť tak az trojnásobne užitočné vlastnosti (Obr. 3). Nasli sme nové možnosti vytvárania chemických pinin- gových centier mikrokrakoví.
<urn:uuid:d39e848b-49f7-4019-809f-2af609bace89>
HuggingFaceFW/finepdfs/tree/main/data/slk_Latn/train
finepdfs
slk_Latn
23,369
Gruppo Consiliare MoVimento 5 Stelle Senago Senago, 29 Aprile 2021 Al Comune di Senago email@example.com Al Sindaco del Comune di Senago Sig.ra Magda Beretta All'assessore al Bilancio Gianluca Magni All'assessore ai lavori pubblici Mario Milani Al Presidente del Consiglio Comunale Luca Biasotto E p.c.: ai Consiglieri Comunali e alla Giunta del Comune di Senago OGGETTO: Formale interrogazione con richiesta di risposta scritta – Richiesta Informazioni in merito al progetto "RIGENERAITALIA" Considerato che Il progetto "RIGENERAITALIA "voluto dal Governo Conte II ha stanziato per l'anno 2021 la somma di 1 Miliardo di Euro da distribuire ai comuni Italiani in base alla popolazione . Il contributo a fondo perduto riguarda interventi di efficientamento energetico e sviluppo sostenibile . Per usufruire di questi fondi è necessario che i lavori inizino prima del 15 Settembre 2021. Gruppo Consiliare MoVimento 5 Stelle Senago Preso atto che secondo la ripartizione dei fondi reperibile all'indirizzo https://drive.go o gle.com/file/d/1jgw3ZTna24Auvi_09n-LeHPwXnKZqsOz/view?fbclid=IwAR3GtfpzE5reQvHhkenVKGgI7tc2Cwn7vlnJoNLGx6AriZ27x6nK77vV4g , al comune di Senago spetterebbero 260.000,00 Euro Si interrogano il Sindaco e Assessori competenti per conoscere: 1. Se l'amministrazione è a conoscenza di questa possibilità per il Comune di Senago . 2. Se l'amministrazione si è già attivata per usufruire di questa possibilità 3. Quali progetti verranno realizzati tramite il decreto "RIGENERAITALIA" Distinti saluti. Gruppo Consiliare M5S Senago
<urn:uuid:6bdd4137-0dcf-4901-b70e-1fab4eae62b8>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
1,571
Nel 2015 l’economia regionale cresce sotto le attese - Secondo le ultime stime, il Pil regionale ha chiuso il 2015 con una crescita dello 0,8% rispetto all’anno precedente, consolidando la tendenza registrata nel 2014 (+0,4%). Tra le principali regioni competitor il Veneto ha spuntato un risultato migliore di Piemonte e Toscana (entrambe +0,7%), mentre Lombardia ed Emilia-Romagna hanno segnato performance migliori (rispettivamente +1,0% e +0,9%). - Nel 2015 l’economia regionale è stata sostenuta dalla domanda interna (al netto della variazione delle scorte), grazie all’accelerazione dei consumi delle famiglie (+1,4%) e al risveglio degli investimenti fissi lordi (+0,7%) in particolare nella componente relativa ai beni strumentali. - Dopo un avvio d’anno vivace, la domanda estera ha evidenziato durante l’estate una decelerazione, parzialmente compensata da un recupero nell’ultimo scorciio dell’anno: nel 2015 le esportazioni hanno registrato, in termini reali, un incremento del 2,4% mentre le importazioni sono aumentate del +7,2%. - Nella media dell’anno le imprese manifatturere del Veneto hanno registrato un aumento della produzione industriale (+1,8%), confermando la tendenza registrata nel 2014. Anche il fatturato industriale ha ottenuto un buon risultato (+2,3%), grazie alla componente estera (+2,9%) e al vivace recupero di quella interna (+1,8%). - Il mercato del lavoro ha evidenziato un recupero dei livelli occupazionali, grazie ai contratti a tempo indeterminato, favorita dai provvedimenti di sostegno alle assunzioni: l’occupazione dipendente ha segnato un aumento di oltre 36,6 mila posizioni di lavoro, ascrivibile ad un forte incremento delle assunzioni (+12,3%) e ad un rallentamento delle cessazioni (+5,2%). Segnali positivi anche sul versante della Cassa integrazione: le ore autorizzate hanno registrato nel 2015 una diminuzione (-36%), attestandosi a 57,6 milioni. - Nel 2015 la struttura produttiva ha subito un ulteriore ridimensionamento: le imprese attive sono risultate in calo di oltre 2 mila unità rispetto all’anno precedente (-0,5%). A fronte di una stabilità nel numero di aperture (+0,3%) e una riduzione delle chiusure per cessata attività (-3,7%), le crisi aziendali hanno registrato un’inversione di tendenza: nel 2015 le aperture di un procedimento hanno coinvolto 799 imprese (-50% rispetto al 2014) e 25.421 lavoratori (-35% rispetto al 2014). Per il secondo anno consecutivo si è registrato un calo delle aperture di procedure per scioglimento e liquidazione (-5,8%), a fronte di un lieve aumento delle aperture di procedure concorsuali (+1,2% rispetto al 2014). - Il mercato del credito ha mostrato nel 2015 forti elementi di debolezza: secondo gli ultimi dati disponibili le sofferenze bancarie hanno raggiunto il livello record di 18,6 miliardi di euro (settembre 2015) mentre il livello dei prestiti bancari è sceso a 156,7 miliardi, uno delle soglie più basse degli ultimi anni. Nel 2016 crescita moderata per il Veneto - Dopo aver chiuso l’anno con una crescita dello 0,8%, nel 2016 si prospetta per l’economia del Veneto un rafforzamento del trend di sviluppo. Secondo le stime più recenti il Veneto registrerà un incremento del Pil pari all’1,3%, in linea con quella del Nord Est (+1,4%). Il miglioramento del quadro esogeno nazionale ed internazionale porterà un’accelerazione di qualche decimo di punto del ritmo di crescita nel biennio 2017-2018 (+1,6%). - Per l’anno in corso si stima un andamento meno favorevole delle esportazioni (+3,0%) a seguito dell’evoluzione del commercio internazionale non particolarmente vivace che sta frenando le prospettive della domanda proveniente da alcuni mercati, in particolare da quelli emergenti. - A fronte di un impulso meno efficace della domanda estera, nel 2016 la domanda interna avrà un ruolo rilevante nel trainare l’economia regionale (+1,6%). L’intonazione moderatamente espansiva della politica fiscale e le aspettative di bassa inflazione (o meglio di deflazione) dovrebbero sostenere sia la spesa di consumo delle famiglie che le spese di investimento delle imprese. - Il recupero dei consumi delle famiglie proseguirà anche nel 2016: grazie al favorevole andamento del reddito disponibile delle famiglie e al progressivo recupero dei livelli occupazionali ci si attende un aumento dei consumi del +1,7%, un valore tra i più intensi a livello di regioni italiane. - Il risveglio delle costruzioni e il consolidamento della crescita della componente relativa ai beni strumentali dovrebbe sostenere la dinamica degli investimenti: nel 2016 si stima una progressiva tendenza verso tassi positivi (+2,6%), che dovrebbe intensificarsi nel biennio 2017-2018. - Il recupero occupazionale dovrebbe proseguire nell’anno in corso e nel biennio successivo: in particolare nel 2016 l’occupazione dipendente è attesa in aumento dello 0,7%, per effetto della proroga sugli incentivi a sostegno delle assunzioni. - La dinamica occupazionale positiva favorirà la discesa del tasso di disoccupazione iniziata nel corso del 2015, che dovrebbe proseguire anche nel 2016, attestandosi sul 6,7%. Tale tendenza è conferma anche per il biennio 2017-2018 durante il quale l’indicatore dovrebbe ridursi fino al 6%, pari a circa la metà del valore previsto per l’Italia (11,5%). L'ECONOMIA REGIONALE NEL 2015: UN'ANALISI DI DETTAGLIO Imprese Il numero di imprese attive presenti nei registri camerali del Veneto nel 2015 si è attestato a 437.130, circa 2 mila unità in meno rispetto all'anno precedente (-0,5%), confermando il trend negativo del 2014 (-0,7%). Il saldo complessivo tra le iscrizioni (+0,3%) e le chiusure (-3,7%) di imprese, al netto delle cessazioni d'ufficio, torna positivo di 1.500 unità dopo 3 anni consecutivi di andamento negativo. La dinamica positiva ha interessato le attività dei servizi alle imprese (+429 unità) e del turismo (+231 unità), mentre il comparto delle costruzioni e quello dell'agricoltura hanno sofferto maggiormente con saldi negativi superiori alle 1.000 unità. L'analisi per forma giuridica evidenzia come si sia consolidata la struttura imprenditoriale: le società di capitale hanno registrato 3 mila unità in più. Dal 2010 al 2015 in Veneto sono state perse oltre 20 mila imprese. Nel 2015 le imprese entrate in liquidazione/scioglimento sono diminuite (7.721 unità, -5,8%), mentre sono cresciute le imprese che hanno aperto una procedura concorsuale di concordato o di fallimento (1.474 unità, +1,2%). Famiglie Dopo anni difficili nel 2015 il reddito disponibile delle famiglie è cresciuto dello 0,4%, con un valore medio di 20.395 euro. La spesa delle famiglie ha raggiunto una media annua di 2.533 euro (+8,2%), anche per l'effetto positivo del mercato dell'auto: nel 2015 le immatricolazioni auto sono aumentate del 15,3% rispetto al 2014, attestandosi a quota 121.207 (+15,3%). Tuttavia nel 2015 la popolazione residente si è ridotta di 12 mila abitanti (-0,24%), toccando quota 4,9 milioni, di cui 502 mila stranieri. Nel 2015 inoltre si è registrato un picco di mortalità, con 49.663 decessi (+8,1% rispetto al 2014) ma anche il record negativo di nascite, con un tasso d'incremento naturale più sfavorevole (-2,1%) e una flessione del tasso di natalità (8‰). La popolazione diventa sempre più vecchia: nel 2015 gli ultra 65enni rappresentano il 22% della pop. e l'età media della popolazione ha toccato la soglia di 44,8 anni. Mercato del lavoro Volano le assunzioni nel 2015: secondo le elaborazioni di Veneto Lavoro su dati Silv il saldo occupazionale è stato positivo per 36.600 posizioni di lavoro dipendente (era -10.900 nel 2014) grazie al marcato incremento delle assunzioni (+12,3%; +81% a tempo indeterminato e +73% le trasformazioni) e alla minor crescita delle cessazioni (+5,2%). Tuttavia tale dinamica non si è ancora riflessa sui dati di stock: secondo la rilevazione Istat sulle forze di lavoro l'occupazione dipendente nel 2015 è rimasta stabile (-0,3% rispetto al 2014), a fronte di una lieve flessione dell'occupazione autonoma (-1,7%). Ne consegue che il tasso di occupazione è risultato stazionario (63,6%), mentre il tasso di disoccupazione in lieve calo (7,1%). Scambi con l'estero Vivace (ma in decelerazione) la dinamica della domanda estera: nel 2015 le esportazioni hanno registrato, in termini nominali, un incremento del +5,3% rispetto all'anno precedente attestandosi su un valore di 57,5 miliardi di euro a valori correnti. I settori che più hanno contribuito maggiormente alla variazione positiva dell'export sono stati l'alimentare (+13,7%), l'occhialeria (+12,7%), i prodotti chimici (+11,7%) e le bevande (+10%), mentre le uniche variazioni negative sono state registrate nella maglieria (-4,7%) e nell'abbigliamento (-1,8%). Le importazioni hanno invece evidenziato un trend in crescita del +5,9% raggiungendo i 41,9 miliardi di euro. Ne è conseguito un saldo commerciale positivo di 15,6 miliardi di euro (+588 milioni di euro rispetto al 2014). Tutta la domanda globale ha sostenuto l’export manifatturiero regionale pur nella decelerazione dei Paesi europei non Ue (-8,5%), in primis a causa dell’embargo russo (-30,2%), e dell’America centro-meridionale (+5,8%), a seguito della recessione del Brasile (-11,2%). **Agricoltura** L’annata agraria 2015 in Veneto ha visto ridursi la **produzione lorda** del -1%, raggiungendo i 5,7 miliardi di euro, a causa principalmente dell’andamento climatico estivo che ha penalizzato molte colture. Si è ridotto anche il numero delle **imprese agricole** iscritte alle Camere di Commercio del Veneto, sceso a 68.498 unità, con una flessione del -1,4%, mentre è risultato in aumento il numero di imprese dell’industria alimentare con 3.376 unità attive (+1,8%). Anche il numero degli **occupati** in agricoltura ha evidenziato un calo (-0,7%), arrivando a 62.551 unità. **Industria manifatturiera** L’industria manifatturiera del Veneto tiene il ritmo: nel 2015 l’indice regionale della **produzione industriale**, calcolato da Unioncamere Veneto sulla base dell’indagine VenetoCongiuntura, ha evidenziato una variazione media annua del +1,8% (con una crescita marcata negli ultimi 3 mesi dell’anno +2,3%), confermando lo stesso ritmo di crescita registrato lo scorso anno. Il fatturato è cresciuto del +2,3%, gli ordini interni si sono ravvivati (+1,9%) e quelli esteri hanno tenuto (+3,1%). Per quanto riguarda le **tipologie di beni**, la produzione ha evidenziato una crescita del +2% per i beni di investimento e del +1,9% per i beni intermedi, meno marcata la variazione per i beni di consumo (+1,7%). La produzione industriale è risultata in crescita per quasi tutti i **settori economici**, in particolare nel comparto della gomma e plastica (+3,9%) e dell’alimentare (+3,5%), seguiti da legno e mobile (+2,3%) e dalle macchine ed apparecchi meccanici (+2%). Hanno invece registrato una tendenza negativa i settori del tessile (-1,9%) e dei mezzi di trasporto (-0,4%). **Costruzioni** Nel 2015 torna il segno positivo per il mercato delle costruzioni in Veneto. Dopo i picchi negativi del passato quello appena trascorso è stato un anno di assestamento che ha visto una variazione media del **fatturato** del +0,2%, ascrivibile alla variazione positiva delle imprese non artigiane (+0,4%) e al giro d’affari stabile di quelle artigiane. Questi dati rappresentano sia la fine definitiva del periodo di crisi ma anche la situazione di stallo le imprese devono aspettarsi nel breve periodo. **Commercio al dettaglio** Il 2015, secondo l’indagine VenetoCongiuntura, si è chiuso con un valore positivo per le **vendite del commercio al dettaglio** che hanno registrato una variazione del +2,9% dopo 4 anni di calo. Le vendite hanno segnato un progressivo aumento dell’intensità della variazione: nel periodo gennaio-marzo l’indicatore è aumentato del +1,7% fino ad arrivare a+3,7% nell’ultimo trimestre dell’anno. La dinamica positiva è stata trainata dal commercio nelle medie e grandi superfici di vendita che hanno evidenziato una variazione media annua del +4%, mentre le piccole strutture hanno mantenuto durante l’anno una situazione di sostanziale stabilità (-0,1%). Il bilancio delle vendite è risultato migliore per gli esercizi specializzati nel commercio alimentare (2,1%) rispetto a quelli non alimentari (+1,5%). **Turismo** Nel 2015 il Veneto rimane la prima regione in Italia e la sesta in Europa nel settore turismo con **63,2 milioni di presenze** (+2,2% rispetto all’anno precedente), soprattutto in città d’arte e al lago. Le presenze turistiche sono rappresentate per 2/3 da stranieri provenienti principalmente da Germania, Austria e Paesi Bassi. In aumento anche gli arrivi (+6,1%) con la cifra record di 17,2 milioni, soprattutto per montagna e lago. Il CISET stima che la spesa dei turisti in Veneto è risultata pari a 11,3 miliardi di euro: 6,3 miliardi da turisti italiani e 5 miliardi da turisti stranieri. **Trasporti** Secondo i dati elaborati da Assaeroporti, nel 2015 l’aeroporto di Venezia-Treviso, 3° polo italiano dopo Roma e Milano, ha registrato un incremento del traffico cargo del 14,7%, con uno scambio di 51 mila tonnellate di merci ed ha continuato ad avere un andamento dinamico del traffico passeggeri (+3,8% con oltre 11 milioni di persone). Il porto di Venezia ha mostrato un aumento (+15,3%) nel tonnellaggio complessivo nel traffico merci, pur con una diminuzione del traffico passeggeri (-9,8%). **Credito** Il mercato del credito ha mostrato nel 2015 forti elementi di debolezza: secondo gli ultimi dati disponibili le sofferenze bancarie hanno raggiunto il livello record di 18,6 miliardi di euro (settembre 2015), In particolare la quota di sofferenze che fa capo alle imprese ha raggiunto i 15 miliardi (+15% rispetto al 2014) mentre quella relativa alle famiglie si è attestata a 2,8 miliardi (+2,8%). Il livello dei prestiti bancari è sceso a 156,7 miliardi, uno delle soglie più basse degli ultimi anni: i prestiti alle imprese sono crollati a 96,7 miliardi (-3,3%) mentre i prestiti alle famiglie hanno raggiunto i 45,3 miliardi (+2,1%), sostenuti dall’aumento delle erogazioni dei mutui immobiliari. **Investimenti delle imprese** Sulla base dell’indagine VenetoCongiuntura, nel 2015 quasi il 48% delle imprese manifatturiere del Veneto con almeno 10 addetti ha effettuato investimenti materiali e immateriali, impegnando il 25% di risorse in più rispetto al 2014. In particolare l’aumento è ascrivibile ai settori dell’alimentare (+44,6%) e del legno e mobile (+41,4%), mentre a livello dimensionale le piccole imprese hanno registrato la variazione maggiore (+28,1%), seguite dalle grandi (+23,9%) e medie (+23,5%). Gli investimenti si sono concentrati principalmente sul miglioramento dei processi produttivi: l’86,7% delle imprese ha investito nell’acquisto di macchinari e impianti; il 42,8% nell’ottimizzazione dell’automazione d’ufficio. Il 29,6% ha scelto di investire in formazione e risorse umane e il 28,8% in ricerca e sviluppo. Il 25,6% ha realizzato investimenti in fabbricati da destinare alla produzione o ad uffici e solo il 20,8% ha puntato sulle energie rinnovabili e sul risparmio energetico. Le imprese hanno investito mediamente il 3,2% del fatturato aziendale maturato nell’anno. Le prospettive per il 2016 mostrano un trend positivo, sia per numero di imprese propense ad investire che per valore dell’investimento.
<urn:uuid:ac16dcd4-1fb9-4064-95a0-7c81a038a893>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
15,368
Bildquelle: Adobe Stock Makrolon®, Vivak®, Axpet® Massivplatten für Gesichtsmasken Mit Exolon Group Massivplatten geschützt vor Covid-19 Infektionen Infektionen verhindern. Die Gesundheit Ihrer Mitarbeiter und Kunden ist Ihnen wichtig? Sie denken über Maßnahmen zur Infektionsprävention nach um der schnellen Verbreitung von Viren und Bakterien entgegenzuwirken, wissen aber nicht mit welchem Material Sie diese am schnellsten umsetzen können? Dann können wir Ihnen mit unseren transparenten Massivplatten helfen, eine schnelle und effiziente Lösung zu finden. Hoch schlagzähe Massivplatten für Schutzvisiere. Ob Arztpraxen, Krankenhäuser, Altenwohnheime oder im Pflegebereich. Nicht immer lässt sich der Mindestabstand einhalten. Hier schaffen Gesichtsvisiere, hergestellt aus Polycarbonat oder Polyesterplatten der Marken Makrolon® (PC), Vivak® (PET G) oder Axpet® (A PET) abhilfe. Sie eignen sich als Husten- und Niesschutz und schützen vor einer Vireninfektion. Die hohe Schlagzähigkeit der thermoplastischen Kunststoffplatten sorgt für eine hohe Bruchsicherheit und für eine gefahrlose Nutzung im Gesichtsbereich. Alle empfohlenen Produkte verfügen über eine gute Brandklassifizierung gemäß EN 13501-1, B-s1, d0. Einfache und schnelle Verarbeitung. Thermoformieren, Abkanten oder kalt Einbiegen (je nach Produkt) sind Möglichkeiten das Produkt schnell und effizient zu verarbeiten. Bohren, Fräsen, Sägen, Schneiden, Stanzen oder Laserschneiden. Unsere Materialien lassen sich schnell und sicher verarbeiten. Reinigung mit handelsüblichen Mitteln. Das Material ist einfach mit einem weichen, sauberen Schwamm und lauwarmen Wasser abzuwaschen, das eine milde Seife oder ein neutrales oder leicht alkalisches Reinigungsmittel enthält. Anschließend mit sauberem Wasser gut abspülen und mit einem Ledertuch oder einem feuchten Zelluloseschwamm trocknen. Zur Desinfektion empfehlen wir Produkte zu nutzen die basierend sind auf den Inhaltsstoffen: Ethanol oder 2-Propanol oder Wasserstoffperoxid. Unsere Produkte sind im Vergleich zu anderen Kunststoffen, wie z.B. PMMA resistent gegen diese Chemikalien. Für die professionelle Reinigung von PC Visieren empfehlen wir die Dampfsterilisation. Exolon Group - Your longterm partner. Die Exolon Group ist führender Anbieter von extrudierten thermoplastischen transparenten oder transluzenten Massiv- und Stegplatten, die in verschiedenen innovativen Anwendungen ihren Einsatz finden. Sie haben noch Fragen? Wir stehen Ihnen gerne zur Verfügung. Exolon Group GmbH Rommerskirchener Str. 21 50259 Pulheim Deutschland firstname.lastname@example.org www.exolongroup.com Visiere mit Durchblick für: * Gesichtsschutz * Schutzvisiere * Nies-/Hustenschutz Ihr Vorteil auf einen Blick: * hohe Transparenz * leichte Verarbeitung * einfache Reinigung * hohe Schlagzähigkeit Wir empfehlen folgende Produkte: Makrolon® GP * hohe Schlagzähigkeit * kalt einbiegbar * thermoformierbare * 0,75 - 3 mm Dicke Vivak® * Lebensmittelecht * einfach zu thermoformieren * hohe Schlagzähigkeit * 0,6 - 3 mm Dicke Axpet® * Lebensmittelecht * geeignet für flache Anwendungen * hohe Steifigkeit * 0.8 - 3 mm Dicke Es liegt außerhalb unserer Kontroll- und Einflussmöglichkeiten, in welcher Art und Weise und zu welchem Zweck Sie unsere Produkte, technischen Unterstützungen sowie Informationen (unabhängig ob mündlich, schriftlich oder anhand von Produktionsbewertungen erhalten) einschließlich vorgeschlagener Formulierungen und Empfehlungen, anwenden und/ oder einsetzen. Daher ist es unerlässlich, dass Sie unsere Produkte, technischen Unterstützungen und Informationen sowie Formulierungen und Empfehlungen eigenverantwortlich daraufhin überprüfen, ob sie für die von Ihnen beabsichtigten Zwecke und Anwendungen auch tatsächlich geeignet sind. Eine anwendungsspezifische Untersuchung muss mindestens eine Überprüfung auf Eignung in technischer Hinsicht sowie hinsichtlich Gesundheit, Sicherheit und Umwelt umfassen. Derartige Untersuchungen wurden nicht notwendigerweise von Exolon Group durchgeführt. Der Verkauf aller Produkte erfolgt – sofern nicht schriftlich anders mit uns vereinbart – ausschließlich nach Maßgabe unserer Allgemeinen Verkaufsbedingungen, die wir Ihnen auf Wunsch gerne zusenden. Alle Informationen und sämtliche technische Unterstützung erfolgen ohne Gewähr (jederzeitige Änderungen vorbehalten). Es wird ausdrücklich vereinbart, dass Sie jegliche Haftung (Verschuldenshaftung, Vertragshaftung und anderweitig) für Folgen aus der Anwendung unserer Produkte, unserer technischen Unterstützung und unserer Informationen selber übernehmen und uns von aller diesbezüglichen Haftung freistellen. Hierin nicht enthaltene Aussagen oder Empfehlungen sind nicht autorisiert und verpflichten uns nicht. Keine hierin gemachte Aussage darf als Empfehlung verstanden werden, bei der Nutzung eines Produkts etwaige Patentansprüche in Bezug auf Werkstoffe oder deren Verwendung zu verletzen. Es wird keine konkludente oder tatsächliche Lizenz aufgrund irgendwelcher Patentansprüche gewährt. Makrolon® ist eine eingetragene Marke, im Besitz und lizenziert von der Covestro Gruppe. Edition: 2020 · Order-No.: MF0375 d · Printed in Germany
<urn:uuid:b131300a-4fb6-491e-9d11-4f897672a877>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
5,195
Social Change and its Potential Impacts on Chinese Population Health Hong Wang Introduction his chapter aims to analyze the relationship between social change and the population's health by presenting a case study of that relationship from the People's Republic of China (China). With a territory of 9.6 million square kilometers, it is ranked the third largest country in the world. It's population reached 1.25 billion in the year 2000, which ranks it the first in the world. 1 T China is considered one of few Socialist States in the world. Administratively, China is divided into 23 provinces (including Taiwan), 5 autonomous regions, 2 special administration regions, and 4 municipalities. 2 The government structure from the top to the bottom includes the Central Government, Provincial Government, Prefecture and City Government, District (in the urban area)/County (in the rural area) Government, and Resident Street (in the urban area)/ Township (in the rural area) Government. Although the Neighborhood Committee (in the urban area)/ the Village Committee (in the rural area) also plays administration roles at the bottom, below the resident street/ township government. It is considered, as the extension, not the formal entity within the government structure. Within the past 25 years, China has experienced transformation of its economic system from a highly centralized planned economy toward a market oriented economic system. This process has led to massive and rapid changes in all aspects of society with profound effects on the population's health in the large parts of the country. Along with the material prosperity, the living conditions of Chinese people, such as food, shelter, and sanitation status, have been improving steadily. People have more capability to purchase health related merchandise as well as health 1 Atlapedia (2002). People's Republic of China, www.atlapedia.com/online/ countries/china.htm. 2 Statistical Yearbook, (2000). services. Overall the health status of most Chinese has improved but there are significant exceptions to this overall conclusion. These exceptions arise from increasing inequity of income, increases in unemployment rates, the decline of health insurance coverage, changes in demography, changes in social value, culture, health related behaviors, and the changes of health care systems. This chapter is organized into five sections. The introduction section provides the background information including a brief summary of China's geographic and administration system and also the purpose of this case study. Section II, provides an overview of China's economic reform. Section III describes the major social changes brought on by this economic reform that have potentially both positive and negative influences on the population's health status. Section IV describes the current Chinese population health status, which reflect the mixed impacts by the economic and social change process. Then finally the policy implications and suggestions will be included in the last section V. The Recent Economic Reforms in China The Background of Chinese Economic Reform Before 1979, the Chinese economy was organized on a central planning system. Under this system, most resources, such as goods, services and information, were produced and allocated as collective goods. 3 In urban areas, the allocation of labor to working units and enterprises was administratively determined through provincial and local labor bureaus. The assignment of individuals to the working units and enterprises reflected administrative goals, rather than individual or working unit's need and preference. 4 Almost all those of working age were guaranteed to get permanent jobs in the state-owned or collective-owned working units or enterprises. 5 The wage of the employees was set at a very low level by the government based on the working years, position, occupation, and education to meet basic needs for food and clothing with little variation. In addition, the working unit or enterprise was also responsible for providing welfare to its 3 A. Oberschall, 'The Great Transition: China, Hungary, and Sociology Exit Socialism into the Market', American Journal of Sociology, 101(4) (1996), 1028–41. 4 D. P. Coacy and L. Wang, 'Equity, Efficiency, and Labor-Market Reforms in Urban China: The Impact of Bonus Wages on the Distribution of Earnings', China Economic Review, 11 (2000), 213–231. 5 C. Fang,, X. Zhang, et al., 'Emergence of Urban Poverty and Inequality in China: Evidence from Household Survey', China Economic Review, 13 (2002), 430–443. employees, which includes housing, healthcare, childcare, pensions and certain subsidized foods. Labor mobility across different working units and enterprises was tightly controlled and extremely infrequent. 6 In rural areas, the farmland was owned by the state with farmers working collectively in the commune system. The government set very low prices for agricultural products. Farmers' earnings were quite equal but only sufficient enough to survive. 7 The commune system also provided certain welfare to the farmers, such as healthcare and child education. Although Chinese government achieved its equalization goals under the central planning system described above, the productivity and efficiency of whole society was very low due to the lack of incentives and responsibilities. In addition, the continuing political movements, nature disasters, and international isolation severely distorted the Chinese economic development. By the end of culture revolution in 1976, China was still one of the poorest countries in the world. Under the planning system, the government revenue is mainly from profitable state-owned and collective-owned enterprises. 8 Because of low efficiency and low productivity, many of these enterprises were losing money and required government subsidies. By the end of 1998,the government deficit reached to 13.5 billion Yuan, which are about 11.8% of the government revenue. 9 The Major Approaches of Economic Reform Once Xiaoping Deng took power in China in 1978, he launched the most recent economic reform, to transform the central planning economic system to a market oriented economic system and to modernize China in terms of its industry, agriculture, science and technology, and national defense system. The economic reform was initiated by reforming the rural economy system. The collective economy was then replaced by the individual household responsibility system in the early 1980s. The financial incentive was that the farmers could receive direct economic rewards from individual productivity. The farmland was divided into small plots still under the ownership of the state. Each family makes a contract for its plot, agreeing to produce a certain quota of crops, which the state purchases 6 Coacy and Wang, (2000). 7 R. Zhang and M. S. Tam, 'Changes in Income Distributions in China in the Process of Economic Reform in the 1980s: A Welfare Approach', China Economic Review 2(1) (1991), 97– 114. 8 R. S. Eckaus, 'Some Consequences of Fiscal Reliance on Extrabudgetary Revenues in China', China Economic Review, 14 (2003), 72–88. 9 Y. Zhang, and F. He, 'System Transition Induced by Fiscal Pressure', From Planning Economy to Market Economy (Beijing, China Finance Publish House, 1998). at a relatively low fixed price. Then any output that exceeds the quota can be sold to the state or in the market at a higher bonus price. 10 In order to encourage farmers to increase their productivity and to increase the farmer's income, the government also increased the purchasing price of agriculture products while reducing the prices of agriculture production materials. These measures have succeeded dramatically. Urban economic reform was introduced in the mid 1980s. Decentralization of government power (including decisions concerning resource allocation and renumeration) to working units and enterprises was an important feature. The enterprise manager was given greater autonomy in recruiting, dismissing, promoting and reallocating their employees. The bonus wage was introduced on top of the previous fixed standard wage, and was directly linked to an individual's productivity and enterprise performance. 11 The second key element of the reform was to allow private, individual, and foreign-owned enterprises to compete with state-owned enterprises. In 1978, there were virtually no private-owned, and foreign-owned enterprises. Seventy eight percent of industrial production was from state-owned enterprises with the rest from collective-owned enterprises. By 1999, 44% of industrial production was from private, foreign and joint-owned enterprises and only 28.2% from state owned enterprises. 12 Welfare reform started in 1996 with the aim of reducing the heavy burdens of welfare and to increase market competition. The central theme of this reform was to transfer welfare provision obligation, such as health care and housing, from enterprises to social insurance agencies and to individuals. This welfare system reform also reduced the employees' welfare ties with their employers and increased employees' mobility to change jobs and achieve higher earning potential. 13 The Chinese government also established a series of special economic zones and opened its door to the world to increase the international trade and foreign investments, and to acquire advanced technology and management knowledge. The total value of import-export increased from 20.6 billion US dollars in 1978 to 474.3 billion US dollars in 2000. 14 During the 1980s the central government also decentralized its fiscal system and implemented the "provincial contracting' system, which allows provinces to 10 W. C. Hsiao, 'Transformation of Health Care in China', N Eng J Med., 310 (1984), 932–326. 11 Cacy and Wang (2000). 12 China Statistical Bureau, China Statistical Yearbook 1997 (Beijing, China Statistical Publishing House, 1998) and China Statistical Bureau, China Statistical Yearbook 1999 (Beijing, China Statistical Publishing House, 2000). 13 Fang, Zhang et al., (2002). 14 G. Long, 'The Opportunities and Challenges to the Policy of "Open the Door to the Outside" under the Globalization', The New Stage of China Economy (2002). contract with the central government for a fixed revenue sharing quota: a base quota of shared revenues must be transferred to the central government, but all the revenues above this quota may be kept by the province. The shares of local government revenues in the total government revenues are between 60–85% during 1978–1993. 15 After implementing this financial reform, the financial status of local government has improved. Local governments have more motivation and capability to develop regional economy. 16 The second major government finance system reform was conducted in 1994. This reform separated the taxation system into central and local government taxations. The share of central government revenue in total government revenue has increased from 22% in 1993 to 56% in 1994 17 , which significantly increased the central government's capability to cross-subsidy between rich and poor areas. Health Related Social Changes Brought on by the Economic Reform After the Economic Reform was initiated in 1978, the Chinese economy achieved impressive results in terms of both real GDP and per capita income. This reform also led to dramatic changes in living conditions, better education, improvements in nutrition, housing, and sanitation. Economic Development China's economy has grown dramatically since the economic reform in 1978. The average annual increase of the Gross Domestic Product (GDP) was 9.7% during 1978–1999 based on the index of GDP at comparable price, which is 3.2 percent point faster than the annual increase rate of the GDP before the economic reform during 1952–1977. After considering the factor of population increase, the average annual increase per capita GDP was 8.3% during 1978–1999 based on the index of per capita GDP at comparable price, which is twice as fast as the increases during 1952–1977 period (Figure 1). 15 H. Sheng, 'The Relationship between Fiscal System Reform and the Stability of Macro-Economy', Market and Stability (S. Zhang, 2001). 16 C. M. Grogan, 'Urban Economic Reform and Access to Health Care Coverage in the People's Republic of China', Soc. Sci. Med, 41(8) (1995), 1073–1084. 17 Sheng, (2001). Source: China Statistical Yearbook 2000, China Statistical Bureau. The economic prosperity provided the premise for improving population living conditions. Food expenditure (as a proportion of total expenditure) declined from 57.5% in 1978 to 39.2%; it declined by about 18% for both urban and rural population (Figure 2). People had more capacity to consume other goods such as education and health services to improve the quality of life. Source: China Statistical Yearbook 2001, China Statistical Bureau. Education, Housing, and Nutrition Based on the population census data, the illiteracy rate declined from 22.9% in 1982 to 6.7% in 2000. The proportion of the population who had college or higher education increased from 0.6% in 1982 to 2.9% in 2000 (Figure 3). The percentage of college students in the schools increased from 8.9% in 1978 to 46.0% in 2000. 18 It is expected that higher education would lead to better health status. 19 18 China Statistical Bureau, China Statistical Yearbook 2000 (Beijing, China Statistical Publishing House, 2001). 19 P. Farrel and V. R. Fuchs, 'Schooling and Health: The Cigarette Connection', Journal of Health Economics, 1 (1982), 217–230; J. K. House and J. M. Lepkowski, 'The Social Stratification of Aging and Health', Journal of Health and Social Behavior, 35 (1994), 213–234; M. Grossman, 'The Human Capital Model of the Demand for Health', Handbook of Health Economics (Cambridge, MA, National Bureau of Economic Research, Working Paper 7078, 1999). Source: China Statistical Yearbook 2001, China Statistical Bureau. Both rural and urban areas have witnessed an extraordinary boom in house construction since 1978. In the rural area, per capita measure of housing increased from 8.1 square meters in 1978 to 24.8 square meters in 2000. In the urban area, this figure increased from 3.6 square meters to 10.3 meters. Within 23 years, the housing size per capita increased 3 times in both urban and rural areas. 20 The quality of housing also improved. Many new houses in the rural area were constructed of bricks, tiles, or reinforced concrete, whereas the older stock of housing was often built of adobe walls and thatched roofs. 21 With the economic growth, the Chinese nutrition status also improved. In the urban area, the consumption of grain declined to 85kg per capita per years in 1999 (58% of the consumption in 1981). While the consumption of meats, fish, shrimps, cooking oils and eggs increased. The consumption of the rural population shared the same trends with the urban population (Table 1 in Tables). The nutrition status of the Chinese population, especially rural population, improved significantly. 20 China Statistical Bureau, China Statistical Yearbook 2000 (Beijing, China Statistical Publishing House, 2001). 21 T. Mckinley and L. N. Wang, 'Housing and Wealth in Rural China', China Economic Review, 3(2) (1992), 195–211. Sanitation and Clean Water In the urban area, the percentage of the coverage of pipe water supply has been increased from 32% in 1952 to 96% in 2000. Unlike drinking water, the human waste sanitizing rate in urban area is relatively low. Only 55% human waste has been sanitized in 1997. It is predicted by the Ministry of Construction that by 2010, the urban pipe water coverage will reach to 100% and the human waste sanitizing rate will be 85% in urban China. 22 In the rural area, nearly 55.2% of the rural population accessed the pipe water system in 2000, which is 35 percent point higher than the figure in 1987. About 44.8%of the rural households have built the toilet with the sanitizing process in 2000. 23 Health Care System Development One year after the economic reform, China initiated its health system reform. 24 Many measures that were used in other economic sectors were also adopted in the health sector – decentralizing the power of the resource allocation to health care institutes; allowing private, individual, and foreign-owned health institutes to compete with state-owned institutes; using bonus wages and rising certain services prices as the economic incentives to improve doctors productivity; and cutting operational costs of services in order to improve efficiencies. These reforms successfully solved some problems that existed in the previous system, such as the shortage of supply to meet increased health demands of the population and inefficiency due to the lack of economic incentives. The health care resources are continuing to grow, the number of health institute increased by 8.3%, the number of hospital bed per 1000 population increased by 5.6%, and the number of doctor per 1000 population increased 7.1% during 1978–1999. 25 Nevertheless, certain aspects of the social changes brought on by this rapid economic development have potential negative impacts on the population's health. These impacts come from the increases in distribution of income, increases in unemployment rates, changes in emography, changes in social value, culture and 22 X. Li, 'The Trend and the Strategies of the Development of Urban basic construction.Beijing'. Minstry of Construction, www.stats-sd.gov.cn/cxjs/cjdt/csjj.htm. (1997). 23 Patriot Health Campaign Committee, 'Provincial Summaries of "Ninth Five Year Plan" and the Plans of "Tenth Five Year Plan" on Water and Toilet Improvement' (Beijing, 2002). 24 R. Peng, R. Cai, et al., China Reform: The Edition of Health System Reform (Dalian, Dalian Publishing House, 1992). 25 China Statistical Bureau, (2001 ). Income Inequalities Source: Zhao and Wang 2002. health related behaviors, the decline of health insurance coverage, and the changes of health care delivery systems. The major critiques of the Chinese economic reforms focus on the issue of inequality. Almost two decades into the implementation of the "get rich first" policy, the Gini coefficient, the indicator that measures income inequality, increased from 0.16 in 1978 to 0.30 in 1999 in urban China, and from 0.21 in 1978 to 0.42 in 2000 in rural China (Figure 4). Per capita GDP in Shanghai is 37,382 Yuan, while it is only 2,895 Yuan in Guizhou in 2001 (Table 2 in Tables). The income gap between the urban and rural was 2.9 times different at the beginning of the economic reform this declined to 2.3 during the initiation period of the reform during 1978 and 1985, while the economic reform was mainly focused on the rural economic reform. But this gap has increased since 1986 reaching 3.5 times difference by the late 1990s. 26 26 China Statistical Bureau, (2001). Research suggests that these income disparities could have had negative impacts on the distribution as well as the level of the population health status. 27 The experiences from advanced economies indicate that rapid economic growth can cause critical social insecurities and health problems. Rapid economic growth has always brought serious disruption: environmental, ideological, and political. As a result the relationship between economic growth and population health is complex since such disruption always threatens to spill over into deprivation, disease and death. 28 To attain a higher income, people may need to engage in occupations that have more stress and strain and greater exposure to risks. 29 Rising income may also be associated with consuming adverse diets and exercising less (will be discussed in the following paragraphs), all resulting in the worse health status. Unemployment and Floating Population Although society became more efficient through decentralization, privatization, and market competition, the unemployment has increased. For decades, the word "unemployment' was taboo in Mainland China. In the 1980's, surplus workers from various enterprises were described as "job-awaiting people". 30 Based on the official 1999 report from Ministry of Labor and Social Security in China, the urban registered unemployment is 5.7 million, and the urban registered unemployment rate is 3.1%. 31 However, many studies show the unemployment problems to be more severe than this figure indicates. 32 It is estimated there are 15 million people, 27 R. G. Wilkinson, 'Income Distribution and Life Expectancy', British Medical Journal, 304 (1992), 165–68; Y. L. Liu, W. C. Hsiao, et al., 'Equity in Health and Health Care: the Chinese Experience', Social Science & Medicine, 49(10) (1999), 1349–1356. 28 S. Szreter, 'Rapid Economic Growth and "the Four Ds" of Disruption, Deprivation, Disease and Death: Public Health Lessons from Nineteenth-Century Britain for Twenty-FirstCentury China', Tropical Medicine and International Health, 4(2) (1999), 146–152. 29 M. Rosko, and R. Broyles, The Economics of Health Care (Westport, Connecticut, Greenwood Press, Inc., 1988). 30 F. Shan, 'Unemployment in Mainland China: Current Situation and Possible Trends', Issues & Studies, 32(10) (1996), 75–84. 31 Ministry of Labour and Social Security, Yearbook of China Labour, 1999 (Beijing, China Labour and Social Security Publishing House, 2000). 32 J. C. B. Leung, 'The Political Economy of Unemployment and UnemploymentInsurance in the Peoples-Republic-of-China', International Social Work, 38(2) (1995), 139–149; L. Wong, and N. Kinglun, 'Unemployment and Policy Responses in Mainland China', Issues & Studies, 33(1) (1997), 43–63; G. P. Mao, and Y. Higano, 'Measurement of Concealed Unemployment in Shanghai', International Regional Science Review, 21(1) (1998), 59–78; E. X. Gu, 'From Permanent Employment to Massive Layoffs: the Political Economy of 'Transitional Unemployment' in Urban China (1993–8)', Economy and Society, 28(2) (1999), 281–299; V. Mok, 'Post-Mao Economic Transition: The Role of Non-State Enterprises', Issues & Studies, 36(2) (2000), 1–31. which is three times higher than the registered unemployment figure, are unemployed, lost their job, or are awaiting for a job in 1999. 33 Based on a study of 4000 households from 13 cities in six provinces in 2000, as many as 11% of urban workers had been retrenched, and 53% of these remained unemployed. The risk of retrenchment was higher for women, the less educated, the low skilled, the middle-aged, and those employed by local government or urban collectives. The duration of unemployment is longer for the unhealthy, the less educated, and woman with young children. 34 Those people who lost their job not only lost their income, but also lost or partially lost their welfare including health insurance, which made it more difficult for them to access health care services. The frustration and pressure due to the loss of a job also had a potential impact on their health status. The surplus of the labor force in rural China also became a significant social issue. As described in the previous section, the rural economic reforms have greatly mobilized farmers to improve their productivity. However, the increase of productivity also produced the surplus of labor. It is estimated that about 1/3 of farmers, which is about 150 millions, became surplus labor in rural China. With the economic development in urban China, many farmers moved to the urban area to find better and more profitable jobs. It is estimated that there is about 100–140 million floating population in urban areas since 1997 (which include both people from rural to urban and from one urban to other urban areas). This floating population has become one of major sources of labor for urban development. However, it has also created a series of social problems. They are not integrated into the urban health care system with no health insurance and limited access to community health services. Isolated in the city, casual and commercial sex became very prevalence in this population. They have become a high-risk population of sexual transmitted disease and HIV/AIDS, and the "bridge population" to transmit these diseases to the others. Demographic Change With the birth rate and mortality rate declining and the life expectancy rate increasing, the aging of the population accelerated after the economic reform. The percentage of people over 65 years old had increased from 4.9% in 1982 to 7.0% in 2000 (Table 3 in Tables). It estimated this figure would be up to 14%, which is 33 J. Tang, The Report on China Urban Poverty and the Relapse of Poverty (Beijing, Huaxia Publish House, 2002). 34 S. Appleton, J. Knight, et al., 'Labor Retrenchment in China, Determinants and Consequences', China Economic Review, 13 (2002), 252–275. similar to Japan's current status, in 25 years. 35 Based on the study of National Health Service Survey in 1993, the per capita illness day for the elderly (age 60 and above) is 64 days, which is 3.8 times higher than the general population. 36 It is expected that chronic diseases as well as disability will be more prevalence in the population. The demand for the health service utilization for these chronic diseases will increase. The caring system for the elderly has also changed gradually. Traditionally, Chinese had a large family with three or more generations living together with different generations playing different roles in the family. The mid-aged family members acting as careers to their parents. Many grandparents in turn take care responsibility for their grandchildren. With the improvement of living conditions and culture changes, fewer families had more than two generations living together in the same household. Family size reduced from 4.4 persons per household in 1982 to 3.4 persons per household (Table 3 in Tables). The responsibilities of caring for the aged population and children gradually switched from family to the society. The Change of Social Value, Culture After the economic reform, Chinese social values and culture also changed drastically. Before the economic reform, political and moral rewards were the major incentive for people to work for society. After the introduction of market economy, economic incentive becomes the major mechanism of rewarding people's productivity. "Political person" becomes "economic person". Based on the study of the criteria of selecting a spouse, the peoples preference had been shifted from "family political background' and "personal political status" to "better occupation", "high income", and "better housing" (Table 4 in Tables). The second change is that the collectivism had been weakened and the individualism had been strengthened. The Chinese people used to work collectively and share the responsibility, benefit, and economic gain evenly with his/her colleagues who work in the same working unit, state-owned or collective-owned enterprises, and collective-owned farming community. After the economic reform, individual contribution had been rewarded individually. The personal difference from others had been encouraged by the society. The third change is that the social capital has been weakened. Traditionally, the Chinese social network was built upon the family ties, relatives and people who come from the same community. After the introduction of market economic, those 35 K. Chen, Aging issue in China: The Problems and Their Solution (Beijing, China Union Medical School Publishing House, 2002). 36 Ministry of Health, Research on National Health Services (Beijing, Ministry of Health, China, 1994). traditional relationships are gradually replaced by the relationships of economic ties and sharing common interests. Due to the corruption and inconsistency of government policy, people are less and less trusting of the government. Recent evidence from the developed world suggest that the decline of social capital could have a negative impact on the population's health status. 37 Changes in social values also increased the cost and difficulties in mobilizing the population for public preventive activities, such as environmental protection, sanitation, and health education. 38 The Change of Health Related Behaviors Key health behaviors such as diet, smoking and drinking have also accompanied economic reform. China's food consumption has changed from traditional low fat, high vegetable diet to "Western-style" high fat, meat based diet. 39 This is resulting in a disease pattern that is shifting toward the chronic "Western-style" disease pattern. 40 Such disease patterns are believed to be closely correlated with the over consumption of fatty food, dairy products, sugar, alcohol and tobacco. 41 China is the largest tobacco producer and consumer in the world with one third of all smokers in the world being Chinese. 42 Based on China's Second National Survey of Smoking in 1996, the smoking rate was 37.6% overall, 66.9% for men and 4.2% for women. Heavy smokers, those who smoke at least 20 cigarettes per day, have rates of 4.1% for the total population, 7.5% for males, and 0.2% for females. 43 These rates have been increasing as compared to data from the 1984 National survey and, in addition, the starting age decreased. 44 It has been predicted 37 I. Kawachi and L. Berkman, 'Social Cohesion, Social Capital, and Health', Social Epidemiology, L. Berkman and I. Kawachi (Oxford, Oxford University Press, 2000), 174–190. 38 Y. Liu, 'Historical Review of Social Mobilization Measures', Strategy and Management, 4 (1999). 39 S. Du, B. Lu, et al., 'A New Stage of the Nutrition Transition in China', Public Health Nutrition, 5(1A) (2002), 169–74. 40 C. J. Smith, '(Over) Eating Success: The Health Consequences of the Restoration of Capitalism in Rural China', Soc. Sci. Med., 37(6) (1993), 761–770. 41 J. Chen, Diet, Life-Style and Mortality in China: A Study of the Characteristics of 65 Chinese Counties (Oxford, Oxford University Press, 1990). 42 T. H. Lam, Y. He, et al., 'Mortality Attributable to Cigarette Smoking in China' JAMA, 278(18) (1997), 1505–08; People's Daily, 'China Faces Hard Job to Control Smoking', People's Daily (China, 2000). 43 G. H. Yang, 1996 National Prevalence Survey of Smoking Pattern (Beijing, China Science and Technology Press, 1997). 44 Yang, (1997). that half of male smokers will die between the ages of 35 and 65. 45 The increase in the already high prevalence of smoking in China shows the urgency of preventing new smokers and also of reducing the number of current smokers. Sexual freedom, increased promiscuity, economic incentives, mobility of population and increasing disparity between the rich and poor leading to a rise of commercial sex are major factors that drive the rise of Sexual Transmitted Diseases (STD). Based on the government statistic report, the incident rate of gonorrhea increased from 6.84 per 100,000 populations in 1990 to 18.31 per 100,000 populations in 2000. The incident rate of syphilis also increased from 0.093 per 100,000 populations in 1990 to 4.73 per 100,000 populations in 2000 (Table 5 in Tables). The number of HIV infected persons already reached to 850,000 cases in 2002 based on the government estimation; figures from international organizations are much higher. 46 Change of Health Care Financing and Health Delivery System One of the most striking health care problems is the inequality of access to the services. Based on the rural household survey conducted by the Ministry of Health in 1986, about 29% were unable to be hospitalized due to unable to afford the high cost of hospitalization. 47 This figure increased to 64% in 1998. 48 The decreased accessibility of health care service is not only influenced by economic and social changes, such as the inequality of income, but also is related to the health care system transition itself, such as the change of health care financing and the reform of health care delivery system to a market oriented system. 45 T. H. Lam, S. Y. Ho, et al., 'Mortality and Smoking in Hong Kong: Case-Control Study of All Adult Death in 1998', BMJ, 323 (2001), 1–6. 46 P. M. Gorbach, C. Ryan, et al., 'The Impact of Social, Economic and Political Forces on Emerging HIV Epidemics', AIDS, 16(Suppl 4) (2002), 35–43. 47 Ministry of Health, Research on National Health Services (Beijing, Ministry of Health, China, 1986). 48 Ministry of Health, Research on National Health Services-An Analysis Report of the Second National Health Services Survey in 1998(I) (Beijing, Ministry of Health, China, 1999). Source: Cai 2002. Change of Health Care Financing There are three major sources of health care financing, the government, the employer, and the individual. All of these three sources increased in terms of the absolutely values of health expenditure during 1990–2000. However, due to the increase of individual expenditure, it is much faster than government and employer's expenditure. The share of individual expenditure in total health expenditure increased from 37% in 1990 to 61% in 2000, while the shares of other resources all declined. The decline of the share of government expenditure for the public is the most stark, almost reduced to the half of its share in 1990 (Figure 5). The decline of health insurance coverage is considered the major reason for the rapid increase of individual health expenditure. In the urban area, health insurance systems are mainly employment-based schemes (i.e. Government Employee Health Insurance and Enterprise Employee Health Insurance). Increasing unemployment in both the private and public sector has led to a sharp decline in social insurance coverage (Table 6 in Tables). In addition, with the cost containment concern, the originally "free" public health insurance system has been replaced by commerciallike health insurance schemes with a variety of cost sharing mechanisms, such as indemnity, deduction, co-payment, and coinsurance measures. 49 These cost sharing 49 W. C. Yip and W. C. Hsiao, 'Medical Savings Accounts: Lessons from China', Health Affairs, 16(6) (1997), 244–251; T. W. Hu, M. Ong, et al., 'The Effects of Economic Reform on mechanisms also increase the individual health expenditure and financial burden for people using medical services. Before the economic reform, Cooperative Medical System (CMS) was the insurance scheme in rural China to cover the major health expenditure. Ninety three percent of rural villages were covered by the CMS in 1976. 50 The major source of funding for this insurance scheme relied on the collective economic, the commune system. However, with the replacement of individual responsible system to the collective economic system, CMS collapsed due to the loss of financial support and political interferences. By the time of 1990, only 6.1% of villages have kept the CMS system (Table 7 in Tables) 51 and only 5% of rural residents were covered. 52 Although there were numerous attempts for restoring rural health insurance during 1990s, most of these attempts failed due the lack of policy support, lack of willingness and capacity to pay for the insurance premium by individual farmers, and lack of capacity of the management of CMS. The rural health services are now largely provided by individual rural doctors paid by fee-forservice payment method. Only those patients who have the ability-to-pay for these services are able to access these services. 53 The decentralization of the government fiscal system also has a potential impact on the inequality of access health care services. As part of the general decentralization of the government authority, the structure of government health care financing was changed so that each level of government was directly responsible for maintaining the health institutions under its administration. 54 For example, central government finances only the national hospitals, research institutes, and medical schools, which report directly to the central government. Each province or county is responsible for its own public services, including health care education and welfare, thus, a prosperous county may be able to provide generous health care and a poor county may have to settle for less. 55 Health Insurance and the Financial Burden for Urban Workers in China', Health Economics, 8(4) (1999), 309–321. 50 X. Feng, S. Tang, et al., 'Cooperative Medical Schemes in Contemporary Rural China', Soc. Sci. Med., 41(8) (1995), 1111–1118. 51 Feng, Tang et al. (1995). 52 X. Gu, G. Bloom, et al., 'Financing Health Care in Rural China: Preliminary Report of A Nationwide Study', Soc. Sci. Med., 36(4) (1993), 385–391. 53 W. C. L. Hsiao, 'The Chinese Health-Care System – Lessons for Other Nations', Social Science & Medicine, 41(8) (1995), 1047–1055. 54 G. E. Henderson, J. S. Akin, et al., 'Trends in Health Services Utilization in Eight Provinces in China, 1989–1993', Soc. Sci. Med., 47(12) (1998), 1957–1971. 55 Hsiao, (1984). Reform of Health Care Delivery System The diffusion of economic reform has transformed health care institutions from heavily subsidized welfare institutions to marketed oriented cost recovery and surplus/profit driven entities. In order to improve the efficiency and productivity, the government has adopted these following major approaches to reform health care system. First, the government limited public funds available for health care institutions, covering only basic personnel wages and certain new capital investment, which were about 25–30% of health institutes' cost, thereby leaving the health institute to recover the other 70–75%. 56 Second, the government used different price policies in order to encourage particular patterns of health care usage. Prices for most basic health services have been kept low, based on historical fees set in the 1950s. However, the prices are established higher than their cost for new and high technology services. Hospitals and doctors were also allowed to keep 15–25% mark up from selling the drugs. 57 In order to reduce cost and increase competition, the drug distribution system also changed. Hospitals and clinics are allowed to purchase drugs directly from drug companies, factories and retailers with lower prices. This policy has enabled them to make profits from selling drugs. However, hospitals and clinics may purchase low quality drugs in order to earn more or for more commissions to the individuals who is in charge of purchasing drugs on behalf of hospital and clinics. 58 Third, the government gave health institutes a large degree of financial independence. As in the economic sector, the bonus wage has been introduced as the economic incentives to improve doctors' and other medical staff's productivity. The bonus wage is from the profits of health institutes. There is thus strong incentive for doctors to provide highly profitable services to the patients, such selling more drugs and providing more high-technology services. Fourth, the government allowed private ownership of health institute and private clinical practices to compete with public-owned health institutes. Private investment in new health institute was promoted by allowing them to charge higher fees than allowed by public-owned institutes. 59 The services that provided by those private-owned health institute are driven by the demand of health care market. With all those reform approaches described above, the productivity of health institute, doctors income, health care investment and health care expenditure all 56 Hsiao, (1995). 57 Hsiao, (1995). 58 H. Dong, L. Bogg, et al., 'Drug policy in China: Pharmaceutical Distribution in Rural Areas', Soc. Sci. Med., 48 (1999), 777–786. 59 Hsiao, (1995) increased. Per capita health expenditure increased from 11.4 Yuan in 1978 to 364.2 Yuan in 2000 (Table 8 in Tables). 60 Cost inflation became another barrier to access to health care services. 61 The Change of Public Health System China has a long history of recognizing that the disease prevention is a very important issue in terms of human survival and socio- economic development. The idea of "prevention is better than cure" comes from the earliest Chinese Medicine treatise, Huangdi Neijing which was written over a period, from 206 B.C. to 8 A.D. 62 After the Liberation in 1949, in order to put the principle of "preventive service should be the first priority among health services" 63 into practice, the Chinese government established public health administration agencies as well as the preventive service system called Epidemic Prevention Station system (it was renamed to Center for Disease Control and Prevention) at each administration level. Although public health plays a very important role in controlling communicable disease and improving population health, the total expenditure on public health services provided by EPS/CDC is very limited. Based on estimates from the National Health Account Research Team, the revenues of EPS and other disease control and prevention institutes (the expenditures from all sources on these institution services) increased four-fold from 2027 million Yuan in 1990 to 8150 million Yuan in 1998. Still this was a slight decline as a share of the total health expenditure from 2.36%t in 1990 to 2.1% in 1998 (Table 9 in Tables). 64 Public health institutes, including the EPS, were traditionally financed completely by the government and provided free public health services. 65 However, after the economic reform, these public health institutes were no longer considered pure welfare entities. The government provides a fixed budget to each public health 60 R. Cai, Developing Health Care System and Improving Health Status. Conference on Macro-Economy and Health (Beijing, China Health Economic Institute, MOH, 2002). 61 X. Z. Liu and W. C. L. Hsiao, 'The Cost Escalation of Social Health-Insurance Plans in China – Its Implication for Public-Policy', Social Science & Medicine, 41(8) (1995), 1095–1101. 62 Z. Cheng, and Z. Song, Brief Medical History (Beijing, Beijing Medical University and Beijing Union Medical University Joint Publishing House, 1990). 63 S. Huang and S. Lin, Contemporary Chinese Health System (Beijing, China Social Science Publishing House, 1986). 64 G. Liu, Y. Zhao, et al., 'Study on the Allocation for Chinese Health Accounting in Health System', Chinese Journal of Health Economics, 20(2) (2001), 29–33. 65 D. Yu and J. Meng, 'The Study on Financial Operational m Mechanism within Health System', Improving Health Economic Policies (S. C. P. R. Group. Beijing, China Economic Publishing House, 1996), 57–75. institute to cover staff salaries and a parts of the services cost. Although certain public health services are still free for the public (paid for by local government), such as the vaccines in EPI, and random monitoring of sanitation in public sites, drinking water and foods, a significant portion of the services were allowed to charge for services, in order to generate additional revenue to compensate shortfall in the government budget. 66 The results of the National Health Services Survey in 1998 67 , which included data from 130 EPSs, showed that only about 38% of the EPSs' revenue came from the government budget in 1997. Fifty eight percent of the EPSs' revenue came from their service charges, for health services such as physical check-up for people who work in food industries, and health monitoring and inspection (Table 10 in Tables). With these additional charges, the EPSs are able to recover their costs and have an average surplus of about 86,000 Yuan per institute per year. The positive effect of the fixed government budget for EPSs has increased financial accountability of the institutes, resulting in the reduction of waste. It also gave incentives to EPSs to expand their public health services to new areas and new population groups. Thus they now provide additional services, such as testing the safety of the new construction materials, water purifying devices, and so on, and new immunizations (not included in the EPI program) to cover certain high risk population groups. However, these policies also had negative effects, with high social costs. Since the public health services have been divided into user's charge and non-user's charge categories, it creates incentives for EPSs to over- provide the services that can bring additional revenues to the institutes, such as sanitation inspections (the food industry, restaurants, hotels, and industries which discharge pollutants and have risky working conditions, primary schools, etc. are subject to inspections by EPSs), and to under-provide the services that do not bring additional revenues to the institutes ,such as immunization and monitoring of diseases. 68 The bonus wage was also introduced into public health system. The amount of bonus wage is linked with the revenues that department could bring by user's charge. Since the services that allow having user's charge are different by department, the amount of bonus varies by 4–5 times across different departments within EPS/CDC. This economic incentive has distorted performance of various public health activities. It is estimated that there are about 1.2 million rural doctors and health assistants and 699,000 health posts (some health posts have more than one staff member). The collectives own 41% of these health posts and the rest of them are owned by 66 X. Liu, 'Financing Reforms of Public Health Services in China: Lessons for other Nations', Social Science & Medicine, 54(11) (2002), 1691–1698. 67 Ministry of Health, (1999). 68 Liu, (2002). individuals. 69 Their revenues are mainly from the providing of medical services to the patients based on fee-for-service payment method. Although some of rural doctors receive certain fixed amount subsidies from government to conduct essential disease control and prevention programs, and the government still requests rural doctors to play important roles in disease prevention and control, there is no incentive for them to play very active roles in activities for environmental sanitation, vector control, and health education. The Changes of Population Health Status As described above, the rapid economic development and social change produced mixed effects on population health status. On the one hand, the materials prosperity provided the premise to improve population health status. These included the increase of income, better education, better housing and nutrition status, and more and better health care services. On the other hand, several social problems brought on the economic reform have the potential negative impacts on population health. These factors include the income inequalities, unemployment, poverty, floating population issues, the decline of social capital, and decline of access health care services. The current Chinese population health status reflects the results from both contrary effects. Level of Population Health Status: Mortality and life Expectancy Since 1949, Chinese health status has increased dramatically. Mortality decreased from 18 per 1000 in 1950 to 6.4 per 1000 in 2000. The infant mortality rate declined from 196 per 1000 live births in 1950 to 33.1 per 1000 in 2000. Life expectancy increased from 30.5 in 1949 to 71.4 in 2000 (Table 11 in Tables). The attributions of these health status improvements are the rapid economic development, innovative health system development, and massive public health movements. However, population health improvement has been slowed down recently and is not consistent with the speed of economic development. GDP per capita increased 4% annually during 1950–1980 whilst life expectancy increased 2.1% per year, and infant mortality declined 5.1% annually at the same period. During 1980–2000, GDP per capita increased 8.3% annually, almost twice as fast as the speed before 1980. Life expectancy increased only 0.3% per year, and infant mortality declined 69 Ministry of Health, 2001 Communique of Health System Development Statistics (Beijing, Ministry of Health, China, 2002). 1.6% annually, which is much lower than the speed before 1980. 70 Other studies also sow that despite rapid economic growth and improvement in literacy rates, the mortality rate for children under the age of five has not changed since 1985 71 , the infant mortality rates have remained virtually unchanged and the average life expectancy has changed little since the mid-1980s. 72 Although it is arguable that there is potential effect of marginal return decline once economic development as well as health status reach to certain levels, the potential negative effects brought on by the rapid economic and social transitions should not be neglected due to this reason. Distribution of Population Health Status: Inequality of Health Status There is also disparity of population health status across the urban and rural, rich and poor in China. Life expectancy is reported to range from 74.5 years in big city areas to 64.5 years in the poorest rural areas. The infant mortality rate is ranged from 15.8 per 1000 life birth in big city areas to 71.8 per 1000 life birth in the poorest rural areas, also with a significant gradient from rich to poor areas. The prevalence of disability also shows a similar pattern; it ranges from 6.3 per 1000 population in big city areas to 12.4 per 1000 population in the poorest rural areas (Table 12 in Tables). 73 The disparity of population health status has also widened over the course of economic transition. Evidence shows that infant mortality declined by about 4% in poor provinces while it declined by about 33% in rich provinces during 1983 and1993 period. 74 As an indicator of this gap, the Ratio of Infant Mortality Rate (IMR) between rural and urban areas has increased from 1.67 in 1981 to 1.75 in 1990 and to 2.93 in 1993. 75 70 A. Hu and L. Hu, China Macro-economy and Health. Conference on Macro-Economy and Health (Beijing, China Health Economic Institute, MOH, 2002). 71 N. Chen, 'Effect of Society and Economy Development on Infant Mortality Rate in China', Health Economics Research, 2 (2003), 9–12. 72 W. C. L. Hsiao and Y. L. Liu, 'Economic Reform and Health – Lessons from China', New England Journal of Medicine, 335(6) (1996), 430–432. 73 Y. L. Liu, K. Rao, et al., 'China: Increasing Health Gaps in a Transitional Economy', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University, 2001), 77–89. 74 Chen, (2003). 75 Liu, Hsiao et al., (1999). Structure of Population Health Status: the Leading Causes of Death Like many other countries, China has experienced a shift in the leading cause of death from acute infectious diseases to chronic conditions. In the urban area, infectious diseases and pulmonary tuberculosis were the number 2 and 3 leading causes of death in urban China in 1957. These two causes dropped to number 6 and 8 positions before economic reform (1975). By 1993, infectious diseases were no long among first ten leading causes of death in urban China. Instead, cancer, heart disease, and cerebrovascular disease become the first three leading cause of death in 2000 (Table 13 in Tables). The death due to accident, injury, poisoning and mental health disease is also in the raising trend. Rural China also followed urban transition pattern but with slow trend. By 2000, death due to pulmonary tuberculosis is still in the first ten leading cause of death in rural China (Table 14 in Tables). The health transition depicted above stems from the dramatic decline in fertility (and the resultant change in the age structure of the population) as well as the successful reduction of infectious diseases' morbidity and mortality. It also reflects the results of social changes due to the most recent economic reform in China. Material prosperity due to economic reform played a more important role in the decline of infectious disease, while psychosocial factors, such as stress and anxiety, brought on by the rapid social change may play a more important role on the increase of chronic diseases. 76 Unhealthy behaviors, such as the excess consumption of fatty foods, dairy products, sugar, alcohol and tobacco also contribute to these health transition. 77 Due to its potential close relationship with the rapid economic and social change, suicide rates have also caught peoples' attention, although it is not in the list of leading cause of death. It is estimated that there are over 300,000 suicides in China per year, This makes suicide one of the most important causes of death in the country and makes the suicide rate in China one of the highest in the world. 78 Due to lack of the data prior to 1987, it is difficult to determine whether the suicide rate increased or not with the rapid economic and social transitions. However, researchers believe that many social changes brought on by the rapid economic reform world influence suicide rate, which includes "the major economic losses for individuals and families due to participating in risky ventures or pathological gambling, increasing rates of marital infidelity and divorce, increasing 76 Wilkinson, (1992). 77 Smith, (1993). 78 M. R. Phillips, H. Liu, et al., 'Suicide and Social Change in China', Culture, Medicine and Psychiatry, 23 (1999), 25–50. rate of alcohol and drug use, rapidly increasing cost of health care which may make some people not able to afford, weakening the family ties which results in less social support, migrants to urban for temporary work, and increase the social and economic gaps". 79 Health Related Quality of Life The Health Related Quality of Life (HRQoL) represents another dimension of population health status, which has been investigated much less than the length of life. Recently WHO estimated the Disability Adjusted Life Expectancy (DALY), which is one way of measuring quality adjusted life expectancy, for 192 countries. Based on this estimation, Chinese DALY is 61.2 years for male and 63.3 years for female. Comparing to the life expectancy of 68.1 years for male and 71.3 years for female, the life expectancy losses due to low quality of life (as measured by disability here) are 6.9 years for Chinese male and 8 years for Chinese female. These two figures are 5.7 years for Japanese male and 7.1 years for Japanese female. 80 Both life expectancy and DALY indicator displayed that Chinese health status is lower than Japanese health status in terms of both length of life and quality of life. Another study from 2000 Beijing Household Health Survey also found that the Chinese HRQoL might be lower than other developed countries. The EQ-5D dimension indicators and EQ-5D visual analog scale (VAS) have been used to measure Chinese quality of life in this study. Age-specific VAS analysis shows that the VAS scores significantly drop in age 30's to 40's in the Chinese population, which is 10 years younger than in the UK population, and 30 years younger than in the Japanese population. This result might imply that the Chinese population might have earlier and longer lower HRQoL lifespan compared to people living in the developed countries. 81 The results of this study also show that the Chinese population HRQoL is 78.3 measured by the EQ-5D VAS, Pain/Discomfort and Anxiety/Depression are the major problems of Chinese HRQoL. The social determinants such as employment status and property level are the major determinants of overall population HRQoL. If this significant relationship proves to be causal, a greater disparity in Chinese 79 Phillips, Liu et al., (1999). 80 WHO, The World Health Report 2000, Health Systems: Improving Performance (Paris, France, WHO, 2000). 81 H. Wang, 'Variations in Population Health Related Quality of Life and Health Service Utilization in Beijing, China', Department of Population Health Sciences (Madison, University of Wisconsin-Madison, 2002). population HRQoL will be expected due to the increase in disparity of wealth and the increase in unemployment associated with rapid economic transition. 82 The Options of Social Policies in Improving Population Health Reestablishing the Social Value of Equity After more than 20 years of economic reform, China has successfully transformed its economy from a central planning system to a market oriented economic system. With the economic transition, social values have also changed. "Getting rich first" becomes the most prominent social goal. Disparity in income, as well as the disparity in other aspects of society such as accessing health care and population health, becomes a normal and acceptable phenomenon. With the widening of social inequality, its negative effects on the social stability as well as population health have emerged, which will in turn restrict the economic and social development. In order to correct these problems brought by on the market-oriented economic system, social value of "equity" should be reinstalled. A sustainable economic and social development has to rely on the balance of "great efficiency' and "reasonable equity". Social value development is the first step of making effective value-based policies to reach this goal. 83 Integrating Health Improvement Goals into Broad Economic and Social Development Policies Population health is the result of the effects of multiple determinants. As discussed in the previous section, many economic and social policies could have the impact on population health. Therefore, it is important to take the goals of health improvement into the consideration while making these economic and social policies. However, the Ministry of Health (MOH) used to be considered the least powerful Ministry in the government. Based on the existing administration 82 Wang, (2002). 83 M. Whitehead, G. Dahlgren, et al., 'Developing the Policy Response to Inequalities in Health: A Global Perspective', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University, 2001), 309–323. structure, the Ministry of Health does not have the authority and capacity to coordinate other sectors to achieve population health goals. The establishment of a permanent joint health committee, which is similar to the Patriot Health Committee, at State Council level might be necessary to take the responsibility to coordinate multiple sectors in terms of improving population health status. (The Patriot Health Campaigns were initiated in 1952. During the Korea War, the Chinese Communist Government was convinced that the United States intended to use biological weapons to spread communicable diseases in order to reduce the strength of the Liberation Army. Patriot Health Campaign Committee was established on March 14, 1952 in order to prevent the outbreak of communicable diseases. This Committee was composed of members from 21 ministries and various unions. These ministries and unions include planning, finance, construction, industries, commerce, agriculture, water resources, chemistry, culture, education, health, environmental protection, security, the military, civil affairs, workers' union, youth union, and the women's union etc. The Committee holds meetings periodically, to set up the agenda for the Campaigns' activities, and to coordinate and assign tasks to each participant ministry or union for certain common goals of improving population health. 84 Leaning Health Interventions Towards Vulnerable Population Competition is the characteristics of the market economy. The winners in this market competition would obtain more resource to enjoy the goods and services that are provided by the market, and thereby enjoy the better life. The losers in this market competition, however, become the vulnerable population and are left out by the market economic system. With little resources, those vulnerable populations would not be able to enjoy the goods and service that provided by the market. Furthermore, vulnerable populations are exposed to much more risks than betteroff populations, such as unhealthy housing, dangerous working conditions, nutritional deficiencies, more stressful, more smoking and drinking. 85 The intervention from public sectors should be more leaning towards those vulnerable populations who are left out by the market. 84 H. Chen, Chinese Health Care (Beijing, People's Health Publishing House, 1985). 85 F. Diderichsen, T. Evens, et al., 'The Social Basis of Disparities in Health', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University 2001), 13–23. Increasing Health Insurance Coverage Health insurance has been used as a unique social welfare measure to redistribution resources from the healthy population to the most needed unhealthy population; to ensure the accessibility to the health care services; to provide the financial risk protection to the patients; and to ensure the services provided by the doctors are the appropriate (cost-effective) services to the patients. However, the coverage of health insurance is still very low, only about 20% population that has been covered (the coverage rate is 40% for urban population and 10% for rural population). How to provide the health insurance for the 80% uncovered population is a tremendous challenge to the government as well as to the all society. In October 2002, Government of China, for the first time in its history, announced its willing to set up a subsidy (RMB 20 Yuan=$2.5 per person per year) to support a community-based health insurance scheme to cover basic health service for the farmers who are in poor rural areas of China. Although this announcement represents a significant progress in the Government of China's determination to help the poor farmers, the actual establishment of new health financing scheme and improvement of delivery system are left open. The central government will not disburse the subsidy without the lower level government/community prove to a workable model of such insurance schemes. The local government and the communities are in urgent need for technical support to make a new scheme work and to have financial support to test it before they get the subsidy from central government. Continuing Reforming Health Delivery System Due to the market incentives, it is inevitable that health providers will focus on providing more and better services to the people who can afford them. How to ensure the economical disadvantaged population to access basic services is one of critical social problems in the market-oriented society. With the public financial support, health delivery system should take the responsibility to provide low cost or free first aid services to the people who can't afford the expensive services. Research, Researches, and Research It is been joked that every research project will end up with the results of requiring more research. Indeed, the relationships between economic development and social change and population health are very complex. There are causal relationships between economic development and population health in both directions, i.e. the better economy would lead to better population health and better population health also lead to better economic development. Most of the evidences that are cited in this study did not address these causal issues. In addition, the determinants of health are numerous, and we are not able to list all of them in this study and we did not attempt to prioritize them. However, all these unsolved issues are very crucial to make concrete interventions. There is a great need to conduct more research to support sound evidence-based policies. For these reasons, we also conclude, as other study, that there is great need to conduct more research in the following two areas: to conduct more research in order to get better understanding the causal relationships between economic development and social change and population health; to conduct more research in order policy makers able to prioritize their intervention policies. Hong Wang, M.D., Ph.D., is Assistant Professor at the Division of Global Health, Yale School of Public Health, Yale University, New Haven, CT 06511, USA. References Appleton, S., J. Knight, et al., 'Labor Retrenchment in China, Determinants and Consequences', China Economic Review, 13 (2002), 252–275. Atlapedia (2002). People's Republic of China, www.atlapedia.com/online/ countries/china.htm. Cai, R., Developing Health Care System and Improving Health Status. Conference on Macro-Economy and Health (Beijing, China Health Economic Institute, MOH, 2002). Chen, H., Chinese Health Care (Beijing, People's Health Publishing House, 1985). Chen, J., Diet, Life-Style and Mortality in China: A Study of the Characteristics of 65 Chinese Counties (Oxford, Oxford University Press, 1990). Chen, K., Aging issue in China: The Problems and Their Solution (Beijing, China Union Medical School Publishing House, 2002). Chen, N., 'Effect of Society and Economy Development on Infant Mortality Rate in China', Health Economics Research, 2 (2003), 9–12. Cheng, Z. and Z. Song, Brief Medical History (Beijing, Beijing Medical University and Beijing Union Medical University Joint Publishing House, 1990). China Statistical Bureau, China Statistical Yearbook 1997 (Beijing, China Statistical Publishing House, 1998). China Statistical Bureau, China Statistical Yearbook 1999 (Beijing, China Statistical Publishing House, 2000). China Statistical Bureau, China Statistical Yearbook 2000 (Beijing, China Statistical Publishing House, 2001). Coacy, D. P. and L. Wang, 'Equity, Efficiency, and Labor-Market Reforms in Urban China: The Impact of Bonus Wages on the Distribution of Earnings', China Economic Review, 11 (2000), 213–231. Diderichsen, F., T. Evens, et al.,'The Social Basis of Disparities in Health', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University, 2001), 13–23. Dong, H., L. Bogg, et al., 'Drug policy in China: Pharmaceutical Distribution in Rural Areas', Soc. Sci. Med., 48 (1999), 777–786. Du, S., B. Lu, et al., 'A New Stage of the Nutrition Transition in China', Public Health Nutrition, 5(1A) (2002), 169–74. Eckaus, R. S., 'Some Consequences of Fiscal Reliance on Extra budgetary Revenues in China', China Economic Review, 14 (2003), 72–88. Fang, C., X. Zhang, et al., 'Emergence of Urban Poverty and Inequality in China: Evidence from Household Survey', China Economic Review, 13 (2002), 430– 443. Farrel, P. and V. R. Fuchs, 'Schooling and Health: The Cigarette Connection', Journal of Health Economics, 1 (1982), 217–230. Feng, X., S. Tang, et al., 'Cooperative Medical Schemes in Contemporary Rural China', Soc. Sci. Med., 41(8) (1995), 1111–1118. Gorbach, P. M., C. Ryan, et al., 'The Impact of Social, Economic and Political Forces on Emerging HIV Epidemics', AIDS, 16(Suppl 4) (2002), S35–43. Grogan, C. M., 'Urban Economic Reform and Access to Health Care Coverage in the People's Republic of China', Soc. Sci. Med., 41(8) (1995), 1073–1084. Grossman, M., 'The Human Capital Model of the Demand for Health', Handbook of Health Economics (Cambridge, MA, National Bureau of Economic Research, Working Paper 7078, 1999). Gu, E. X., 'From Permanent Employment to Massive Layoffs: the Political Economy of 'Transitional Unemployment' in Urban China (1993–8)', Economy and Society, 28(2) (1999), 281–299. Gu, X., G. Bloom, et al., 'Financing Health Care in Rural China: Preliminary Report of A Nationwide Study', Soc. Sci. Med., 36(4) (1993), 385–391. Henderson, G. E., J. S. Akin, et al., 'Trends in Health Services Utilization in Eight Provinces in China, 1989–1993', Soc. Sci. Med., 47(12) (1998), 1957–1971. House, J. K. and J. M. Lepkowski, 'The Social Stratification of Aging and Health', Journal of Health and Social Behavior, 35 (1994), 213–234. Hsiao, W. C., 'Transformation of Health Care in China', N Eng J Med., 310 (1984), 932–326. Hsiao, W. C. L., 'The Chinese Health-Care System – Lessons for Other Nations', Social Science & Medicine, 41(8) (1995), 1047–1055. Hsiao, W. C. L. and Y. L. Liu, 'Economic Reform and Health – Lessons from China', New England Journal of Medicine, 335(6) (1996), 430–432. Hu, A. and L. Hu, China Macro-economy and Health. Conference on MacroEconomy and Health (Beijing, China Health Economic Institute, MOH, 2002). Hu, T. W., M. Ong, et al., 'The Effects of Economic Reform on Health Insurance and the Financial Burden for Urban Workers in China', Health Economics, 8(4) (1999), 309–321. Huang, S. and S. Lin, Contemporary Chinese Health System (Beijing, China Social Science Publishing House, 1986). Kawachi, I. and L. Berkman. 'Social Cohesion, Social Capital, and Health', Social Epidemiology, L. Berkman and I. Kawachi (Oxford, Oxford University Press, 2000), 174–190. Lam, T. H., Y. He, et al., 'Mortality Attributable to Cigarette Smoking in China', JAMA, 278(18) (1997), 1505–08. Lam, T. H., S. Y. Ho, et al., 'Mortality and Smoking in Hong Kong: Case-Control Study of All Adult Death in 1998', BMJ, 323 (2001), 1–6. Leung, J. C. B., 'The Political Economy of Unemployment and UnemploymentInsurance in the Peoples-Republic-of-China', International Social Work, 38(2) (1995), 139–149. Li, X., 'The Trend and the Strategies of the Development of Urban basic construction', Beijing, Minstry of Construction, www.stats-sd.gov.cn/ cxjs/cjdt/csjj.htm. (1997). Liu, G., Y. Zhao, et al., 'Study on the Allocation for Chinese Health Accounting in Health System', Chinese Journal of Health Economics, 20(2) (2001), 29–33. Liu, X., 'Financing Reforms of Public Health Services in China: Lessons for other Nations', Social Science & Medicine, 54(11) (2002), 1691–1698. Liu, X. Z. and W. C. L. Hsiao, 'The Cost Escalation of Social Health-Insurance Plans in China – Its Implication for Public-Policy', Social Science & Medicine, 41(8) (1995), 1095–1101. Liu, Y., 'Historical Review of Social Mobilization Measures', Strategy and Management, 4 (1999). Liu, Y. L., W. C. Hsiao, et al., 'Equity in Health and Health Care: the Chinese Experience', Social Science & Medicine, 49(10) (1999), 1349–1356. Liu, Y. L., K. Rao, et al.,'China: Increasing Health Gaps in a Transitional Economy', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University, 2001), 77–89. Long, G., 'The Opportunities and Challenges to the Policy of "Open the Door to the Outside" under the Globalization', The New Stage of China Economy (2002). Mao, G. P. and Y. Higano, 'Measurement of Concealed Unemployment in Shanghai', International Regional Science Review, 21(1) (1998), 59–78. Mckinley, T. and L. N. Wang, 'Housing and Wealth in Rural China', China Economic Review, 3(2) (1992), 195–211. Ministry of Health, Research on National Health Services (Beijing, Ministry of Health, China, 1994). Ministry of Health, Research on National Health Services (Beijing, Ministry of Health, China, 1986). Ministry of Health, Research on National Health Services-An Analysis Report of the Second National Health Services Survey in 1998(I) (Beijing, Ministry of Health, China, 1999). Ministry of Health, 2001 Communique of Health System Development Statistics (Beijing, Ministry of Health, China, 2002). Ministry of Labour and Social Security, Yearbook of China Labour, 1999 (Beijing, China Labour and Social Security Publishing House, 2000). Mok, V., 'Post-Mao Economic Transition: The Role of Non-State Enterprises', Issues & Studies, 36(2) (2000), 1–31. Oberschall, A., 'The Great Transition: China, Hungary, and Sociology Exit Socialism into the Market', American Journal of Sociology, 101(4) (1996), 1028– 41. Patriot Health Campaign Committee, 'Provincial Summaries of "Ninth Five Year Plan" and the Plans of "Tenth Five Year Plan" on Water and Toilet Improvement' (Beijing, 2002). Peng, R., R. Cai, et al., China Reform: The Edition of Health System Reform (Dalian, Dalian Publishing House, 1992). People's Daily, 'China Faces Hard Job to Control Smoking', People's Daily (China, 2000). Phillips, M. R., H. Liu, et al., 'Suicide and Social Change in China', Culture, Medicine and Psychiatry, 23 (1999), 25–50. Rosko, M. and R. Broyles, The Economics of Health Care (Westport, Connecticut, Greenwood Press, Inc., 1988). Ru, X., X. Lu, et al., Blue Book of the Chinese Society (Beijing, Social Sciences Documentation Publishing House, 2003). Shan, F., 'Unemployment in Mainland China: Current Situation and Possible Trends', Issues & Studies, 32(10) (1996), 75–84. Sheng, H., 'The Relationship between Fiscal System Reform and the Stability of Macro-Economy', Market and Stability (S. Zhang, 2001). Smith, C. J., '(Over)Eating Success: The Health Consequences of the Restoration of Capitalism in Rural China', Soc. Sci. Med., 37(6) (1993), 761–770. Szreter, S., 'Rapid Economic Growth and "the Four Ds" of Disruption, Deprivation, Disease and Death: Public Health Lessons from NineteenthCentury Britain for Twenty-First-Century China', Tropical Medicine and International Health, 4(2) (1999), 146–152. Tang, J., The Report on China Urban Poverty and the Relapse of Poverty (Beijing, Huaxia Publish House, 2002). Wang, H.,'Variations in Population Health Related Quality of Life and Health Service Utilization in Beijing, China', Department of Population Health Sciences (Madison, University of Wisconsin-Madison, 2002). Whitehead, M., G. Dahlgren, et al., 'Developing the Policy Response to Inequalities in Health: A Global Perspective', Challenging Inequalities in Health: From Ethics to Action, T. Evens, M. Whitehead, F. Diderichsen, A. Bhuiya and M. Wirth (Oxford, Oxford University, 2001), 309–323. WHO, The World Health Report 2000, Health Systems: Improving Performance (Paris, France, WHO, 2000). Wilkinson, R. G., 'Income Distribution and Life Expectancy', British Medical Journal, 304 (1992), 165–68. Wong, L. and N. Kinglun, 'Unemployment and Policy Responses in Mainland China', Issues & Studies, 33(1) (1997), 43–63. Xu, A., 'The changes of the criteria of selecting spouse in China', Sociology Research, 6 (2000). Yang, G. H., 1996 National Prevalence Survey of Smoking Pattern ( Beijing, China Science and Technology Press, 1997). Yin, D., 'The Achievement and Its prospect of Chinese Public Health System' (Beijing, Ministry of Health, China, 2000). Yip, W. C. and W. C. Hsiao, 'Medical Savings Accounts: Lessons from China', Health Affairs, 16(6) (1997), 244–251. Yu, D. and J. Meng, 'The Study on Financial Operational m Mechanism within Health System', Improving Health Economic Policies (S. C. P. R. Group. Beijing, China Economic Publishing House, 1996), 57–75. Zhang, R. and M. S. Tam, 'Changes in Income Distributions in China in the Process of Economic Reform in the 1980s: A Welfare Approach', China Economic Review, 2(1) (1991), 97–114. Zhang, Y. and F. He, 'System Transition Induced by Fiscal Pressure', From Planning Economy to Market Economy (Beijing, China Finance Publish House, 1998). Zhao, M. and S. Wang, The research of income inequality and polarization (Beijing, China Economic Publish House, 2002). Zheng, G., The Transition of China Social Security System and Its Assessment (Beijing, 2002). Tables Table 1. Per capita annual consumption of major food commodities, during 1981– 1999, China. Sources: China Statistical Yearbook 2000, China Statistical Bureau. Table 2. Selected health related socio-economic indicators by provinces in 2001. Source: Ru, Lu et al. 2003Table 3. Household size, median age and age composition during 1953–2000. Table 3. Household size, median age and age composition 1953–2000. Sources: China Statistical Yearbook 2001, China Statistical Bureau. Table 4. The changes of the criteria of selecting spouse in China. Source: Xu, 2000. Table 5. The incident rate, mortality and disease specific mortality for each report-required communicable diseases in *The units of incident rate and mortality rate are 1/100,000; and the unit of disease specific mortality is %. Source: Chinese Health Statistical Digest, 1985, 1990, 1995, 2000 , Ministry of Health, PRC. Table 6. The urban health insurance's coverage and its expenditure during 1988–1998. Source: Zheng, 2002. Table 7. The coverage of Co-operative Medical System (CMS) in rural China during 1976–1990. Source: Feng, Tang et al. 1995. Table 8. Total health expenditure and is composition in total GDP during 1978–2000. Source: Cai, 2002. Table 9. The Epidemic Prevention Station and other prevention institute's revenues during 1990–1998 (in Million Yuan). Source: Liu, 2002. Table 10. Epidemic Prevention Station's Revenue and Expenditures in 1997. *These percentage is based on the revenue from service charge as 100% Source: Liu, 2002. Table 11. Mortality, infant mortality, and life expectancy during 1949–2000. *1952 data Source: Yin, 2000. Table 12. Socio-economic and health indicators in cities by size and rural counties by income level, in China 1993. Source: Liu, Rao et al., 2001. 150 Table 13. First ten leading causes of death in urban China in selected years. *The unit of mortality is 1/100,000 Source: Chinese Health Statistical Digest, 1985, 2000, Ministry of Health, PRC. Table 14. First ten leading causes of death in rural China in selected years. *The unit of mortality is 1/100,000 Source: Chinese Health Statistical Digest, 1985, 2000, Ministry of Health, PRC.
<urn:uuid:32b8a6bf-cd9a-4327-b13b-70ad4760b82a>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
77,769
Sortim de l'alberg Vila Nova (1) i baixem per l'Avinguda del Ferrocarril fins a l'estació. Allà, prenem el Carrer del Forn de Vidre fins al Passeig de Joan Baptista Pirelli, que ens duu directament a la platja. Marxem cap al sud pel Passeig de Ribes Roges (2) fins al final, on ens topem amb el Turó de Sant Gervasi. Unes escales ens permeten ascendir-hi i davallar per l'altre costat del turó (3), on voregem la Platgeta de Sant Gervasi. Creuem la via del tren per sota el túnel (4) i prenem a l'esquerra. Travessem l'aparcament i seguim un tram d'asfalt fins que aquest es converteix de nou en una pista de terra. Continuem per aquest camí que davalla suaument i, a l'alçada d'una petita riera, torna a creuar per sota la via del tren. Nosaltres no creuem el túnel, prenem el senderó que marxa a la dreta paral·lel a les vies (5). El senderó condueix a un bosquet on, a l'esquerra, un altre camí creua les vies del tren. Atenció! Estem a la Platja Llarga, antics aiguamolls del riu Foix (6). Continuem fins al passeig marítim de Cubelles, que resseguim fins al final, on desemboca el riu Foix (7). Un pont de fusta ens permet travessar-lo i continuem per un sender paral·lel al mar i que crea una àrea recreativa. Seguim paral·lels a la platja per aquest carrer fins al final, on marxa a la dreta. Nosaltres el deixem per continuar pel sender que ressegueix el perímetre de la platja i que ens duu al passeig marítim de Cunit. Continuem endavant, sempre paral·lels a la línia de la costa, fins que l'asfalt es converteix de nou en sender. Arribem al passeig de Segur de Calafell primer i al de Calafell després, que resseguim fins que s'acaba. Prenem a la dreta (8) rere les darreres cases fins a la carretera, paral·lela a la qual hi ha un carril de bicis i vianants. Entrem a Coma-ruga per l'Avinguda Palfuriana, al número 104 de la qual es troba l'alberg Santa Maria del Mar (9).
<urn:uuid:f0e8d781-6093-4f24-9106-b7891a5a99ac>
HuggingFaceFW/finepdfs/tree/main/data/cat_Latn/train
finepdfs
cat_Latn
1,885
MATERIAL SAFETY DATA SHEET | Product or trade name: | iBrows Tattoo Removal | |---|---| | Manufacturer’s name: | iBrows Academy | | Address: | 807 S. King St, Seattle, WA 98104 | | Emergency Telephone: | 1-206-446-8428 | | Date Prepared | October 10th, 2018 | | Ingredient Name | CAS Number | Formula | |---|---|---| | Water | 7732-18-5 | 𝐻 O " | | Sodium Chloride | 7647-14-5 | NaCl | | Lactic Acid | 79-33-44 | 𝐶𝐻 𝐶𝐻 𝑂𝐻 𝐶𝑂 𝐻 $ " | | Disodium Phosphate | 7558-79-4 | 𝑁𝑎 𝐻𝑃𝑂 " ) | | Triethanolamine | 102-71-6 | 𝑁 𝐶𝐻 𝐶𝐻 𝑂𝐻 " " $ | | Benzyl Alcohol | 100-51-6 | 𝐶 𝐻 𝑂 * + | | Hydroxyethylcellulose | 9004-62-0 | 𝐶 𝐻 𝑂 $, *- ./ | | Glycerine | 56-81-5 | 𝐶 𝐻 𝑂 $ + $ | | Monosodium Phosphate | 7558-80-7 | 𝑁𝑎𝐻 𝑃𝑂 " ) | | Benzalkonium Chloride | 8001-54-5 | 𝐶 𝐻 𝐶𝐻 𝑁 𝐶𝐻 𝑅𝐶𝑙 , 0 " $ " | | Propylene Glycol | 57-55-6 | 𝐶 𝐻 𝑂 $ + " | | Appearance and odor | Clear liquid with strong odor | |---|---| | Solubility in water | Miscible | | pH (at 21° C) | 1.17 – 1.25 | | SECTION 4 – FIRE AND EXPLOSION HAZARD DATA | | | |---|---|---| | | Flash point (method used) | N/A | | | Flammable limit | N/A | | | Extinguishing media | Not required | | | Usual fire and explosion hazard | N/A | | General | For external use on human eyebrows only. May cause severe irritation to eyes | |---|---| | Eye contact | No contact with eyes – may result in substantial irritation | | Skin Contact | Prolonged contact with skin may result in burn | | Inhalation | N/A | | Ingestion | N/A | | Chronic effects | N/A | | Ingestion | For external use only. In case of accidental ingestion, seek medical attention immediately. | |---|---| | Inhalation | None | | Skin contact | Prolonged contact with skin may result in burn. Do not leave product on skin for more than 60 seconds. Use water to wash off product from skin or use iBrows Neutralizer to neutralize the product. | | Eye contact | In case of eye contact, immediately flush eyes with plenty of water for at least 5 minutes. If irritation persists, seek medical attention. | | Small release or spill | Wipe the product with paper or rags and place the contaminated items in waste container. | |---|---| | Disposal consideration | Discard as ordinary trash. For large quantity, pour carefully into sink and flush with plenty of water. | SECTION 9 – EXPOSURE CONTROL AND PERSONAL PROTECTION | Protective equipment | Wear latex or nitrile gloves when handle product. | |---|---| | Respiratory equipment | None | SECTION 10 – ACCIDENTAL RELEASE MEASURE | Personal precautions | None | |---|---| | Environmental precautions | None | | Methods of cleanup | Material is biodegradable and doesn’t require special cleanup. | | Ecotoxicity | None | |---|---| | Environment | Biodegradable | SECTION 13 – DISPOSABLE INFORMATION This product is not known to be defined as hazardous by current provision of the EPA. SECTION 14 – TRANSPORT INFORMATION | UN Number: Land/Road/Railway | N/A | |---|---| | Sea IMDG Class | N/A | | Inland = Waterway | N/A | | Air IATA –DGR class | Not regulated | | National Transport Regulations | None | iBrows Academy 807 S. King St Seattle, WA 98104 Email: firstname.lastname@example.org
<urn:uuid:0fa7f6eb-79fb-4211-a941-c7d5f6729c38>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
3,157
Coming to Aurora this Summer: o Aurora Join us for free meals at the park for kids and teens ages 18 and under! Monday-Friday, June 3–August 9 9:30 – 10:30 AM – Garfi eld Park (Lehnertz & Ohio) – breakfast 10:45 – 11:45 AM – MLK Park (Farnsworth & Grand) 12:15 – 1:15 PM – McCarty Park (New York & Park Place) 1:30 – 2:30 PM – Blackhawk Park (Blackhawk & Galena) 3:00 – 4:00 PM (Mon/Wed. ONLY) – Garfi eld Park 3:00 – 4:00 PM (Tues/Thurs/Fri ONLY) – Sage Crest Apartments (RESIDENTS ONLY) All kids and teens are welcome. No registration is required. Viniendo en Aurora este verano: en Aurora ¡Acompáñanos para las comidas gratis en el parque para niños y adolescentes de 18 años y menos! Lunes a viernes, 3 de junio a 9 de agosto 9:30 – 10:30 AM – Garfi eld Park (Lehnertz & Ohio) – el desayuno 10:45 – 11:45 AM – MLK Park (Farnsworth & Grand) 12:15 – 1:15 PM – McCarty Park (New York & Park Place) 1:30 – 2:30 PM – Blackhawk Park (Blackhawk & Galena) 3:00 – 4:00 PM (SOLAMENTE lunes/miércoles) – Garfi eld Park 3:00 – 4:00 PM (SOLAMENTE martes/jueves/viernes) – Sage Crest Apartments (SOLÓ PARA RESIDENTES) Todos los niños y adolescentes están bienvenidos. No es necesario registrarse. Visita a www.SolveHungerToday.org/MOTM para más información.
<urn:uuid:78975ab2-85b1-48c6-b843-c017ddd0b706>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,265
Dohoda o postúpení práv a povinností hráčov I. ZMLUVNÉ STRANY 1. MsHK Žilina a.s. Športová 5, 010 01 Žilina Zastúpený: p. Tittl Marián – predseda predstavenstva p. Mgr. Trnovec Anton - člen predstavenstva IČO: 363 871 93 IČ DPH :SK 2020 1039 21 BANKOVÉ SPOJENIE: 2. HC Nové Zámky s.r.o. Svetlá 8, 811 02 Bratislava Zastúpený: p. Ing. Sucharda František – prezident klubu p. Ing. Marek Mráz – konateľ spoločnosti IČO: 46 087 851 DIČ: 2023030825 BANKOVÉ SPOJENIE: II. PREDMET ZMLUVY Predmetom zmluvy je postúpenie práv a povinností hráčov Štěpán NOVOTNÝ, nar. 21.09.1990 z MsHK Žilina a. s. na HC Nové Zámky s. r. o. (profesionálna zmluva č.14/2017 zaregistrovaná na Pro–hokej a.s. pod por. číslom 013-P-227-2016/17) Denis Rehák, nar. 14.05.1985 Z MsHK Žilina a. s. na HC Nové Zámky s.r.o. (profesionálna zmluva č. 25/2017 zaregistrovaná na Pro–hokej a.s. pod por. číslom 013-P-352-2016/17) Václav Čížek, z HC Nové Zámky s. r. o. na MsHK Žilina a. s. (profesionálna zmluva č.2016/08 /01-02 zaregistrovaná na Pro–hokej a.s. pod por. číslom 128-P-287-2016/17) na dobu od 08.február 2017 do 30.apríla 2017 III. PODMIENKY REALIZÁCIE HOSŤOVANIA Prechod oboch hráčov do nových klubu sa uskutoční na základe dohody formou hosťovania podľa čl.10 PP SZĽH, bez finančnej kompenzácie. Klub HC Nové Zámky s. r. o., ako aj klub MsHK Žilina a. s. sa zaväzujú prevziať záväzky vyplývajúce z profesionálnej zmluvy počas celého hosťovania. Hráči si ponechajú pôvodný výstroj a rozdiel v počte hokejok bude vykompenzovaný na základe faktúry. IV. ZÁVEREČNÉ USTANOVENIA Obe zmluvné strany vyhlasujú, že túto dohodu podpísali podľa prejavu svojej slobodnej vôle, nie pod nátlakom ani v časovom strese. Akékoľvek zmeny v tejto dohode môžu byť riešené výlučne písmennými dodatkami a odsúhlasené oboma stranami. Dohoda bola vyhotovená v troch exemplároch, z ktorých po jednom obdržali obe zmluvné strany a jeden Pro-Hokej, a.s. ako riadiaci orgán Slovanft extraligy. Vo Žiline 07.02.2017 Za MsHK Žilina V Nových Zámkoch 07.02.2017 Za HC Nové Zámky s.r.o.
<urn:uuid:e231c2bc-ff78-42dc-8b1a-c1e49dd78bb1>
HuggingFaceFW/finepdfs/tree/main/data/slk_Latn/train
finepdfs
slk_Latn
2,087
La transizione alla green economy dopo Rio+20 Stefano Pisani "La green economy è un'alternativa alla decrescita infelice". Le iniziative di economia e di crescita verde fioriscono dappertutto ed è ormai comune la convinzione che la strada per uscire dalla crisi economica, ecologica e sociale sarà green / Il Commissario dell'Ambiente dell'Unione Europea Janez Potonick ha annunciato che il 2014 sarà l'"Anno europeo della green economy". Di recente, è stato diffuso un rapporto della AtKisson di Seattle, commissionato originariamente dal WWF svedese, dal titolo "Green Economy 2013. A Strategic Briefing on the State of Play in the Global Transition", che analizza lo stato globale della transizione all'economia verde. L'AtKisson Group è una realtà mondiale leader nel campo della conoscenza e nel consulting networks sulla sostenibilità ed è stata pioniere e innovatore in questo settore sin dalla sua fondazione, nel 1992. Il gruppo comprende società di consulenza e formazione, centri universitari per la sostenibilità e fondazioni no profit provenienti da una dozzina di paesi. In questo report, che fa parte della "The Sustainability Intelligence Series", si analizzano oltre cento fra rapporti, iniziative e programmi nell'ambito della green economy. Si tratta del tema che ha caratterizzato la conferenza Onu di Rio+20 che si è tenuta a giugno 2012 in Brasile: più precisamente, Rio+20 è stata l'occasione per discutere su come le economie possano raggiungere una crescita verde. Prima di questa conferenza, la proposta della green economy si focalizzava sulla necessità di coniugare la protezione dell'ecosistema e la lotta alla povertà con una nuova economia (una prospettiva in linea, peraltro, con gli Obiettivi di Sviluppo del Millennio delle Nazioni Unite). A Rio+20, lo United Nations Environment Programme Green Economy Report 2011, citato come documento di background fondamentale per la conferenza, delinea la definizione della – e l'approccio alla – green economy come segue: "L'Unep definisce la green economy come un'economia che si traduce nel miglioramento del benessere e dell'equità sociale umana riducendo in modo significativo i rischi ambientali e le carenze ecologiche". In parole più semplici, la green economy è a basso tenore di carbonio, efficiente (sotto il profilo delle risorse) e socialmente inclusiva. In una economia green , la crescita del reddito e dell'occupazione dovrebbero essere guidate dagli investimenti pubblici e privati ​che riducono le emissioni di carbonio e l'inquinamento, aumentano l'energia e l'efficienza delle risorse e prevengono la perdita di biodiversità e servizi ecosistemici. "Questi investimenti devono essere catalizzati e sostenuti da spese pubbliche mirate, riforme politiche e modifiche normative e il percorso di sviluppo dovrebbe mantenere, migliorare – e se necessario ricostruire – il capitale naturale come risorsa economica fondamentale e come fonte di benefici pubblici. Questo è particolarmente importante per le persone che si trovano in povertà, la cui sussistenza e sicurezza dipendono dalla Natura". Le conclusioni in materia raggiunte da quel vertice non sono state esattamente soddisfacenti: la formula della green economy ha incontrato numerose critiche e resistenze da parte di tutti fronti politici, anche se, tuttavia, è stata comunque la prima volta che la definizione di green economy è entrata in un documento ufficiale. Dopo una levata di scudi da parte dei paesi del G7 e della Cina, il documento finale concordato affermava, in sostanza, che i paesi che volevano seguire la strada della green economy come uno "sforzo comune" erano liberi di farlo. Dopo Rio+20, il dibattito resta oggi accesissimo, soprattutto sulla desiderabilità – quando non sulla fattibilità stessa – della green economy, con i critici conservatori che la definiscono uno spreco di denaro e le voci progressiste a sinistra che la ritengono un cambiamento di rotta eccessivo. Nonostante "incidenti di percorso", dunque, gli sforzi per arrivare a L'obiettivo del rapporto AtKisson è di investigare sullo spostamento dei capitali in tecnologie verdi una green economy, o almeno per pianificare il modo in cui realizzarla, continuano ad aumentare in tutto il mondo. Molti paesi, sia nel mondo sviluppato che in quello in via di sviluppo, si sono già impegnati sul fronte politico e economico. Uno in particolare, la Cina, che aveva frenato la roadmap europea verso la green economy proprio a Rio+20, si candida a essere in cima al mondo in questa direzione, con un piano di investimento di mille miliardi di dollari in più pianificati nei prossimi cinque anni con il supporto di strategie politiche, ad esempio nel settore bancario, che guidano cambiamento e innovazioni. Considerati i flussi di investimento in settori come le energie rinnovabili, i numeri dell'occupazione nei cosiddetti lavori ''verdi'' e il valore dei prodotti e servizi greenbadged , la green economy è già una significativa realtà e costituisce circa il 5% dell'economia mondiale. Se la Cina, infatti, si ripropone di creare un settore del valore di centinaia di miliardi di dollari, i paesi di tutto il mondo hanno stabilito i loro programmi, si legge nel report, secondo scale che vanno dal piccolo al "gargantuesco". Tuttavia, gli investimenti effettivi, con la notevole eccezione di pochi paesi, finora stentano, dato che l'enorme fiume di fondi che è necessario – e che è stato promesso dai governi nazionali – non si è ancora materializzato. Il "disaccoppiamento" Il disaccoppiamento sistematico è uno dei temi principali nelle iniziative di green economy. Il disaccoppiamento prevede di slegare la tradizionale crescita economica e il progresso dal consumo di risorse. Una economia che sta disaccoppiando ha lo scopo di "fare più con meno", incrementando il livello di "produttività" delle risorse, disaccoppiando, appunto, l'intensità di energia e materie prime per unità di Pil. Lo scopo è ottenere una riduzione dell'input di materie prime ed energia per la produzione di beni e servizi e creare valore utilizzando una quantità inferiore di risorse naturali. Il concetto di disaccoppiamento è stato oggetto di un serio dibattito politico per la prima volta negli anni Novanta, in Olanda. Gli sforzi dei Paesi Bassi per migliorare l'efficienza e ridurre l'inquinamento produssero alcuni misurabili e validi risultati di disaccoppiamento e attrassero l'attenzione di altri paesi. In tempi recenti, molte nazioni hanno mostrato risultati simili a quelli olandesi, specialmente rispetto all'intensità di carbonio delle loro economie. Le reali possibilità offerte dal disaccoppiamento rimangono comunque controverse e non mancano le opinioni critiche, come quella dell'economista Tim Jackson secondo cui si tratterebbe di un meccanismo impossibile da attuare senza abbandonare i tradizionali paradigmi di crescita economica. Possibile o no, il disaccoppiamento assoluto – ossia una crescita economica (misurata tramite il Pil) che risulti in un assoluto e reale decremento complessivo dell'uso di risorse, piuttosto che in un relativo aumento dell'efficienza – si è dimostrata molto impegnativa. Più in particolare, solo pochi paesi hanno raggiunto il disaccoppiamento negli ultimi tempi: Francia, Germania e Italia hanno, in anni recenti, sperimentato l'aumento del Pil e il calo assoluto delle emissioni di carbonio. Altri paesi in via di sviluppo hanno perseguito politiche energetiche risultanti in un disaccoppiamento relativo, ossia in una riduzione delle emissioni di carbonio per unità di Pil ma senza una riduzione assoluta delle emissioni (che continuano a crescere). I Paesi Bassi, nei loro indicatori di Green Growth per il 2011, hanno anche riferito progressi in termini di disaccoppiamento e di aver raggiunto il disaccoppiamento assoluto in due aree: surplus di nutrienti e intensità dell'uso dell'acqua. 33 Le politiche di prevenzione dei danni ambientali Green economy significa anche comprendere i legami fra i danni ambientali e le scelte dell'economia. Dal rapporto si sottolinea la necessità promuovere partnership con i sindacati per la creazione di Green Job Gli eventi climatici estremi, che sono all'ordine del giorno, vengono collegati in maniera crescente ai cambiamenti climatici – non solo dagli ambientalisti e dagli scienziati del clima, ma anche dalle compagnie di assicurazione. I costi associati ai cambiamenti climatici sono arrivati in primo piano sin dal 2006, con la pubblicazione della "Stern Review on the Economics of Climate Change" che ha cambiato il dialogo globale sull'argomento. I cambiamenti climatici non sono l'unica fonte di danno crescente: incidenti industriali come la fuoriuscita di petrolio della BP Deepwater Horizon del 2010 sono in aumento e rendono sempre più necessario un rapido adeguamento delle arene politiche e commerciali. In Cina, ad esempio, nel 2008 ci sono stati 135 incidenti industriali che hanno causato danni ambientali, un numero salito nel 2011 a 542. Si tratta di eventi estremi che, in qualche misura, dovrebbero stimolare nuove metodologie e politiche economiche e che rendono chiaro come alcuni costi e rischi su larga scala siano stati ignorati (fino al momento delle tragedie) e come le politiche debbano in futuro cercare di prevenire simili eventi. Secondo il rapporto, però, è ancora raro trovare iniziative politiche preventive che si basino su valutazioni dei potenziali rischi e dei costi derivanti dai danni ambientali e dagli effetti dei cambiamenti climatici. Di recente, un report Teeb (The Economics of Ecosystems and Biodiversity) ha stimato che le attività di business costano circa 4,7 trilioni di dollari, ogni anno, in termini di danno ambientale. Il danno maggiore, sempre secondo questo studio, è stato causato dalle centrali elettriche a carbone dell'Asia orientale, che provocano un onere economico di oltre 450 miliardi di dollari ogni anno (a fronte di un fatturato di soli 443 miliardi di dollari). Tuttavia, l'allevamento di bestiame in Sud America è di gran lunga peggiore, con 350 miliardi di dollari di perdite in termini di capitale naturale contro un fatturato di soli 17 miliardi di dollari. In quest'ambito, un'attività di indirizzo molto importante viene svolta dal Fondo Monetario Internazionale che sta spingendo affinché si ponga fine ai sussidi per i combustibili fossili e il cui direttore, Christine Lagarde, ha messo in guardia circa i costi dell'inazione a proposito dei cambiamenti climatici. Secondo la Commissione Europea (negli studi "The costs of not implementing the environmental acquis" del 2011 e "The economic benefits of environmental policy", del 2010 ) il costo per l'economia europea derivato dalla non implementazione dei suoi regolamenti ambientali si stima fra i 200 e i 300 miliardi di euro all'anno. I Green Jobs Sono milioni i nuovi posti di lavoro che rientrano nella categoria dei green jobs (ossia disegnati per ridurre il danno all'ambiente): si parla di oltre 7 milioni nella Unione Europea, oltre 3 milioni negli Stati Uniti e circa 3 milioni in Brasile (pari al 6,6% dell'occupazione formale complessiva del paese). Se poi i lavori verdi, per definizione, si mettono in relazione alla gestione delle risorse naturali, come la rigenerazione delle foreste, la conservazione della natura e la protezione della biodiversità, allora la stima nella Ue sale fino a 14,6 milioni. Mentre diversi studi suggeriscono che l'impatto occupazionale degli investimenti su lavori verdi è significativamente più elevato rispetto agli investimenti in "lavori brown"(per esempio, quelli del settore dei combustibili fossili), ci sono alcune preoccupazioni, sollevate di solito da voci conservatrici, sul fatto che creare normative che favoriscono posti di lavoro verdi equivarrà a perdere posti di lavoro brown. Secondo uno studio dell'Ilo (International Labour Organization) questa preoc- cupazione sarebbe però infondata perché, a livello globale, il passaggio a un'economia verde produrrà un "guadagno netto" dello 0,5-2% dei posti di lavoro. Tuttavia, la transizione sarà difficile, poiché dal 10 al 20% dei posti di lavoro dipende dalla esistente economia brown (ad esempio, l'industria dei combustibili fossili). La transizione politica deve essere dunque gestita correttamente per evitare gravi spostamenti. Il report menziona poi alcuni casi interessanti, come quello della Corea del Sud che, con l'iniziativa Green Growth, mira a creare circa 1,5 milioni di nuovi green jobs . La Germania, che è stata un importante caso studio di successo per la politica dei lavori verdi, ha vissuto di recente alcune battute d'arresto: le politiche di promozione delle energie rinnovabili hanno creato oltre 30 mila posti di lavoro all'anno a partire dal 2004; secondo uno studio del Ministero dell'Ambiente, 370 mila nuovi posti di lavoro sono stati creati nel 2012 solo nel settore delle rinnovabili. Verso la fine del 2012, tuttavia, migliaia di posti di lavoro nel solare sono stati persi a causa della guerra dei prezzi e della competizione con la Cina e alcune società tedesche che si basavano sulle energie rinnovabili sono andate in bancarotta. Comunque, l'impatto dei green jobs sull'economia della Germania resta molto significativo. La Spagna ha creato migliaia di posti di lavoro verdi per energie rinnovabili, sostenibilità dei trasporti, gestione dei rifiuti e nel settore delle costruzioni. Purtroppo, si tratta di un impatto che ha dovuto vivere la profonda recessione e la crisi della disoccupazione, anche se un corpo legislativo completo in materia ambientale ha contributo ad ammortizzare gli effetti di queste difficoltà contingenti. Il settore delle rinnovabili, in Spagna, spera da solo di arrivare a creare circa 200 mila nuovi posti di lavoro verde per la fine del 2013. Le leve per lo sviluppo della green economy Il rapporto AtKisson si conclude con alcune riflessioni e proposte generali. Innanzitutto, lo sviluppo della green economy non è più solo teorico: sono in corso grandi cambiamenti, processi innovativi e flussi di investimenti. La green economy ha bisogno di incontrare sul suo cammino strategie che ne accelerino la velocità e i punti su cui far leva potrebbero essere: promuovere l'uso accelerato di indicatori alternativi, come un "Pil verde" o misure equivalenti; promuovere nuove leggi, incentivi e regolamenti che inducano un incremento negli investimenti, in particolare attraverso norme e incentivi per il settore bancario (la Cina, per esempio, ha programmato di investire 1,28 trilioni di dollari nello sviluppo della green economy nell'arco 2011-2015. I livelli di investimento cinesi sono superiori a qualunque altro singolo flusso di capitale, nella transizione, di qualunque altro luogo al mondo); invitare i governi a onorare i loro impegni per il Green Climate Fund e, in generale, orientare la politica e l'attenzione degli attivisti al sotto-investimento di fondi per trasformare l'economia; evidenziare, promuovere e tentare di accelerare l'adozione di nuovi strumenti di monetizzazione per mettere servizi e costi ambientali in bilancio; sponsorizzare un serio processo di revisione per affrontare grandi sfide, come le economie di disinvestimento nei combustibili fossili; istituire partnership con i sindacati per la promozione di strategie per green jobs, utilizzando le migliori analisi e modelli disponibili e focalizzando l'attenzione, in particolare, sui problemi della disoccupazione giovanile; collaborare con le istituzioni finanziarie per lo sviluppo di nuove strategie di finanziamento e di iniziative per la green economy.
<urn:uuid:82126d3d-f706-4f04-bf4d-168402ff3f9d>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
15,579
$%&'()$ DECLARATION PUBLIQUE D'INTERETS Nom Prénoms Activités professionnelles LAGNIAUX (")$*+ , -.)$,!/."". , 0)$/.1!"# * + ,%./,01Ex.libéral : à mi-temps, au sein d'une structure sportive + Enseignement (formation continue) Ex.salarié : à 3/4 temps au sein de la Fédération Française de Handball Mandats Je soussigné, certifie l'exactitude des renseignements et m'engage à informer le CMK de toute évolution ou modifications intervenant dans ma situation personnelle J'accepte que cette DPI soit rendue publique Syndicaux Associatifs: Président de la Société Française des Masseurs-Kinésithérapeutes du Sport Politiques: Conseiller municipal Ordinaux : Président du CDOMK 93 Formation continue Enseignement: Intervenant au sein de la SFMKS et autres organismes Liens d'intérêts dans des sociétés en lien avec la kinésithérapie et professions de santé : Directeur de l'organisme de formation SFMKS FORMATION AutresFait à Asni ères sur OiseLu et approuvé Signature le 4 octobre 2022 : LU ET APPROUVE
<urn:uuid:24c3dd4a-b747-4514-94f0-21104fd25311>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
1,033
НАРЕДБА №2 ЗА ПРОЕКТИРАНЕ НА ЗАВЕДЕНИЯ ЗА СОЦИАЛНИ ГРИЖИ Издадена от Министерството на териториалното развитие и строителството, Министерството на здравеопазването и Министерството на труда и социалните грижи, обн., ДВ, бр. 74 от 13 септември 1994 г. Глава първа ОБЩИ ПОЛОЖЕНИЯ Чл. 1. (1) Тази наредба се прилага при проектирането на нови и при реконструкцията на съществуващи заведения за социални грижи. (2) Прилагането на наредбата при реконструкция на съществуващи заведения за социални грижи се извършва съобразно възможностите им (теренни, композиционни, конструктивни и др.), като отклонения от нормите в наредбата се допускат при доказана технико-икономическа целесъобразност. Чл. 2. За различните заведения за социални грижи нормите в наредбата се прилагат в зависимост от тяхното предназначение и структура, определени със съответното задание за проучване и (или) проектиране, наричано понататък за краткост "задание за проектиране". Чл. 3. Наредбата се прилага едновременно с другите нормативни документи, поставящи изисквания към обектите за социални грижи. Чл. 4. (1) Заведенията за социални грижи са форма за обществено подпомагане, които чрез структурните си елементи осигуряват възможности за обитаване, поддържане на здравословното състояние и (или) активно лечение, включване в подходяща трудова дейност и (или) хоби-занимания, провеждане на учебно-възпитателна и (или) учебно-професионална дейност, културно-занимателна дейност и др. (2) Заведения за социални грижи са: домове за стари хора; домове за лица над 18 години с физически увреждания, сетивни нарушения, умствена изостаналост и психически разстройства; домове за деца, юноши и младежи с физически увреждания и умствена изостаналост; социални учебнопрофесионални заведения, домове за временно пребиваващи; детски селища и др. Номенклатурата на заведенията за социални грижи е дадена в приложение № 1, публикувано във ведомствените издания на наредбата: Бюлетина за строителство и архитектура на Министерството на териториалното развитие и строителството, Служебния бюлетин на Министерството на здравеопазването и Бюлетина по труда на Министерството на труда и социалните грижи. (3) В зависимост от предназначението на заведението за социални грижи и обслужвания в него контингент в конкретното задание за проектиране се уточняват видовете дейности по ал. 1, които ще бъдат застъпени в него. Глава втора ГРАДОУСТРОЙСТВЕНИ И СИТУАЦИОННИ ИЗИСКВАНИЯ Чл. 5. (1) Теренът за заведение за социални грижи се определя с териториалноустройствен или градоустройствен план на населеното място, извънселищната територия, курорта и др. или в съответствие с този план. (2) Теренът, определен за заведение за социални грижи, трябва да отговаря на изискванията на действащите норми за планиране на населените места, санитарно-хигиенните и екологичните норми. (3) При разполагане на заведенията за социални грижи се избягват зони с интензивно движение и шумови натоварвания и съседство с промишлени зони. (4) При разполагане в извънселищна среда се създава възможност чрез комуникационни връзки за приобщаване на заведението за социални грижи към селищната среда и използването на общоселищните лечебнопрофилактични заведения. (5) Заведенията за социални грижи при възможност се разполагат в курорти и курортни комплекси с оглед активното използване и на природните лечебни ресурси. Чл. 6. На терена на заведението за социални грижи не се допуска разполагането на сгради и съоръжения, които не са свързани с неговите функции. Чл. 7. (1) Големината на терена на заведението за социални грижи се определя в зависимост от неговото предназначение, структура и капацитет. Нормите за основните видове заведения са следните: 1. за домове за стари хора - 40-60 кв. м на обитател; 2. за домове за инвалидизирани лица - 70-90 кв. м на обитател; 3. за домове за временно пребиваващи инвалиди - 30-40 кв. м на обитател; 4. за домове за деца и юноши с физически увреждания (телесни недъзи) - 80-90 кв. м на обитател; 5. за домове за деца и юноши с умствена изостаналост - 40-60 кв. м на обитател; 6. за социални учебно-професионални заведения - 60-80 кв. м на обитател. (2) При реконструкция или теренни ограничения нормите по ал. 1 могат да се занижават след съгласуване с Министерството на здравеопазването и Министерството на труда и социалните грижи. Чл. 8. На терена на заведението за социални грижи се обособяват следните функционални зони: 1. зона на основните сгради и съоръжения, непосредствено свързани с провеждания режим в заведението; 2. зона на обслужващите стопански сгради и съоръжения; 3. зона на озеленената площ, откритите площадки и съоръжения. Чл. 9. (1) В зоната на основните сгради и съоръжения се осигурява изолиране на легловия сектор от транспортни комуникации и източници на шум. (2) Разположението на обслужващите стопански сгради и съоръжения трябва да отговаря на хигиенните изисквания и на тези за опазване на околната среда. (3) Зоната на озеленената площ, откритите площадки и съоръжения заема не по-малко от 40 на сто от площта на терена на заведението за социални грижи. Чл. 10. (1) Заведенията за социални грижи се осигуряват с непосредствен достъп на автомобилен транспорт. (2) Броят на минималните необходими места за паркиране на леки автомобили на обитатели, персонал и посетители се определя при норма 1 място на 8 легла. (3) Най-малко 30 на сто от местата за паркиране се проектират с възможност за обслужване на пациенти със затруднена подвижност (включително с инвалидни колички). Чл. 11. Минималното разстояние от легловия сектор на стационарните блокове до уличнорегулационната линия на парцела към транспортни артерии с интензивно движение е 30 м. Чл. 12. Наклоните и размерите на алеите на терена на заведенията за социални грижи трябва да позволяват и движение на инвалидна количка. Глава трета КОМПОЗИЦИОННИ И ФУНКЦИОНАЛНИ ИЗИСКВАНИЯ Раздел I ОБЩИ ИЗИСКВАНИЯ Чл. 13. Композиционното решение на заведенията за социални грижи трябва да осигурява: 1. оптимална организация за провеждане на функционалните процеси; 2. ясни и преки функционални връзки между основните структурни елементи и между отделните помещения в тях; 3. необходимите условия за пребиваване и обслужване, включително и на инвалидизирани лица, в случаите, когато заведението е предназначено и за такива лица. Чл. 14. (1) Заведенията за социални грижи трябва да съдържат следните структурни елементи: 1. приемно-административен сектор; 2. леглови сектор (стационар); 3. медицински сектор; 4. хранителен сектор; 5. учебен сектор; 6. културно-занимателен сектор; 7. стопански сектор. (2) Посочените структурни елементи се развиват в различна степен в отделните видове заведения за социални грижи в зависимост от предназначението и капацитета им и съгласно изискванията на заданието за проектиране. Чл. 15. Етажността на заведенията за социални грижи се съобразява и със специфичния контингент (деца, пациенти със затруднена подвижност, инвалиди и др.), както и с необходимостта от лесен и непосредствен контакт с природната среда. Стационарните блокове се предвиждат до 4 етажа, като максимално допустимата им етажност съгласно Противопожарните строително-технически норми е 9 етажа. Чл. 16. (1) Помещенията на заведенията за социални грижи се проектират в надземни етажи. (2) В сутеренни етажи се допускат складови и технически помещения. При осигуряване на естествено осветление се допускат и санитарно-битови помещения за персонала. Чл. 17. В съседство с помещенията на легловия и медицинския сектор не се допускат помещения с източници на шум и вибрации (машинни помещения, работилници и др.). Чл. 18. (1) Асансьори се предвиждат в зависимост от предназначението, капацитета и приетото композиционно решение. (2) В заведения за социални грижи с трудно подвижни или инвалидизирани контингенти се предвиждат при височина над 2 етажа не помалко от 2 асансьора, единият от които болничен. (3) Асансьор за храна се предвижда при доказана целесъобразност. (4) Асансьорните шахти и машинните помещения на асансьорите не се допускат в съседство със спални помещения. Чл. 19. (1) Всички вертикални и хоризонтални комуникации за придвижване в заведенията за социални грижи (с изключение на тези в стопанския сектор) се проектират с необходимите съоръжения и приспособления, позволяващи движението на обитатели със затруднена подвижност, включително и с инвалидни колички. (2) Рампите се проектират с широчина 1,65 м (за разминаване на 2 инвалидни колички) и с наклон 6 на сто. Чл. 20. (1) Минималната светла височина на спалните помещения в легловия сектор на заведенията за социални грижи е 2,5 м. (2) Височината на помещенията в медицинския сектор се проектира съгласно изискванията на Правилника за техническата безопасност и хигиената на труда в отделенията за физикална терапия и рехабилитация (ДВ, бр. 91 от 1971 г.). (3) Височината на помещенията в хранителния, учебния, културнозанимателния и стопанския сектор се проектира съгласно нормите за проектиране на съответните обществени сгради. Чл. 21. Минималната широчина на коридорите в заведенията за социални грижи е, както следва: 1. за коридори, които не се използват като чакални - 2,4 м; 2. за коридори, използвани и като чакални - 2,8 м. Чл. 22. Минималната широчина на вратите на помещенията в заведенията за социални грижи е 1,1 м, а на вратите по пътя на евакуация (коридори и стълбища) - 1,2 м. Чл. 23. (1) Помещенията в заведенията за социални грижи се проектират с естествено и изкуствено осветление съгласно БДС 1786. (2) Само изкуствено осветление се допуска за санитарни възли, складове и помещения, при които това се налага по технологични съображения. Раздел II ПРИЕМНО-АДМИНИСТРАТИВЕН СЕКТОР Чл. 24. Главният вход на заведенията за социални грижи се маркира ясно и трябва да бъде лесно достъпен, включително и за увредени или инвалидизирани лица. Чл. 25. Приемно-административният сектор на заведението за социални грижи се проектира във функционална връзка с легловия, медицинския и учебния сектор. Чл. 26. (1) Помещенията в приемно-административния сектор се конкретизират със заданието за проектиране в зависимост от специфичния характер на заведението за социални грижи. (2) Видовете помещения в приемно-административния сектор и минималната им площ се определят по приложение № 2 (публикувано във ведомствените издания по чл. 4, ал. 2). ЛЕГЛОВИ СЕКТОР (СТАЦИОНАР) Чл. 27. (1) Основна структурна единица на легловия сектор на заведението за социални грижи е отделението. (2) Броят на леглата в едно отделение се определя в зависимост от предназначението на заведението, капацитета и композиционното му решение. (3) Допуска се да не се обособяват отделения, когато се предвижда леглови сектор с общо обслужване или с групирани легла за дневно и нощно пребиваване, с възможност за пълна или частична изолация на отделните жилищни групи в зависимост от необходимия вид грижи и контрол. (4) Структурата и капацитетът на легловия сектор в заведенията за социални грижи се определят със заданието за проектиране. Чл. 28. (1) Във всяко отделение (жилищна група) на заведенията за социални грижи се обособяват следните структурни елементи: 1. спални помещения; 2. битово-стопански помещения; 3. медицински помещения; 4. санитарно ядро. (2) Минималните площи на помещенията в отделението (жилищната група) на легловия сектор се приемат по приложение № 2. Чл. 29. (1) Спалните помещения в отделението (жилищната група) се проектират с едно, две, три и четири легла, като: 1. най-малко 10 на сто от леглата за възрастни се проектират в стаи с едно легло; 2. най-малко 5 на сто от леглата за деца се проектират в стаи с едно легло. (2) Към всяко спално помещение се проектира санитарен възел, както и необходимата гардеробна площ. (3) Спалните помещения се ориентират по възможност на изток, югоизток, юг и югозапад. (4) Архитектурното решение и интериорът на спалните помещения трябва да дават възможност за съхраняване и ползване и на личните вещи на обитателите, когато това се изисква със заданието за проектиране. Чл. 30. В легловия сектор за възрастни съгласно заданието за проектиране се предвиждат самостоятелни кухненски боксове или обща кухня с възможност за самообслужване. Чл. 31. Столовата към отделението (жилищната група) се оразмерява за част от капацитета му, като това се уточнява от заданието за проектиране. Чл. 32. Дневните в легловия сектор на заведението за социални грижи се проектират в зависимост от капацитета на отделението (жилищната група) и композиционното решение на сектора, като се оразмеряват за едновременно пребиваване на до 20 души. Чл. 33. Медицинските помещения към отделението (жилищната група) на легловия сектор се определят в зависимост от предназначението и капацитета на заведението за социални грижи и се уточняват със заданието за проектиране. Раздел IV МЕДИЦИНСКИ СЕКТОР Чл. 34. (1) Медицинският сектор в заведенията за социални грижи трябва да осигурява поддържане на здравословното състояние и (или) активно лечение на обитателите. (2) Структурата и специфичните изисквания към медицинския сектор (частичен или развит) на всяко заведение за социални грижи се определят със заданието за проектиране, като се отчита и наличието в близост на здравни заведения и наличните курортни ресурси (балнеолечебни и биоклиматични). (3) Заданието за проектиране се съгласува с Министерството на здравеопазването по отношение на изискванията за наличие, структура и особености на медицинския сектор. Чл. 35. (1) Медицинският сектор се проектира във функционална връзка с легловия сектор. (2) Когато двата сектора са в различни сгради, между тях се проектира закрита връзка. Чл. 36. Структурните елементи на медицинския сектор се обособяват в консултативни кабинети и лечебно-процедурни отделения, като минималните им площи се определят по приложение № 2. Чл. 37. (1) Консултативните кабинети обхващат: лекарски кабинети, манипулационна, кабинет за функционална диагностика, стоматологичен кабинет и стерилизационна. (2) Кабинетът за функционална диагностика не трябва да се проектира в близост до електромашинни помещения (за асансьорни, вентилационни, помпени, компресорни и други подобни уредби). Чл. 38. (1) Лечебно-процедурните отделения се обособяват функционално като: 1. закрити помещения - в сградата на заведението; 2. открити площадки и съоръжения - на терена на заведението. (2) Между закритите и откритите елементи се осигурява пряка функционална връзка. (3) Общите помещения към лечебно-процедурните отделения се проектират с възможност за обслужване както на закритите, така и на откритите елементи. Чл. 39. Структурните елементи на лечебно-процедурните отделения се проектират с необходимите санитарно-технически устройства и съоръжения, улесняващи движението и приемането на процедури от трудно подвижни и инвалидизирани обитатели. Чл. 40. (1) В отделението за трудотерапия се организират дейности, които не са свързани с шум и вибрации. (2) Допуска се организирането в едно помещение на работни места за трудотерапия и за хоби-занимания с еднакъв предмет на дейност. Чл. 41. Отделението за топлолечение се ситуира в медицинския сектор така, че да се изолират отделяните миризми от лечебните суровини в отделението. Чл. 42. Процедурните помещения на водолечебното (балнеолечебното) отделение се проектират по възможност на ниво терен при осигуряване на инсталационен етаж. Чл. 43. Басейните към водолечебното (балнеолечебното) отделение се проектират така, че да се използват общи обслужващи помещения (съблекални, душове, санитарни възли). Чл. 44. (1) Отделението за питейно приложение на минерални води се проектира като част от медицинския или хранителния сектор. (2) До складовото помещение за минерални води се осигурява необходимата хоризонтална и вертикална транспортна достъпност. Чл. 45. (1) Откритите площадки и съоръжения се уточняват със заданието за проектиране в зависимост от предназначението на заведението за социални грижи, природно-климатичните условия, конфигурацията на терена и др. (2) Площадките и терасите за слънце-въздушни процедури и за сън на открито се обзавеждат със слънцезащитни и ветрозащитни съоръжения (индивидуални и общи), кушетки, шезлонги и др. Раздел V ХРАНИТЕЛЕН СЕКТОР Чл. 46. (1) Хранителният сектор се проектира в пряка функционална връзка с легловия сектор. (2) При разполагане на хранителния сектор в самостоятелна сграда между столовата и легловия сектор се осигурява закрита комуникационна връзка. Чл. 47. (1) Хранителният сектор на заведението за социални грижи трябва да осигурява условия за: 1. приемане и съхранение на продукти; 2. приготвяне на храната; 3. помощно-технологични помещения; 4. административно-битово обслужване на персонала; 5. столово хранене. (2) Допуска се доставянето на готова храна отвън при спазване на санитарно-хигиенните изисквания, като съответните структурни елементи на хранителния сектор отпаднат. Чл. 48. (1) Столовата в заведенията за социални грижи се оразмерява за хранене до три смени. (2) Столови към отделенията (жилищните групи) се допускат, когато това се определя със заданието за проектиране. Чл. 49. В съответствие с хигиенните изисквания на подходящо място се предвижда съответно необходимата площ за съхранение на хранителни отпадъци. Чл. 50. При проектиране на хранителния сектор се спазват изискванията на действащите норми за проектиране на заведения за обществено хранене и на Нормите за проектиране на болнични заведения от общ тип и амбулаторно-поликлинични заведения. Раздел VI УЧЕБЕН СЕКТОР Чл. 51. (1) Необходимостта от включване на учебен сектор в структурата на заведението за социални грижи се обосновава със заданието за проектиране в зависимост от предназначението на заведението и обслужвания контингент. (2) Учебният сектор се проектира за провеждане на учебновъзпитателна и (или) учебно-професионална дейност. (3) Учебно-възпитателна дейност се провежда в заведенията за деца и юноши. (4) Учебно-професионална дейност се провежда в заведенията за юноши и лица в трудоспособна възраст. Чл. 52. (1) Учебният сектор се проектира във функционална връзка с легловия сектор на заведението. (2) При възможност учебният сектор се проектира в съседство с културно-занимателния сектор, като се предвижда общо използване на част от помещенията им. Чл. 53. Учебният сектор се състои от учебно-възпитателни и (или) учебно-професионални помещения, минималните площи на които се определят по приложение № 2. Чл. 54. (1) Учебно-възпитателните помещения се групират съобразно възрастта на учащите се и по функционално предназначение. (2) Съставът на учебно-възпитателните помещения и площните им показатели се приемат за обучение на една или две смени. (3) При проектиране на учебно-възпитателните помещения се спазват действащите норми за проектиране на училища, като със заданието за проектиране се конкретизира съставът на помещенията в зависимост от предназначението на заведението за социални грижи и контингента му. Чл. 55. (1) Учебно-професионалните помещения се групират съобразно спецификата на изучаваните в тях професии и изискванията за повишена инсталационна съоръженост, наличие на шум и вибрации и др. (2) Помещенията за обучение в професии и лекционните помещения се проектират с възможност за универсално ползване. (3) Помещения за самостоятелно обучение се проектират със сепарирани работни места (предназначени и съобразени със специфичен контингент, обучение в редки професии и др.). Чл. 56. Оразмеряването и обзавеждането на учебните помещения в учебния сектор се съобразяват с намалените двигателни възможности на учащите и обучаващите се, включително и на лица, които се придвижват с инвалидни колички, когато в заведенията се предвижда такъв контингент лица. Раздел VII КУЛТУРНО-ЗАНИМАТЕЛЕН СЕКТОР Чл. 57. (1) Културно-занимателният сектор на заведенията за социални грижи се разполага централизирано с оглед лесната му достъпност от легловия, учебния и приемно-административния сектор. (2) Помещенията на културно-занимателния сектор да се предвиждат с възможност за многофункционално използване, включително като елементи и на учебния и приемно-административния сектор. Чл. 58. Структурата на културно-занимателния сектор се определя със заданието за проектиране в зависимост от предназначението на заведението за социални грижи и обслужвания контингент. Чл. 59. Минималните площи на помещенията на културнозанимателния сектор се определят по приложение № 2. Чл. 60. (1) Помещенията в културно-занимателния сектор се проектират достъпни и за лица с намалени двигателни възможности, включително и за лица, които се придвижват с инвалидни колички. (2) В залата за кинопрожекции, пред първия ред столове, се проектира зона за инвалидни колички с широчина за един ред 1,3 м. Подът на тази зона се проектира с 0,1 м по-нисък от пода на залата. Зрителите от първия ред се отделят от зоната с инвалидни колички с преграда, висока 0,8 м. СТОПАНСКИ СЕКТОР Чл. 61. Стопанският сектор на заведенията за социални грижи се разполага в зоната на обслужващите сгради и съоръжения. Чл. 62. (1) Стопанският сектор включва следните структурни елементи: 1. пералня с производствени и спомагателни помещения; 2. отоплителна централа; 3. складови помещения; 4. технически работилници, автопарк и др. (2) Съставът на посочените в ал. 1 елементи и тяхната големина се определят при доказана технико-икономическа целесъобразност в заданието за проектиране. (3) При териториална близост се допуска използване на елементи от стопански сектори на други здравни заведения. Чл. 63. (1) Капацитетът на пералнята се определя на база 0,5-0,75 кг сухо бельо на едно легло на ден. (2) В съответствие със заданието за проектиране могат да се предвиждат помещения за пране и гладене на лично бельо (за самообслужване) и приемателен пункт за химическо чистене на личните дрехи на обитателите. Чл. 64. При необходимост, доказана след технико-икономическа обосновка, и за осигуряване на техническото обслужване на заведенията за социални грижи се проектират отоплителна централа, трансформаторен пост, дизелагрегат и автоматична телефонна централа. Чл. 65. За обслужване на инсталациите и съоръженията, част от медицинската апаратура, предметите на обзавеждането и др. се проектират технически работилници, определени след технико-икономическа обосновка. Чл. 66. (1) Към автопарка се предвижда гараж за леки и товарни автомобили при норма 25 кв. м за лек автомобил и 35 кв. м за товарен автомобил или автобус. (2) При технико-икономическа целесъобразност автопаркът се проектира за обслужване на две и повече социални и здравни заведения. Глава четвърта АРХИТЕКТУРНО-СТРОИТЕЛНИ И ИНСТАЛАЦИОННИ ИЗИСКВАНИЯ Чл. 67. При проектиране на заведенията за социални грижи се спазват и изискванията на Наредба № 3 на МНЗ за пределно допустимите концентрации на химични вещества, отделяни от полимерни строителни материали в жилищни и обществени сгради (ДВ, бр. 17 от 1984 г.). Чл. 68. (1) Ограждащите елементи на помещенията в основните сектори на заведенията за социални грижи (леглови, медицински, учебен и културно-занимателен) се проектират с необходимите топло-, хидро- и звукоизолации от негорими материали, устойчиви на миещи и дезинфекционни препарати. (2) Подовите настилки на помещенията в секторите на заведението се съобразяват с движението и на обитатели с увреждания на опорнодвигателния апарат, като се избягват хлъзгащи повърхности, ненужни прагове и стъпала. (3) По пътя за придвижване на обитателите се проектират допълнителни приспособления, като парапети, ръкохватки и др. (за придвижване по стълбища и коридори, за ползване на лечебни установки, душови и санитарни съоръжения, кухненско оборудване и др.). Чл. 69. Общите етажни и покривни тераси на заведението за социални грижи при възможност се проектират като площадки за слънце-въздушни процедури и двигателни занимания. Чл. 70. (1) Допустимите минимални напречни междуосия за отделните функционални клетки на структурните елементи на заведенията за социални грижи са: 1. за спални помещения с едно легло - 3 м; 2. за спални помещения с две и три легла - 3,3 м; 3. за процедурните помещения в медицинския сектор - 3,6 м; 4. за лекарски кабинети и манипулационни - 3 м. (2) Допустимите минимални надлъжни междуосия за отделните функционални клетки на структурните елементи на заведението за социални грижи са: 1. за спални помещения с едно легло - 4,2 м; 2. за спални помещения с две и три легла - 4,5 м; 3. за процедурните помещения в медицинския сектор - 4,8 м; 4. за приемни лекарски кабинети и манипулационни - 4,8 м. Чл. 71. Откритите площадки и съоръжения се изпълняват с материали и покрития, устойчиви на атмосферни влияния и позволяващи използването им и от обитатели със затруднено движение. Чл. 72. Инсталационните изисквания към заведенията за социални грижи са посочени в приложение № 3 (публикувано във ведомствените издания по чл. 4, ал. 2). ЗАКЛЮЧИТЕЛНИ РАЗПОРЕДБИ § 1. Тази наредба се издава на основание чл. 201, ал. 1 от Закона за териториално и селищно устройство. § 2. Наредбата се прилага за обекти, които започват да се проектират след 1 януари 1995 г. § 3. Указания по прилагането на наредбата, както и разрешения за отклонения от нормите дава министърът на труда и социалните грижи съгласувано с министъра на териториалното развитие и строителството и министъра на здравеопазването.
<urn:uuid:489187d3-7e6a-4d4d-b375-cfe59b0be291>
HuggingFaceFW/finepdfs/tree/main/data/bul_Cyrl/train
finepdfs
bul_Cyrl
25,172
Bächlihof Kathrin und Silvio Brüesch Bächli 34 7064 Tschiertschen email@example.com 081 373 13 03 Betriebsspiegel Unser Betrieb liegt auf 1350 m.ü.M im schönen Dorf Tschiertschen (Bergzone 3 und 4). Wir bewirtschaften 35 ha Land und kümmern uns um ca. 50 Stück Vieh. Unsere Betriebsrichtung ist IP-Suisse. In unserem Wohnhaus befindet sich eine Ferienwohnung, welche wir über das ganze Jahr gerne an Gäste vermieten! Wir bieten unsere eigenen Produkte in unserem Hofladen "Bazar" an und freuen uns über Ihren Besuch! Angebot
<urn:uuid:b0662f96-0fa2-41ab-8061-044ec5e6a9d6>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
531
1st International Workshop on Autonomous Systems Design ASD 2019, March 29, 2019, Florence, Italy Edited by Selma Saidi Rolf Ernst Dirk Ziegenbein Editors Selma Saidi Hamburg University of Technology, Germany email@example.com Rolf Ernst Technical University of Braunschweig, Germany firstname.lastname@example.org Dirk Ziegenbein Robert Bosch GmbH, Germany email@example.com ACM Classification 2012 Hardware → Analysis and design of emerging devices and systems; Computer systems organization → Robotic autonomy; Software and its engineering → Software safety; Computer systems organization → Dependable and fault-tolerant systems and networks ISBN 978-3-95977-102-3 Published online and open access by Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, Germany. Online available at https://www.dagstuhl.de/dagpub/978-3-95977-102-3. Publication date March, 2019 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at https://portal.dnb.de. License This work is licensed under a Creative Commons Attribution 3.0 Unported license (CC-BY 3.0): https://creativecommons.org/licenses/by/3.0/legalcode. In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the authors’ moral rights: ■ Attribution: The work must be attributed to its authors. The copyright is retained by the corresponding authors. Digital Object Identifier: 10.4230/OASIcs.ASD.2019.0 OASIs – OpenAccess Series in Informatics OASIs aims at a suitable publication venue to publish peer-reviewed collections of papers emerging from a scientific event. OASIs volumes are published according to the principle of Open Access, i.e., they are available online and free of charge. Editorial Board - Daniel Cremers (TU München, Germany) - Barbara Hammer (Universität Bielefeld, Germany) - Marc Langheimrich (Università della Svizzera Italiana – Lugano, Switzerland) - Dorothea Wagner (Editor-in-Chief, Karlsruher Institut für Technologie, Germany) ISSN 1868-8969 https://www.dagstuhl.de/oasics ## Contents Preface *Selma Saidi, Rolf Ernst and Dirk Ziegenbein* ........................................... 0:vii ### Regular Papers Fault-Tolerance by Graceful Degradation for Car Platoons *M. Baha E. Zarrouki, Verena Klös, Markus Grabowski, and Sabine Glesner* ............ 1:1–1:15 Feasibility Study and Benchmarking of Embedded MPC for Vehicle Platoons *Iñaki Martín Soraa, Amar Ibrahim, Dip Goswami, and Hong Li* .......................... 2:1–2:15 IDF-Autoware: Integrated Development Framework for ROS-Based Self-Driving Systems Using MATLAB/Simulink *Shota Tokunaga, Yuki Horita, Yasuhiro Oda, and Takuya Azumi* .......................... 3:1–3:9 Controlling Concurrent Change – A Multiview Approach Toward Updatable Vehicle Automation Systems *Mischa Möstl, Marcus Nolte, Johannes Schlatow, and Rolf Ernst* .......................... 4:1–4:15 Safety and Security Analysis of AEB for L4 Autonomous Vehicle Using STPA *Shefali Sharma, Adan Flores, Chris Hobbs, Jeff Stafford, and Sebastian Fischmeister* ......................................................... 5:1–5:13 Towards a Formal Model of Recursive Self-Reflection *Azel Jantsch* ............................................................................................................. 6:1–6:15 ### Interactive Presentations A Dependable Detection Mechanism for Intersection Management of Connected Autonomous Vehicles *Rachel Dedinsky, Mohammad Khayatian, Mohammadreza Mehrabian, and Aviral Shrivastava* ......................................................... 7:1–7:13 TrueView: A LIDAR Only Perception System for Autonomous Vehicle *Mohammed Yazid Lachachi, Mohamed Ouslim, Smail Niar, and Abdelmalik Taleb-Ahmed* ......................................................... 8:1–8:10 Generation of a Reconfigurable Probabilistic Decision-Making Engine based on Decision Networks: UAV Case Study *Sara Zermani and Catherine Dezan* ................................................................. 9:1–9:14 Preface This volume contains the proceedings of the 1st International Workshop on Autonomous Systems Design (ASD 2019). The workshop is held in Florence, Italy on March 29, 2019, and is co-located with the 22nd Design, Automation and Test in Europe Conference (DATE 2019). ASD 2019 aims at exploring recent industrial and academic trends, methods and methodologies in autonomous systems design. The workshop is organized into regular sessions with peer-reviewed research papers selected from an open call, complemented by 4 invited talks and two distinguished keynotes. The presented contributions addressed different topics on robotics, automated driving and frameworks for autonomous systems like Robot Operating System (ROS) and AUTOSAR Adaptive. Selected papers are included in this volume and are categorized into 6 long papers and 3 interactive presentations. The presented papers discuss recent development approaches for autonomous systems involving the integration of ROS-based self-driving system (Autoware) using MATLAB/Simulink, advanced implementations of model predictive control systems and multi-view model-based design and verification approaches. Another important discussed topic is related to dependable autonomous systems design based on degradation cascades for sensor and communication failures in autonomous car platoons, applying STPA-based (System Theoretic Process Analysis) hazard analysis technique for the design of robust autonomous emergency braking systems under safety and security requirements, and the incorporation of self-awareness in the design of autonomous systems using dynamic formal data flow semantics. The first invited talk will focus on the next generation of ROS frameworks developed to address the main challenge of seamless integration of deeply embedded devices considering resource-constrained computing platforms, non-ideal networks and real-time requirements. The second invited talk will address the dependability challenge by providing reliable control solutions in cloud computing provided under formal guarantees. The two last invited talks, are dedicated to present recent research activities and derived findings of research and industrial clusters in the field of autonomous driving. The activities of two large projects in the field will be presented, namely the UNICARagil project to demonstrate disruptive modular architectures for agile automated vehicle concept, and the CCC (Controlling Concurrent Change) project to investigate automated integration of critical applications using self-adaptation with self-protection based on contracting and self-awareness. The workshop will host two distinguished industrial keynotes highlighting important challenges and recent trends in the fields of autonomous design. In his keynote “Challenges of Automated and Connected Driving”, Thomas Form, Head of Electronics and Vehicle Research at Volkswagen AG, will talk about the challenges in automated driving regarding sensor technologies, redundancies as well as verification and validation questions. Masaki Gondo, CTO at eSOL, the company that provides POSIX/AUTOSAR/TRON RTOS will talk about AUTOSAR Adaptive as a standardized software platform specification for the highly automated and autonomous driving and emphasize the role of OS architectures in coping with recent challenges in the field. This volume will present a short summary of the considered keynotes and invited talks in addition to the selected long and interactive presentation papers. List of Contributions **Keynote 1:** Challenges of Automated and Connected Driving (Thomas Form) **Keynote 2:** AUTOSAR Adaptive - Challenging the Impossible (Masaki Gondo) **Invited Talk 1:** Bringing the Next Generation Robot Operating System on Deeply Embedded Autonomous Platforms (Ralph Lange) **Invited Talk 2:** Autonomous Data Center - Feedback Control for Predictable Cloud Computing (Martina Maggio) **Invited Talk 3:** An Approach to Automotive Service-oriented Software Architectures in a Multi-partner Research Project (Stefan Kowalewski) **Invited Talk 4:** Controlling Concurrent Change- Design Automation for Critical Systems Integration (Rolf Ernst) **Regular Paper 1:** IDF-Autoware: Integrated Development Framework for ROS-based Self-driving Systems Using MATLAB/Simulink (Shota Tokunaga et al.) **Regular Paper 2:** Feasibility Study and Benchmarking of Embedded MPC for Vehicle Platoons (Inaki Martin Soroa et al.) **Regular Paper 3:** A Multiview Approach Toward Updatable Vehicle Automation Systems (Marcus Nolte et al.) **Regular Paper 4:** Fault-Tolerance by Graceful Degradation for Car Platoons (Mohammed Baha E. Zarrouki et al.) **Regular Paper 5:** Safety and Security Analysis of AEB for L4 Autonomous Vehicle using STPA (Shefali Sharma et al.) **Regular Paper 6:** Towards a Formal Model of Recursive Self-Reflection (Axel Jantsch) **Interactive Presentation 1:** A Dependable Detection Mechanism for Intersection Management of Connected Autonomous Vehicles (Rachel Dedinsky et al.) **Interactive Presentation 2:** A LIDAR Only Perception System for Autonomous Vehicle (Mohamed Yazid Lachachi et al.) **Interactive Presentation 3:** Generation of a Reconfigurable Probabilistic Decision Making Engine based on Decision Networks: UAV Case Study (Sara Zermani et al.) Keynotes & Invited Talks Keynote 1: Challenges of Automated and Connected Driving Speaker: Thomas Form, Head of Electronics and Vehicle Research, Volkswagen AG, Germany In recent years, various publications and presentations from a lot of companies have shown the improvements in the sector of automated driving. The vehicle- and mobility-concept SEDRIC is a current example from the Volkswagen AG. However, for a release of these technologies there are several unresolved issues regarding sensor technologies, redundancies as well as verification and validation questions. Regarding sensors, the main objectives are miniaturization and reduction of system costs. Advantages and disadvantages of existing solutions have to be evaluated. In addition to economic aspects, ensuring the redundancy of the system is absolute necessary. Is, for example, Artificial Intelligence able to provide an independent second or third function path? Regarding verification and validation concepts, current discussions are focused on which scenarios have to be tested and how, in order to enable regulatory authorities to approve the release of automated driving functions? It is conceivable, that this is an automotive industry wide task that can only be solved in cooperation with all stakeholders. Keynote 2: AUTOSAR Adaptive - Challenging the Impossible Speaker: Masaki Gondo, Software CTO at eSOL Co., Ltd., Japan The vast researches related to autonomous driving seem steadily progressing – it no longer makes news to just have some research vehicle drive autonomously. However, bringing this technology to the market, with all the associated legal, societal, and ethical responsibilities, with justifiable cost efficiency, is hard at its best, and impossible at its worst. Furthermore, the automotive industry is facing drastic challenges in electric vehicles, connected services, which also heavily impact the whole vehicle architecture. AUTOSAR (AUTomotive Open System ARchitecture) is a worldwide development partnership of automotive interested parties. One of its latest challenges is to develop the software platform specification for the highly automated and autonomous driving, named AUTOSAR Adaptive Platform. This talk gives an overview of the challenges of such a platform, followed by the solution approach of AUTOSAR reflecting the industrial needs, and the overall architecture of AUTOSAR Adaptive. It also introduces a new multi-kernel OS technology the author develops, describing why such OS architecture is essential for coping with the challenge in the long run. Invited Talk 1: Bringing the Next Generation Robot Operating System on Deeply Embedded Autonomous Platforms Speaker: Ralph Lange, Robert Bosch GmbH, DE In the last decade, the Robot Operating System (ROS) has become the primary framework and middleware for robotics research and an important building block for the autonomous systems engineering in general. The Next Generation Robot Operating System (ROS 2) aims at strengthening this position by new mechanisms for resource-constrained computing platforms, non-ideal networks, real-time requirements and further fundamental needs from series development of autonomous systems. A particular challenge is the seamless integration of deeply embedded devices with ROS 2. In this talk, an overview to ROS 2 will be provided, followed by an analysis of basic issues for such seamless integration. As a solution, the micro-ROS stack will be presented in the second part of this talk. This includes an introduction to the up-coming DDS-XRCE middleware standard, a novel concept of system runtime configuration for ROS2 and micro-ROS, and early results on an extended API for predictable scheduling. Invited Talk 2: Autonomous Data Center - Feedback Control for Predictable Cloud Computing Speaker: Martina Maggio, University of Lund, SE, Cloud computing gives the illusion of infinite computational capacity and allows for on-demand resource provisioning. As a result, over the last few years, the cloud computing model has experienced widespread industrial adoption and companies like Netflix offloaded their entire infrastructure to the cloud. However, with even the largest datacenter being of a finite size, cloud infrastructures have experienced overload due to overbooking or transient failures. In essence, this is an excellent opportunity for the design of control solutions, that tackle the problem of mitigating overload peaks, using feedback from the computing infrastructure. Exploiting control-theoretical principles and taking advantage of the knowledge and the analysis capabilities of control tools, it is possible to provide formal guarantees on the predictability of the cloud platform. This talk introduces recent research advances on feedback control in the cloud computing domain. This talk discusses control solutions and future research for both cloud application development, and infrastructure management. In particular, it covers application brownout, control-based load-balancing, and autoscaling. Invited Talk 3: An Approach to Automotive Service-oriented Software Architectures in a Multi-partner Research Project Speaker: Stefan Kowalewski, RWTH Aachen, DE Novel software architectures will become necessary to cope with the short lifetime and innovation cycles of the technologies underpinning self-driving vehicles. In the UNICARagil project, seven German universities and six industrial partners join forces to research and demonstrate disruptive modular architectures for agile, automated vehicle concepts. As today’s prevailing automotive electric, electronic and software architectures are mostly function-oriented and design-time integrated, they often are unsuitable for infield updates or system reconfiguration. In contrast, service-oriented software architectures are based on runtime integrated service and are a promising way forward. We present the lean and simple concept for service-orientation, that serves as the basis for the implementation of all vehicle functions in the UNICARagil vehicles. Invited Talk 4: Controlling Concurrent Change- Design Automation for Critical Systems Integration Speaker: Rolf Ernst, TU Braunschweig, DE Embedded systems for safety critical and high availability applications have moved from isolated components to highly integrated mixed criticality networked systems with numerous shared resources. The resulting function interference challenges the design process, in particular in autonomous systems which shall independently manage software updates and hardware reconfigurations. With support from the German DFG, a group of 8 PIs has investigated automated integration of critical applications using self-adaptation with self-protection based on contracting and self-awareness. Applications were driving automation and space robotics. The talk will review the results of the six year project and outline the demonstrations which will be exhibited at the workshop. Support and Acknowledgement We would like to thank our distinguished keynote speakers as well as invited speakers for their valuable participation to the workshop. We would also like to acknowledge the contributions of authors and the help of program committee members in the review process. We extend our appreciation to the DATE organizing committee and K.I.T Group GmbH Dresden for their help and support in the logistics arrangements. ASD 2019 is partially supported by the IEEE Council on Electronic Design Automation CEDA and the Technical University of Braunschweig, we would therefore like to acknowledge their financial contribution. Lastly, we would like to thank the editorial board of the OASiCs proceedings. Organizers Workshop Organizers Rolf Ernst, Technical University of Braunschweig, Germany Selma Saidi, Hamburg University of Technology, Germany Dirk Ziegenbein, Robert Bosch GmbH, Germany Publicity Chair Sebastian Steinhorst, Technical University of Munich, Germany Steering Committee Marko Bertogna, University of Modena, Italy Naehyuck Chang, Korea Advanced Institute of Science and Technology, Korea Klaus Dietmayer, Ulm University, Germany Karl Henrik Johansson, KTH Royal Institute of Technology, Sweden Matthias Traub, BMW, Germany Technical Program Committee Assad Al Alam, Scania CV AB, Sweden Mohammad Al Faruque, University of California, Irvine, USA Marko Bertogna, University of Modena, Italy Bart Besselink, University of Groningen, Netherlands Samarjit Chakraborty, Technical University of Munich, Germany Jyotirmoy Vinay Deshmukh, University of Southern California, USA Marco Di Natale, Scuola Superiore Sant’Anna, Italy Sebastian Fischmeister, University of Waterloo, Canada Arne Hamann, Robert Bosch GmbH, Germany Stefan Kowalewski, RWTH Aachen University, Germany Martina Maggio, Lund University, Sweden Rahul Mangharam, University of Pennsylvania, USA Markus Maurer, TU Braunschweig, Germany Karl Meinke, KTH Royal Institute of Technology, Sweden Gabor Orosz, University of Michigan, USA Dongwha Shin, Yeungnam University, Korea Aviral Shrivastava, Arizona State University, USA Lin Xue, Northeastern University, USA Takuya Azumi, Graduate School of Science and Engineering, Saitama University, Japan Rachel Dedinsky, Arizona State University, USA Catherine Dezau, Lab-STICC, France Rolf Ernst, Technische Universität Braunschweig, Germany Sebastian Fischmeister, University of Waterloo, CA, Canada Adan Flores, University of Waterloo, Canada Sabine Glesner, Technische Universität Berlin, Germany Dip Goswami, Eindhoven University of Technology, Netherlands Markus Grabowski, Assystem Germany GmbH, Germany Chris Hebbs, QNX Software Systems Limited, Canada Yuki Horita, Hitachi Automotive Systems Ltd, Japan Amr Inbrahim, Eindhoven University of Technology, Netherlands Axel Jantsch, Technische Universität Wien, Austria Mohammad Khayatian, Arizona State University, USA Verena Klös, Technische Universität Berlin, Germany Mohammed Yazid Lachachi, University of Sciences and Technology, Oran, Algeria Hong Li, NXP Semiconductor, Netherlands Mohammadreza Mehrabian, Arizona State University, USA Mischa Möstl, Technische Universität Braunschweig, Germany Smail Niar, Université Polytechnique Hauts-de-France, France Marcus Nolte, Technische Universität Braunschweig, Germany Yasuhiro Oda, Hitachi Automotive Systems Ltd, Japan Mohamed Ouslim, University of Sciences and Technology, Oran, Algeria Johannes Schlatow, Technische Universität Braunschweig, Germany Shefali Sharma, University of Waterloo, Canada Aviral Shrivastava, Arizona State University, USA Inaki Martin Soroa, Eindhoven University of Technology, Netherlands Jeff Stafford, Renesas Electronics America Inc., Canada Abdelmalik Taleb-Ahmed, Université Polytechnique Hauts-de-France, France Shota Tokunaga, Graduate School of Engineering Science, Osaka University, Japan Mohammed Baha E. Zarrouki, Technische Universität Berlin, Germany Sara Zermani, Lab-STICC, France Fault-Tolerance by Graceful Degradation for Car Platoons M. Baha E. Zarrouki TU Berlin, Ernst-Reuter-Platz 7, 10587 Berlin, Germany firstname.lastname@example.org Verena Klös TU Berlin, Ernst-Reuter-Platz 7, 10587 Berlin, Germany email@example.com Markus Grabowski Assystem Germany GmbH, Gutenbergstraße 15, 10587 Berlin, Germany firstname.lastname@example.org Sabine Glesner TU Berlin, Ernst-Reuter-Platz 7, 10587 Berlin, Germany email@example.com Abstract The key advantage of autonomous car platoons are their short inter-vehicle distances that increase traffic flow and reduce fuel consumption. However, this is challenging for operational and functional safety. If a failure occurs, the affected vehicles cannot suddenly stop driving but instead should continue their operation with reduced performance until a safe state can be reached or, in the case of temporal failures, full functionality can be guaranteed again. To achieve this degradation, platoon members have to be able to compensate sensor and communication failures and have to adjust their inter-vehicle distances to ensure safety. In this work, we describe a systematic design of degradation cascades for sensor and communication failures in autonomous car platoons using the example of an autonomous model car. We describe our systematic design method, the resulting degradation modes, and formulate contracts for each degradation level. We model and test our resulting degradation controller in Simulink/Stateflow. 2012 ACM Subject Classification Computer systems organization → Embedded and cyber-physical systems; Computer systems organization → Availability; Software and its engineering → Software design engineering Keywords and phrases fault-tolerance, degradation, car platoons, autonomous driving, contracts Digital Object Identifier 10.4230/OASIcs.ASD.2019.1 1 Introduction In autonomous car platoons vehicles drive with short inter-vehicle distances to increase traffic flow and reduce fuel consumption by travelling in the slipstream. The short distances can be achieved by exploiting real-time knowledge about the driving behaviour of preceding vehicles in the platoon. This knowledge is achieved by combining onboard sensors and wireless communication with platoon members. If a sensor or communication failure occurs, the required knowledge becomes unavailable and driving within a short distance is not safe anymore. In contrast to fail-safe systems, where a shut-down of actuators leads to a safe system state, autonomous vehicles have to be fail-operational, i.e. a shut-down of the vehicle during operation on a highway is not acceptable. Thus, failures have to be compensated and adherence to safety restrictions has to be guaranteed even under failure occurrence. For autonomous car platoons, this means that the inter-vehicle distance always has to be large enough to allow for an autonomous reaction to a sudden braking of preceding vehicles. without risking a collision. The required reaction time depends on the quality and speed of information about the behaviour of preceding vehicles, i.e. available sensors and inter-vehicle communication, and has to be reflected in the distance. One possibility to specify safe and fault-tolerant driving behaviour for autonomous platoons is to rely on graceful degradation. This means to systematically define a partial-order of less and less acceptable operation modes and to select the best achievable mode in presence of failures. Thus, the system maintains its operation as far as possible. As an example, an autonomous vehicle can be in the platoon-mode or in a mode of cooperative adaptive cruise control (CACC), where it only communicates with the vehicle directly in front of it, or in the mode of adaptive cruise control (ACC), where it relies on onboard sensors only. An operating mode in which the system is not operated at full functionality due to failures is called degradation mode and a sequence of less and less acceptable operation modes is called degradation cascade. With the increasing complexity of vehicles, e.g. due to increasing functionality required for autonomous driving, the design of degradation cascades becomes challenging, i.e. managing the resulting amount of failure combinations. In [4], a systematic approach for design and verification of degradation cascades for embedded systems was presented. Following a systematic process can help to cope with the increasing complexity. Inspired by this work, we describe a systematic design of degradation cascades for sensor and communication failures in autonomous car platoons using the example of the autonomous model car “Velox” which serves as a case study in the AMASS research project\(^1\). Note that although this paper focuses on safety, the proposed solutions can also be used to cope with security, i.e. attacks on sensors, actuators and communication channels, as long as these attacks are identified by some anomaly detection mechanisms (see [1] for an overview). We describe our systematic design method, the resulting degradation modes, and formulate contracts \(^2\) for each degradation level. We model and test our resulting degradation controller in Simulink/Stateflow. **Car Platoons** ![Figure 1](image) **Figure 1** A platoon-drive. In this paper, we focus on autonomous car platoons with at least two vehicles that drive with a small inter-vehicle distance on one lane of the highway. They synchronize their speed and sensor data based on onboard sensors and Vehicle-to-Vehicle (V2V) communication, as depicted in Figure 1. The platoon members can have different vehicle types (cars, trucks) from different manufacturers. The vehicle at the front of a platoon is the platoon leader. --- \(^1\) https://www.amass-eccel.eu/ \(^2\) Contracts are pairs of assumptions and guarantees that define the behaviour of individual system components to lower the overall complexity of large systems. Based on user-inputs, it determines an efficient velocity and a desired inter-vehicle distance for the whole platoon. As the safety of inter-vehicle distances depends on individual vehicle characteristics (i.e. maximum braking deceleration), we assume that each platoon member adjusts its distance control setpoint such that it is always larger or equal to the individual safe inter-vehicle distance, and never smaller than the desired distance proposed by the platoon leader. Furthermore, the leader keeps a safe distance to vehicles or platoons in front of it. Each following vehicle is a follower (or platoon member) and autonomously has to maintain the inter-vehicle distance determined by the platoon leader. This is achieved by longitudinal control, which regulates the speed of the vehicle. The vehicles drive fully autonomously with a driver who is not prepared to take control, i.e. as if no driver were present. **Outline** This paper is structured as follows: In Section 2, we discuss related work on degradation concepts for car platoons. In Section 3, we systematically analyze the system architecture, identify relevant failures for platooning and discuss how to adapt the inter-vehicle distance to capture slower response times due to less precise information. The results are used to infer degradation modes for sensor and communication failures. Based on these reactions, we propose a compact degradation controller that we model in Simulink/Stateflow in Section 4. To ensure the safety of autonomous platoons that use graceful degradation, we define contracts and discuss how they can be analyzed and tested with our Stateflow model in Section 5. We conclude the paper in Section 6 and outline future work. ## Related Work In this section, we review related work on fault-tolerant designs and degradation strategies for CACC and platooning. The work in [7] proposes a diagnostic system that monitors the sensors of the longitudinal and lateral controllers in autonomous vehicles that operate in a platoon. However, it does not detect communication failures and the authors do not define a reaction to the detected failures. In our work, we assume that sensor and communication failures are successfully detected and focus on appropriate and safe reactions to detected faults. The work in [6] presents a graceful degradation technique for CACC in case of communication failures. The main idea is to estimate the acceleration of the preceding vehicle based on distance measurement information provided by onboard sensors. This strategy shows better performance than using ACC as a fallback option. This paper only considers one possible failure of CACC-mode which is the communication with the preceding vehicle and does not handle other failures i.e. distance measurement sensor failures that affect the estimation. In our work, we cover all possible sensor and communication failures affecting the longitudinal guidance in platoon-mode. Moreover, we define reactions and design a global state-machine-model that guides the vehicle completely-autonomously in a running platoon-drive. In our approach, we rely on a similar distance measurement as described in [6] in case of communication failures with the preceding vehicle. Our work is similar to and based on the work presented in [9], which introduces a structured design of degradation cascades for car platoons and a contract-based design approach to ensure safety. The presented degradation cascade only switches between Platoon, CACC, ACC and manual driving. In our work, there is no possibility for a fallback to manual driving as we handle fully automated vehicles (SAE Level 5\(^3\)). Moreover, we introduce new degradation modes that allow the vehicle to handle more failure combinations and to deliver a better performance in the platoon. Our work is inspired by the systematic approach to define, design, implement and verify degradation cascades for embedded systems presented in [4]. The approach proceeds systematically from the analysis of the system and its safety over defining degradation cascades and its requirements down to modelling and generating code from Simulink for real-time testing. The systematic approach is illustrated with a DC drive example. In our work, we apply a similar approach on autonomous vehicles in a platoon-drive. ### 3 Systematic Analysis of Possible Failures and Alternative Information Sources In the regular industrial design process, the system design is followed by a safety analysis to check whether the system adheres to safety requirements. For safe-operational systems that rely on graceful degradation, possible failures already have to be considered during the design of degradation modes. Thus, we follow [4], and already perform a systematic safety analysis before the system design. With this minor change of the usual design flow, the systematic design of degradation cascades can be easily integrated into industrial practice. Our systematic design approach for degradation cascades consists of a systematic analysis of the system architecture to identify a) failure sources that are relevant for platooning, and b) fallback alternatives for faulty system components. To capture the performance loss of fallback alternatives, we define individual failure-specific constants that we add to the reaction time of degraded vehicles. The reaction time describes how long it takes to detect and react to a sudden change in the behaviour of the preceding vehicle. It is used to define the safe inter-vehicle distance \(x_{rd,i}\) between the \(i\)-th vehicle and the preceding vehicle: \[ x_{rd,i}(t) = x_r + t_{r,i} * v_i \tag{1} \] The parameters of the equation are the remaining distance at standstill \(x_r\), the reaction time \(t_{r,i}\), and the current velocity \(v_i\) of vehicle \(i\). This distance law assumes similar vehicle velocities and accelerations in a platoon drive. Our failure-specific constants describe the additional time that is needed to detect sudden breaks in the presence of specific failures. They are added to the reaction time \(t_{r,i}\) in equation 1. Based on our analysis results, we define degradation cascades that describe several degradation steps as a response to sequences of failures. We combine these cascades into a single and compact degradation controller, which we model in Simulink/Stateflow to enable simulation, testing and later controller synthesis. In this section, we first describe relevant parts of the system architecture of the “Velox” car in Section 3.1. To identify degradation modes for sensor and communication failures, we identify possible sources for required information about the environment, e.g. the distance to the vehicle in front, and about other platoon members, e.g. the velocity of the vehicle in front, based on available sensors and communication partners, and evaluate the influence of alternative information sources on the reaction time of the autonomous vehicle in Section 3.2. --- \(^3\) The SAE Norm [8] defines six levels of autonomy for motor vehicle automation ranging from no automation (level 0) to full automation (level 5) 3.1 System Architecture Within the scope of research projects, experimental cars on a scale of 1:8, the “Velox Cars”, were developed by “Assystem Germany GmbH”. The prototypes were designed for training and research purposes as well as for the development of advanced functions of highly automated systems (HAS) with a focus on autonomous driving. Various driving assistance functions such as a lane departure warning system, the ACC/CACC/Platoon or the Traffic Sign Assistant, have been developed. For this purpose, the model cars are equipped with a valuable range of sensors. In this work, the analysis is based abstractly on the architecture of the Velox car, which is generally similar to other vehicles. In this paper, we assume a vehicle architecture as depicted in Figure 2. Each vehicle is equipped with ultrasonic sensors and a LIDAR (Light Detection And Ranging) radar to measure the distance to the vehicle in front. A sensor fusion of the ultrasonic sensor data and the LIDAR data is performed in order to detect measurement errors. In addition, the vehicles are equipped with an odometry unit to determine their own driving behaviour (acceleration, velocity, distance covered and position). A camera and an inertial measurement unit (IMU) are implemented on the vehicle. However, we assume that they are not used by the longitudinal controller for the normal Platoon/CACC function. Note that we here assume a similar architecture and equipment of all platoon members. However, the approach could also include vehicles that are not fully equipped with sensors or communication devices by handling these vehicles as vehicles with corresponding sensor or communication failures. ![Figure 2](image.png) **Figure 2** A simplified vehicle architecture for platooning. The signal flow in Figure 2 goes from the input on the left to the output on the right. The input corresponds to the sensors, and the output corresponds to the actuator control. All sensor data is processed in the corresponding Processing Unit in the **Environment Perception** layer. This layer contains function blocks such as the *Wheel-Encoder Processing Unit*, which acquires the odometer data (steering angle and wheel encoder data) and preprocesses the odometer data. The IMU is only used if the wheel encoder fails. In the subsequent **Environment Modelling** layer, the environment is modelled with the help of different algorithms. This layer contains function blocks such as a Vehicle Detection block. The **Platoon/CACC Controller** decides between platoon and CACC mode and calculates a target velocity to maintain the desired distance between the ego-vehicle and the vehicle in front. These decisions are based on the partner’s and the ego-vehicle data. The partner vehicle data are received by the **External Communication** interface for the communication between the own vehicle and external systems (Vehicle-to-Vehicle (V2V)) communication, GPS etc.). The received V2V data is then filtered by Partner Vehicle Data Processing. Furthermore, the Platoon/CACC Controller broadcasts the Ego vehicle data. The Velocity Controller regulates the speed of the vehicle and controls the motor based on the provided target velocity. We design our degradation concept for the Velox Car. In practice, it can be assumed that vehicles of different manufacturers participate in a platoon. Thus, the platoon can be regarded as a heterogeneous system of systems of different manufacturers. In order to realize the functionality of platoon driving, all vehicles have to be equipped with relative distance and speed sensors as well as V2V communication. Our results can easily be transferred to similar architectures. 3.2 Failures, Consequences, and Fallback Strategies For the platoon operation, a Velox car needs the following capabilities: it can determine the distance to the vehicle in front, it can measure its own (ego) motion data (acceleration, speed, distance covered and position), and it can receive the motion of the vehicle in front and of the first vehicle in the platoon, i.e. the platoon leader. In normal platoon operation, the distance to the vehicle in front is determined by LIDAR and ultrasonic (US) sensor fusion, the calculation of the ego-motion is based on the wheel encoder, information about the front-vehicle motion is available via vehicle-2-front-vehicle communication, and the motion of the platoon leader is available via vehicle-2-leader communication. Table 1 Default and Fallback Information Sources. | Kind of Information | Default Source | 1st Fallback Source | 2nd Fallback Source | |---------------------|----------------|---------------------|---------------------| | Distance to vehicle in front | LIDAR and Ultrasonic sensor fusion | LIDAR only, Ultrasonic only | GPS and Wheel-Encoder (for communication packet identification only) | | Ego-Motion | Wheel-Encoder | Inertial-Measurement-Unit (IMU) | Motor-model for speed estimation | | vehicle in front motion | vehicle-2-Front vehicle (V2F) | vehicle-2-Leader (V2L) | based on distance measurement | | Motion of Platoon Leader | V2L | V2F | - | In the case of sensor and communication failures, the required information has to be obtained from alternative sources. In Table 1, we summarize available information sources in the Velox car and introduce new sources for the fallback scenario. If, for example, the LIDAR fails, ultrasonic data can be used without sensor fusion. However, the obtained information is less precise. If this sensor also fails, the system can still rely on the second fallback option: a combination of GPS and wheel-encoder that is precise enough to identify communication packets from the vehicle in front, but not for ACC-mode. In the following, we describe the identified fallback possibilities for sensor and communication failures and their influence on the reaction time to changes in the behaviour of preceding vehicles. The resulting delays are expressed in terms of failure-specific constants. These constants have to over-approximate the actual delays as precisely as possible to ensure that the distance to the vehicle in front is as small as safely possible. The actual values depend on the characteristics of the sensors, actuators and the efficiency of the algorithms (fusion of data, recognition etc.) and can be determined with simulations and real-time tests. Failure in Distance Measurement In case of a failure of the LiDAR (LID_F) or the US sensor (US_F), it is no longer possible to use sensor fusion to increase precision, but we can still rely on the remaining sensor. As a result, the reaction time increases due to less precise sensor data. We capture this by adding a constant failure-specific factor, e.g. tr_lid1 for LiDAR failures and tr_us1 for US failures, that captures the necessary increase of the reaction time, to the reaction time in the normal platoon operation tr_pl. Thus, we get tr_pl+tr_lid1 and tr_pl+tr_us1, respectively. It applies tr_lid1 > tr_us1, since the LiDAR is more accurate than the ultrasonic sensor. If both distance sensors fail, the system can still rely on a combination of GPS and wheel-encoder to identify communication packets from the vehicle in front. In this case, tr_lid_us is added to the reaction time. However, this is not precise enough for CACC-mode. Failure in estimating the Ego-motion An error in the wheel encoder (WEnc_F) affects the acquisition of the covered distance, the own acceleration and speed (Ego-Motion-Data). If a wheel encoder error occurs, the system can still obtain 3-axis acceleration data from the motion sensor (inertial measuring unit (IMU)). However, this information is less precise. Accordingly, the reaction time increases to tr_pl+tr_wenc. If the IMU fails (IMU_F), it is still possible to roughly estimate the own velocity based on electrical values by using a motor model as discussed in [4]. The reaction time has to be increased to tr_pl+tr_wenc_imu. Communication Failures In the platoon operation, each vehicle communicates with the platoon leader and the vehicle in front of it. If the communication with the vehicle in front fails (V2F_F), the vehicle in front motion can only be estimated using the slower distance measurement, which means that the reaction times, and, thus, the safety distance, have to be increased when switching to the corresponding ACC mode. However, if communication to the platoon leader is still available, the platoon leader could be requested to forward messages from the vehicle in front. To this end, an extended packet filtering algorithm has to be implemented in the Partner Vehicle Data Processing. If an error in the communication with the platoon leader (V2L_F) occurs (e.g. error during a sending procedure or error with the reception), we lose any information about the leader’s driving behaviour. As a consequence, we would need to switch to the CACC mode and increase the inter-vehicle distance accordingly. However, if the vehicle in front is still able to communicate with the platoon leader and the ego vehicle has a stable communication connection to the vehicle in front, this vehicle can forward messages from the platoon leader. As message forwarding introduces some communication delay, reactions to sudden changes in the behaviour of the vehicle in front / the leader will also be delayed. Thus, the reaction time increases to tr_pl + tr_front and tr_pl + tr_lead, respectively. Based on the results of a systematic evaluation of available fallback possibilities for relevant sensor and communication failures, we define corresponding degradation modes for each combination of evaluated failures in the next section. 4 Degradation Controller With our systematic analysis, we have identified fallback alternatives to compensate for sensor and communication failures within a running platoon-drive. In this section, we use the analysis results to infer degradation modes that describe less and less acceptable operation modes for platoon members. We propose a controller, modelled in Simulink/Stateflow, that safely guides the graceful degradation. Note that we assume the existence of a reliable and sufficiently fast fault detection method that we can rely on. This, of course, is not trivial, but out of the scope of this work. Our controller receives fault detection events from the fault detector and selects the best mode based on these events. The Stateflow model is used for systematic testing in the next section and can be further refined for controller code synthesis. 4.1 Degradation Cascades In case of failure combinations of different information types, our fallback strategies from the previous section can be combined step-by-step as long as information alternatives are available. If only knowledge about the platoon leader is missing, the vehicle can still switch to CACC and rely on vehicle-2-front-vehicle communication. If this communication also fails, only onboard sensor-based ACC may be possible. However, degradation is only possible as long as any acceptable operation mode can be executed. Thus, the last degradation step leads to a final degradation mode FIN_DEG, which describes a safe exit from the platoon. At this point, the system cannot rely on important sensor information and may not be able to communicate with other vehicles. Thus, it should come to a standstill as far to the right as possible, brake and warn other road users. 4.2 Controller Model The Stateflow model, as depicted in Figure 3, consists of three hierarchical modes. The system starts in the nominal platoon mode. Failures cause a transition to the degraded platoon mode. If failures are resolved, it returns to nominal platoon mode. If no further acceptable degradation is possible, the last step leads to the final degradation mode (FIN_DEG). Figure 3 Main Statechart. The degraded platoon mode, as depicted in Figure 4, consists of three parallel states, which in turn contain further state machines: *Degradation for the communication* (Figure 5), *Degradation for the distance measurement* (Figure 7) and *Degradation for the ego motion measurement* (Figure 8) according to the failure categories: communication failures, failures in distance measurement and failures in measurement of the ego-motion. In each parallel state, the reaction time is adjusted as described in the previous section. The overall reaction time is the sum of the normal reaction time $tr\_pl$ and all added constants. If, for example, an error occurs in the LIDAR, in the communication with the vehicle in front and in the wheel encoder, the reaction time to be added is the sum of $tr\_lid$, $tr\_front$ and $tr\_wenc$. ![Figure 4](image) **Figure 4** Statechart for the Degraded Platoon-Mode. ![Figure 5](image) **Figure 5** Degradation for Communication Failures. The state machine for *degradation in case of communication failures* is shown in Figure 5. The initial state “wait” corresponds to states without any communication errors. This state is active if the degraded platoon-mode is activated without communication errors, but with an error in the distance measurement or in the measurement of own motion. There are three different variants of degradation for communication: the failure is due to communication with the platoon leader (V2L_F), with the vehicle in front (V2F_F), or with both. When a failure in the communication with the platoon leader (V2L_F) occurs, we switch to a degradation mode for communication with the leader. If the failure is resolved, the system returns to “wait” again. Failures within the communication with the vehicle in front (VF2_F) are handled analogously. If the communication with both, the leader and the preceding vehicle, is corrupted, the ACC mode is activated (ACC_m=true) and the ACC-specific constant tr_acc_offset is added to the reaction time. When this state is left, the offset is subtracted again. The same holds for a switch to the CACC mode, where tr_cacc_offset is added. It contains a sub-state machine for corrupted communication with the platoon leader (DEG_L) as shown in Figure 6 (DEG_F is similar and, thus, omitted here). The vehicle switches to CACC mode (CACC_m=true) and tr_cacc_offset is added to the reaction time. At the same time, a request for the data of the platoon leader is sent to the preceding vehicle. When this data is received (pos_resp_F), the vehicle changes to a degraded state (DEG_L1) and the reaction time is increased by tr_lead. If the preceding vehicle looses connection to the platoon leader (F2L_F), the system returns to CACC mode. During this process, the system continuously tries to re-establish the communication with the platoon leader in order to switch back to an operating mode with a better performance. Figure 6 Degradation for Communication Failures with the Leader. The state machine for degradation in case of distance measurement failures is depicted in Figure 7. The LIDAR and the ultrasonic sensor are mainly used for the identification of the received communication packets or for precise distance measurement in ACC mode. Starting from a wait state (wait), the system switches to a degraded state (DEG_LID1) and relies on the ultrasonic sensor for identification of communication packets if a LIDAR error occurs (LID_F), tr_lid1 is added to the reaction time. However, when ACC mode is active (ACC_m), it switches to a degraded state (DEG_LID2) and relies on the ultrasonic sensor for precise distance measurement. tr_lid2 is added to the reaction time. The same applies if an error occurs in the ultrasonic sensor, i.e. tr_us1 or tr_us2 are added to the reaction time and only the LIDAR is used. The following applies: tr_lid2 > tr_lid1 and tr_us2 > tr_us1. For failure-free communication, an estimate is sufficient to identify the communication packets. If the communication is faulty, an exact distance measurement is needed. Thus, the reaction times tr_lid2 and tr_us2 are higher. If the data of both sensors are faulty, the system switches to a degradation state in which it relies on the GPS and the wheel encoder to identify communication packets. Compared to the positions of platoon partners that were received via V2V communication, communication-packets of the vehicle in front and the platoon leader can then be filtered. \( \text{tr\_lid\_us} \) is added to the reaction time in this case. This degradation is only possible if communication is available. Otherwise, the vehicle passes to the final degradation state (FIN_DEG). **Figure 7** Degradation for Distance Measurement Failures. **Figure 8** Degradation for the Measurement of Own Motion. In Figure 8, we depict the state machine for degradation in case of *measurement failures of the ego-motion*. Starting from a wait state (wait), the system switches to a degraded state (DEG_WENC) and relies on the inertial measurement unit to determine its own acceleration if an error occurs in the wheel encoder (WEnc_F). `tr_wenc` is added to the reaction time. If the inertial measurement unit is faulty too, we switch to a degraded state (DEG_WENC_IMU) and add `tr_wenc_imu` to the reaction time. In this mode, a motor model is introduced which estimates the motor speed from electrical values without using the physical speed sensor. The introduction of the motor model was discussed in [4]. Although the speed is not estimated very well, an estimation is better than a complete loss of the measurement of the ego-vehicle motion. The proposed fallback concept can be further refined by changing reactions to failures or adding new actions. For example, in case of a distance measurement failure, the cameras can be used to estimate the distances. Furthermore, the logical expression that leads to the final degradation state can also be adjusted. This can be useful, for example, if it is determined during simulation or testing that a safe distance cannot be maintained for a certain combination of failures. The presented controller model contains degradation steps for all failure combinations that were considered during our systematic system analysis. To ensure that the controller is complete and that the reaction time estimate is safe, i.e. leading to a safe distance to the preceding vehicle, we systematically tested our controller, as described in the next section. ## Assurance by Mode-Specific Contracts To ensure a safe operation of vehicles, standards like ISO26262 [3] define concepts and procedures which need to be considered during the development of safety-critical functions. These standards explicitly recommend a formal system description for heavily safety-critical systems like our car platoon. Based on the formal system description, methods like model checking allow a partly or fully automated way of verifying and validating the system early during development. A promising approach to this is Contract-based Design[5]. By specifying pairs of assumptions and guarantees the behaviour of each system component can be defined on its own and thus lowering the overall complexity of large systems. The composition of components and their contracts can then be evaluated. To validate our degradation controller we specify contracts in SSPL (*System Specification Pattern Language*)[2], which enables a formal and verifiable description of behaviour while also maintaining a readable appearance. We came up with 11 contracts which describe the degradation of the platooning function. As an example, the contract defining the minimum distance to the vehicle in front while platooning is active and no errors occur (nominal platoon-mode) looks as follows: | Assumption | all of the following conditions hold: - `platooning` is `ACTIVE` - `com_error` does not occur - `distance_meas_error` does not occur. | |-------------|--------------------------------------------------------------------------------| | Guarantee 1 | `distance_to_front` is always greater than `d_min_pl` | | Guarantee 2 | Whenever `break_maneuver_front` occurs then in response `distance_to_front` is never less than `distance_at_standstill` starting immediately. | As a second example, we show a contract specifying a switch to ACC-mode (drv_mode = ACC) when the communication to the platoon head and the preceding vehicle is lost: | Assumption | No specific assumption. The contract’s guarantees shall always hold. | |------------|------------------------------------------------------------------------| | Guarantee 1| Whenever V2L_F changes to true while all of the following conditions hold: - V2F_F is true - drv_mode is not FIN_DEG then in response drv_mode changes to ACC eventually. | | Guarantee 2| Whenever V2F_F changes to true while all of the following conditions hold: - V2L_F is true - drv_mode is not FIN_DEG then in response drv_mode changes to ACC eventually. | As a first step towards a verified degradation controller, we have implemented and automated tests based on these contracts in Simulink to successfully check the state machines against our specification. To this end, we have simulated our controller in the presence of specific failure combinations and checked whether our guarantees hold. Figure 9 gives an overview of internal failures and external events that we have used for systematic testing of failure combinations. Expressing our system behaviour with semi-formal contracts in SSPL, has eased writing proper test cases for our state machines. ![Simulink/Stateflow model used to verify against contract specification.](image) **Figure 9** Simulink/Stateflow model used to verify against contract specification. ## Conclusion & Future Work We have described a systematic design of degradation cascades for sensor and communication failures in autonomous car platoons using the autonomous model car “Velox” as example. We have modelled our resulting degradation controller in Simulink/Stateflow. For safety assurance, we have formulated contracts for each identified degradation level and used them for systematic testing. The methodology of the present work and its systematic approach is inspired by [4] and has been adapted for the platooning function. In our work, new ideas for degradation and reactions to errors have been developed and presented at a conceptual level. It can serve as a basis for further improvement, development and implementation in future work. The systematic approach presented in this paper is not restricted to autonomous platoon driving but can also be applied to other problems and different systems in general. In contrast to traditional, non-distributive systems, cooperative systems should not only deal with local failures, but also with failures of the other participants. Failures can, if possible, be transmitted via communication. However, if this is not possible due to communication failures, participants should also be able to deal with this situations and reach a functional and safe state. In future work, the degradation concept could be extended to feature additional modes allowing platoon members to autonomously determine which members are affected by malfunctions. For example, if a platoon member can only estimate its own acceleration with poor accuracy due to sensor failures, it will communicate its degradation mode to the other platoon participants. Another approach would be to define reactions beyond the consideration of individual vehicles on a platoon level. For example, if the platoon leader cannot be reached by several followers, the platoon leader could be changed, e.g. by choosing the next achievable follower as a new platoon leader. This kind of platoon management has not been systematically coped with so far and would definitely be a mandatory step for a robust and applicable platooning functionality. As a first step, we have tested our concept based on formal contract specifications. By expressing our system behaviour with semi-formal contracts in SSPL, it has already been much easier to write proper test cases for our state machines. In future work, we aim at automatically verifying our contract specification against the static system architecture using model checking. A promising candidate is the model checking tool OCRA\textsuperscript{4} as it already supports this type of contract verification. We are currently developing a translation from SSPL to Othello, the contract specification language supported by OCRA. With an automatic translation, the engineers will not have to cope with difficult expressions in temporal logic but can rather use our template approach to specify and verify their systems. --- References 1. Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. *ACM Computing Surveys (CSUR)*, 51(4):76, 2018. 2. Markus Grabowski, Bernhard Kaiser, and Yu Bai. Systematic Refinement of CPS Requirements using SysML, Template Language and Contracts. In Ina Schaefer, Dimitris Karagiannis, Andreas Vogelsang, Daniel Méndez, and Christoph Seidl, editors, *Modellierung 2018*, pages 245–260, Bonn, 2018. Gesellschaft für Informatik e.V. 3. ISO. ISO 26262 Road vehicles - Functional safety. Standard, International Organization for Standardization, 2011. In several parts: 1: Vocabulary, 2: Management of functional safety, 3: Concept phase, 4: Product development at the system level, 5: Product development at the hardware level, 6: Product development at the software level, 7: Production and operation, 8: Supporting processes, 9: Automotive Safety Integrity Level (ASIL)-oriented and safety-oriented analyses, 10: Guideline on ISO 26262. \textsuperscript{4} Othello Contracts Refinement Analysis, \url{https://ocra.fbk.eu/} B Kaiser, B Monajemi Nejad, D Kusche, and H Schulte. Systematic design and validation of degradation cascades for safety-relevant systems. In *Annual European Safety and Reliability Conference ESREL*, 2017. Bernhard Kaiser, Raphael Weber, Markus Oertel, Eckard Böde, Behrang Monajemi Nejad, and Justyna Zander. Contract-based design of embedded systems integrating nominal behavior and safety. *Complex Systems Informatics and Modeling Quarterly*, 4:66–91, 2015. Jeroen Ploeg, Elham Semsar-Kazerooni, Guido Lijster, Nathan van de Wouw, and Henk Nijmeijer. Graceful degradation of CACC performance subject to unreliable wireless communication. In *16th International IEEE Conference on Intelligent Transportation Systems (ITSC)*, pages 1210–1216. IEEE, 2013. Rajesh Rajamani, Adam S Howell, Chieh Chen, J Karl Hedrick, and Masayoshi Tomizuka. A complete fault diagnostic system for automated vehicles operating in a platoon. *IEEE Transactions on Control Systems Technology*, 9(4):553–564, 2001. SAE International. *Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems*. January 2014. doi:10.4271/J3016_201401. Irfan Sijivo, Barbara Gallina, and Bernhard Kaiser. Assuring degradation cascades of car platoons via contracts. In *International Conference on Computer Safety, Reliability, and Security*, pages 317–329. Springer, 2017. Feasibility Study and Benchmarking of Embedded MPC for Vehicle Platoons Iñaki Martín Soroa Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands firstname.lastname@example.org Amr Ibrahim Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands email@example.com Dip Goswami Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands firstname.lastname@example.org Hong Li Car Infotainment and Driving Assistance, NXP Semiconductor, Eindhoven, The Netherlands email@example.com Abstract This paper performs a feasibility analysis of deploying Model Predictive Control (MPC) for vehicle platooning on an On-Board Unit (OBU) and performance benchmarking considering interference from other (system) tasks running on an OBU. MPC is a control strategy that solves an implicit (on-line) or explicit (off-line) optimisation problem for computing the control input in every sample. OBUs have limited computational resources. The challenge is to implement an MPC algorithm on such automotive Electronic Control Units (ECUs) with an acceptable timing behavior. Moreover, we should be able to stop the execution if necessary at the cost of performance. We measured the computational capability of a unit developed by Cohda Wireless and NXP under the influence of its Operating System (OS). Next, we analysed the computational requirements of different state-of-the-art MPC algorithms by estimating their execution times. We use off-the-shelf and free automatic code generators for MPC to run a number of relevant MPC algorithms on the platform. From the results, we conclude that it is feasible to implement MPC on automotive ECUs for vehicle platooning and we further benchmark their performance in terms of MPC parameters such as prediction horizon and system dimension. 2012 ACM Subject Classification Applied computing → Command and control; Computer systems organization → Embedded systems Keywords and phrases Model predictive control, vehicle platoon, embedded implementation, code generation Digital Object Identifier 10.4230/OASIcs.ASD.2019.2 Funding This work is partially supported by the H2020 projects I-MECH (GA no. 737453) and eCPS (GA no. 674875). 1 Introduction Vehicle platooning is an application based on Cooperative Adaptive Cruise Control (CACC) technology, which is an extension of Adaptive Cruise Control (ACC). In ACC, the vehicle senses the position of the preceding vehicle and adapts the speed to avoid a collision. CACC introduces V2V messages between different vehicles. These messages have much richer information including position, speed, acceleration or road intersection status among others. The richer information allows the vehicles to react faster to sudden changes in the preceding... vehicles and therefore, the distance between the vehicles can be reduced which enables to achieve better fuel efficiency and road capacity [21]. Model Predictive Control (MPC) is an optimal control strategy capable of satisfying constraints on the states of the system (plant) and the control input. The main challenge of MPC is its high computational requirements since it requires to solve an optimisation problem at every time step (sample) [7]. The MPC technology is extensively used in the chemical industry where the dynamics is generally slower. With the advent of powerful computing abilities of modern processors, MPC is making its way into other sectors such as the automotive industry [10]. One of the applications of MPC in the automotive industry is vehicle platooning. MPC has already been applied to vehicle platooning without explicitly considering constraints on the computational resources and the V2V communication time that is present in a real implementation [6]. In a real implementation, the ECU of a vehicle, which is an embedded device with limited resources, needs to solve the MPC optimization fast enough to meet the timing requirements imposed by the V2V communication. MPC has already been implemented on embedded platforms successfully for different applications. In [31] the authors use a simple embedded device with an ARM processor running at 48MHz with 64kB of RAM memory. They control a system consisting of 8 states, 2 inputs and a control horizon of length 20 achieving a sampling period of 4ms. In [31], Fast Gradient Method algorithm (FGM) was used with fixed point operations and a tuned level of sub-optimality specific for the plant. When using floating point operations and decreasing the control horizon length to 15, it achieves a sampling time of 8ms. In [9], the authors achieved a sampling frequency in the kHz range using a processor with a clock frequency of 1GHz with a dedicated floating point unit. When controlling a larger system they manage to reach a sampling time of 13ms. A number of works approached the embedded MPC problem using hardware accelerators [5] [28] [25] [17] [14] [22] usually on a Field Programmable Gate Array (FPGA). These works attempt to achieve sampling rates in the kHz range or control very large systems, while the vehicle platooning problem does not require very short sampling times nor large predictive models. In order to solve the MPC optimisation problem an algorithm needs to be used. There are mainly two categories of MPC algorithms – explicit and implicit. In explicit MPC the solution is computed off-line and given to the controller as a look up table which usually requires large memory capacity. In implicit MPC the solution is computed on-line at each sampling period [1]. In this paper we focus on implicit MPC. Implicit MPC is the most commonly used method and there are a number well-developed state-of-the-art algorithms. Almost all of them can be classified in one of the following categories – Inner Point Method (IPM) [16], Active Set Method (ASM) [8], and (Fast) Gradient Method ((F)GM) [17] [3]. We analysed the feasibility of these algorithms with a special focus on FGM. In order to determine if it is feasible to implement MPC for vehicle platooning on an embedded device, timing constraints must be met. The MPC algorithm needs to be able to compute the solution fast enough for a problem with similar dimensions and constraints as in vehicle platooning, described below (Section 4.2). The time available for the execution of the MPC task depends on the message rate (or sampling rate) supported by the V2V communication and the execution time of the other tasks running on the device. Ideally the execution time would be deterministic or bounded, which can be achieved for some of the state-of-the-art algorithms. We also analyse the trade-off that needs to be made to balance the control performance and the execution time of the MPC task. We investigate the impact of the length of the control horizon (used in the MPC optimization) on the execution time, the effect of the algorithm choice and provide a number of guidelines for choosing the processor. The rest of the paper is organised as follows. We describe the problem of vehicle platooning in Section 2. In Section 3, we analyse the characteristics and the performance of a platform suitable for being used for vehicle platooning. Next, we describe a possible implementation for vehicle platooning and we measure the overhead introduced by the other tasks that need to run on the selected platform in Section 4. We investigate a number of automatic C code generation tools available for MPC in Section 5. We analyse the computational requirements of different MPC algorithms in Section 6. Using the computational requirements of different algorithms and the performance of the platform, we provide an analytical estimation of the execution time on the selected platform in Section 7.1. We use the code generation tools to run a number of template MPC algorithms on the V2V wireless node in Section 7.2. Using the experimental and the analytical execution times we estimate the possible delays and sampling periods that can be achieved using MPC and the trade-offs that can be made, in Section 7.3. Finally we conclude in Section 8. 2 Vehicle platoons 2.1 V2V Communication and topology The vehicle-to-vehicle communication (V2V) is performed following the standards of each country, most notably the standard of the EU, ETSI-ITS, and the standard of the USA, 1609 WAVE. Both standards are based on the IEEE 802.11p protocol stack. Under IEEE 802.11p, we can reach up to 10Hz message rate when the network usage is below 70%. The message rate can get as low as 1Hz under heavy traffic of vehicles with V2V communication devices [13]. In this paper we consider the Predecessor-Follower (PF) topology, where each vehicle receives messages from its predecessor (Fig. 1). Other topologies exist, such as Two-Predecessor-Follower (TPF) [30] and Leader-Predecessor-Follower (LPF) [30]. In Fig. 1, $m_i$ is the message from the vehicle $i$ including its speed, position and acceleration, and $\Delta d_i$ is the error in distance (desired gap - actual gap) between the vehicles $i$ and $i-1$. ![Figure 1](image.png) **Figure 1** Predecessor-Follower topology. 2.2 Platoon model The platoon model is distributed, each vehicle has a model of itself (vehicle model) and its relation with its predecessor (inter-vehicle dynamics). The model of the vehicle $i$ is obtained combining a simplified model of the longitudinal dynamics of the vehicle with the dynamics of a DC motor [27, 26], and it is given by: $$\dot{x}_v^i = A_v^i x_v^i + B_v^i u_v^i \quad (1)$$ where $A_v^i$ and $B_v^i$ are the state and input matrices respectively, $u_v^i$ is the duty cycle of the input of the motor and $x_v^i = [a^i \quad \dot{a}^i]^T$ is the state vector. Where $a^i$ and $\dot{a}^i$ are the acceleration and the rate of change of the acceleration of the vehicle $i$, respectively. Moreover, the state matrix $A_v^i$ and the input vector $B_v^i$ of vehicle $i$ are defined as: $$ A_v^i = \begin{pmatrix} 0 & 1 \\ -\frac{1}{\tau v} & -\left(\frac{\sigma^i + \tau_{ch}^i}{\tau v}\right) \end{pmatrix} \in \mathbb{R}^{2 \times 2}, \quad B_v^i = \begin{pmatrix} 0 \\ K^i K_{ch}^i \end{pmatrix} \in \mathbb{R}^{2 \times 1}. $$ where $\tau^i$, $\tau_{ch}^i$, $K^i$, $K_{ch}^i$ are model parameters of the vehicle $i$. To obtain the platoon model under the PF topology, the inter-vehicle dynamics relate the vehicle $i$ to the vehicle $i - 1$. This is done by adding two new states, $\Delta v^i$ and $\Delta d^i$, which represent the speed difference and the gap error between the vehicles, respectively. They are defined as $\Delta d^i = d^i - d_{des}^i$ and $\Delta v^i = v^{i-1} - v^i$, where $\Delta d^i$ is the error between the actual gap ($d^i$) and the desired inter-vehicle gap ($d_{des}^i$) between the vehicle $i$ and the vehicle $i - 1$. $\Delta v^i$ is the velocity error between the vehicle $i$ and the vehicle $i - 1$, where $v^i$ denote for the velocity of the vehicle $i$. $d^i$ and $d_{des}^i$ are defined as $d_{des}^i = d_0 + \tau_h v^i$ and $d^i = q^{i-1} - q^i - L^i$, where $d_0$ is the gap between vehicles at standstill, $\tau_h$ is the constant headway time (the time the vehicle $i$ needs to reach the position of the vehicle $i - 1$ when $d_0 = 0$). $L^i$, $q^i$ are the length and position of the vehicle $i$, respectively. Combining the vehicle model with the inter-vehicle dynamics we obtain the platoon model: $$ \dot{x}_p^i = A_p^i x_p^i + B_p^i u_p^i + G_p^i a^{i-1} $$ (2) where $x_p^i = [a^i \quad \dot{a}^i \quad \Delta d^i \quad \Delta v^i]$ is the state vector, $a^{i-1}$ is the acceleration of the preceding vehicle and $A_p^i$ is the state matrix. The predictive model used for MPC will be obtained based on the platoon model in Eq.(2) (see Section 4.2). 3 Embedded platform: Cohda Wireless MK5 OBU The Cohda Wireless MK5 is a platform developed by Cohda Wireless in partnership with NXP. It has been developed as a prototyping platform for V2V applications, such as CACC, and other Vehicle to Everything (V2X) applications. 3.1 Hardware The platform has one main processor, NXP i.MX6 Dual Lite @ 800MHz (dual-core processor), paired with a communications co-processor, NXP MARS. It is equipped with 1GB of volatile memory. With a large volatile memory, memory is not a bottleneck and we are interested only in the computational power. The platform has several ports and connectivity options. It can be connected to two 5.9GHz antennas, a GNSS antenna, µSD card, Ethernet port, CAN bus port and audio jack. On top of that it has a DC power connection. 3.2 Software The platform uses an Ubuntu distribution of Linux as its Operating System (OS). It is not a Real-Time OS (RTOS). There are system applications available on the platform. The most relevant are the communication stacks of the EU and the USA standards. We also use the evaluation platform reported in [30] and available in [29], which allows to quickly measure the string stability of the platoon and takes care of all the tasks required to execute CACC in a modular approach. The structure of this evaluation platform is further detailed in Section 4. 3.3 Performance evaluation The performance is measured in millions of floating point operations per second (Mflop/s) and millions of fixed point operations per second (Mop/s). We evaluate the average performance and its distribution in percentiles. The type of operations measured are fixed point and floating point additions, and fixed point and floating point multiplications. Most MPC algorithms use only these operations. In Table 1, the performance of the platform is shown. Table 1: Performance of the Cohda Wireless MK5 platform. | | Fixed point addition | Fixed point multiplication | Floating point addition | Floating point multiplication | |------------------|----------------------|----------------------------|-------------------------|------------------------------| | Fastest | 230.1 Mop/s | 214.0 Mop/s | 113.0 Mflop/s | 88.2 Mflop/s | | 95th percentile* | 214.0 Mop/s | 200.0 Mop/s | 113.0 Mflop/s | 88.2 Mflop/s | | Average | 174.0 Mop/s | 156.0 Mop/s | 112.0 Mflop/s | 60.0 Mflop/s | | 5th percentile* | 200.0 Mop/s | 150.0 Mop/s | 103.0 Mflop/s | 78.9 Mflop/s | | 1st percentile* | 107.0 Mop/s | 88.2 Mop/s | 50.8 Mflop/s | 47.6 Mflop/s | *The $k$th percentile is the number larger than $k\%$ of the measurements. We use an internal timer for the measurement which runs at a frequency of 1MHz, while the processor runs at 800MHz. Therefore the accuracy of our measurement is within 800 clock cycles. The first test uses a large number of operations in a loop. We used $8 \times 10^9$, $4 \times 10^9$ and $2 \times 10^9$ operations for each of the measured types. The different number of operations allows us to confirm that the execution time is linear to the number of operations. These measurements give us a notion of the average performance of the system. As our system does not use a RTOS, during the time that the test executes (over 4 minutes in some cases) there are other tasks preempting the test. In order to measure the variability of the performance we designed a second test. In this test we measure the time needed to perform 3000 operations, and the measurement is repeated for 1 million times. We search for the fastest iteration and the 1st, 5th and 95th percentile. If performance requirement is higher, the device can be overclocked to reach 1GHz, and some secondary OS tasks such as Bluetooth can be shut down to remove their influence. 4 Overall architecture In the Fig. 2 we can see a diagram showing how the system works. We use the platform in [30], with the MPC design in [15]. As we will use the PF strategy for the communication, the leader sends its state to the first vehicle, and the vehicle $i$ sends its state to the vehicle $i + 1$. In a real environment, the leader vehicle would be driven by a human driver, and the commands control the real vehicle. In a simulation we create a profile for the acceleration commands and actuate the model of the vehicle. The vehicle $i$ receives the state from the vehicle $i - 1$ and uses $a^{i-1}$ and $x_p^i$ as inputs for the MPC controller (the upper layer), which computes the desired acceleration. The desired acceleration is used by the lower layer as reference value and outputs the duty cycle of the input to the motor, which controls the vehicle. The state of the vehicle (sensed or simulated) is given as an input to the two controllers and it is also sent to the next vehicle. 4.1 Lower layer controller The lower layer controller is a state-feedback controller and it runs at a faster rate than the upper layer with a sampling rate of 2ms [15]. The output of this controller is the motor duty cycle which controls the vehicle. 4.2 MPC: Upper layer controller In MPC we solve an optimisation problem by defining the following quadratic cost function subject to specific constraints on inputs and states: \[ J = x_{N+k|k}^T P x_{N+k|k} + \sum_{j=0}^{N-1} (x_{j+k|k}^T Q x_{j+k|k} + u_{j+k|k}^T R u_{j+k|k}) \] subject to \[ x_{j+k+1|k} = \Phi^i x_{j+k|k} + \Gamma^i u_{j+k|k} + \Psi^i a_{j+k|k}^{-1}, \quad j = 0, ..., N - 1 \] \[ x_{\text{min}} \leq x_{j+k|k} \leq x_{\text{max}}, \quad j = 1, ..., N \] \[ u_{\text{min}} \leq u_{j+k|k} \leq u_{\text{max}}, \quad j = 1, ..., N \] (3) where \( J \) is the cost function, \( N \) is the length of the control horizon, \( x_{j+k|k}^i \) is the predicted state vector of vehicle \( i \) after \( j \) steps computed at time \( k \), where \( x_{j|k}^i \) is the sensed state of vehicle \( i \). \( u_{j+k|k}^i \) is the computed input vector for the vehicle \( i \) for the \( j \) step, and \( Q, R \) and \( P \) are the weight matrices. It should be noted that a quadratic cost function is chosen so that the problem is convex and a global minimum can be found. In order to use MPC we must discretize the platoon model in Eq. (2) using Zero-Order Hold (ZOH). After the discretization, the predictive model for vehicle \( i \) becomes: \[ x_{j+k+1|k}^i = \Phi^i x_{j+k|k}^i + \Gamma^i u_{j+k|k}^i + \Psi^i a_{j+k|k}^{-1}, \quad j = 0, ..., N - 1 \] (4) where \( x_{j+k|k}^i = [a_{j+k|k}^i \quad \delta a_{j+k|k}^i \quad \Delta a_{j+k|k}^i \quad \Delta^2 a_{j+k|k}^i] \) represent the predicted states. \( u_{j+k|k}^i \) is the desired acceleration (the optimal control inputs that must be computed). \( a_{j+k|k}^{-1} \) is the predicted acceleration of the preceding vehicle. We consider that the future evolution of the acceleration of the preceding vehicle is constant. Therefore, it does not affect the optimisation process. The predictive model has 4 states and 1 input variable. Each of the states and the desired acceleration (\( u^i \)) have an upper and a lower bound. Therefore we have 10 constraints. The upper layer uses MPC. It receives the current state of the vehicle and the state of the preceding vehicle, and gives the lower layer a new acceleration reference. The upper layer runs with a sampling time of 100ms since the maximum message rate is 10Hz. At every sample in which a new message has been received, the MPC controller computes an optimal series of future N inputs (N is the horizon length). When the message rate is lower than the sampling rate, the MPC controller automatically updates the desired acceleration using the next value of the optimal series of inputs that were computed in the last sample in which a message had been received. As the message rate can drop to 1Hz, we need the length of the control horizon to be at least 10 while a higher N could improve the quality of the control. We consider $10 \leq N \leq 20$. ### 4.3 Execution time budget for MPC In this section, we compute the maximum available execution time for the MPC algorithm considering a message rate of 10Hz. That is, the time available to execute the MPC algorithm after performing all the other system tasks – see Fig. 3. The platform needs to send and receive messages (communication task), and compute the result of the lower layer and upper layer controllers. The upper layer also has some overhead besides the MPC algorithm such as updating the value of some pointers and variables like the desired acceleration. Fig. 5 shows the tasks performed by each piece of hardware. The MARS co-processor sends and receives packages. The main processor creates the packages that need to be sent, processes the received packages, and executes the upper and lower layer controllers. ![Figure 3](image) **Figure 3** Execution time requirement when running on a single core. In order to measure the contribution of each task to the total execution time, we use the platform developed in [29] which uses a PID controller for the upper layer and a state-feedback controller for the lower layer. We removed the logging functions and the PID controller, so that we get a minimal version of the platform, and added time stamps to analyse the latency of each task. Furthermore, we have modified the platform so that the tasks in the main processor are scheduled using POSIX threads with a Fixed-Priority Preemptive Scheduler (FPPS). For tasks with equal priority it follows a First In, First Out (FIFO) schedule. The OS has the highest priority, the lower layer and the (de)packetizing tasks are given an equal medium priority, while the upper layer has the lowest priority. The processor has two cores, making it possible to process two different tasks (threads) simultaneously. The kernel distributes the different tasks (including the OS tasks) between the 2 cores dynamically. In Fig. 4 we can observe the expected execution of the tasks in the absence of OS tasks. The lower layer is represented at a lower frequency that the frequency implemented. The results are shown in Table 2. We are mainly concerned about the tasks shown in Fig. 3. We present the measured maximum and average latencies after 100 runs and the execution frequency, i.e. how often does that task have to execute. Table 2 Latency of other tasks that run on the platform. | Task | Maximum latency | Average latency | Execution frequency | |-----------------------------|-----------------|-----------------|---------------------| | Lower layer controller | 0.045ms | 0.0151ms | 500Hz | | Upper layer controller | 0.059ms | 0.0126ms | 10Hz | | Communication tasks | 1.063ms | 0.3611ms | ≤ 10Hz | With the results in Table 2 we can obtain the execution time budget for the MPC task. In 100ms we need to perform the lower layer controller task 50 times \(\left(\frac{500Hz}{10Hz}\right)\), and the communication and the upper layer controller tasks only once. We used the worst case latencies to compute the execution time available for the MPC algorithm in the worst case. The worst case latencies will occur when the OS tasks are running on both cores of the processor; therefore for the worst case analysis we assume that there is only one core available for all the tasks. \(e_{MPC}, e_{Comm}, e_{Ovh}\) and \(e_{LL}\) denote the maximum latency of the MPC task, the communications tasks, the overhead of the high level controller and the low level controller respectively. \[ e_{MPC} \leq 100ms - (e_{Comm} + e_{Ovh} + 50e_{LL}) = 96.628ms \] (5) From the above experiments, we conclude that the effects of other tasks are almost negligible and we obtained an upper bound for the execution time. How to respect this requirement is analysed in Section 6. The quality of the control is affected by the sensor-to-actuator delay. Therefore, the execution time should be as short as possible. ## Automatic C code generation for MPC In order to facilitate implementing MPC algorithms on embedded platforms, automatic C code generators are developed. These tools take a description of the desired MPC problem and generate the necessary C code to solve it with a given optimisation algorithm. Code generators are used academically and in the industry [4]. There are many tools available. Some of them are commercial (paid) tools, e.g., ODYS [24] or FORCES [11] while others (e.g., µAO-MPC[32], CVXGEN [20], FiOrdOs [12], jMPC [2]) are free. We used CVXGEN, µAO-MPC and FiOrdOs in this paper since they are free and they allow to stop executions providing a sub-optimal solution. - **CVXGEN** has been developed in the University of Stanford. It allows to describe an optimisation problem in general terms, the problem description includes the dimensions of the different matrices and vectors, and some properties such as being positively definite, or diagonal. It does not need the exact values of each entry of the matrices. The algorithm used is based on CVX, a solver for MATLAB. The tool is online based and free for academic use [20]. Figure 6 Number of iterations as a function of the number of variables ($n_v$) and constraints ($m_c$), reproduced from [19]. - **μAO-MPC** has been developed in the Otto von Guericke University of Magdeburg. This tool is a very similar to CVXGEN in its usage and flexibility. It uses a FGM algorithm for obtaining the solution. The tool can be downloaded for free and it works using Python, which is also a free tool [32]. - **FiOrdOs** has been developed in ETH Zurich. This tool requires a full description of the problem, with all the entries of the matrices before it can generate the code. It uses a FGM algorithm. The tool is a free toolbox for MATLAB [12]. ## 6 MPC algorithms and computational requirements In order to estimate the execution time of different algorithms, we need to know their complexity. The number of computations per iteration is deterministic in most algorithms, but the number of iterations depends on the convergence speed of the problem and the initial conditions making the total execution time unpredictable.\(^1\) - **IPM** reaches the solution in steps towards solving the Karush-Kuhn-Tucker equations, making few but computationally heavy iterations [19]. For IPM we used the estimate of the number of flops shown in [19] which is also shown in Table 3. We use the Gauss-Jordan elimination with pivoting method for solving the linear systems using the estimate given in [19]. We assumed that division operations are equivalent to 10 multiplications. For the number of iterations, we took an approximate value based on Fig. 6, reproduced from [19], with 13 iterations. - **ASM** tries to guess the constraints that are active in the solution (Active Set) and does it by adding the constraints one by one on every iteration [19]. For ASM we use the estimate of the number of flops found in [19]. We made the same choices as for IPM. For the number of iterations, we can find a direct linear relationship between the number of decision variables, $n_v$, and the number of iterations when looking at Fig. 6, see Table 3. - **GM** computes the gradient of the cost function in the current point and next, it moves one step in that direction. It repeats the process until it finds the minimum. In the fast variants, FGM, a sub-optimal solution is accepted as a trade-off for a faster computation time. An important advantage of FGM is that it can give an output at any point in time, making it possible to bound the execution time. These methods require the cost function to be quadratic [17] [3]. --- \(^1\) In [23] an upper bound for the number of iterations of some algorithms is found. However, it requires knowledge of the exact values of the predictive model and the bound is significantly larger than the observed number of iterations [31]. For FGM we use the estimations provided in [18], which analyses several different FGM algorithms. It analyses Bemporad’s and Richter’s algorithms, each of them with 2 alternative formulations, which give different computational requirements. The equations used can be seen in Table 3. These estimates don’t specify the type of operations. We assume that 50 iterations are needed, based on the experiments performed in [18], but those values are based on a different problem than the one used in [19], therefore they might not be comparable. Table 3 Formulas used to compute the number of flops [8] [19] [18]. | Algorithm | Flops per iteration | Number of iterations | |----------------------------|--------------------------------------------------------------------------------------|----------------------| | IPM | $2n_c^2(n_c + 1) + n_c(7n_c + 2) + 14n_c + 1 + Mq(n_c) + Mm(n_c) + 10(3n_c + 1 + Md(n_c))$ | 13 | | ASM | $2n_c^2 + 2n_c(2n_c + 1) - n_c + Ma(n_c + 0.5n_c) + Mm(0.5n_c + n_c) + 10(n_c + Md(n_c + 0.5n_c))$ | $2.5 \times n_v$ | | Bemporad’s FGM u-formulation | $N^2n_u(2n_u + 3n_y + 3n_x)$ | 50 | | Bemporad’s FGM xu-formulation | $N(4n_x^2 + 6n_xn_u) + 6N(N_x + n_y)(n_x + n_u) + 4Nn_u(n_x + n_u)$ | 50 | | Richter’s FGM uy-formulation | $2N^2(n_y^2 + n_yn_u)$ | 50 | | Richter’s FGM xuy-formulation | $2N(n_y + n_x)(5n_x + 2n_u + n_y)$ | 50 | In Table 3 the new variables have the following meaning: - $n_x$: Number of states of the plant model, in this case 4. - $n_y$: Number of outputs of the plant model, in this case 1. - $n_u$: Number of inputs of the plant model, in this case 1. - $n_c$: Number of inequality constraints, in this case 10. - $n_t$: Parameter computed as $n_t = n_u + n_y + n_x$ - $n_p$: Parameter computed as $n_p = N \cdot n_u$ - $Ma(x)$: Number of additions needed to solve the linear system of equations, computed as $Ma(x) = 0.5(x - 1)x(x + 1)$ when using Gauss-Jordan elimination. - $Mm(x)$: Number of multiplications needed to solve the linear system of equations, computed as $Mm(x) = 0.5x^2(x + 1)$ when using Gauss-Jordan elimination. - $Md(x)$: Number of divisions needed to solve the linear system of equations, computed as $Md(x) = x$ when using Gauss-Jordan elimination. The effect of varying the control horizon length for a system with 4 states, 1 input, 1 output and 10 inequality constraints can be seen in Fig. 7. We can observe that the complexity of some algorithms grows exponentially while in others it grows linearly. Depending on the control horizon chosen for the application, different algorithms are recommendable. 7 Performance analysis 7.1 Estimated execution time Using the specifications of the predictive model and the constraints in Section 4.2, taking $N = 15$, and the formulas given in Table 3, we can obtain the number of operations needed to solve MPC for vehicle platooning. Combining them with the performance of the device (Table 1) we can estimate the execution time for each algorithm. Figure 7 Effect of varying the length of the control horizon. Total number of flops Table 4 Execution time estimation for different algorithms for the model described in Section 4.2 and $N = 15$. | | Per iteration | | Total | |----------------------|---------------|----------------------|----------------| | | Flops | Time [ms] (multiplications$^1$) | Time [ms] (mixed$^2$) | Flops | Time [ms] (multiplications$^1$) | Time [ms] (mixed$^2$) | | ASM | $9.56 \times 10^3$ | 0.1593 | 0.1112 | $35.85 \times 10^4$ | 5.9750 | 4.1686 | | Bemporal’s FGM u-formulation | $9.9 \times 10^3$ | 0.1650 | 0.1151 | $49.5 \times 10^4$ | 8.2500 | 5.7558 | | Bemporal’s FGM xu-formulation | $7.92 \times 10^3$ | 0.1320 | 0.0921 | $39.6 \times 10^4$ | 6.6000 | 4.6047 | | IPM | $10.11 \times 10^3$ | 0.1685 | 0.1176 | $13.14 \times 10^4$ | 2.1907 | 1.5284 | | Richter’s FGM uy-formulation | $9 \times 10^3$ | 0.1500 | 0.1047 | $45 \times 10^4$ | 7.5000 | 5.2326 | | Richter’s FGM xy-formulation | $6.24 \times 10^3$ | 0.1040 | 0.0726 | $31.2 \times 10^4$ | 5.2000 | 3.6279 | $^1$ This measurement assumes that all the operations are multiplications. $^2$ This measurement assumes that half of the operations are additions and the other half multiplications. In Table 4 we show the number of operations and execution time in total and per iteration for all the considered algorithms. Two different execution times are given, one under the assumption that all the operations are multiplications and the other assuming mixed operations, i.e. half of the operations are additions and the other half are multiplications. 7.2 Code generation experiments The theoretical estimations can be too optimistic, as they assume that the data is always available, which is equivalent to having a infinitely fast memory. Using the code generation tools described in Section 5 we run an experiment (Appendix A) on the Coehda platform, obtaining a real execution time. The three algorithms are considered. We use approaches based on several iterations and sub-optimality levels. Each algorithm converges to the solution at a different speed. Therefore they need a different number of iterations. We determined the number of iterations as the minimum necessary to reach a value within 0.001 units of the solution for a very large number of iterations, which is assumed to be the optimal solution. This is equivalent to an error smaller that 1% in the problem used (Appendix A). For CVXGEN the number of iterations varied with the control horizon length, being 63 for $N=10$, 56 for $N=15$ and 59 for $N=20$. $\mu$AO-MPC and FiOrdOs use a dual approach, with an inner and outer loop. For $\mu$AO-MPC we needed 30 iterations for the inner loop and 30 for the outer loop. For FiOrdOs the number of iterations of the inner loop is 1, and 125 for the outer loop for all the horizons. The time displayed in Table 5 is the average between 100 solutions. We expect that the number of iterations needed to solve the vehicle platooning problem will be comparable to the number of iterations used in this problem. Table 5 Execution time of different automatic code generation tools for different control horizon lengths. | Horizon length | CVXGEN | μAO-MPC | FiOrdOs | |----------------|----------|---------|---------| | \(N=10\) | 15.52 ms | 106.150 ms | 32.286 ms | | \(N=15\) | 26.02 ms | 211.526 ms | 73.632 ms | | \(N=20\) | 45.35 ms | 358.030 ms | 125.968 ms | 7.3 Feasibility analysis Following the execution diagram in Fig. 4, the delay from the sampling instant until the new control input is computed, depends on the execution times of the upper layer and the communication tasks. The execution time is variable due to the OS, making it impossible to obtain an exact value. We approximate it as: \[ \text{delay} \approx \tau_{MPC} + \tau_{Comm} + \tau_{Ovh} \] where \( \tau_{MPC}, \tau_{Comm} \) and \( \tau_{Ovh} \) are the average execution time of the MPC task, the communication task and the overhead of the upper layer, respectively. Under the selected communication protocol, there is no use on having a faster sampling rate than 10Hz, but other communication protocols could be used. Therefore we will compute the maximum achievable sampling rate as the inverse of the delay. We consider that it is feasible to use an algorithm if its execution time is below the budget computed in Section 4.3. Looking at the theoretical estimates, the execution time of IPM is the shortest, while the shortest FGM algorithm is Richter’s algorithm using the xuy-formulation. For the FGM algorithms we don’t know the type of operations. Therefore, we use the estimate in the case that all the operations are multiplications. For IPM the number of multiplications and additions are very similar [19] and we use the mixed estimation. When considering the experimental execution times, the best results are for CVXGEN for all the tested horizon lengths. In Table 6 we present the results for the selected algorithms allowing us to make the following observations. First, there is a significant difference in the execution time when using different algorithms or different control horizon lengths. Second, the delay is almost equal to the execution time of the MPC algorithm. Finally, all the selected algorithms are feasible to be used for this problem. 7.4 Trade-off analysis From the complexity of the different algorithms (Section 6) we observe that the size of the predictive model and the length of the control horizon have a big impact on the complexity of the algorithm. Generally a longer control horizon length and a more accurate predictive model (which usually results in a larger model) give a better control performance, but the improvement might not be sufficient to overcome the negative effects of increasing the sensor-to-actuator delay and reducing the sampling rate. When choosing hardware for MPC applications, the variability in the execution time must be taken into account. In all the implicit MPC algorithms the number of iterations varies depending on the initial conditions (making the total execution time vary), therefore it is not Table 6 Feasibility analysis, execution time, delay and the maximum sampling period for the selected algorithms. | Algorithm | Execution time (ms) | Delay (ms) | Maximum sampling period (Hz) | Feasible | |------------------------------------------------|---------------------|------------|------------------------------|----------| | IPM $N = 15$ | 1.5284 | 1.9021 | 526 | Yes | | Richter’s FGM xuy-formulation $N = 15$ | 5.2000 | 5.5737 | 179 | Yes | | CVXGEN $N = 10$ | 15.5200 | 15.8937 | 63 | Yes | | CVXGEN $N = 15$ | 26.0200 | 26.6368 | 38 | Yes | | CVXGEN $N = 20$ | 45.3500 | 46.1027 | 22 | Yes | enough to select a processor capable of meeting the timing constraints for the average case. The processor depends on the requirements of the application, i.e. the MPC algorithm must be guaranteed to execute within the timing constraints 90% of the times. To provide such guarantees, it is required to perform multiple experiments under different initial conditions and obtain a probabilistic distribution of the execution time. Finally, the MPC task can be parallelized when running on a multi-core processor. This can improve the execution time of MPC but it must be done ensuring that the task in charge of receiving new messages is able to run. Every received message needs to be processed and it must be recalled that every vehicle broadcasts several messages per second, making it possible to receive several hundreds of messages per second when there is traffic. 8 Conclusion In this paper we analysed the feasibility of employing embedded MPC for vehicle platooning and provided an overview of the trade-offs that can be done. We obtained a bound for the maximum execution time admissible when taking into consideration the other system tasks that run on the platform. We have shown that it is feasible in two different ways. First, we analysed the computational complexity of different MPC algorithms and compared it to the performance of the device, obtaining a theoretical execution time. Second, we used automatic C code generation tools to measure the real execution time of MPC algorithms for different control horizon lengths. We compared the execution times to the execution time bounds, showing that it is feasible to use embedded MPC for vehicle platooning. In this process, we have benchmarked the performance of various MPC algorithms with respect to parameters such as the horizon length and the number of the states. References [1] Alessandro Alessio and Alberto Bemporad. A Survey on Explicit Model Predictive Control. In *Nonlinear Model Predictive Control, LNCIS 384*, pages 345–369. Springer-Verlag, Berlin Heidelberg, 2009. [2] Auckland University of Technology. jMPC Toolbox. URL: http://www.i2c2.aut.ac.nz/Resources/Software/jMPCtoolbox.html. [3] Alberto Bemporad and Panagiotis Patrinos. Simple and Certifiable Quadratic Programming Algorithms for Embedded Linear Model Predictive Control. *IFAC Proceedings Volumes*, 45(17):14–20, 2012. [4] Daniele Bernardini. ODYS and GM bring online MPC to production! | ODYS. URL: http://www.odys.it/odys-and-gm-bring-online-mpc-to-production/. L.G. Bleris, P.D. Vouzis, M.G. Arnold, and M.V. Kothare. A co-processor FPGA platform for the implementation of real-time model predictive control. In *American Control Conference (ACC)*, pages 1912–1917, 2006. Catalin Braescu, Razvan C. Rafaila, Alexandru Tiganasu, Anca Maxim, and Constantin F. Caruntu. Distributed model predictive control algorithm for vehicle platooning. *International Conference on System Theory, Control and Computing (ICSTCC)*, pages 657–662, 2016. Eduardo F. Camacho and Carlos Bordons Alba. *Model Predictive Control*. Springer-Verlag London, London, 2007. Gionata Cimini and Alberto Bemporad. Exact Complexity Certification of Active-Set Methods for Quadratic Programming. *IEEE Transactions on Automatic Control*, 62(12):6094–6109, 2017. J Currie, A Prince-Pike, and D I Wilson. Auto-code generation for fast embedded Model Predictive Controllers. *International Conference on Mechatronics and Machine Vision in Practice (M2VIP)*, pages 116–122, 2012. Alexander Domahidi, Hans Joachim Ferreau, Stefan Almer, Helfried Peyrl, and Juan Luis Jerez. Survey of industrial applications of embedded model predictive control. *European Control Conference (ECC)*, pages 601–601, 2016. Embotech. FORCES Pro code generator. URL: https://www.embotech.com/forces-pro. ETH Zurich. FiOrdOs - Code Generation for First-Order Methods. URL: http://fiordos.ethz.ch/dokuwiki/doku.php. European Telecommunications Standards Institute. Intelligent Transport Systems (ITS); Harmonized Channel Specifications for Intelligent Transport Systems operating in the 5 GHz frequency band, 2012. S. Gopi, V. M. Vaidyan, and M. V. Vaidyan. Implementation of FPGA based model predictive control for MIMO systems. In *IEEE Conference on Systems, Process Control (ICSPC)*, pages 21–24, 2013. Amr Ibrahim, Chetan Belagal Math, Dip Goswami, Twan Basten, and Hong Li. Co-simulation Framework for Control, Communication and Traffic for Vehicle Platoons. *Euromicro Conference on Digital System Design (DSD)*, pages 352–356, August 2018. Stephen J. Wright. Applying new optimization algorithms to model predictive control. *International Conference on Chemical Process Control – CPC V*, pages 147–155, 1996. Juan L Jerez, Paul J Goulart, Stefan Richter, George A Constantoudis, Eric C Kerrigan, and Manfred Morari. Embedded Predictive Control on an FPGA using the Fast Gradient Method. *European Control Conference (ECC)*, pages 3614–3620, 2013. Dimitris Konzoupis. Complexity of First-Order Methods for Fast Embedded Model Predictive Control. Master’s thesis, ETH Zurich, 2014. Mark S. K. Lau, S. P. Yue, K. V. Ling, and J. M. Maciejkowski. A comparison of interior point and active set methods for FPGA implementation of Model Predictive Control. *Proceedings of the European Control Conference*, pages 3–8, 2009. Jacob Mattingley and Stephen Boyd. CVXGEN: A code generator for embedded convex optimization. *Optimization and Engineering*, 13(1):1–27, 2012. doi:10.1007/s11081-011-9176-9. V. Milanes, S. E. Shladover, J. Spring, C. Nowakowski, H. Kawazoe, and M. Nakamura. Cooperative Adaptive Cruise Control in Real Traffic Situations. *IEEE Transactions on Intelligent Transportation Systems*, 15(1):296–305, 2014. Khalil Mohamed, Ahmed El Mahdy, and Mohamed Refai. Model Predictive Control Using FPGA. *International Journal of Control Theory and Computer Modeling*, 5(2), 2015. Yuriy Nesterov. *Introductory Lectures on Convex Optimization*, volume 87 of *Applied Optimization*. Springer US, 2004. ODYS. ODYS QP solver, 2018. URL: http://www.odys.it/qp/. Yasser Shoukry, M. Watheq El-Kharashi, and Sherif Hammad. MPC On-chip: An embedded GPC coprocessor for automotive active suspension systems. *IEEE Embedded Systems Letters*, 2(2):31–34, 2010. M Tsuji, H Takeuchi, K Oda, and M Ohba. Application of self-tuning to automotive cruise control. In *American Control Conference, 1990*, pages 1843–1848. IEEE, 1990. A Galip Ulsoy, Huei Peng, and Melih Çakmakci. *Automotive control systems*. Cambridge University Press, 2012. Adrian G Wills, Geoff Knagge, and Brett Ninness. Fast Linear Model Predictive Control Via Custom Integrated Circuit Architecture. *IEEE Transactions on control systems technology*, 20(1):59–71, 2012. Sijie Zhu. NXP Platoon Control Algorithm Evaluation Platform. URL: https://github.com/sijiezhu/NXP-Platoon-Control-Algorithms-Evaluation-Platform. Sijie Zhu. Model-in-the-loop Experiments and Analysis of Platoon Control Algorithms. Master’s thesis, Technische Universiteit Eindhoven, 2018. URL: https://research.tue.nl/en/studenttheses/model-in-the-loop-experiments-and-analysis-of-platoon-control-alg. P Zometa, M Kogel, T Faulwasser, and R Findeisen. On Time versus Space and Related Problems. In *American Control Conference (ACC)*, pages 57–64, 2012. P Zometa, M Kögel, and R Findeisen. $\mu$AO-MPC Documentation. Technical report, Otto von Guericke Universität Magdeburg, 2016. URL: http://ifatwww.et.uni-magdeburg.de/syst/research/muAO-MPC/doc/muaompc-1.0.pdf. ### Parameters used in experimental analysis \[ Q = \begin{bmatrix} 1.89 & 0 & 0 & 0 \\ 0 & 1.90 & 0 & 0 \\ 0 & 0 & 1.13 & 0 \\ 0 & 0 & 0 & 1.21 \end{bmatrix}, \quad \Gamma = \begin{bmatrix} 1.75 \\ 1.90 \\ 0.69 \\ 1.61 \end{bmatrix}, \quad x_0 = \begin{bmatrix} 0.20 \\ 0.83 \\ -0.84 \\ 0.04 \end{bmatrix}, \quad x_{max} = \begin{bmatrix} 0.61 \\ 0.52 \\ -0.55 \\ -1.10 \end{bmatrix} \] \[ P = \begin{bmatrix} 1.44 & 0 & 0 & 0 \\ 0 & 1.03 & 0 & 0 \\ 0 & 0 & 1.46 & 0 \\ 0 & 0 & 0 & 1.65 \end{bmatrix}, \quad \Phi = \begin{bmatrix} -0.88 & 0.71 & 0.36 & -1.90 \\ 0.24 & -0.96 & -0.34 & -0.87 \\ 0.77 & -0.24 & -1.37 & 0.18 \\ 1.12 & -0.77 & -1.11 & -0.45 \end{bmatrix}, \quad x_{min} = \begin{bmatrix} -1.63 \\ -100 \\ -100 \\ -100 \end{bmatrix} \] \[R = 1.05, \quad u_{max} = 1.38, \quad u_{min} = -0.49, \quad \Psi = [0 \ 0 \ 0 \ 0]\] IDF-Autoware: Integrated Development Framework for ROS-Based Self-Driving Systems Using MATLAB/Simulink Shota Tokunaga Graduate School of Engineering Science, Osaka University, Osaka, Japan Yuki Horita Hitachi, Ltd., Yokohama, Japan Yasuhiro Oda Hitachi Automotive Systems, Ltd., Hitachinaka, Japan Takuya Azumi Graduate School of Science and Engineering, Saitama University, Saitama, Japan Abstract This paper proposes an integrated development framework that enables co-simulation and operation of a Robot Operating System (ROS)-based self-driving system using MATLAB/Simulink (IDF-Autoware). The management of self-driving systems is becoming more complex as the development of self-driving technology progresses. One approach to the development of self-driving systems is the use of ROS; however, the system used in the automotive industry is typically designed using MATLAB/Simulink, which can simulate and evaluate the models used for self-driving. These models are incompatible with ROS-based systems. To allow the two to be used in tandem, it is necessary to rewrite the C++ code and incorporate them into the ROS-based system, which makes development inefficient. Therefore, the proposed framework allows models created using MATLAB/Simulink to be used in a ROS-based self-driving system, thereby improving development efficiency. Furthermore, our evaluations of the proposed framework demonstrated its practical potential. 2012 ACM Subject Classification Information systems → Open source software Keywords and phrases self-driving systems, framework, robot operating system (ROS), MATLAB/Simulink Digital Object Identifier 10.4230/OASIs.ASD.2019.3 Funding This work was partially supported by Mr. Tohru Kikawada and JST PRESTO, Japan (grant No. JPMJPR1751). Yasuhiro Oda: Presently with Hitachi Industry & Control Solutions, Ltd. 1 Introduction Self-driving systems continuously increase in complexity along with the increasing number of required functionalities. One approach to the development of complicated systems is the use of Robot Operating System (ROS) [5] [12] [13]. ROS characteristics, such as abstracting hardware and improving code reusability, make the development of such systems more efficient. A ROS-based self-driving system is Autoware [1]. Autoware is open-source software for autonomous vehicles and can be used in embedded systems, such as NVIDIA DRIVE PX2 [10] and Kalray MPPA-256 [11]. However, in the automotive industry, the design of self-driving subsystems, such as detection, planning, and control have often used MATLAB®/Simulink® [3]. The models designed using MATLAB/Simulink can not be directly linked to Autoware in the currently adopted development framework. To integrate such models into Autoware, it is necessary to generate and incorporate the associated C++ code. Although MATLAB/Simulink has a C++ code generation functionality, code corresponding to Autoware (i.e., ROS) can not be generated, thereby deteriorating development efficiency. Moreover, it is possible that a model ported to Autoware will not perform as designed because the MATLAB/Simulink environment differs from that of Autoware. To address these limitations, we propose a framework called IDF-Autoware [2] (Figure. 1) that manages models designed using MATLAB/Simulink as nodes that represent individual processes in ROS. This enables data exchange between Autoware and MATLAB/Simulink, thereby allowing the models to be used without incorporation into Autoware. To the best of our knowledge, this is the first work that co-simulation and operation of a real vehicle using MATLAB/Simulink for self-driving systems. The main contributions of this study are as follows: - We confirmed the practicality of the method by comparing the data transfer time and processing capacity of ROS and MATLAB/Simulink (Section 3.1), as well as that the nodes designed using MATLAB/Simulink could be applied to the co-simulation and operation of an autonomous vehicle; - We improved the design efficiency in MATLAB/Simulink based on IDF-Autoware generating MATLAB template scripts and Simulink template models (Section 3.2), which help a developer design nodes for Autoware using MATLAB/Simulink; - We improved usability by extending Runtime Manager, which is a graphical user interface (GUI) tool for Autoware, to enable operations for MATLAB/Simulink (Section 3.3), as well as making available the other functionalities provided by IDF-Autoware (e.g., template generation). 2 Design and Implementation The functionalities provided by IDF-Autoware facilitate the integrated development of Autoware and MATLAB/Simulink. The key functionalities are as follows (Figure. 1): - They generate MATLAB template scripts and Simulink template models, and provide visualization tools to aid template generation (Section 2.1); - They enable MATLAB/Simulink to operate on Runtime Manager, to display node information, and to make use of the other provided functionalities (Section 2.2) In this section, we discuss the design and implementation of each of these functionalities, and use cases of the proposed framework are shown. 2.1 Template Generation When MATLAB/Simulink is used to design nodes for Autoware, the nodes must contain essential information, such as a node name, the topics to publish/subscribe, and the message type of each topic. This information can be obtained by analyzing the source code of Autoware and executing ROS commands. However, the need for such analyses places a burden on developers, especially on those who are unfamiliar with ROS. Therefore, we provided functionalities that allow the generation of MATLAB template scripts and Simulink template models that include this necessary information, as the templates help developers design nodes in MATLAB/Simulink. Additionally, we made two visualization tools to aid the template generation. One is the rqt_graph_autoware plugin (Figure. 2 (b)). In addition to the functionalities of rqt_graph [7], rqt_graph_autoware can render node dependency, such as sensing, perception, decision, and planning, for Autoware applications. The other tool displays a list of the running nodes and provides information on any node selected from the list. As noted, before the template of a desired node is generated, it is necessary to obtain node information; therefore, a .yaml file containing information pertaining to all Autoware nodes was created. Based on this information, templates are created using functions provided by Robotics System Toolbox™ [4], which provides the interface between ROS and MATLAB/Simulink. Developers can create nodes for Autoware in MATLAB/Simulink using the generated template. To implement the rqt_graph_autoware plugin, we created .dot files that render node dependency graphs for each Autoware’s application. Moreover, to create the GUI for rqt_graph_autoware, we added buttons to rqt_graph using Qt designer, which is a Qt tool for designing a GUI. The buttons were configured to open each .dot file, and clicking on these buttons cause a graph to be drawn. This allows developers visualization of the nodes included in each Autoware’s application. To display node information, we used a rosnode command-line tool [6] that includes commands that fetch node information, including rosnode list and rosnode info node_name. The rosnode list command displays a list of running nodes, whereas rosnode info node_name displays information about the topics to be published/subscribed by the node. Displaying the results of these commands in Runtime Manager renders the node information easily comprehensible. Section 2.2 describes the method for displaying these results in Runtime Manager. ### 2.2 Runtime Manager for IDF-Autoware Autoware and MATLAB/Simulink are operated with different GUI tools; thus, this is troublesome for users who want to use the two simultaneously. Therefore, we added GUIs to the Autoware’s GUI tool (i.e., Runtime Manager) to allow use of MATLAB/Simulink and the functionalities provided in IDF-Autoware (Figure. 2 (c)). These GUIs enabled the following functionalities: - Starting MATLAB, Simulink, and rqt_graph_autoware; - Executing MATLAB scripts and Simulink models; - Generating MATLAB template scripts and Simulink template models; - Displaying node information. This unification of operation method simplifies the MATLAB/Simulink operation and the utilization of the provided functionalities. Runtime Manager was designed using the wxPython toolkit [9]. Therefore, we designed the GUIs for the added functionalities using wxGlade [8], and outputted its designs as wxPython. The GUIs involve buttons and panels that execute each functionality. We next modified the Runtime Manager execution code to configure them for GUI functionalities. The execution code imports modules, including the code generated by wxGlade, and loads the .yaml files. In the execution code, loading .yaml files initiates functions that align simple operations to specified buttons. Therefore, by creating a yaml file for MATLAB/Simulink, we configured the initiation of MATLAB, Simulink, and rqt_graph_autoware to each button. To allow the execution of MATLAB scripts and Simulink models from Runtime Manager, we created multiple GUIs with the following configurations: - A button to open a dialog for file selection; - A panel displaying the absolute path of the selected file; and - A button to execute the file displayed on the panel. This execution button was designed to run if the selected file was a MATLAB/Simulink file (i.e., a .m or .slx file). Table 1 Evaluation environment. | CPU | Model number | Intel Core i7-6700K | |---------|--------------|---------------------| | | Cores | 4 | | | Threads | 8 | | | Frequency | 4.00 GHz | | Memory | | 32 GB | | ROS | | Indigo | | MATLAB/Simulink | | R2016b | | OS | | Ubuntu 14.04.5 LTS | Figure 3 Measurement of transfer time. To generate MATLAB template scripts and Simulink template models, we designed the following GUIs: a panel to input the node name and buttons to run the execution code that generates the template of the input node. For the node information display, we designed two panels, with the first displaying the output of the executing rosnodes list. When a node is selected from the list, the second panel displays the output of rosnodes info the_selected_node_name, which eliminates the need to enter the rosnodes command. 2.3 Use Case IDF-Autoware allows co-simulation of Autoware and MATLAB/Simulink. The demonstration video can be viewed at the following hyperlink: https://youtu.be/X4d9VbXnPeg (Figure. 2). In this video, one of the nodes necessary for planning is executed by MATLAB/Simulink. This simulation facilitates an operational check of MATLAB/Simulink nodes. Moreover, it can also be used for experiments using an autonomous vehicle. The demonstration video showing operating of the autonomous vehicle using IDF-Autoware can be seen at the following hyperlink: https://youtu.be/wusCU2VPQQQ. 3 Evaluations The main goal of this study was to improve development efficiency. To demonstrate this improvement, the practicality of IDF-Autoware, efficiency, and usability were evaluated. To evaluate the practicality, we compared the communication times among nodes within ROS and between ROS and MATLAB/Simulink. Additionally, we performed a co-simulation and operation of an autonomous vehicle to show the practicality of the proposed framework. We investigated the design efficiency by measuring the generated MATLAB/Simulink template. To evaluate the usability, we compared the development environments with Autoware, Robotics System Toolbox, and IDF-Autoware. These evaluations demonstrated that IDF-Autoware improved the development efficiency. Table 1 summarizes the software and hardware environments used in the experiments. 3.1 Practicality IDF-Autoware enabled the communication of nodes designed using MATLAB/Simulink with Autoware nodes to improve the development efficiency. However, it was necessary to consider the effect of using Autoware with only ROS and together with MATLAB/Simulink together. Therefore, to evaluate practicality, ROS and MATLAB/Simulink were compared as follows: 1. According to the relationship between the transfer time and the data size when a message is sent via ROS and via MATLAB/Simulink, respectively; and 2. According to the processing capacity when the same type of method was used. As shown in Figure. 3, the transfer time was defined as the elapsed time when Node 1 published the message to Node 3, which subscribed the message via Node 2. The processing capacity was compared with the processing time over 1,000 iterations and using the same machine (Node 1 published the message at 10 Hz). We measured the ROS and MATLAB/Simulink transfer time when the message data size on each topic was set to 100, 1 K, 10 K, 100 K, and 1 M bytes. Figure. 4 shows the transfer times via ROS and MATLAB/Simulink plotted against each data size. Both the ROS and MATLAB/Simulink transfer times increased along with data size, although the data transfer by MATLAB/Simulink had an overhead exceeding that of ROS. However, the MATLAB/Simulink transfer time did not exceed the Autoware maximum of 32 Hz. To evaluate the processing capacity, we measured the processing times of ROS and MATLAB/Simulink when multiplying square matrices on the order of 50, 100, 150, and 200, which served as easy points of reference to enable comparison of ROS with MATLAB/Simulink rather than as a requirement for self-driving. The evaluation measured the time required to process the time complexity at each matrix size and assessed the performance of the functions provided by MATLAB/Simulink. Therefore, the MATLAB/Simulink processing time was measured using two MATLAB scripts: one written in the same way as the ROS code, and the other using MATLAB matrix functions. Figure. 5 shows the processing times at each matrix size. When using the MATLAB script written in the same way as the ROS code, the processing times of ROS and MATLAB/Simulink were approximately the same. By contrast, when the MATLAB script used matrix functions, its processing time was significantly shorter than that of the other two methods, because processing was executed on multiple cores with multiple threads, even when this was unspecified. Comparison of the processing times with the transfer times revealed that the script using matrix functions was again significantly faster, thereby confirming that application of the functions provided by MATLAB/Simulink code enabled the handling of processes with large time complexity (e.g., image processing), even when accounting for the transfer time. Therefore, as shown the videos in Section 2.3, the practicality of IDF-Autoware is demonstrated. | Generated lines | MATLAB template scripts | |-----------------|--------------------------| | | (1) + α(2) + β((3) + 2(4)) | | (1): Defining node | | (2): Defining publisher | | (3): Defining subscriber | | (4): Defining callback function | | α: The number of publishers | | β: The number of subscribers | Figure 5 The average processing time according to each matrix size. Table 2 Task reduction using MATLAB template scripts. Table 3 Task reduction using Simulink template models. | Simulink blocks | Simulink template models | |-----------------|--------------------------| | Settings | $\alpha((1) + (2) + (3)) + \beta((4) + (5) + (6))$ | | | $(i) + (\alpha + \beta)((i\text{ii}) + (i\text{iii}) + (i\text{iv}) + 2(i\text{v}))$ | (1): Placing Publisher (2): Placing Message (3): Placing Bus Assignment (4): Placing Subscriber (5): Placing Bus Selector (6): Placing Terminal (i): Defining model name (ii): setting message name (iii): setting topic name (iv): Configuring topic source (v): Connecting blocks $\alpha$: The number of publishers $\beta$: The number of subscribers Table 4 Functionalities available with Autoware, Robotics System Toolbox, and IDF-Autoware. | Functionality | Autoware [1] | Robotics System Toolbox [4] | IDF-Autoware [2] | |----------------------------------------------------|--------------|------------------------------|------------------| | Operating Autoware | ✓ | | ✓ | | Operating MATLAB/Simulink | | ✓ | ✓ | | Communicating between Autoware and MATLAB/Simulink | | | ✓ | | Drawing node dependency | ✓ | | ✓ | | Generating MATLAB/Simulink templates | | | ✓ | | Displaying node information | | | ✓ | 3.2 Efficiency To improve the design efficiency, a functionality to generate both MATLAB template scripts and Simulink template models was provided. These templates help developers design nodes for Autoware in MATLAB/Simulink. Table 2 shows the amount of the template generated by a MATLAB template script. The MATLAB template script defines the essential information, as mentioned in Section 2.1, and creates callback functions utilized when a topic is subscribed. For example, the lane_stop node required for planning has one publisher and five subscribers. One line is generated to define a node, a subscriber, and a publisher, and two lines are generated to define the callback function. Therefore, in total, 17 lines are generated for the MATLAB template script for the lane_stop node. When creating a Simulink model, it is necessary to place and configure the Simulink blocks, to define the model name, and to connect the blocks. Table 3 summarizes the number of Simulink blocks placed and the settings created by a Simulink template model. The Simulink template model defines the model name and places the essential Simulink blocks, thereby creating a model for Autoware. Additionally, the Simulink blocks are configured and connected together. For example, when the Simulink template model of lane_stop node is generated, 18 Simulink blocks are placed and 31 settings are configured in total. If the functionality allowing MATLAB/Simulink templates to be generated is not provided, the developer must examine the node information and define it in a MATLAB script or a Simulink model. By contrast, when the templates are used, this becomes unnecessary; therefore, this improves design efficiency. 3.3 Usability IDF-Autoware enables the operation of MATLAB/Simulink in Autoware and provides functionalities to improve the usability. Here, we compared the available functionalities between Autoware, Robotics System Toolbox, and IDF-Autoware, as summarized in Table 4. Autoware cannot operate MATLAB/Simulink, and Robotics System Toolbox cannot operate Autoware. IDF-Autoware provides functionalities required to operate MATLAB/Simulink in Runtime Manager for IDF-Autoware, such as starting MATLAB/Simulink or executing MATLAB scripts and Simulink models. Therefore, IDF-Autoware can operate both systems. Communication between Autoware and MATLAB/Simulink is possible in Robotics System Toolbox and IDF-Autoware. Moreover, IDF-Autoware provides a drawing to visualize node dependency using the rqt_graph_autoware plugin created by extending rqt_graph available in Autoware. In addition to these features, IDF-Autoware can generate MATLAB/Simulink templates and display node information. Because this increases the number of available functionalities, the usability is also enhanced, which in turn improves development efficiency. 4 Conclusion In this paper, we described the development of an integrated development framework for Autoware with MATLAB/Simulink (IDF-Autoware) that enabled communication between Autoware and MATLAB/Simulink. We evaluated the data transfer time and processing capacity of MATLAB/Simulink, and confirmed the practicality of the method by using both co-simulations and experiments using an autonomous vehicle. IDF-Autoware facilitated the generation of MATLAB/Simulink templates that can help developers create models using MATLAB/Simulink for Autoware, thereby improving the design efficiency. Furthermore, the functionalities added to IDF-Autoware allow Runtime Manager to operate MATLAB/Simulink and various functionalities, further improving usability. Our findings confirmed that IDF-Autoware improved the development efficiency. References 1. Autoware.github.com. URL: http://github.com/CPFL/Autoware. 2. IDF-Autoware.github.com. URL: https://github.com/T-Shota/IDF-Autoware. 3. MATLAB/Simulink. URL: http://www.mathworks.com. 4. Robotics System Toolbox. URL: https://mathworks.com/products/robotics.html. 5. ROS.org. URL: http://www.ros.org. 6. ROS.org/rosnode. URL: http://wiki.ros.org/rosnode. 7. ROS.org/rqt_graph. URL: http://wiki.ros.org/rqt_graph. 8. wxglade.sourceforge.net. URL: http://wxglade.sourceforge.net. 9. wxpython.org. URL: http://wxpython.org. 10. S. Kato, S. Tokunaga, Y. Maruyama, S. Maeda, M. Hirabayashi, Y. Kitsukawa, A. Monrroy, T. Ando, Y. Fujii, and T. Azumi. Autoware on Board: Enabling Autonomous Vehicles with Embedded Systems. In Proc. of ICCPS, 2018. 11. Y. Maruyama, S. Kato, and T. Azumi. Exploring Scalable Data Allocation and Parallel Computing on NoC-Based Embedded Many Cores. In Proc. of ICCD, 2017. 12. M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, E. Berger, R Wheeler, and A. Ng. ROS: an open-source Robot Operating System. In Proc. of ICRA, Open-Source Software Workshop, 2009. 13. Y. Saito, T. Azumi, S. Kato, and N. Nishio. Priority and Synchronization Support for ROS. In Proc. of CPSNA, 2016. Controlling Concurrent Change – A Multiview Approach Toward Updatable Vehicle Automation Systems Mischa Möstl Technische Universität Braunschweig, Institute of Computer and Network Engineering Hans-Sommer-Str. 66, 38106 Braunschweig, Germany firstname.lastname@example.org Marcus Nolte Technische Universität Braunschweig, Institute of Computer and Network Engineering Hans-Sommer-Str. 66, 38106 Braunschweig, Germany email@example.com Johannes Schlatow Technische Universität Braunschweig, Institute of Computer and Network Engineering Hans-Sommer-Str. 66, 38106 Braunschweig, Germany firstname.lastname@example.org Rolf Ernst Technische Universität Braunschweig, Institute of Computer and Network Engineering Hans-Sommer-Str. 66, 38106 Braunschweig, Germany email@example.com Abstract The development of SAE Level 3+ vehicles [24] poses new challenges not only for the functional development, but also for design and development processes. Such systems consist of a growing number of interconnected functional, as well as hardware and software components, making safety design increasingly difficult. In order to cope with emergent behavior at the vehicle level, thorough systems engineering becomes a key requirement, which enables traceability between different design viewpoints. Ensuring traceability is a key factor towards an efficient validation and verification of such systems. Formal models can in turn assist in keeping track of how the different viewpoints relate to each other and how the interplay of components affects the overall system behavior. Based on experience from the project Controlling Concurrent Change, this paper presents an approach towards model-based integration and verification of a cause effect chain for a component-based vehicle automation system. It reasons on a cross-layer model of the resulting system, which covers necessary aspects of a design in individual architectural views, e.g. safety and timing. In the synthesis stage of integration, our approach is capable of inserting enforcement mechanisms into the design to ensure adherence to the model. We present a use case description for an environment perception system, starting with a functional architecture, which is the basis for componentization of the cause effect chain. By tying the vehicle architecture to the cross-layer integration model, we are able to map the reasoning done during verification to vehicle behavior. 2012 ACM Subject Classification Hardware → Safety critical systems Keywords and phrases safety, behavior, functional, architecture, multi-view, automated driving Digital Object Identifier 10.4230/OASIcs.ASD.2019.4 Funding This work was funded by the Deutsche Forschungsgemeinschaft (DFG) under the grant FOR1800 Controlling Concurrent Change (CCC). Acknowledgements The authors thank the other members of the CCC research group for many fruitful discussions and their support. 1 Introduction In recent years, huge progress has been generated toward the commercialization of automated vehicles systems. The focus of the industry has shifted from advanced driver assistance systems (ADAS), corresponding to SAE level 1 and 2 [24] to automated vehicle systems of SAE Levels 3+. However, while impressive results are achieved regarding environment perception algorithms, also due to the introduction of machine learning technology, verification and validation of Level 3+ systems becomes increasingly difficult. This is especially true, if it must be considered that software intense systems will most likely require frequent after-market updates for deploying bugfixes, and/or updates of the vehicle’s functionality. Challenges for safety verification are on the other hand caused by increased complexity of the perception systems required to generate a representation of the vehicle’s environment which is sufficiently detailed to make decisions in complex traffic scenes (cf. [13]). On the other hand, replacing the driver is equivalent to replacing vast parts of the safety system of SAE Level 1 and 2 systems. Established safety design processes must thus be rethought and extended in order to suit the newly arising challenges when removing the driver from the control loop. Safety strategies which only assure that the driver can control system failures by being able to physically overrule system commands to the drive train or steering system do not apply anymore. For the automotive industry, the safety standard ISO 26262 [10] provides guidelines for designing functionally safe systems. This subsumes hazards caused by malfunctioning behavior of E/E components and ensures the correct implementation of functional (safety) requirements. One frequently formulated drawback of the ISO regarding the applicability to Level3+ systems is that it does not consider nominal behavior of the overall E/E system (cf. [19, 4, 13, 8]) and thus does not provide guidelines on how to define the functional requirements for the system. However, this formulation of safe nominal behavior (or external behavior as defined in [20], according to [3]) and the boundaries of safe nominal behavior is crucial when it comes to ensuring safety of driverless vehicles, as the system must not pose a threat to its passengers and/or other traffic participants. For this publication, we adopt the terminology as defined by Waymo in their 2017 safety report [32], referring to the process of defining safe nominal behavior as behavioral safety (cf. [4]). The upcoming ISO PAS 21448 “Road Vehicles – Safety of the Intended Functionality” is partially addressing this problem, however the scope of the current draft standard is intentionally limited to SAE Level 1 and 2 systems [12], while the defined concepts might also apply to levels of higher automation. While there is a number of recent publications on how to extend the concept phase of ISO 26262 toward the definition of safe behavior [19, 4, 8], e.g. based on a scenario-driven concept phase, we would like to elaborate on the consequences of behavioral safety considerations from a systems engineering point of view. As we have argued in [4], the design of safe automated vehicle should follow a safety by design paradigm as a cross-domain effort over different disciplines. For this purpose we have proposed an architecture framework in accordance with ISO 42010 [11], featuring safety as a cross-cutting viewpoint and formulating a functional, a capability, software and hardware viewpoint and attributing behavioral safety to the former two and functional safety to the latter two viewpoints. Correspondences and correspondence rules, as defined in ISO 42010, are represented in example mappings between components in the respective viewpoints. While we formulate the need for formal methods to represent and instantiate the different viewpoints in the architecture framework, the actual instantiation was not part of the initial contribution. Behavioral and functional safety of vehicle automation systems is one of the grand challenges for future automotive systems. Reducing the necessary testing efforts to ship updates for vehicular systems, especially of models that are already in production and in the field is the second grand challenge. The later is particularly interesting to reduce costs. In this paper, we want to show that concepts for safety related systems engineering ([4]) can be combined with automated integration mechanisms and tools as investigated in the project Controlling Concurrent Change (CCC)\footnote{https://ccc-project.org}. As a result of such a design and integration flow, we envision systems where software updates and upgrades can be easily deployed at a minimum of cost for integration testing and safety validation through testing. We illustrate this idea based on an update scenario for the automation system of a research vehicle. Therefore, we first introduce the architecture framework we use to assess behavioral safety in section 2. We maintain traceability from the functional viewpoint up until integration in this architecture (cf. Figure 2), by using Traceability in this architecture is maintained in two ways: For behavioral safety the process is still manual, first ideas to further automate this are also presented in section 2. The example showcase is then presented in section 3, while section 4 then presents the key ideas how we automate the integration and verification based on the presented architecture framework. This section also includes a description of the resulting cross-layer system model. Finally, section 5 concludes the paper. \section{Behavioral Safety in Systems Engineering} As stated in Section 1, the concept of behavioral safety is a potential missing link to extend the concept phase of established ISO-26262-compliant processes toward the application for SAE Level 3+ vehicle automation systems. In this section, we summarize the architecture framework described in [4] and discuss the implications of behavioral safety on traceability requirements for system properties in the design phase and at runtime. Considering behavioral safety as an integral part of the safety concept creates the problem of defining appropriate behavior in different scenarios [4]. An example scenario is displayed in Figure 1 with the vehicle approaching a pedestrian crosswalk. \begin{figure}[h] \centering \includegraphics[width=\textwidth]{example.png} \caption{Example scenario: Automated vehicle approaching a pedestrian crosswalk occluded by a parked vehicle with oncoming traffic and pedestrians who are likely to cross.} \end{figure} At the scenario level, abstract safety goals can be formulated, e.g. by stating that the automated vehicle must not enter oncoming traffic. A process of how these abstract safety goals can be decomposed into (functional) safety requirements and actual technical requirements has been formulated in [4]. A short summary of the described process following an (iterative) Item Definition can be stated as follows: 1. Conduct Hazard Analysis and Risk Assessment by possible accidents in the defined scenarios. 2. Define safety goals. 3. Define a risk minimal state for the scenario at hand. 4. Define functional safety concept (safety requirements and hazard mitigation strategies) for fulfilling the safety goals. 5. Combine with functional architecture and required system capabilities derived during the item definition to derive technical requirements. However, the consequences of formulating behavioral safety requirements for systems development reaches further than defining requirements at the beginning of the development and validation and test before market release in a classic V-Model-like development process. In addition, the adherence to safety requirements must be monitored at runtime. This is required to initiate emergency strategies for reaching a risk minimal state in case safety requirements are violated. For monitoring system behavior at runtime, we have proposed the application of ability and skill graphs [21] and their integration into a development process [20]. They represent functional dependencies in the system, formulating the required capabilities to fulfill the vehicle’s mission. They explicitly model external system behavior as well as dependencies for performance assessment at a functional level, and provide guidance for the decomposition of functional requirements into technical requirements. A core question which needs to be addressed in this context is, how the technical implementation, which is subject to functional safety requirements can cause hazards at the behavioral level. This is where traceability aspects come into play: Assuming that a *functional* system architecture and a capability representation are available after the concept phase of the development process, technical architectures in terms of hardware and software architectures are developed during system implementation. As defined in the ISO 42010, a sound architecture framework requires the formulation of correspondences and correspondence rules between different architectural views. In our formulated architecture framework (cf. Figure 2), this means that we need mapping relations between *functional*, *capability*, *hardware* and *software* components (depicted in Figure 2 as red arrows). However, while informal formulations of those correspondences can assist during system development, informal notations are not suitable to support system monitoring at runtime. For this purpose a formal system model is required which can relate formalized requirements to the current system configuration, e.g. including component mappings or interface and task dependencies. To demonstrate this, we performed a manual ability and skill graph based assessment for an automated driving function of a research vehicle, and used its results as the input for a model-based integration flow. The vehicle and the automation function is explained in the following section. How this function is integrated into a vehicle system in a correct-by-construction fashion is subsequently explained in section 4, which will explain our cross-layer model instantiating the multi-view architecture. ## 3 Concurrent Change Use-Case The CCC approach combines a conventional lab-based design of individual functions with an automated integration process which ensures that updates are applied to an already deployed system only if the system can still adhere to the required safety and security constraints. This becomes particularly challenging as the target platform is shared by multiple functions with different criticality. All side effects must therefore be anticipated and either be bounded or mitigated in order to ensure safe operation of critical functions at all times. For this purpose, all requirements and constraints must be explicitly specified in the input models. Another challenge consists in finding (and specifying) appropriate abstractions that guide the decisions which must be made during such a model-based integration process, as these are usually based on experience and expert knowledge, which is only implicitly available. We demonstrate the applicability of the approach on an environment perception and motion planning showcase that we will introduce in the following: ### 3.1 Research Vehicle MOBILE For showing the applicability of the approaches developed in the CCC project in an automotive context, the research vehicle MOBILE [5] built at the Institute of Control Engineering at TU Braunschweig serves as a demonstrator platform. MOBILE was originally built as a demonstrator for the development of vehicle dynamics control algorithms and vehicle systems engineering applications. It features of four close-to-wheel electric drives ($4 \times 100\text{kW}$), as well as individually steerable wheels, and electro-mechanic brakes [5]. The vehicle features a FlexRay backbone for inter-ECU-communication and additional CAN bus interfaces, which are used for communication with sensors and actuators for vehicle control. The ECUs for vehicle control are programmed in a customized MATLAB/Simulink tool chain. Combined with detailed vehicle-dynamics models, the tool chain serves as a means to establish a rapid-prototyping process for vehicle control algorithms. The basic idea in the project scope is to demonstrate how the CCC architecture can contribute to a state-of-the-art environment perception system in an automated vehicle. For this purpose, the research vehicle MOBILE has been equipped with three roof-mounted LiDAR sensors (cf. Figure 4a), as well as a highly accurate localization platform. Additional hardware platforms were installed in the vehicle to run environment perception and motion planning algorithms in the CCC middleware. The ECUs and sensors of the CCC subsystem are interconnected by Ethernet and connected to the legacy vehicle control through a CAN interface. In addition, the algorithms can be run on a legacy platform as it is used in the *StadtPilot* [33] project for comparison. ### 3.2 Environment Perception & Trajectory Planning System The sensors provide a 360° representation of the vehicles’ environment and enable it to navigate its path around obstacles in its vicinity. For the CCC project, we have ported selected algorithms from the *StadtPilot* project, focusing on the representation of the static vehicle environment. For this purpose, incoming sensor raw data from the LiDAR sensors is combined into a point cloud. Each measurement contains position and reflectivity information. Thus, apart from the information about obstacle positions, reflectivity information can be used to create a monochrome image, making it possible to e.g. detect lane markings in the LiDAR data. In several steps, measurements are annotated with measurement classes (e.g. ground measurements, valid measurements on actual objects, clutter, etc.). The resulting annotated point cloud is then fed into an occupancy grid [6] (cf. Figure 3a), which accumulates measurements over time. The grid framework is based on a multi-layer approach to represent environment features in distinct layers. Examples of three layers are depicted in Figure 3. Figure 3a shows an example of occupancy information in terms of free (green), occupied (red) and unknown (dark blue) space. In addition, the mentioned reflectance information (Figure 3b) for ground-labeled points is represented in a separate layer. For a more detailed description of the processing chain, please refer to [14], [23]. At the end of the sensor-data processing chain for the static environment, the different layers are fused into a consistent representation of the static vehicle environment. The grid representation is always kept in a local coordinate frame, which moves with the vehicle. The vehicle’s position is acquired from an accurate tightly-coupled GNSS/INS platform (global position is obtained via GPS and fused with accelerations & angular rates). (A) fused local occupancy grid(s) provide the basis to perform trajectory planning for automated driving. For this purpose, the system generates a target pose in a reachable area of the vehicle’s environment and the trajectory is planned from the current position to the target pose in the vehicle coordinate frame. Trajectory planning is performed in a model-based fashion, using front- and rear-axle steering. The underlying trajectory control algorithms use the available actuators (4× steering, 4× brakes & drives) to control the vehicle to the planned trajectory. For details on and architectural considerations for trajectory planning, refer to [19]. Aspects of the applied control algorithms are presented in [30]. By representing the available actuators, trajectory planning considers the vehicle’s current abilities. By monitoring e.g. sensor quality, actuator performance and control quality, the system will be able to react to failures in the system. A simple example here is the presence of a steering actuator failure, which can be compensated at the control level, as well as by adapting the trajectory planning algorithm. Monitoring of non-functional properties, such as timing is performed directly in the middleware. (a) Roof-mounted lidar sensors. (b) Hardware architecture used in MOBILE. Figure 4 Research vehicle MOBILE. The algorithms required to demonstrate the use case will run in a distributed system, as shown in Figure 4b. The platform can be separated into two parts: While the lower part of the displayed ECUs is responsible for controlling the individual actuators of the vehicle, the upper part performs environment perception and trajectory planning tasks. As the CCC middleware only runs in the context of the environment perception system, the system model must support transitions between legacy-parts of the system, running without the project middleware and those parts, which are fully controllable by the Multi Change Controller (cf. section 4). A coarse grained functional architecture of the use-case is depicted in Figure 5. Figure 5 Coarse functional system architecture. 4 CCC’s integration and verification system For the model-based integration approach pursued here, the system is composed of two segregated domains: the model domain and the execution domain. Figure 6 shows the conceptual setup of the system. A Multi-Change Controller (MCC) (red) hosts the model domain, consisting of the cross-layer model, as well as configuration generation and verification. We aim for component-based models – including software as well as hardware components – as they reduce dependencies in the architecture to the explicitly modeled interfaces. The components are generic building blocks of the system that is composed of these components such that they implement the desired functionality and fit to the particular target platform. Each change to the system must be coherently representable in this system-wide model for analyzing any potential cross-layer dependencies, as well as for other analyses to ensure freedom from interference for the individual functions that a set of (software) components create. Similar to the conventional V-model development process, the MCC gradually refines the model representation of the new system configuration during the integration process. This is done based on a cross-layer model that captures relevant viewpoints of the system. The process generates new configurations and subsequently checks them for requirements satisfaction. If a new configuration satisfies all requirements and is rated as an improvement to the current one, it can be deployed into the execution domain. Verification is separated due to the fact that not all requirements can be systematically considered during configuration generation. E.g., software response times are hard to optimize if arbitrary activation patterns are assumed. Consequently, an autonomous configuration and verification goes beyond a multi-dimensional optimization of requirement satisfaction. Our execution domain, is based on the open-source Genode OS Framework [7]. This framework follows the microkernel approach and employs a strict decomposition of the system on the application level, resulting in a service-oriented architecture in which separate components implement and provide services for other components. While decomposition can already deal with liveness issues [1] that arise in mixed-critical systems, dependencies on the execution time or response time of other components remain. Note that, however, the methods developed in the model domain are not restricted to these semantics but can be adapted to different implementation models. 4.1 The MCC’s cross-layer model The core concept of the MCC’s model domain is that a) the system is represented on different layers of abstraction, and b) that models describing different viewpoints of the architecture are connected through mappings. Consequently, the described mappings between model artifacts are the implementation of correspondences from the abstract architecture framework. To perform the integration task in the MCC we define three architecture layers, where each layer is treated as a graph. The top layer is a function model, that captures functional aspects implementation independent. ▶ Definition 1. A function model is a graph \( \mathcal{FG} = (F, \rightarrow) \) where the nodes in \( F \) describe the functions, and \( \rightarrow \) is the set of edges that describe functional interactions. For instance the function chain depicted in Figure 5 fulfills this definition. A further necessity of such a layer lies in the fact that safety requirements are derived from implementation independent functional descriptions of a system [10, Part1] (cf. section 2). In order to implement functions, they are decomposed into components. Since during implementation, mappings of software components to hardware components might already be fixed, e.g. because code of one software component requires certain peripherals of a hardware component, they are already part of the component model. In our employed Run Time Environment (RTE), data exchange from one component to one or more others is performed through read-only memory (ROM) components. ROMs implement synchronous bulk transfer of data based on remote procedure calls (RPCs) [7]. If a reader on a remote resource requires contents of a ROM, proxy ROM components on both ends of the communication are inserted that provide the required data on the remote side via a network connection. Formally we define: **Definition 2.** A component model is a graph \( \mathcal{CG} = (C \cup C_{Roms} \cup R^{abs}, \xrightarrow{w} \cup \xrightarrow{r} \cup \xrightarrow{m}) \) where the nodes are the unified set consisting of \( C \) that describes the set of software components implementing functions, \( C_{Roms} \) the set of ROM components, and \( R^{abs} \) the set of abstract resources of the system. The edges either describe a read (\( \xrightarrow{r} \)) or write (\( \xrightarrow{w} \)) operation between software components and ROMs, or a mapping (\( \xrightarrow{m} \)) of a software component to a resource (\( R^{abs} \)). In the course of generating configuration candidates the MCC applies pattern based transformations on \( \mathcal{FG} \) to produce a component model instance \( \mathcal{CG} \). For the example use-case the function chain from Figure 5 is mapped to components in Figure 7 (second layer from the top). The transformation is based on selecting components that implement a function from a component repository. The repository is populated through formal xml-based descriptions of components. A more detailed account of this transformation is provided in [28]. In a subsequent step, the MCC’s configuration generation refines the component model to an instance model, which only contains instantiated components. This process also allows refining components \( c \in C \) into sub-components, which again can be linked by ROM components. The semantics of the resulting instance model are similar to \( \mathcal{CG} \), however it only contains the minimal number of component instantiations under cardinality constraints, i.e. the maximum number of instantiations of a component on a particular CPU. This also results in a mapping of components to particular hardware components, i.e. from abstract resources to individual CPUs. The instance model of the use-case is depicted as the third layer from the top in Figure 7. Yet note, that some components are shown as composites (light blue) due to space limitations. The knowledge of the concrete instance model together with the knowledge about the communication mechanisms allows the MCC to derive and map additional layers that model certain aspects of the system in order to represent particular viewpoints such as safety, availability or security. The requirements for these viewpoints – e.g. a safety-level requirement or a real-time constraint – are collected for each component in a so-called contracting language, which serves as an input to the MCC. Viewpoint-specific analyses are implemented as separate entities in the MCC, e.g. in order to resolve run-time dependencies between software components as presented in [27]. ### 4.2 Analysis and Verification by the MCC For this paper we restrict the scope to outlining how timing and safety requirements are verified by the MCC. W.r.t. safety we further limit ourselves to freedom from timing interference. For the external behavior of the vehicle, timing properties are crucial when it comes to vehicle control. As unaccounted delays can cause degraded control performance or even instable controllers, the adherence to timing constraints in the timing domain must be ensured. In order to reason about end-to-end function timing, a model describing the timing behaviour is necessary. The transformation of the component-based software structure of the Genode OS Framework together with the RPC semantic used by the ROM components to a timing model is described in detail in [26]. The transformation result explicitly expresses effects such as blocking and priority inheritance, while preserving the event chains. [26] also describes how response-time bounds can be computed over a chain of components. Possible alternatives to compute response-time bounds is e.g. MAST [2]. However, if hardware resources are shared with components from other cause effect chains, possibly even components with a different criticality than the chain under analysis, only verifying response-time bounds is insufficient. In the use-case depicted in Figure 7 this is the case for the shared vehicle network. Following a conservative design strategy, a designer would have to assume that by sharing the resource the components are mutually dependent and that any dependency leads to interference, i.e. failures causing malfunctioning behavior. Consequently, absence or strict bounds on the dependencies have to be proven in order to argue freedom from interference. A timing model for the Ethernet network can be derived from the knowledge of: (i) how traffic is routed through the network, (ii) which components inject Ethernet frames into the network at which rate, and (iii) what the maximum payload per frame is. How traffic is routed is known, as this is under control of the MCC which also deploys the network configuration. Similarly, the components which inject frames are already known in the component model. The rate at which they emit a frame $i$ into the network can be abstracted by standard event models, $\delta^+_i$, $\delta^-_i$. These are event model abstractions of concrete execution traces that capture the maximum/minimum time interval between $n$ consecutive activation events. $\delta^+_i$ and $\delta^-_i$ for a frame $i$ can be derived from the results of the timing analysis of the component chains on the computation resources with the analysis described in [26]. Only the maximum payload per frame must be extracted from contracting information, which must be fed into the MCC. Based on this information a timing model for the Ethernet network as e.g. described in [31] can be derived. It is formally based on Compositional Performance Analysis (CPA) [22]. In this model each task $\tau_i$ represents a frame that is competing for arbitration on a switch port, i.e. the switch ports are the resources. The payload of each frame is captured by bounds on its worst-case execution time (WCET) $C^+_i$/best-case execution time (BCET) $C^-_i$ on the wire including all protocol overhead. Chains of dependent tasks on different resources, i.e. Ethernet switch ports, then model a data stream. This model provides the basis to derive the timing-dependency graph (TDG) for the network and the components injecting the traffic as e.g. described by [15]. ▶ **Definition 3.** A Timing Dependence Graph is a graph $\mathcal{G} = (\mathcal{V}, \mathcal{E})$ consisting of nodes $v_i, v_j \in \mathcal{V}$ and edges $e_k \in \mathcal{E}$ where each edge $e_k = (v_i, v_j)$ describes that $v_j$ is dependent on $v_i$. Each node $v_i$ either describes a task parameter $p \in P = \{C^+, C^-, \delta^+_{in}, \delta^-_{in}\}$ or an (intermediate) timing analysis result $r \in R = \{w^+, w^-, \delta^+_{out}, \delta^-_{out}, R^+, R^-, q_{max}\}$. To transform the timing model’s parameter and results into a TDG, two conversion functions are necessary to populate the edge set of the TDG $\mathcal{G}$. ▶ **Definition 4.** The parameter conversion function is a function $$\vartheta_p : \mathcal{T} \times \{C^+, C^-, \delta^+_{in}, \delta^-_{in}\} \mapsto \mathcal{V}$$ (1) that maps each input parameter type \( p \in P \) for a task \( \tau_i \in T \) to a node \( v = \vartheta_p(\tau_i, p) \) with \( v \in V \) in the TDG, and the result conversion function: \[ \vartheta_r : T \times \{w^+, w^-, \delta_{out}, \delta_{out}, R^+, R^-, q_{max}\} \mapsto V \] (2) that maps each result type \( r \in R \) of a task \( \tau_i \in T \) to a node \( v = \vartheta_r(\tau_i, r) \) with \( v \in V \) in the TDG. This conversion function is analysis-specific, i.e. how CPA’s busy-window (\( w^+/w^- \)) and output event models (\( \delta_{out}/\delta_{out} \)) are computed. In general, a TDG is constructed in four steps: First, for each task in the task graph, the timing dependency graph is populated with the nodes describing its parameters. In the second step, all explicit dependencies between tasks on different resources are added as edges in the graph. This happens for two tasks \( \tau_a \) and \( \tau_b \) by inserting two edges \( e_k = (v_i, v_j) \) and \( e_j = (v_m, v_n) \) into the dependency graph in order to capture the dependency between their output and input event model (\( \delta_{a,out}/\delta_{a,out} \) and \( \delta_{b,in}/\delta_{b,in} \)). More precisely, \( v_i = \vartheta_r(\tau_a, \delta_{out}) \) and \( v_j = \vartheta_p(\tau_b, \delta_{in}) \) as well as \( v_m = \vartheta_r(\tau_a, \delta_{out}) \) and \( v_n = \vartheta_p(\tau_b, \delta_{in}) \). The third step then deals with the dependencies on each resource. It adds dependency edges according to the construction of the busy window (\( w^+/w^- \)), and the computation of response times (\( R^+/R^- \)). This implies that, for each scheduler, a specific transformation is necessary. Consequently, the third step must be carried out for each resource individually, respecting its scheduling analysis. Dependent tasks on a resource can either be treated as in step two following the generalized CPA theory, or be treated through the local resource analysis step, as e.g. done in [25] who considers task chains under static-priority preemptive (SPP) scheduling. The fourth step then deals with capturing the dependencies that influence the computation of the output event model, based on the resource-analysis results and the applied propagation strategy to bound them. W.l.g. we assume busy-window propagation as described by Theorems 1–3 in [29]. Dependencies are consequently expressed as edges between timing model parameters in the TDG. The TDG allows identifying timing dependencies that data which is transmitted over the network experiences. Since the functional model \( FG \) has a correspondence rule with the safety viewpoint (cf. Figure 2), we can trace safety requirements from there over \( FG \) to individual task chains and thus to the timing model and the TDG. [16] treats safety requirements on timing requirements as so called confidence requirements. The confidence requirement expresses how well all timing parameters to compute a timing bound must be known, in order to utilize the computed bound as proof that the timing requirement and consequently the safety requirement is fulfilled. The input description of components on the other hand supplies information how accurate timing parameters like WCET/BCET, e.g. payload sizes, are known. By propagating confidence values through the TDG of the system in a flow like manner where the lowest possible confidence is assigned to a TDG node, also every timing requirement in the TDG receives a confidence value. In cases where a mismatch between the assigned confidence and the confidence requirement exists, the MCC either must reject such a configuration or instantiate enforcement mechanisms to guarantee the expected model behaviour at run-time. ### 4.3 Monitoring and Enforcement If the timely transmission of this data is safety relevant and dependent on parameters with lower confidence than its requirement, the MCC must take actions to bound these dependencies. Several authors, e.g. [17, 9, 18] have proposed monitoring and enforcement techniques to conform run-time inputs to model behavior. These techniques can also be used to shape the injected traffic into the network. The MCC can deploy such mechanisms into the execution domain (cf. Figure 6). They render a dependency innocuous since they increase the confidence into a parameter to the confidence of the enforcement mechanism, which is typically high or the highest in the system. This is due to the fact that the monitors are reliable middleware components. In order to prevent overly excessive monitoring and enforcement the MCC coordinates the model enforcement strategy. Two possible strategies for efficient placement of monitors that perform enforcement are described by [16], a greedy input monitor placement and a min-cut strategy. For the MCC the greedy input placement is more suitable as it avoids complex network management where monitors would have to be implemented in the switches of the Ethernet network. Through this enforcement, the network is guaranteed to operate within the bounds of the timing analysis. A reevaluation of the confidence values after placing enforcing monitors shows that confidence requirements are now fulfilled. Together with the timing analysis this is a sufficient proof of freedom from timing interference ([10, clause 3.75, part1]). In the case study depicted in Figure 7 the MCC performs this for the data that is transferred over the shared Ethernet network, i.e. between the Sensor Data Preprocessing and the Static Environment Modelling components, as well as for the reference trajectory sent to the vehicle control component which interfaces with the legacy control subsystem of the vehicle. 5 Conclusion In this paper we have presented a design and integration flow that respects safety aspects of SAE level 3+ vehicle functions. We argued that the system emergent property of safety requires traceability in a design. To ensure this traceability during integration, we presented the MCC based integration flow in section 4, where traceability is inherent due to the automated model-based integration flow. This is mainly achievable due to the cross-layer model as an implementation of multiviewpoint modelling and the dependency analysis that is performed based on the cross-layer model. In section 4 we have particularly shown how this is handled for complex timing dependencies. However, the derivation and formulation of functional safety requirements for the MCC are still manual. It is our vision, to further automatize the coupling between behavioral and functional safety (cf. Figure 2), i.e. integrating this aspect in future versions of the MCC, as it is currently a manual process. References 1 Genode OS Framework release notes 16.11, 17.08, 18.02 and 18.08. URL: https://genode.org/documentation/release-notes/index. 2 MAST: Modeling and Analysis Suite for Real-Time Applications. URL: http://mast.unican.es/. 3 A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11–33, 2004. 4 G. Bagschik, M. Nolte, S. Ernst, and M. Maurer. A System’s Perspective Towards an Architecture Framework for Safe Automated Vehicles. In 2018 IEEE International Conference on Intelligent Transportation Systems (ITSC), pages 2438–2445, 2018. 5 Peter Johannes Bergmüller. Towards functional safety in drive-by-wire vehicles. Springer, 2015. 6 A. Elfes. Using occupancy grids for mobile robot perception and navigation. Computer, 22(6):46–57, 1989. doi:10.1109/2.30720. Figure 7: Visualization of how the obstacle avoidance function graph from Figure 5 is mapped to a component graph (upper half). The component graph is transformed into the component instance graph which also contains the mapping to the hardware resources (lower half). Red interface symbols indicate Genode interfaces, while green represent a data transfer over Ethernet. Norman Feske. Genode OS Framework Foundations 18.05. May 2018. URL: http://genode.org/documentation/genode-foundations-18-05.pdf. Patrik Feth, Rasmus Adler, Takeshi Fukuda, Tasuku Ishigooka, Satoshi Otsuka, Daniel Schneider, Denis Uecker, and Kentaro Yoshimura. Multi-aspect Safety Engineering for Highly Automated Driving: Looking Beyond Functional Safety and Established Standards and Methodologies. In Barbara Gallina, Amund Skavhaug, and Friedemann Bitsch, editors, Computer Safety, Reliability, and Security. SAFECOMP 2018. Lecture Notes in Computer Science, volume 11093, pages 59–72. Springer International Publishing, 2018. Kai Huang, Gang Chen, C. Buckl, and A. Knoll. Conforming the runtime inputs for hard real-time embedded systems. In 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 430–436, June 2012. Intern. Organization for Standardization - ISO. ISO 26262 - Road vehicles - Functional safety, 2 edition, April 2011. Intern. Organization for Standardization - ISO. ISO/IEC 42010 - Systems and software engineering – Architecture description, 2011. International Standard Office. ISO/PRF PAS 21448: Road vehicles : Safety of the intended functionality. ISO, 2018. Helmut Martin, Kurt Tschabuschnig, Olof Bridal, and Daniel Watzenig. Functional Safety of Automated Driving Systems: Does ISO 26262 Meet the Challenges? In Computer Safety, Reliability, and Security. SAFECOMP 2017. Lecture Notes in Computer Science, pages 387–416. Springer, Cham, 2017. Richard Matthaei, Gerrit Bageschik, Jens Rieken, and Markus Maurer. Stationary Urban Environment Modeling Using Multi-Layer-Grids. In 17th International Conference on Information Fusion, 2014. Mischa Möstl and Rolf Ernst. Cross-Layer Dependency Analysis with Timing Dependence Graphs. In Proceedings of the 55th Design Automation Conference (DAC), 2018. Mischa Möstl, Johannes Schlutaw, and Rolf Ernst. Synthesis of Monitors for Networked Systems With Heterogeneous Safety Requirements. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(11):2824–2834, November 2018. doi:10.1109/TCAD.2018.2862458. M. Neukirchner, T. Michaels, P. Axer, S. Quinton, and R. Ernst. Monitoring Arbitrary Activation Patterns in Real-Time Systems. In Real-Time Systems Symposium (RTSS), 2012 IEEE 33rd, pages 293–302, 2012. doi:10.1109/RTSS.2012.80. Moritz Neukirchner, Philip Axer, Tobias Michaels, and Rolf Ernst. Monitoring of Workload Arrival Functions for Mixed-Criticality Systems. In 2013 IEEE 34th Real-Time Systems Symposium, pages 88–96. IEEE, 2013. doi:10.1109/RTSS.2013.17. M. Nolte, M. Rose, T. Stolte, and M. Maurer. Model predictive control based trajectory generation for autonomous vehicles — an architectural approach. In 2017 IEEE Intelligent Vehicles Symposium (IV), pages 798–805, 2017. Marcus Nolte, Gerrit Bageschik, Inga Jatzkowski, Torben Stolte, Andreas Reschka, and Markus Maurer. Towards a Skill- And Ability-Based Development Process for Self-Aware Automated Road Vehicles. In 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), Yokohama, Japan, 2017. Andreas Reschka, Gerrit Bageschik, Simon Ulbrich, Marcus Nolte, and Markus Maurer. Ability and Skill Graphs for System Modeling, Online Monitoring, and Decision Support for Vehicle Guidance Systems. In 2015 IEEE Intelligent Vehicles Symposium (IV), pages 933–939, Seoul, South Korea, 2015. Kai Richter. Compositional Scheduling Analysis Using Standard Event Models. Institut für Datentechnik, 2005. URL: http://www.digibib.tu-bs.de/docid=00001765. J. Rieken, R. Matthaei, and M. Maurer. Toward Perception-Driven Urban Environment Modeling for Automated Road Vehicles. In 2015 IEEE 18th International Conference on Intelligent Transportation Systems, pages 731–738, 2015. SAE. J3016: Taxonomy and Definitions for Terms Related to On-Road Motor Vehicle Automated Driving Systems. *Vehicle Electrification Subscription*, 2014. Johannes Schlatow and Rolf Ernst. Response-Time Analysis for Task Chains in Communicating Threads. In *Real-Time Embedded Technology & Applications Symposium (RTAS)*, Vienna, Austria, April 2016. Johannes Schlatow and Rolf Ernst. Response-Time Analysis for Task Chains with Complex Precedence and Blocking Relations. *International Conference on Embedded Software (EMSOFT), ACM Transactions on Embedded Computing Systems ESWEEK Special Issue*, 16(5s):172:1–172:19, September 2017. Johannes Schlatow, Mischa Möstl, and Rolf Ernst. An extensible autonomous reconfiguration framework for complex component-based embedded systems. In *12th International Conference on Autonomic Computing (ICAC)*, pages 239–242, Grenoble, France, July 2015. Johannes Schlatow, Marcus Nolte, Mischa Möstl, Inga Jatzkowski, Rolf Ernst, and Markus Maurer. Towards model-based integration of component-based automotive software systems. In *Annual Conference of the IEEE Industrial Electronics Society (IECON17)*, Beijing, China, October 2017. doi:10.24355/dbbs.084-201803221525. Simon Schliecker, Jonas Rox, Matthias Ivers, and Rolf Ernst. Providing accurate event models for the analysis of heterogeneous multiprocessor systems. In *Proceedings of the 6th IEEE/ACM/IFIP international conference on Hardware/Software codesign and system synthesis*, CODES+ISSS ’08, pages 185–190, New York, NY, USA, 2008. ACM. T. Solte, Tianyu Liao, Matthias Nee, Marcus Nolte, and Markus Maurer. Investigating Cross-Domain Redundancies in the Context of Vehicle Automation - A Trajectory Tracking Perspective. In *IEEE International Conference on Intelligent Transportation Systems (ITSC)*, pages 2398–2405, 2018. Daniel Thiele, Philip Axer, and Rolf Ernst. Improving Formal Timing Analysis of Switched Ethernet by Exploiting FIFO Scheduling. In *52nd Annual Design Automation Conference, DAC ’15*, pages 41:1–41:6, New York, NY, USA, 2015. ACM. Waymo. Waymo Safety Report: On the Road to Fully Self-Driving, 2017. J. M. Wille, F. Saust, and M. Maurer. StadtPilot: Driving autonomously on Braunschweig’s inner ring road. In *2010 IEEE Intelligent Vehicles Symposium*, pages 506–511, June 2010. Safety and Security Analysis of AEB for L4 Autonomous Vehicle Using STPA Shefali Sharma Electrical and Computer Eng., University of Waterloo, Waterloo, Canada firstname.lastname@example.org Adan Flores Electrical and Computer Eng., University of Waterloo, Waterloo, Canada email@example.com Chris Hobbs QNX Software Systems Limited, Kanata, Canada firstname.lastname@example.org Jeff Stafford Renesas Electronics America Inc., Farmington Hills, USA email@example.com Sebastian Fischmeister Electrical and Computer Eng., University of Waterloo, Waterloo, Canada firstname.lastname@example.org Abstract Autonomous vehicles (AVs) are coming to our streets. Due to the presence of highly complex software systems in AVs, there is a need for a new hazard analysis technique to meet stringent safety standards. System Theoretic Process Analysis (STPA), based on Systems Theoretic Accident Modeling and Processes (STAMP), is a powerful tool that can identify, define, analyze and mitigate hazards from the earliest conceptual stage deployment to the operation of a system. Applying STPA to autonomous vehicles demonstrates STPA’s applicability to preliminary hazard analysis, alternative available, developmental tests, organizational design, and functional design of each unique safety operation. This paper describes the STPA process used to generate system design requirements for an Autonomous Emergency Braking (AEB) system using a top-down analysis approach to system safety. The paper makes the following contributions to practicing STPA for safety and security: 1. It describes the incorporation of safety and security analysis in one process and discusses the benefits of this; 2. It provides an improved, structural approach for scenario analysis, concentrating on safety and security; 3. It demonstrates the utility of STPA for gap analysis of existing designs in the automotive domain; 4. It provides lessons learned throughout the process of applying STPA and STPA-Sec\(^1\). 2012 ACM Subject Classification Hardware → Safety critical systems; Networks → Cyber-physical networks Keywords and phrases Functional Safety, Security, STAMP, STPA, STPA-Sec, ISO 26262, AEB, Advanced Driver Assistance Systems (ADAS), Automated Vehicles, SoC (System-On-Chip) Digital Object Identifier 10.4230/OASIcs.ASD.2019.5 \(^1\) STPA-Sec identifies and frames the security problems [10] 1 Introduction AV functionality is rapidly adopted through ADAS technology today. Combining this rate of adoption with the complexity of the autonomous vehicle’s system architecture and its use of complex SoC, it is essential for Tier-1\(^2\) and semiconductor suppliers to be diligent in their collaborative effort to design for functional safety and for the mitigation of cybersecurity threats impacting functional safety. STPA is a new hazard analysis technique and a new model of accident causation, based on systems theory rather than reliability theory [4]. STPA has the same goals as any other hazard analysis technique, that is, to recognize scenarios leading to identified hazards so that they can be eliminated or controlled. STPA, however, has an innovative theoretical basis or accident causality model. STPA is designed to address increasingly common component interaction accidents, along with component failure accidents, which can result from design flaws or unsafe interactions among non-failing (operational) components [3]. In fact, the causes identified using STPA are a superset of those identified by other techniques [4]. This paper provides an example of applying STPA to an AEB system primarily designed for functional safety as well as to mitigate risks associated with cybersecurity vulnerabilities. In this, we have combined functional safety analysis with safety-relevant security analysis. A methodology is defined to analyze functional safety and cybersecurity, first for the AEB system, and then for the interactions, searching specifically for security vulnerabilities that might contribute to safety hazards. The next step in the analysis is the identification of accidents and unacceptable losses along with accident hazards and unacceptable loss hazards. We define accident hazards and unacceptable loss hazards, keeping in mind that the implementation of the AEB system is on an L4 AV. Because of the level of autonomy of the vehicle, it is safe to assume there is no driver interaction for the control of the vehicle or the AEB system. In this analysis, the system hazards lead to high-level system constraints and further refinement in STPA Steps 1 and 2. As we move forward in the analysis, while applying the STPA process, additional dependencies are going to be identified. Knowing this, we can define a basic initial high-level control structure \(^3\) which will be updated in later steps of the analysis. The final control diagram \(^4\) captures the dependencies from both a safety and cybersecurity perspective. From the high-level control diagram, the next step is to identify CAs (Control Actions). Evaluation of potential hazardous sources is shown in the refined control diagram, considering all of the diagram’s inputs and outputs. We also considered component failure, but the analysis is not limited to this. Instead, it presents all aspects of the system’s performance, including cybersecurity features negatively impacting functional safety. From this analysis, we are defining a set of causal factors and causal accident scenarios. The novelty of this paper lies in the addition of a more systematic approach to the conventional STPA approach. Identifying the scenarios by analyzing the components associated with the control flow, and the causal factors corresponding to each scenario, constitutes the next step. From the causal factors, we are refining the safety constraints so that they can produce technical safety requirements (TSRs). Comparison of the TSRs against an existing --- \(^2\) Companies which supply components directly to the original equipment manufacturer (OEM), that set up the chain. \(^3\) See Figure 3. \(^4\) See Figure 4. autonomous vehicle design (the autonomy vehicles designed as ASIL-D L4 fail-operational systems) is carried out to identify design gaps for future improvement. This gap analysis on an existing system demonstrates how to make safety and security design changes part of a continuous improvement that must be at the heart of every safety culture. 2 How the analysis started We started by reviewing an existing autonomous vehicle in need of formal safety analysis. The initial plan was to use a conventional Hazards Analysis and Risk Assessment (HARA) analysis because the group already had experience using this method. But then we learned about STPA and decided to assess its suitability for a system of this scale. We had read reports of its application to much larger systems [3] and wanted to determine whether it would scale to a single, embedded system. Using this approach, we can generate high-level safety constraints in the early stages of development. These constraints can then be tailored to generate detailed safety requirements on individual components of the analyzed system[8]. To avoid biasing our results, we established that the safety analysis should be as general as possible without being directly involved with the current implementation. Thus the result of this analysis was a list of technical safety requirements which we could use to perform an analysis on the current physical architecture and find possible security and safety issues. We needed to select vehicle functionalities that played an important role in vehicle and occupant safety. The vehicle component also had to be a part of a well-contained function to complete the analysis in the time span available. For these reasons, we selected the L4 AEB function for our analysis. 2.1 The AEB subsystem An AEB system of L4 AV aid in avoiding accidents by identifying potential collisions with the help of a perception system (LIDAR, RADAR, stereo vision, etc.), computing localization, path planning and determining object trajectory. If a collision is unavoidable, these systems prepare the vehicle to minimize the impact by lowering its speed. It is important to note that the AEB itself is independent of the normal braking system of the vehicle. Once the AEB has identified a potential threat, it takes control of the braking system to mitigate the threat. This functionality has a significant effect on the safety of the vehicle and its occupants, making it an excellent vehicle subsystem for our analysis. When looking at the distances between the vehicles as shown in Figure 1, we can establish safety thresholds. The first threshold is the warning distance that notifies the AV when the proximity between ego vehicle and the vehicle in front is becoming dangerous; it is recommended for the ego vehicle to start slowing down and increasing the distance between the vehicles. At this distance, the probability of a collision is low. The next threshold is the normal braking limit. At this distance, the normal braking system of the vehicle starts slowing down the vehicle. If the braking system is unable to slow down the vehicle and increase distance, the vehicle will reach the Collision Imminent Braking distance (CIBd) and will activate the AEB system. At this point the collision probability is high, and the AEB needs to take immediate action. The AEB’s objective is to stop or slow down the vehicle before it reaches the Minimum Safe Distance (MSD). The MSD threshold is the only fixed value amongst all the thresholds. The rest of the values are dependent on the road conditions (weather and road surface) and the speed of the vehicle. 3 Methodology The methodology used in the current approach combines safety and security analysis. This approach considers the functional safety and the security-affecting safety. Figure 2 presents the methodology we are using for the STPA analysis[2]: 1. Define analysis scope a. Accidents b. Hazards c. High-level constraints 2. Develop control structure diagram 3. Identify unsafe control actions a. Unsafe control actions b. Corresponding safety constraints 4. Identify the occurrence of unsafe control actions a. Hierarchical control structure with the process model b. Causal factors, scenarios, and refined safety constraints c. Technical safety constraints The elements 1(c), 3(b), and 4(c) constitute the STPA analysis report which defines the safety constraints for a safer and more secure system. The analysis considers a detailed analysis of various blocks of Figure 2. The constituents of the multiple blocks are referred with an identifier as the various parts of each block, to serve as a starting ground for the next block. 3.1 Scope The methodology begins by defining the scope of the analysis. For the system under consideration, the scope is as follows: “The analysis presents functional safety analysis for AEB for an AV using vehicle state and environmental data analysis to contribute to the safety of the passengers and environment.” 3.1.1 Assumptions After defining the scope, the next step is to define certain conditions that serve as the basis for analysis development. Thus, the analysis considers certain assumptions related to the working conditions. These conditions are also helpful in setting the limits to the analysis. Although, the authors recognize that it would be beneficial to further analyze the assumptions from the perspective of an expanded scope. Here are a couple of examples: Assumption 1: AEB functions for collisions from all angles, not just traditional forward-collisions (no lateral maneuvering or acceleration commanded, considering only the brake actuation). Assumption 5: Path prediction of surrounding mobile objects is available to the AEB system. There are certain logical conditions behind including these assumptions in the analysis. General cases assume collision primarily from the front. This analysis, however, also examines projected paths of side objects relative to the AV projected path. Hence, the Assumption 1. --- 6 These are some of the assumptions we are referring here from the analysis. To have consistency with the report [6], we are using the same identifiers. The analysis considers an assumption about the availability of data from the surroundings, such as for calculating the collision imminent braking distance and path prediction from the surrounding mobile objects. Hence, Assumption 5. Some of the assumptions also consider certain conditions outside the scope of the analysis. For example: - The variation in braking performance based on the mechanical condition of AV tires, - The sensor performance can be negatively impacted by maintenance or improper care, - No manufacturing defects and - All the components are correctly working as they are quality checked and properly maintained. ### 3.1.2 Accidents An accident is an undesired or unplanned event that results in the loss of a human life, human injury, property damage, etc. The accidents considered in the analysis are: **A1:** The AV collides with a mobile object. **A2:** The AV collides with an immobile object. **A3:** The AV passengers injured without collision. In defining the accidents, we first discussed various scenarios that the AV can encounter on the road. Next, we grouped the elements of the scenarios into different categories: vehicles, pedestrians, cyclists, stationary objects, etc. As the analysis was evolving, these subsets posed certain problems; for example, a dustbin could start off as a stationary object, but due to the wind, could start rolling on the road and become non-stationary. We decided that instead of defining it by its current state of activity, we can describe it with its innate ability. So after refinement we devised two subsets: mobile and immobile. For example: if a mailbox were on an HD map, it would be an immobile object. If that same mailbox were blown from its bolts by high wind and became non-stationary, it would be a mobile object requiring identification of the AD sensor system because it is no longer in its original position as shown in the HD map. Here, “mobile” is anything that can move, irrespective of the external influence. Thus A1 and A2 are considered as two potential accidents for the analysis. Also, as in the definition of accident, anything that causes harm to human occupants needs to be considered and is stated as A3. While sitting inside the AV, under certain circumstances such as sudden braking (braking deceleration exceeds the safety physics to passengers) can harm the occupants even when there is no collision. The next step in the analysis was to define system-level hazards. These are the system states or set of conditions, which together with a particular set of worst-case environmental conditions, would probably lead to an accident. ### 3.1.3 System level hazards System level hazards can lead to accidents considered in the analysis. Some of the hazards are listed below: **AH1:** AV does not maintain Minimum Safe Distance (MSD) from a Forward Mobile Object (FMO). **AH2:** AV does not maintain MSD from Prohibited Area (PA). **AH3:** AV occupants exposed to unhealthy g-forces in vehicle exceeding the safety threshold of AV. Maintaining a safe distance from a vehicle in front is a necessary condition for AEB. If the vehicle is unable to keep MSD from a forward mobile object, then this could be the potential cause of an accident and thus become a hazard that could lead to an accident. The condition for the MSD from an FMO is a prerequisite for the safety of the AV. There are certain areas which have restricted access to traffic. The AVs should ensure that they do not enter such areas and this has been considered – in the analysis as AH2. PA can mean any area – military field, recent accident site, landslide site, etc., – AV’s design is not suitable for L4 functionality in a PA. The thresholds predefined in the system related to BFC (Braking Force Command) shall always be complied with because they have the potential to harm the occupants if they exceed a certain threshold level and thus constitute a hazard for the analysis (AH3). After the identification of hazards, the next step was to describe high-level constraints. These prevent the accident from occurring. Thus, HLCs (High-Level Constraints) provide the set of requirements with which the system shall comply to be functionally safe. These are defined consistently to have traceability to the corresponding hazards. Using a consistent structure can be helpful for the automation of the process. Although this analysis doesn’t automate the process, consistency in the structure helped in having a symmetric structure. During this analysis, we were struggling with the question of whether we should generate two different reports relating to safety and security or whether they should be merged into one. We realized that safety and security are closely interlinked and therefore merged them into one single analysis. For example: If the AV speed sensor information is spoofed (security threat) then it can lead to a hazardous scenario ultimately leading to an accident (safety threat). If, due to delayed EPS sensor information (safety threat), BFC fails to set the braking force = 0% even after the removal of earlier hazard, this situation could lead to an unnecessary halt, and thus personal identifiable information of occupants could be inferred (security threat). ### 3.1.4 High-level safety constraints High-level safety constraints define the initial set of safety requirements for the system. ### 3.2 STPA Step 1 The identification of unsafe control actions and the corresponding safety constraints are discussed in this section. #### 3.2.1 Safety control structure The control structure is a preliminary process model for the system. It is a functional decomposition of the system. While working on the control structure, we faced certain challenges such as level of detail to be considered. For the sake of a systematic and structured approach, a control structure is the most crucial thing for the safety analysis. We should only consider the blocks responsible for significant functionality such as controller, actuator, process, and feedback. The structure is only a generic one and does not consider the level of granularity. It gives us an overview of how the execution of instruction is taking place without considering the complete internal functionality of the various components involved. Here follows the description of various blocks within the analysis: Controller: In the system under analysis, the AEB controller is responsible for generating and controlling the BFC. Actuator: In this system, brakes are the actuator responsible for implementing the BFCs. Controlled process: The AEB controls the braking of the vehicle. Feedback: The feedback from the vehicle state and the surrounding environment through the sensors is collected in the state estimator, and thus constitutes the feedback network. The control structure for the system under consideration is as shown in the Figure 3. ![Control Loop Structure](image) **Figure 3** Control loop structure. By following the STPA process diligently, through detailed use of refined control diagrams, we have a reference to verify that the hazards identification is adequate, and through continued refinement, a benchmark for the design to support continuous improvement over the life of the item. During the analysis, we struggled with the level of detail to be present in the control loop diagram. After creating several revisions of the control loop, we concluded that it should be generic in form and that a further level of detail would not add value to the analysis. For the Control Loop, it shall be in basic generic form and the later stages shall consider the details. ### 3.2.2 Unsafe control actions This step performs the identification of the unsafe control actions each component can create which helps in refining the safety requirements and constraints of the system. It will determine the causes of these unsafe control actions. The UCAs are defined using the control actions that can lead to accidents. So, this analysis is considering two control actions based on the control diagram. Here we have taken the BFC (Braking Force Command) coming from the controller; it is only the command and not the force. Two states considered in the analysis are: BFC disengaged (0%), and BFC engaged (modulated engagement ranging from 0% – 100%). After the identification of control actions, the next step is to identify the potential causes of unsafe control. The four ways a controller can provide unsafe control are the following [3]: 1. A control action required for safety is not provided. 2. An unsafe control action is provided. 3. A potentially safe control action is provided too late or too early (at the wrong time) or in the wrong sequence. 4. A control action required for safety is stopped too soon or applied for too long. We considered these four categories as a basis for identification of the control table entries. Some of the unsafe control actions considered are listed here: **UCA 1:** AEB does not provide BFC when AV is at a closer distance than the CIBd. **UCA 3:** AEB does not provide required braking force value when AV is at a closer distance than the CIBd. If BFC is not applied even when the AV is within the CIBd from an object, then this can be a potential unsafe control action, which could lead to an accident. Hence, UCA 1 belongs to the category of “control action required, but not provided.” Another UCA is when the BFC is applied, but the braking force < RDR (Required Deceleration Rate) can also lead to an accident, and is therefore an unsafe control action. Similarly, other UCAs are considered, based upon the time of application of BFC and the total time span of BFC application. Thus, the UCA table is formed. ### 3.2.3 Safety constraints The UCAs help to find reasons behind unsafe actions and guide design engineers to eliminate or control them. We referred to table 1 for UCAs, and SCs sets the requirements for the systems. The refined safety constraints are defined in a consistent language as follows: **SC 1:** AEB shall provide BFC when AV is at a closer distance than the CIBd. **SC 3:** AEB shall provide required braking force value when AV is at a closer distance than the CIBd. ### 3.3 STPA Step 2 This section identifies the reasons behind the unsafe control actions. #### 3.3.1 Causal factors and causal accident scenarios After the identification of the unsafe control actions, we followed STPA Step 2 (Figure 2) to identify the potential causes of unsafe control actions, to understand their presence and how to prevent their occurrence [9]. However, accidents can still occur even without unsafe control actions if, for example, correct and safe control actions are provided, but not executed by other components in the system. The identification of the causal factors can identify a violation of safety constraints despite safe control actions; this is important. To study the scenarios and causal factors corresponding to each UCA, we made a structured approach: 1. Identify scenarios using UCAs. 2. Identify causal factors corresponding to each scenario by analysing the components associated with the control flow diagram. We studied the STPA problem as a whole and took parts from the methods available from various researchers in the field [4], [9]. Then we created a hybrid to perform the required analysis. For example: For the scenario table we tried to use the conventional STPA approach, but found that for our analysis the basic scenarios are sufficient and other detailed scenarios (scenarios arising from feedback issues, etc.) merely lead to redundant scenarios. We created twelve scenarios, but when we started defining the causal factors after three scenarios, they began to repeat and became redundant for our purposes. So we removed the detailed scenarios and analyzed only basic, generic scenarios. Table 1 provides a systematic and structured approach to analyzing the causal factors. For each of the four blocks in the control structure, we considered four actions: the information is missing, inadequate, incorrect and delayed. The reasons behind these unsafe actions could be spoofing, component failure, electrical requirements not met or communication failure. Considering these actions and the reasons behind them, the causal factors can be identified. 3.3.2 Rationale table The analysis uses a supporting table for the causal factor entries. It verifies the table entries and explains the thought process behind the causal factors. It can serve as a reference table for refined safety constraints and technical safety requirement tables. Rationale for CF1.1a (Causal Factors). If the OPP (Object Predicted Path) is calculated incorrectly, there is the potential for the actual object path to be closer to the AV path than calculated. In this case, the controller will not send the BFC command, even though the autonomous vehicle's predicted path has reached the minimum safe distance from the object’s predicted path. An image processing performance fault could prevent the correct calculation required for the identification of an object that is within the MSD of AV. It was recognized and accepted that some rationale repeated itself. When this occurred, we reviewed the causal factor table for correctness and appropriateness, and if it still provided a distinctly different CF (Causal Factor), then the repeated rationale conditions were accepted. The repeated nature is suitable for automation and desirable, as long as it is applied to each unique and new CF. 3.3.3 Refined safety constraints and Technical safety requirements After the identification of reasons behind the UCAs, the constraints on the system were redefined to eliminate or avoid the causes behind the UCAs. These new safety constraints created from the causal factors contained the rationale tables. Technical safety requirements: This step is responsible for the implementation of refined safety constraints on the system. These represent the technical requirements for a safe system. We used these TSRs to make the gap analysis for the already existing architecture and modified the design of the system. 4 Results: Lessons learned This section discusses the contribution of this work to making an adhoc STPA more systematic. During the analysis we learned lessons, which will be useful in structuring future analysis systematically. The lessons are summarised below: ▶ Lesson Learned 1. We realized that certain factors could act as a basis for the analysis development which could have an impact on the definition of the safety fundamentals. The first priority is to define boundaries which are defined as the assumptions for the analysis. ▶ Lesson Learned 2. We realized that the identification of accidents and hazards lacks a systematic approach. SOTIF (Safety Of The Intended Function) details from current PAS (Public Available Specification) can be useful for better structuring. We tried to make the identification of accidents and hazards systematic by considering the various scenarios in a symmetric way. The purpose of such a systematic approach is to get rid of the current brainstorming process and in its place, to establish a concrete, automatic method of scenario identification for the analysis. ▶ Lesson Learned 3. From our analysis we realized that the control diagram must represent the basic blocks with generic functionalities and terms. The control diagram is essential and must represent a complete overview of the function under consideration. During the analysis, the control loop serves a reference block and the representation of the control structure keeps the analysis streamlined. Lesson Learned 4. We have created one single report considering safety and security hazards that threaten safety. Because the safety and security issues are often interlinked, one such report, addressing both problems, is an efficient way to analyze them. Lesson Learned 5. The novelty of our current work is the systematic analysis of causal factors. The approach presented in Table 1 avoids unnecessary mental exercise. Here we predefined certain actions and the possible reasons for those actions. By correlating actions and reasons, using permutation and combination, the causal factors are devised. Since one of our motives is to automate this process using this constructive approach, we can automate the causal factor generation as well. Lesson Learned 6. Making a rationale table for each causal factor table is undoubtedly useful as it lists the logic behind the causal factors and serves as a reference for further steps. The cause-effect relationship of the unsafe actions is exploited in the rationale table. The use of rationale tables helps to identify flaws in the original causal factors and thus works as a checkpoint for those factors. Lesson Learned 7. While using this analysis for finding the gaps in the existing architecture we realized that any architecture could make use of it. We performed the analysis independently of the current design and later compared the technical safety requirements with the existing design. By using a generic rather than the specific approach we found that more extensive applications are possible. The analysis can be used for evaluating any existing AEB system. The gaps provided us with the list of changes that the current architecture might incorporate in order to be safer and more secure. Lesson Learned 8. Another important lesson learned is about the residual risk inherent in any system. Residual risk refers to some risks which are present but acceptable, in our system. The assumptions made in the analysis are part of the residual risk. The integration of the outcome of this analysis with ISO standard is also an area where we should consider the presence of residual risk which is an integral part of the safety analysis and should be taken into account while doing the analysis. 5 Related work STPA proved to be a more powerful and useful technique for evaluating safety-critical systems in the automotive domain by identifying the potential accident scenarios that include the entire accident process, including design errors, software flaws, component interaction accidents and human decision-making errors contributing to accidents [1]. Both ISO 26262 and STPA are based on a systems engineering framework in which a system is considered to be more than merely the sum of its parts [5]. The development and top-down analysis are common to both. While ISO 26262 [7] emphasizes the importance of considering the context of a system in achieving safety (including the role of safety management and safety culture), there seems to be no consensus on whether ISO 26262 considers the context to be a part of the hazard analysis of an item. On the other hand, STPA includes all relevant aspects of the system’s environment, including the driver. 6 Conclusions In the safety analysis, the STPA process has been used to generate system design requirements for an Automatic Emergency Brake (AEB) using a top-down analysis approach to system safety. The STPA analysis provides an improved structured approach for scenario analysis, concentrating on safety and security. We learned lessons while applying the STPA process. The STPA has benefits, but needs to be integrated with the ISO to produce more efficient results. Doing Functional safety analysis and cyber security analysis in parallel is efficient and effective, but tool support is required. STPA is a structured and systematic approach that reduces mental exercise. 7 Future work The next step can be a comparative study, comparing the analysis with standard ISO. Further, the analysis can potentially be expanded beyond the AEB module to cover the complete functionality of AVs. References 1 Asim Abdulkhaleq and Stefan Wagner. Experiences with applying STPA to software-intensive systems in the automotive domain. Stuttgart, 2013. 2 Asim Abdulkhaleq, Stefan Wagner, Daniel Lammering, Hagen Boehmert, and Pierre Bueher. Using STPA in Compliance with ISO 26262 for Developing a Safe Architecture for Fully Automated Vehicles. arXiv preprint, 2017. arXiv:1703.03657. 3 N Leveson. An STPA Primer, Version 1. Massachusetts Institute of Technology, pages 22–65, 2013. 4 Nancy Leveson. Engineering a safer world: Systems thinking applied to safety. MIT press, 2011. 5 Archana Mallya, Vera Pantelic, Morayo Adedjouma, Mark Lawford, and Alan Wassyng. Using STPA in an ISO 26262 Compliant Process. In International Conference on Computer Safety, Reliability, and Security, pages 117–129. Springer, 2016. 6 Shefali Sharma Adan Flores Chris Hobbs Jeff Stafford and Sebastian Fischmeister. Functional Safety and Cybersecurity Assessment of L4 Autonomous Emergency Braking System. University of Waterloo, 2018. 7 Standard. ISO 26262 Road vehicles–Functional Safety. ISO, 2011. 8 John Thomas. Systems Theoretic Process Analysis (STPA) Tutorial, 2013. 9 John P Thomas IV. Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis. PhD thesis, Massachusetts Institute of Technology, 2013. 10 W Young. STPA-SEC for cyber security mission assurance. Eng Syst. Div. Syst. Eng. Res. Lab, 2014. Towards a Formal Model of Recursive Self-Reflection Axel Jantsch TU Wien, Vienna, Austria email@example.com Abstract Self-awareness holds the promise of better decision making based on a comprehensive assessment of a system’s own situation. Therefore it has been studied for more than ten years in a range of settings and applications. However, in the literature the term has been used in a variety of meanings and today there is no consensus on what features and properties it should include. In fact, researchers disagree on the relative benefits of a self-aware system compared to one that is very similar but lacks self-awareness. We sketch a formal model, and thus a formal definition, of self-awareness. The model is based on dynamic dataflow semantics and includes self-assessment, a simulation and an abstraction as facilitating techniques, which are modeled by spawning new dataflow actors in the system. Most importantly, it has a method to focus on any of its parts to make it a subject of analysis by applying abstraction, self-assessment and simulation. In particular, it can apply this process to itself, which we call recursive self-reflection. There is no arbitrary limit to this self-scrutiny except resource constraints. 2012 ACM Subject Classification Computer systems organization → Embedded and cyber-physical systems; Computer systems organization → Self-organizing autonomic computing Keywords and phrases Cyber-physical systems, self-aware systems, self-reflection, self-assessment Digital Object Identifier 10.4230/OASIcs.ASD.2019.6 1 Introduction When the autonomous system itself and its environment are exceedingly complex, dynamic and unpredictable, a comprehensive and correct assessment of the system’s situation is a prerequisite for good decisions. This insight has led to a proliferation of research that approach the challenges from various angles and run under names like autonomic computing [29, 32] and organic computing [23]. Self-awareness has become associated with many self-* properties including self-monitoring and self-adaptation and it has been identified as key element for designing complex computer systems [1] and cyber-physical systems [3]. The challenge has been picked up by funding organizations such as DARPA [25] and the European Commission [4] who have allocated significant funds for this research. These efforts have resulted in many conference papers, journal articles and four books [11, 18, 26, 32]. Several surveys have systematically reviewed the research landscape [9, 16, 19, 27]. While the term self-awareness is used in the literature in different ways and various definitions have been provided, researchers at a 2015 Dagstuhl Seminar have proposed a comprehensive working definition, as summarized by Kounev et al. [13], which is worth quoting in full: Self-awareness, in this context, is defined by the combination of three properties that IT systems and services should possess: 1. **Self-reflective:** i) aware of their software architecture, execution environment and the hardware infrastructure on which they are running, ii) aware of their operational goals in terms of QoS requirements, service-level agreements (SLAs) and costand energy-efficiency targets, iii) aware of dynamic changes in the above during operation. 2. **Self-predictive**: able to predict the effect of dynamic changes (e.g., changing service workloads or QoS requirements) as well as predict the effect of possible adaptation actions (e.g., changing service deployment and/or resource allocations). 3. **Self-adaptive**: proactively adapting as the environment evolves in order to ensure that their QoS requirements and respective SLAs are continuously satisfied while at the same time operating costs and energy-efficiency are optimized. Two reference architectures have been developed where these principles are at least partially implemented, the EPiCS architecture [17, 18] and the Learn-Reason-Act loop [12]. Although these and similar definitions are useful, they are still vague and imprecise. For instance the definition above repeatedly uses the term “aware” in defining self-awareness and thus does not explain what is meant by *awareness*. What would be the difference between being “aware of operational goals in terms of QoS requirements” and storing a list of QoS requirements and using them during operation? Does “aware of dynamic changes” mean that some variables and models are updated and then the system continues to use the new values, or does it mean that the system realizes that a change has happened and ponders its cause and its implications? Not least because much of the research on self-awareness is inspired by psychology (e.g. see [16]) the term “self-awareness” seems to suggest more than a set of variables and models that represent some features of the system, that it can access during operation. In particular, the definition above, and all other definitions presented in the computing literature, leave it open if the self-models are self-created based on self-observations or if the self-models are provided by the designer. If the latter is the case, would the self-model keep track if the reality changes? Also, should the system be aware of its self-awareness? And should this awareness be recursive without bounds? Should the self-awareness be self-adaptive as the environment, the system, and the self-model changes, as tasks become more or less urgent, as resources become available or are withdrawn? Different answers to these questions can lead to technically useful solutions and there seems to be a spectrum between the point where everything is defined at design time and the point where everything is self-constructed at run-time. Self-models, self-adaptation and self-awareness push towards run-time, but how far should we go and how do we determine the trade-offs? Addressing these questions will require to be precise with terminology and to define and model the involved concepts explicitly and in stringent formal terms. The following is an attempt of a formal model of self-awareness but it should not be taken as the final solution but rather as a first step. At several points we are less precise and less complete than we would like to be, partially due to limited space but mostly because of an incomplete understanding of what would be the best choices that lead to a sound basis for modeling, design, exploration and verification. The hope is that a precise formalism will eventually facilitate a design methodology and effective exploration of the design choices in the space of self-aware systems. ## Notation We use dynamic dataflow based on static dataflow process network models such as [7, 8, 14]. But we generalize these models to allow for dynamic changes in the network structure which results in dynamic dataflow not unlike the dynamic model proposed by Grosu and Stelen [5, 6]. The processes in the network are called actors and they communicate with each other through signals. ### 2.1 Signals Actors communicate with each other by writing to and reading from signals. Signals may be produced by sensors or may be the control inputs for actuators. The environment of an actor can also be modeled as an actor; hence, the actors communicate with each other and with the environment by means of signals. Given is a set of values $V$, which represents the data communicated over the signals. *Events*, which are the basic elements of signals, are or contain values. Signals are sequences of events. Sequences are ordered and we use subscripts as in $e_i$ to denote the $i^{th}$ event in a signal. E.g. a signal may be written as $\langle e_0, e_1, e_2 \rangle$. In general signals can be finite or infinite sequences of events and $S$ is the set of all signals. We assume an untimed model of computation [8, 15] and signals encode only a partially ordered time, meaning that events within one signal represent a relative ordering in time but events in different signals are not directly related in time. I.e. an event $e$ appearing before another event $e'$ in the same signal occurs before $e'$; but we do not know which of two events in different signals occur earlier or later. We use angle brackets, “⟨” and “⟩”, to denote ordered sets or sequences of events, but also for sequences of signals if we impose an order on a set of signals. $\#s$ gives the length of signal $s$. Infinite signals have infinite length and $\#\langle\rangle = 0$. We use the notation $\text{Signal}(V)$ to denote a type of signal that consists of elements of the set $V$. E.g. $\text{Signal}(\mathbb{R})$ would denote signals with real numbers, $\text{Signal}(\mathbb{N})$ would denote signals with natural numbers and $\text{Signal}\{(T, F)\}$ would denote signals that contain the two types of elements $T$ and $F$. Signals are point-to-point connections between actors, and there can only be one producer and one consumer for each signal. If events of a signal should be used by more than one actor, we need a copy actor that copies the input signal to two or more output signals. If two or more actors should contribute to one signal, we need a merge actor that defines how the events from the producing actors are merged. In the figures of this article we sometimes omit the copy and merge actors for convenience and clarity, but the model always requires them. ### 2.2 Signal Partitioning We use the partitioning of signals into sub-sequences to define the portions of a signal that are consumed or emitted by an actor in each activation cycle. A *partition* $\pi(\nu, s)$ of a signal $s$ defines an ordered set of signals, $\langle r_i \rangle$, which, when concatenated together, form the original signal $s$. The function $\nu : \mathcal{S} \rightarrow \mathbb{N}$ defines the lengths of all elements in the partition, where $\mathcal{S}$ is the set of states of the partitioning process. For example, if we have a signal $s = \langle 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 \rangle$, the partitioning process runs through the sequence of states $\langle q_0, q_1, q_2, \ldots \rangle$, and $\nu(q_0) = \nu(q_1) = 3, \nu(q_2) = 4$, then we get the partition $\pi(\nu, s) = \langle \langle 1, 2, 3 \rangle, \langle 4, 5, 6 \rangle, \langle 7, 8, 9, 10 \rangle \rangle$. Note, that there is nothing static about this partitioning, because the size of the next partition can be determined by the actor during each activation. Signal partitioning only captures the notion of activation cycles of actors which repeatedly consume part of the input and produce more and more of the output. 2.3 Actors An Actor $A \in A$ maps a set of input signals to a set of output signals. Actors repeatedly evolve through activation cycles, and in each cycle part of the input signals are consumed and part of the output signals are generated. Also, an actor may have an internal state which is also drawn from the set of all subsets of values $V$. $A$ denotes the set of actors, and $\mathfrak{S} = P(V)$, the power set of the set $V$, denotes the set of states, with $\epsilon \in \mathfrak{S}$ being the empty set, i.e. the state that has no values. To capture the notion of activation cycle and to model the behavior of actors, we introduce the state, the next state function $g$, the output encoding function $f$, and the partitioning function $\nu$ of an actor. Thus an actor with $n$ input and $m$ output signals is an eight tuple $A = \langle \mathfrak{T}, I, O, z_0, f, g, \nu, \overline{m} \rangle$ as follows: - $\mathfrak{T} \subseteq \mathfrak{S}$ ... set of states - $I \subseteq P(S)$ ... set of input signals - $O \subseteq P(S)$ ... set of output signals - $z_0 \in \mathfrak{T}$ ... the initial state - $\nu : \mathbb{N} \rightarrow P(\mathbb{N})$ ... input partitioning function - $f : P(S) \times \mathfrak{S} \rightarrow P(S)$ ... output encoding function - $g : P(S) \times \mathfrak{S} \rightarrow \mathfrak{S}$ ... next state function - $\overline{m} : \mathfrak{S} \rightarrow \text{Action}$ ... a meta operator Note, that the sets of input and output signals can dynamically change during the operation, and, consequently, the functions $\nu, f$ and $g$ may have to deal with different numbers of signals at different time. Events from an input signal not consumed by an actor during an activation cycle are left in the signal for later consumption, and if no events are generated for a particular output signal, the signal is unchanged. Thus, an actor is free to ignore input and output signals in which case they are never modified. The meta operator $\overline{m}$ can invoke any of the following actions, which modify the global dataflow network: | Action | Description | |-------------------------|--------------------------------------------------| | addsig($s$) | add signal $s$ | | connectisig($s, A$) | add signal $s$ to the set of input signals in actor $A$. | | connectosig($s, A$) | add signal $s$ to the set of output signals in actor $A$. | | delsig($s$) | delete input signal $s$ and remove it from the input and output signals of the connected actors. | | addactor($\mathfrak{T}', I', O', z'_0, f', g', \nu', \overline{m}'$) | create a new actor $A' = \langle \mathfrak{T}', I', O', z'_0, f', g', \nu', \overline{m}' \rangle$ | | delactor($A'$) | delete actor $A'$ | | nop | do nothing | Since the addactor action assumes all involved signals exist, unconnected signals have to be created first with addsig and used in addactor calls or attached to existing actors with connectisig and connectosig actions. An actor $A$ can be applied to a set of input signals to generate events on output signals. It does so by repeatedly consuming values from the input signals and producing values for the output signals. Each such activity is called activation or activation cycle. The number of input values consumed in each activation cycle is determined by the partitioning function $\nu$. $g$ computes the sequence of states $(z_1, z_2, z_3, \cdots)$ and $f$ gradually produces the values for the output signals. For actor $A$ we write $A(\langle s_1, s_2 \rangle) = \langle s_3, s_4 \rangle$ to denote an actor that consumes two input signals $s_1$ and $s_2$ and generates two output signals $s_3$ and $s_4$. Let $A$ and $B$ be two actors with input and output signals $I_A$, $I_B$, $O_A$ and $O_B$, respectively. If a subset $O'_A$ of $A$’s output signals has the same type as a subset of $B$’s input signals $I'_B$, they can be connected such that the signals $O'_A = I'_B$. This results in a compound actor $C$ with input signals $I_C = I_A \cup (I_B \setminus I'_B)$ and output signals $O_C = (O_A \setminus O'_A) \cup O_B$. The semantics of such actor networks (or process networks) are developed in [7], together with an analysis of loops and deadlocks. 3 Abstraction Abstraction is a prerequisite for self-modeling because the model that an actor entertains of itself, must be simpler, hence more abstract, than itself. Since we try to capture the notion of unlimited recursive self-modeling, we need to make sure, that the self-model at one level is more abstract than the self-model of the previous level. Here we do not show what a “good” abstraction is or how to derive it, but we only show that certain signal abstractions, that we use in later sections, have reduced information content. 3.1 Signal Abstraction Given two signals $s_1 : \text{Signal}(V_1)$ and $s_2 : \text{Signal}(V_2)$, an abstraction of $s_1$ is a mapping $B_\alpha : \text{Signal}(V_1) \to \text{Signal}(V_2)$ with an abstraction function $\alpha : \langle V_1 \rangle \to V_2$ that maps sequences of $s_1$ onto individual values of $s_2$. For instance, if a thermometer measures the sequence of temperature values as $$s_1 = (36.7, 36.8, 36.7, 36.8, 36.9, 36.9, 37.0, 37.0, 37.1, 37.2, 37.3, 37.2, 37.3, 37.3, 37.4, 37.5, 37.6, 36.6),$$ then the abstraction $B_\alpha$ with $$\alpha((t_1, t_2, t_3)) = \begin{cases} l & \text{if } (t_1 + t_2 + t_3)/3 < 35.5 \\ n & \text{if } 35.5 \leq (t_1 + t_2 + t_3)/3 < 37.5 \\ c & \text{if } 37.5 \leq (t_1 + t_2 + t_3)/3 < 38.5 \\ b & \text{if } 38.5 \leq (t_1 + t_2 + t_3)/3 \end{cases}$$ the abstraction $B_\alpha$ would map three consecutive temperate measurements onto one symbol, i.e. $B_\alpha(s_1) = \langle n, n, n, n, n, c \rangle$. Many signal processing functions can be considered abstractions. E.g. an ECG signal can be abstracted into a sequence of pulse periods, or into a sequence of $P, Q, R, S, T$ symbols to indicate the main components of the ECG signal. The important points are that the abstracted signal represents less information and thus can be encoded with fewer bits, and that it reflects regularities and repetitive patterns. If a sequence of values appears many times in the input signal, this sequence can be abstracted into one abstract symbol. (GrammarViz [28] and unsupervised symbolization [20] are examples for general methods for signal abstraction.) 3.2 Information Reduction by Abstraction The Shannon Entropy [2] provides a formalism for measuring the information content of a signal.\footnote{The Shannon Entropy assumes independent, identically distributed random variables, which in fact cannot be assumed in our case. In the following we use the Shannon Entropy as an estimate but recognize the need for a more appropriate model.} Let $V = \{v_1, v_2, \ldots, v_N\}$ be the set of symbols that appear on the signal $s$ and let the probability of $v_i$ be $p_i$, then the Shannon Entropy $H$ of signal $s$ is $$H(s) = - \sum_{i=1}^{N} p_i \log p_i.$$ $H(s)$ gives the average amount of information per symbol. For a signal of length $m, s = \langle e_1, e_2, \ldots, e_m \rangle$ the information content is $$I(s) = - \sum_{j=1}^{m} E[\log p(e_j)] = -m \sum_{i=1}^{N} p_i \log p_i$$ where $p(e)$ is the probability of event $e$ and $N$ is the number of distinct symbols. ### 3.2.1 Value Abstraction We consider two types of abstraction, time and value abstraction. Let the value abstraction function $\alpha_v$ be $$\alpha_v(\langle x \rangle) = \begin{cases} \mathfrak{A} & \text{if } x = a \text{ or } x = b \\ x & \text{otherwise} \end{cases}$$ which maps two symbols $a$ and $b$ onto the same symbol $\mathfrak{A}$ and leaves all other symbols unmodified. The abstraction $B_{\alpha_v}$ leaves the lengths of signals unchanged but reduces the number of different symbols by one. As a consequence, the information content of the abstracted signal is reduced as well which can be expressed by way of the Shannon Entropy. Let $V = \{v_1, v_2, \ldots, v_N\}$ be a set of symbols with $v_1 = a$ and $v_2 = b$, let $V_A = \{\mathfrak{A}, v_3, \ldots, v_N\}$ be another set of symbols with $N - 1$ elements, let $p_i$ be the probability of occurrence of $v_i$ with $p_1 = p_a$ and $p_2 = p_b$, and $p_{3k}$. Further, let $s$ be a signal of length $m$ and let $s_A = B_{\alpha_v}(s)$ be the abstracted signal of equal length. The Shannon entropy of these two signals is $$H(s) = - \sum_{i=1}^{N} p_i \log p_i = -p_a \log p_a - p_b \log p_b - \sum_{i=3}^{N} p_i \log p_i$$ $$H(s_A) = -p_{\mathfrak{A}} \log p_{\mathfrak{A}} - \sum_{i=3}^{N} p_i \log p_i$$ Since the last sum is identical in both expressions and since $p_{\mathfrak{A}} = p_a + p_b$ we have as entropy difference of these two signals $$H_\delta = H(s) - H(s_A) = p_a \log \frac{p_a + p_b}{p_a} + p_b \log \frac{p_a + p_b}{p_b}$$ The information content decreases on average by $H_\delta$ per symbol and it depends only on the probabilities of the two abstracted symbols $a$ and $b$. For the special case $p_a = p_b = p$ and the base 2 logarithm we have $H_\delta = 2p$. ### 3.2.2 Time Abstraction Let the time abstraction function $\alpha_t$ be $$\alpha_t(\langle x_1, x_2 \rangle) = \begin{cases} \mathfrak{A} & \text{if } x_1 = a \text{ and } x_2 = a \\ (x_1, x_2) & \text{otherwise} \end{cases}$$ $B_{\alpha_t}$ maps two consecutive occurrences of $\alpha$ onto $\mathfrak{A}$ and leaves all other symbols unchanged. We assume that all symbols $\alpha$ appear in pairs, thus all $\alpha$’s are replaced by $\mathfrak{A}$’s. This is not a simplification since we can pick an arbitrary pair of symbols, say $(b, c)$ and first apply a value abstraction to transform it into $(\alpha, \alpha)$ pairs, and then apply the time abstraction function $\alpha_t$. The key point is that $\alpha_t$ shortens the signal by replacing all pairs of symbols $(\alpha, \alpha)$ by a new symbol $\mathfrak{A}$. $\alpha_t$ reduces the signal length but not the number of symbols and not necessarily the information per symbol. Thus, the reduction of information content comes from the decreasing signal length. While the general case is quite involved, we can illustrate the trend with a special case. Assume an abstraction function $$\alpha_t(\langle x_1, x_2 \rangle) = \begin{cases} \mathfrak{A} & \text{if } x_1 = \alpha \text{ and } x_2 = \alpha \\ \mathfrak{B} & \text{if } x_1 = b \text{ and } x_2 = b \\ \mathfrak{C} & \text{if } x_1 = c \text{ and } x_2 = c \\ \ldots \end{cases}$$ Assume further that $s$ consists only of symbol pairs like $s = \langle \alpha, \alpha, c, c, \alpha, \alpha, b, b, \alpha, \alpha, \mathfrak{B}, \mathfrak{B}, \mathfrak{B}, \ldots \rangle$. The abstraction $B_{\alpha_t}(s)$ will then half the length of $s$ but probabilities will be maintained like $p_\alpha = p_\mathfrak{A}$, $p_b = p_\mathfrak{B}$, $p_c = p_\mathfrak{C}$, etc. Thus, the Shannon Entropy for $s$ and $s_A = B_{\alpha_t}(s)$ is $$H(s) = - \sum_{i \in \{\alpha, b, c, \ldots\}} p_i \log p_i$$ $$H(s_A) = - \sum_{i \in \{\mathfrak{A}, \mathfrak{B}, \mathfrak{C}, \ldots\}} p_i \log p_i = H(s)$$ Hence, the Shannon Entropy denotes the average information content per symbol, which is unchanged. However, the information content of the entire signal is as follows. $$I(s) = mH(s)$$ $$I(s_A) = \frac{m}{2} H(s_A) = \frac{I(s)}{2}$$ if the length of $s$ is $m$ and the lengths of $s_A$ is $m/2$ as a result of the abstraction. Time abstraction has its name because signals encode timing information. This means that merging two consecutive symbols into one decreases the number of symbols per time. Hence, timing abstraction reduces the information content per time unit. Reducing the amount of information is a necessary condition for an abstraction but it is not sufficient for a useful abstraction. A useful abstraction will reduce the information that is less relevant and keep the important information, thus increasing its prominence. Much could be said about finding good abstractions, see for instance [30] for effective abstraction techniques. Also note, that what constitutes a useful abstraction depends on the actor’s goals and condition. ### 3.3 Abstractions as Actors Signal abstraction is modeled as an actor that maps one or more input signals onto output signals. Let $B = \langle \mathcal{T}, I, O, z_0, \nu, f, g, \mathfrak{m}_0 \rangle$ with $\mathcal{T} = \{\epsilon\}$ (the actor is stateless), $I = \{\text{Signal}(V_1), \text{Signal}(V_2), \ldots\}$, $O = \{\text{Signal}(V')\}$ (one or more input and one output signal), $z_0 = \epsilon$, (No initial state), $\nu(.) = \langle c_1, c_2, \ldots \rangle$ (the actor consumes a constant number of values from each input signal), $g(\cdot, \cdot) = \epsilon$ (no states), $\mathfrak{m}_0(.) = \text{nop}$ (no meta actions). $B$ maps one or more input signals consisting of symbols from $V_1, V_2, \ldots$ onto one output signal with symbols from $V'$, and if it applies a combination of value and time abstractions, we call it a signal abstraction. We can of course conceive more complex abstractions with internal states, but this kind of abstraction will suffice to illustrate the approach. Given three actors $A, B_I, B_O$ an actor abstraction $\text{ActAbstraction}(A, B_I, B_O) = A_A$ denotes an abstraction of actor $A$, if $$B_O(A(S_I)) = A_A(B_I(S_I))$$ for all set of input signals $S_I$ that can be consumed by $A$. ![Figure 1](image) **Figure 1** $A_A$ is an abstraction of $A$ if $S'_O = S''_O$. This situation is depicted in Figure 1. $A_A$ operates on an abstraction of the input signals $S_I$, abstracted by the actor $B_I$. If the output signals $S'_O$ generated by $A_A$ are identical to the signals $S''_O$, which are abstractions of $S_O$, then actor $A_A$ is an abstraction of actor $A$. This definition is not constructive and does not tell us how to derive $A_A$, or $B_I$ or $B_O$; nor does it tell us what a useful abstraction is. Intuitively $A_A$ should be significantly simpler than $A$ but should faithfully reflect relevant properties of $A$. ## 4 Self-Model An actor with a self-model has an abstract model of its own behavior, an abstract model of the environment it interacts with, and the capability to simulate these abstract models together. Let $A$ be an atomic or compound actor (as defined in section 2.3) arbitrarily complex actor, let $B_I$ and $B_O$ be abstractors of the input and output of $A$, respectively, and let $\text{ActAbstraction}(A, B_I, B_O) = A_A$, just as discussed in section 3.3. Further, let $E$ be the environment the actor interacts with through the signal sets $S_I$ and $S_O$, and let $E_A$ be an abstraction of $E$, such that we have $\text{ActAbstraction}(E, B_O, B_I) = E_A$. Moreover, let $\tilde{A}$ be a *simulatable actor* derived from $A$ which behaves like $A$ with the following additions: - It has an additional input signal denoted as *control signal*. - It can be stopped and resumed at will through the control signal. - For each input signal of $A$ it has two input signals of the same type: hence it has two sets of input signals with identical types. The control signal selects one of the two sets for input in each activation cycle. - It has an additional output signal, denoted as *status signal* that reports its internal status under control of the control signal. The whole situation is illustrated in Figure 2a. In addition we see in the figure a $\text{Sim}$ actor, which controls the models $A_A, \tilde{E}_A, \tilde{B}_I$ and $\tilde{B}_O$ to simulate them. Also, instead of actor $A$ we have a modified actor $A'$ which acts just like $A$ but can at appropriate times invoke the simulator, learn about simulation results, which then can support its decision process. Thus, given appropriate actors $A$, $\hat{A}_A$, $\hat{E}_A$, $\hat{B}_I$, $\hat{B}_O$ and $\text{Sim}$, $\text{ActorSelfModel}(A, \hat{A}_A, \hat{E}_A, \hat{B}_I, \hat{B}_O) = A_{SM}$ is a resulting actor corresponding to the one shown in Figure 2a. ### 4.1 Self-Assessment ![Figure 2](image) **Figure 2** A self modeling actor $A_{ASM}$. To allow for self-assessment the actor requires a model of the specification and requirements of itself. Such a model can be an elaborate functional model, or it can be a list of properties that at all times have to be fulfilled. A large body of literature has studied this problem under terms such as run-time monitoring, fault tolerance, and reliability. Thus, we assume solutions readily exist and a dedicated actor, named $J_{A''}$, continually monitors the input and output signals of the actor under observation and detects functional and performance aberrations. We could connect $J_{A''}$ to the actor inputs $S_I$ and outputs $S_O$, however, it is more likely that $J_{A''}$ operates on abstractions of those signals like the one provided by $\hat{B}_I$ and $\hat{B}_O$. The output of actor $J_{A''}$ in Figure 2b is denoted as $\Delta_J$ and signifies the difference between expected and observed behavior. It is fed back to actor $A''$ to allow for the use of this information and improve its performance. Hence, we have a variation of the actor without that facility, which was named $A'$. If $J_{A''}$ also maintains a history of the assessment, it facilitates a holistic lifetime self-assessment as a basis for hindsight analysis, self-explanation and self-improvement. ### 4.2 Adaptive Self-Model To model adaptive actors we need to capture the notion of learning.\footnote{The meaning of terms “learning”, “adaptation” and “optimization” overlap. Here we use the term “learning” as a basic capability of an actor to modify its own behavior based on an error signal. Depending on how this capability is used, the actor may be \textit{self-optimizing}, when the behavior improves within the same environment, or \textit{adaptive}, when its behavior appropriately changes as response to a changing environment, or both.} A \textit{Learning Actor} $A^L$ is an actor that takes an error signal as input, in addition to the other signals it needs for its operation, and modifies its behavior with the goal to minimize the error in the error signal. Hence, let $A$ be an actor with input signals $I_A$ and output signals $O_A$, the learning actor... $A^L$ has input signals $I_{A'} = I_A \cup \{\sigma_e\}$ and output signals $O_{A'} = O_A$, where $\sigma_e$ is an error signal that reflects the quality of $A'$s performance in some way. It could be a simple numeric signal or it could be structured to detail which parts and aspects of $A'$s behavior exhibits which quality. Considering Figure 2b, there are several parts that we would like to see continually improved, in particular the abstractions $\bar{B}_T$ and $\bar{B}_G$, and the abstract models $\bar{A}_A$ and $\bar{E}_A$. If we want to make them learning actors, we have to identify the source of the error information. While actors could use application specific information, obvious generic sources are the differences between signals $S'_G$ and $S''_G$, and between signals $S'_T$ and $S''_T$. Consequently, we introduce actors that analyze the differences in two sets of signals to generate $\Delta$ signals that inform other actors about observed differences. Figure 2c shows two actors, $D_1$ and $D_2$ that analyze and compare signals $S'_T$, $S''_T$ and signals $S'_G$, $S''_G$, respectively, to generate the signals $\Delta_{S'_T}$ and $\Delta_{S''_G}$. These $\Delta$ signals are then used by the learning actors $\bar{B}'_T$, $\bar{B}'_G$, $\bar{A}'_A$ and $\bar{E}'_A$ to improve their models and their behavior. Figure 2c shows one possible scenario but many other strategies are conceivable and other information sources can be utilized to improve learning actors. We imagine that the learning actors in Figure 2c start with an initial, relatively crude model or behavior which then is continuously improved with the expectation that this continuous improvement eventually leads to far better models and behaviors for $\bar{B}'_T$, $\bar{B}'_G$, $\bar{A}'_A$ and $\bar{E}'_A$ than could possibly be accomplished with careful engineering at design time. 5 Recursive Self-Reflection Our actor has been extended quite significantly as illustrated in figure 2c. Before moving on, let’s step back and consider what we have done. We have added functionality to our original actor $A$ twice, as indicated by the two ticks. We have added assessment and simulation facilities together with abstract models of the actor itself and the environment. This allows for improved behavior of the actor by using self-assessment information from $A'_{A'}$ and by using predictions from $Sim$. In addition we have introduced learning capabilities for the abstractions. Thus, $A''$ is continually improving by three different means: self-assessment, simulation based prediction, improving abstract models. As a result we have obtained the actor $A_{ASM}$, an adaptive, self-modeling actor. Is it self-aware? The abstract self-model, the simulation engine, the self-assessment and the learning capabilities are all ingredients of self-awareness but they are not self-awareness, just like flour, sugar, raisins, yeast are ingredients for a cake, but they are not yet the cake. In fact, $A_{ASM}$ can be considered the cake, but we are not looking for the cake, we are looking for the process of baking. So far we have used the mechanisms abstraction, simulation, assessment, and learning deliberately to construct something which resembles self-awareness, but the result is not self-awareness because self-awareness is the process, not the result. We need a general method that uses those mechanisms and can be applied to any actor, not just $A$. In particular, it must also be applicable to itself. Consider Figure 3, where a learning actor $A^L$ interacts with the environment and is continuously monitored by $J_{A^L}$. Imagine the monitor $J_{A^L}$ is more complex than checking properties. It keeps track of a set of goals that may be hierarchically organized and in part mutually contradictory. The goals could be to perform some useful function, to keep the battery loaded, avoid harming people, avoid damage to itself and to its environment, etc. The $\Delta_J$ signal informs to which extent these goals are satisfied at any time during operation. In addition we have an actor $A^L_{SAF}$ that facilitates self-awareness. It is informed by $J_{AL}$ about the actor’s performance and, through the signals $s_{AL}$ and $s_{J_{AL}}$, it keeps track of which actors are in the system. If it deems necessary, for instance when it is unhappy about the actor’s performance, it can trigger an investigation. At its disposal it has simulation, abstraction, learning and other facilities. Picking an actor, for instance $A_L$, it can spawn a monitoring and assessment setup as illustrated in Figure 4a. It does all this through meta actions through the $\bar{m}$ output in the figure. The self-awareness facilitator still keeps track of many, but not necessarily all, actors in the system, which is indicated by the $S_A$ input signal. It can spawn a new investigation into any of the newly created actors if deemed useful and if the available resources suffice. In addition, we propose to also provide an explanation actor $F$ that, through a question and explanation interface (signals $s_Q$ and $s_F$), provides a mechanism to explain what has happened, which decisions have been taken, what observations have been made. We expect this actor to be useful in the interaction with other systems. In particular in the interaction with humans it will convey to which extent the $A_{SA}$ actor is self-aware and at what level it understands what it is doing. For now, let’s assume $A^L_{SAF}$ deletes the newly created actors and returns to the state shown in figure 3, and then picks actor $J_{AL}$ as a next target for investigation, the result of which is shown in figure 4b. Moreover, it may target itself, if unhappy with its own performance or if just curious, and thus create a situation as shown in figure 4c. In its simplest form the proposed self-reflection mechanism picks an actor, atomic or compound, abstracts this actor and assesses the behavior of the abstracted actor by comparing it to the actor’s stated goals. Hence, a prerequisite for this operation is the accessibility of stated goals, which may be part of the actor under study or may come from somewhere else. From that it follows, that $A^L_{ASF}$ can study any other actor for which it has access to its inputs, outputs and goals. This may in principle be the case for any of the actors visible in Figures 4a – 4c. But note, that not every interior detail of an actor is necessarily subject to this mechanism, since it is limited to behavior visible from the outside. To warrant the name “recursive” the mechanism must be applicable to itself and to thus recursively derived actors, without principle limits. Consequently, any actor created by $A^L_{ASF}$ in Figure 4 could have its inputs, outputs and goals again be accessible to $A^L_{ASF}$. Without working out the details here this is plausible for all created actors because $A^L_{ASF}$ generates the inputs and outputs itself and “knows” what it is supposed to accomplish. In summary, we define self-awareness as the capability to pick any actor in the system, it may be a simple or compound actor or the entire system itself, and apply abstraction, assessment, prediction, and learning techniques, as outlined in this article, in order to analyze, assess and possibly improve its performance. 6 Related Work As alluded to in the introduction a substantial amount of papers have been published on the topic of self-awareness. Here we only compare our proposal to definitions of self-awareness that have similar scope and ambition. In 2009 Agarwal et al. [1] argue that self-aware subjects should be “introspective” (they can observe and optimise their own behaviour), “adaptive”, “self-healing”, (they monitor themselves for faults and take corrective actions), “goal oriented”, and “approximate”, (they use the least amount of precision to accomplish a given task). In 2011 Lewis et al. [19] base their concepts on work in psychology, in particular on Morin’s definition of self-awareness as “the capacity to become the object of one’s own attention” [22] and Neisser’s five-level model [24] which includes the “ecological self”, the “interpersonal self”, the “extended self”, the “private self” and the “conceptual self”, the last being “the most advanced form of self-awareness, representing that the organism is capable of constructing and reasoning about an abstract symbolic representation of itself” [19]. In 2014 Jantsch et al. [10] give seven properties that constitute awareness and define a subject to be aware at level 0 to 5, depending on which of these properties are exhibited by the subject. For instance level 4 requires that the subject assesses its own performance over the history of its lifetime, and can simulate future actions for prediction and planning purposes. The highest level 5 defines group awareness which requires subjects to be aware of its peers in a group. We have cited the 2017 definition by Kounev et al. [11] in the introduction and repeat here only that it requires a subject to be self-reflective, self-predictive and self-adaptive. All these definitions have some concepts in common, like goal orientation, adaptation, and introspection, but also differ in whether they include self-healing, approximation, learning, or prediction. But note that a definition that does not include an aspect such as learning probably does not mean to exclude it either. What is mentioned explicitly may only reflect the prominence given to some of the aspects, while others are less emphasized. These ambiguities and imprecision are a consequence of the informal style used to describe rather than define the key concepts of self-awareness. Hence the first main difference to the work cited above is our attempt to provide a formal semantic for the involved concepts thus avoiding ambiguities and imprecision. We admit, that this attempt in giving a formal semantic is not complete but we argue it is a first step that shows the contours of such a semantic and that suggests it can be given. The work by Vasiev and Hinchev [31] is a formal approach to model self-awareness based on knowledge representation. It captures knowledge the system has about itself that includes information, rules, constraints and methods. The formal model has the benefit of clarity and unambiguity which makes clear that awareness is reduced to knowledge representation. In the described case study this self-knowledge is used by robots in a swarm to make situation dependent decisions that sensibly contribute to an overall swarm behavior. However, a mechanism to observe, assess and reason about its own usage of self-knowledge is missing. Hence, the second main difference is the concept of recursive reflection. No other previous definition or model allows for applying self-awareness recursively onto its own activity. However, we contend that this unbounded recursion is the essence of self-awareness and it requires a formal model to demonstrate its feasibility and its utility. 7 Conclusions The proposed formal model of self-awareness is based on a dynamic dataflow semantics. It captures the notion of signal abstraction, actor abstraction, adaptive actors, self-assessment, and recursive self-reflection. Even though many details of the formalism are still missing and the approach has not yet been demonstrated we are hopeful that it can be implemented and simulated in an appropriate framework. A particular appealing aspect of recursive self-reflection is its promise, that any particular situation can be abstracted up to a level, where it is amenable to the assessment and planning capabilities of the system. Thus, there is no situation too complex that the self-aware actor is able to handle, provided it finds the appropriate sequence of abstractions. Since an abstraction step reduces the amount of information and since abstractions can be recursively applied, a given situation can be abstracted up to the level, where its information amount is within the limit of the system. The human mind seems to be doing something similar, because it manages to analyze, elaborate, and handle arbitrarily complex subjects even though the amount of conscious information processing is severely limited as has been established in Miller’s seminal paper in 1956 on the magical number seven [21], and confirmed many times since then. If this analogy is correct, and if sufficiently effective and efficient abstraction techniques can be developed and employed, recursive self-reflection would turn out to be a wonderfully general tool for dealing with arbitrary situations where assessment and planning is crucial but an overwhelming diversity and complexity seems to render any general technique futile. These are big Ifs and a number of questions arise. Abstraction techniques. We need efficient techniques for automated abstraction. The definition of ActAbstraction is not constructive and there seems to be no good, general method to abstract an arbitrary actor. However, many abstraction methods exist but all of them have their strength and drawbacks. Thus, we need to identify good abstraction methods for our purpose and we need methods to select the most appropriate for a specific actor and for specific objectives. Abstraction level. Related to the abstraction method is the question of the right abstraction level. A given set of data and a given abstractor can be abstracted more or less. It is not well understood what constitutes a good abstraction level in general, and how to identify a good abstraction level in a particular case. Assessment techniques. We need good assessment techniques. Again, we do not have good general methods for assessment of an arbitrary actor. Goal Management. Complex systems often have a complex goal structure, which may be hierarchical and dynamic with partially overlapping and partially mutually exclusive goals. Handling these goals and assessing an actor’s performance with respect to given goals is an interesting challenge. **Learning.** Machine learning is an active research domain and many methods have been proposed and studied. The challenge for us is to identify appropriate and efficient learning methods streamlined for our purpose. **Simulation.** Finally, general and efficient simulation methods will be instrumental to make self-awareness as proposed efficient. The key here is probably not the simulation method itself, but to find the right abstraction level in combination with efficient simulation methods. With a precise, formal and operational model of self-awareness we can identify its challenges, address the open problems and study its benefits and drawbacks in the context of specific applications. As a result, self-awareness could be made into a powerful generic method that can be the foundation of truly autonomous systems. --- **References** 1. A. Agarwal, J. Miller, J. Eastep, D. Wentzlaiff, and H. Kasture. Self-aware Computing. *Final Technical Report AFRL-RI-RS-TR-2009-161*, page 81, 2009. 2. T. M. Cover and J.A. Thomas. *Elements of Information Theory*. Wiley, Hoboken, NJ, USA, 2006. 3. Lukas Esterle and Radu Grosu. Cyber-physical systems: challenge of the 21st century. *e & i Elektrotechnik und Informationstechnik*, 133(7):299–303, November 2016. 4. European Commission. Self-Awareness in Autonomic Systems, January 2013. 5. Radu Grosu and Ketil Stølen. A denotational model for mobile point-to-point dataflow networks. Technical Report Technical Report SFB 342/14/95 A, Technische Universität München, 1995. 6. Radu Grosu and Ketil Stølen. A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing. In *In Proc. AMAST’96, LNCS*, pages 504–519, 1996. 7. Axel Jantsch. *Modeling Embedded Systems and SoCs – Concurrency and Time in Models of Computation*. Systems on Silicon. Morgan Kaufmann Publishers, June 2003. 8. Axel Jantsch. Models of Embedded Computation. In Richard Zurawski, editor, *Embedded Systems Handbook*. CRC Press, 2005. Invited contribution. 9. Axel Jantsch, Nikil Dutt, and Amir M. Rahmani. Self-Awareness in Systems on Chip – A Survey. *IEEE Design Test*, 34(6):1–19, December 2017. 10. Axel Jantsch and Kalle Tammenmäe. A Framework of Awareness for Artificial Subjects. In *Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis*, CODES ’14, pages 20:1–20:3, New York, NY, USA, 2014. ACM. 11. S. Kounev, J.O. Kephart, A. Milenkoski, and X. Zhu, editors. *Self-Aware Computing Systems*. Springer, 2017. 12. Samuel Kounev, Peter Lewis, Kirstie Bellman, Nelly Bencomo, Javier Camara, Ada Diaconescu, Lukas Esterle, Kurt Gehs, Holger Giuse, Sebastian Götz, Paola Inverardi, Jeffrey Kephart, and Andrea Zisman. The Notion of Self-Aware Computing. In Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, and Xiaoyun Zhu, editors, *Self-Aware Computing Systems*, pages 3–16. Springer, 2017. 13. Samuel Kounev, Xiaoyun Zhu, Jeffrey O. Kephart, and Marta Kwiatkowska. Model-driven Algorithms and Architectures for Self-Aware Computing Systems (Dagstuhl Seminar 15041). *Dagstuhl Reports*, 5(1):164–196, 2015. 14. Edward A. Lee. A Denotational Semantics for Dataflow with Firing. Technical Report UCB/ERL M97/3, Department of Electrical Engineering and Computer Science, University of California, Berkeley, January 1997. Edward A. Lee and Alberto Sangiovanni-Vincentelli. A Framework for Comparing Models of Computation. *IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems*, 17(12):1217–1229, December 1998. Peter R. Lewis. Self-aware Computing Systems: From Psychology to Engineering. In *Proceedings of the 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)*, pages 1044–1049, 2017. Peter R. Lewis, Arjun Chandra, Funmilade Faniyi, Kyrré Glette, Tao Chen, Rami Bahsoon, Jim Torresen, and Xin Yao. Architectural Aspects of Self-aware and Self-expressive Computing Systems. *IEEE Computer*, August 2015. Peter R. Lewis, Marco Platzer, Bernhard Rinner, Jim Torresen, and Xin Yao, editors. *Self-Aware Computing Systems: An Engineering Approach*. Springer, 2016. P.R. Lewis, A. Chandra, S. Parsons, E. Robinson, K. Glette, R. Bahsoon, J. Torresen, and Xin Yao. A Survey of Self-Awareness and Its Application in Computing Systems. In *Self-Adaptive and Self-Organizing Systems Workshops (SASO), 2011 Fifth IEEE Conference on*, pages 102–107, October 2011. Yue Li and Asok Ray. Unsupervised symbolization of signal time series for extraction of the embedded information. *Entropy*, 19(4), January 2017. George A. Miller. The Magical Number Seven, Plus or Minus Two: Some Limits on our Capacity for Processing Information. *Psychological Review*, 63:81–97, 1956. Alain Morin. Levels of consciousness and self-awareness: A comparison and integration of various neurocognitive views. *Consciousness and Cognition*, 15(2):358–371, 2006. Christian Müller-Schloer, Hartmut Schmeck, and Theo Ungerer, editors. *Organic Computing — A Paradigm Shift for Complex Systems*. Birkhauser, 2011. Ulric Neisser. The roots of self-knowledge: Perceiving self, it, and thou. *Annals of the New York Academy of Sciences*, 818:19–33, 1997. L.D. Paulson. DARPA creating self-aware computing. *IEEE Computer*, 36(3):24, March 2003. Jeremy Pitt, editor. *The Computer after Me: Awareness and Self-Awareness in Autonomic Systems*. Imperial College Press, 2014. J. Schaumeier, J. Jeremy Pitt, and G. Cabri. A Tripartite Analytic Framework for Characterising Awareness and Self-Awareness in Autonomic Systems Research. In *Proceedings of the Sixth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW)*, pages 157–162. IEEE Computer Society, 2012. P. Senin, J. Lin, X. Wang, T. Oates, S. Gandhi, A.P. Boedihardjo, C. Chen, S. Frankenstein, and M. Lerner. GrammarViz 2.0: a tool for grammar-based pattern discovery in time series. In *ECML/PKDD*, 2014. R. Sterritt and M. Hinchey. SPAACE IV: Self-properties for an autonomous and autonomic computing environment - part IV a newish hope. In *IEEE International Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe)*, pages 119–125, 2010. Joshua B. Tenenbaum, Charles Kemp, Thomas L. Griffiths, and Noah D. Goodman. How to Grow a Mind: Statistics, Structure, and Abstraction. *Science*, 331(6022):1279–1285, 2011. E. Vassev and M. Hinchey. Knowledge Representation and Awareness in Autonomic Service-Component Ensembles - State of the Art. In *2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops*, pages 110–119, March 2011. Martin Wirsing, Matthias Hölzl, Nora Koch, and Philip Mayer, editors. *Software Engineering for Collective Autonomic Systems: The ASCENS Approach*. Springer, 2015. A Dependable Detection Mechanism for Intersection Management of Connected Autonomous Vehicles Rachel Dedinsky Arizona State University, 660 S Mill Ave, Tempe, AZ, US firstname.lastname@example.org Mohammad Khayatian Arizona State University, 660 S Mill Ave, Tempe, AZ, US Mohammadreza Mehrabian Arizona State University, 660 S Mill Ave, Tempe, AZ, US Aviral Shrivastava Arizona State University, 660 S Mill Ave, Tempe, AZ, US Abstract Traffic intersections will become automated in the near future with the advent of Connected Autonomous Vehicles (CAVs). Researchers have proposed intersection management approaches that use the position and velocity that are reported by vehicles to compute a schedule for vehicles to safely and efficiently traverse the intersection. However, a vehicle may fail to follow intersection manager (IM) scheduling commands due to erroneous sensor readings or unexpected incidents like engine failure, which can cause an accident if the failure happens inside the intersection. Additionally, rogue vehicles can take the advantage of the IM by providing false position and velocity data and cause traffic congestion. In this paper, we present a new technique and infrastructure to detect anomalies and inform the IM. We propose a vision system that can monitor the position of incoming vehicles and provide real-time data for the IM. The IM can use this data to verify the trajectories of CAVs and broadcast a warning when a vehicle fails to follow commands, making the IM more resilient against attacks and false data. We implemented our method by building infrastructure for an intersection with 1/10 scale model CAVs. Results show our method, when combined with an IM dataflow, is more dependable in the event of a failure compared to an IM without it. 2012 ACM Subject Classification Computer systems organization → Embedded and cyber-physical systems Keywords and phrases Connected Autonomous Vehicles, Intersection Management, Dependable Systems Digital Object Identifier 10.4230/OASIs.ASD.2019.7 Category Interactive Presentation 1 Introduction CAVs are expected to shape the future of the automobile industry because they have the potential to minimize traffic, increase user satisfaction by enabling user autonomy, and, most importantly, increase safety for all interaction models. In order to truly be accepted by the community, it is important to have reliable infrastructure to support these vehicles. A point of complexity in this fully autonomous system is managing traffic at an intersection. To manage traffic best, infrastructure is implemented to support intersection management. Automated Intersection Management or Intersection Managers (IM(s)) as they are referred to in this paper interact with vehicles as they approach an intersection. IMs have the potential to make intersections safer and more efficient compared to the involvement of human drivers in interactions, as these IMs instruct traffic as an unbiased external system specifically designed for both safety and efficiency. Humans are biased and prone to making a greedy decision in safety-critical situations which can decrease throughput and lead to accidents. Thus, many researches regarding intersection optimization have involved the use of IMs. Some of the most notable existing researches using IMs are Autonomous Intersection Management(AIM)[7], Crossroads[2], and Robust Intersection Management(RIM)[11]. In AIM, vehicles query the IM with a specific velocity of arrival and trajectory of arrival in order to reserve a timeslot through the intersection, which is commonly called a query-based IM(QB-IM). In Crossroads, vehicles provide their current position and velocity to the IM and request a velocity from the IM to drive safely through the intersection; this technique is commonly referred to as a velocity-assignment Intersection Management(VA-IM). VA-IM is improved in RIM; typically a VA-IM assumes constant velocity through the intersection but RIM tracks position trajectory in order to account for external disturbances. From experimentation, we know that even RIM can’t account for all external disturbances, because it has no physical monitoring system to ensure that the trajectory of arrival assigned in RIM is actually achieved. A common technique in these IMs to achieve safe operation despite uncertainty in vehicle’s trajectory is to consider a safety buffer around the vehicles to ensure safe scheduling of vehicles through the intersection. Though this achieves some level of reliability by considering worst case position uncertainty of vehicles, this can still be erroneous if too much trust is placed on one system. Consider the case where a vehicle has inaccurate positioning information which is being reported to the IM. If the error of positioning is greater than the threshold safety buffer, an accident is likely to occur in the intersection. For example in AIM to achieve a safe scheduling of vehicles through the intersection, the CAVs send the IM completion times; this way the IM knows which vehicles are about to enter the intersection, are in the intersection, or have completed their trajectories through the intersection. The completion time data which the IM uses to create a schedule are based on the data the car is reporting for its position, and in the case that the car is reporting positioning outside of the threshold safety buffer value the schedule will be inaccurately computed. True safety relies on redundancy of systems to maximize the safety of the IMs. In addition to safety, these IMs must be more efficient to be accepted by the community. A study done by University of Michigan [5] showed that connected vehicles, while improving quality of life for humans, also opens the door for cyber-attacks. Their study attacked I-SIG sponsored by the United States Department of Transportation and their results showed how drastically throughput can decrease if traffic control is not secured. Those doing research on IMs use encryption to prevent outsiders from attacking the system. Additionally, IMs are external systems and therefore unbiased because they produce the schedule to proceed through the intersection instead of vehicles possibly making greedy decisions. However, if an attacker found a way to spoof into the system, there is no way to detect a sybil attack since there is no data validation. We propose a Detection System as an additional way to advance safe operation. The Detection System will act as a supervisory system that can verify the behavior of vehicles before and inside the intersection. This external system will supplement IMs positioning data given by the CAVs with real-time, environmental sensing data. Additionally, this system will have the capability to validate if vehicles are communicating with the IM, if a vehicle is actually entering the intersection (e.g., sensing for a sybil attack), and ensuring the connected data aligns with the environmental data. In the event of an accident-prone situation, the IM can broadcast a warning to the CAVs interacting with the intersection. This solution can be applied to many intelligent intersection management schemes already implemented or in development, since it acts as an external agent whose primary focus is to identify positioning information (which can be extrapolated to velocity data using a simple distance versus time equation). This enables many IMs to have more fine-tuned positioning data and these management schemes can therefore make more informed decisions for scheduling vehicles through the intersections. The implementation of the Detection System was done by building intersection infrastructure and CAVs that are 1/10 scale. 2 Related Work Many different intelligent autonomous intersection schemes has been proposed so far [3, 9, 12, 13]. We need to validate that the intersection management schemes are as robust, resilient, reliable, and redundant as possible. A popular solution to this problem is known as the Autonomous Intersection Management (AIM) [7]. As vehicles approach the intersection at a constant speed, the vehicle sends a speed query to the IM and the IM replies with either a yes or a no to the request based on other requests it is managing for safe operation. If the answer from the IM is yes, the vehicle continues through the intersection at the requested constant speed; however if the answer is no the vehicle slows down and again queries the IM. Once the vehicle is through the intersection it would send a done signal to the intersection manager. This query-based approach worked well on both hybrid (both autonomously-driven and human-driven vehicles operating on the road) and completely autonomous intersections and it did not degrade the position uncertainty due to computational delay on the IM, however it increased network traffic and the amount of computation done on both the vehicle and the IM. In order to have safe operation, AIM relies on the accuracy of the data being communicated between the vehicles and the IM. Another cutting-edge solution followed it, known as Crossroads [2], whose contribution was to have the IM calculate and assign the velocity of completely autonomous vehicles requesting to cross the intersection. This method when compared to AIM decreased network traffic and computational delay. Vehicles in this research were given a safety buffer which accounted for uncertainty in velocity and position. Network and computational delays are included in finding the round trip delay and this round trip delay is incorporated into the safety buffer. The main issue with this scheme was that it was prone to external disturbances and model mismatches (i.e., a bump in the road or wind). This is because Crossroads tracked a constant velocity through the intersection without accounting for the effect of position uncertainty resulting from these disturbances. The resulting position uncertainty leads to the possibility of inaccurate positioning data being communicated between the vehicles and the IM. This situation could eventually lead to accidents since the IM isn’t aware of the vehicles’ exact positioning. The research which improved on Crossroads was Robust Intersection Management (RIM) [11], whose contribution was to track the trajectory of vehicles through the intersection. The premise was to assign a velocity of arrival (VOA) and trajectory of arrival (TOA) to vehicles who were about to enter the intersection. The tracked trajectory accounted for the time it would take the vehicle to speedup or slowdown its velocity to reach its respective VOA. This helped account for any position disturbances and therefore lead to a more accurate model for scheduling vehicles crossing the intersection. Though RIM has higher certainty of vehicle positioning, it still relies entirely on accurate data transmission from the vehicles to the IM which can be error prone as seen in Figure 1. Since all the researches above have one point of failure for obtaining positioning information, they are all prone to attacks which involve spoofing of location. Further, the system may fail if the communication between the vehicle and the IM fails. Whether a direct attack or lack of validation of connected data, any positioning inaccuracy can be detrimental to safe operation of the IM. To improve all these models, it is extremely beneficial to create redundant systems. ![Figure 1](image) **Figure 1** RIM Algorithm: A car will communicate with the IM to get a Time of Arrival (TOA) and Velocity of Arrival (VOA). However, it may not be able to meet the TOA and VOA and can cause an accident. ## Proposed Method The Detection System needs to be able to gain a robust understanding of the environment, and the solution implemented to find positioning data was image processing. It is important for this system to act independently from the IM to prevent interaction bias. To act independently, this system must do all processing externally from any of the IM researches, acting only as a reporting mechanism. The interaction model between the IM and Detection System uses I2C, where position determined by the Detection System is sent using I2C to the IM to be used for computation. Note that for security purposes, the Detection System is completely offline, so accessing the system can only be done physically. This adds a layer of data integrity which is dependent on the physical security to the Detection System and the cyber-security available to the IM. Because the Detection System contains four subsystems, there were four I2C communication points between the IM and the Detection System. As described in Algorithm 1, the Detection System uses live video feed, parses the image using image processing, and alerts the IM using interrupts that a vehicle with a given identification is approaching the intersection. To do the image processing, the camera is calibrated, the image is normalized, and then the front bumper of the car is identified. Once the bumper is located in the image, the distance to the car can be found. This distance is transferred over I2C to the IM. In Algorithm 2, the IM uses the calculated distance and identification provided by the Detection System to parse for specific packets being sent from the vehicles. Then the IM will process the environmental data and compare it to the connected vehicle data. During this comparison the IM can perceive four different scenarios: The first is that the image processing data doesn’t match the connected data, the second is that a request is received but no vehicle is detected, the third is the Detection System recognizes a vehicle is approaching even though Algorithm 1: Pseudocode for Camera platform. for every $\Delta t$ seconds do Read Image; Process Image ; Send vehicles’ data to IM; end the vehicle hasn’t communicated with the IM, and the last is that the connected data is the same as the environmental sensing data. These scenarios are discussed in Section 4. Algorithm 2: Pseudocode for IM. Timer_ISR (every $t$ seconds){ Get data from cameras; } if (A packet is received) then Process the data: if Scenario 1: Camera’s data doesn’t match the expected then Send back a packet to the vehicle end if Scenario 2: A request is received but no vehicle is detected then Change Policy e.g. MAC blocking end if Scenario 3: vehicle didn’t communicate (A rouge driver) then Broadcast an alert to other automated vehicles end end 4 Empirical Evaluation The Detection System is beneficial to preserve high precision of position certainty for the IM. We implemented and tested with the four previously discussed scenarios in order to show the advantages of using the Detection System. Our testing has shown that in all four scenarios, the Detection System was able to observe and report the vehicle’s location within 2 cm accuracy. 4.1 Testbed 4.1.1 The components The Detection System created in this research involved four separate, equivalent subsystems to work together. Each subsystem’s purpose was to monitor a given lane of traffic. Given a typical intersection, there are four lanes of traffic therefore four subsystems were needed for testing of the Detection System. Each subsystem was built using a Raspberry Pi 3 Model B as the processing agent, running operating system Raspbian Sketch 4.14. A Raspberry Pi V2 Camera was used for capturing the visual input to the subsystem. OpenCV 184.108.40.206 in Python 3.5 was used for image detection. Note the interaction of all these components in Figure 2. ![Diagram](image) **Figure 2** The IM, Detection System and vehicle interact with each other in five steps to verify the car data using the environmental sensing data. ### 4.1.2 Chosen IM In order to test the Detection System, a version of RIM was used for the IM. RIM iterated on both AIM and Crossroads, and has the most accurate model for positioning data. By using the model with the most accurate positioning, the potential of the Detection System can be seen more clearly. Briefly, RIM divides the action of a vehicle approaching the intersection into four phases. Initially, the vehicles synchronize their clocks with the IM and pass a physical synchronization line. If the synchronization is not successful the vehicle tries to synchronize again. If the synchronization is successful, then when the vehicles pass the physical transmit line they send to the IM a packet containing position, velocity, acceleration, timestamp, outgoing lane, minimum and maximum acceleration, and identification. If this transmit is unsuccessful, the vehicle slows down and tries again. If this transmit is successful, the IM calculates a trajectory of arrival and velocity of arrival for the vehicle based on the packet sent by the vehicle and the respective scheduling algorithm being used to control the vehicles which are currently interacting with the intersection. Then the IM sends this packet back to the requesting vehicle, meanwhile the vehicle is keeping a constant velocity headed toward the intersection until it receives further instruction. Finally, the vehicle creates a reference trajectory from the received packet from the IM and follows it through the intersection[11]. Using RIM described above as the basis for the IM, the Detection System was incorporated into a variant algorithm for RIM which for our purposes will be called RIM Robust. RIM Robust varies from RIM after phase two finishes. In phase three after the vehicle transmits its data to the IM, the IM verifies that the transmitted data is the same as the environmental sensing data from the Detection System. To implement RIM Robust as seen in Figure 3, the first step was to build a model intersection with model CAVs. The vehicles were built using TRAXXAS RC Car with onboard ESP8266 boards for communication with the IM, which also used an ESP8266 board. All boards were designed using the Arduino software suite. A wooden arch was crafted for the infrastructure to support the Raspberry Pi and Camera above the 1/10 scale model of Figure 3 RIM Robust has a surveillance Detection system that monitors the position of vehicles and reports it to the IM. intersection using TRAXXAS RC car. Given that the average traffic light is approximately 18 ft. to 22 ft. in height, our scaled, wooden infrastructure’s height was 26 inches tall. The infrastructure of the model intersection can be seen in Figure 4. Figure 4 At one corner of the intersection, you can see one of the four subsystems of the Detection System mounted on top of the wooden infrastructure with a TRAXXAS RC Car about to drive underneath. 4.1.3 Image Processing For image processing, the camera first had to be calibrated. It is important to note the field of view (a restriction to what is visible in the frame [1]) because it is directly related to the focal length (the distance from the focal point to the vertex of the first optical surface [10]), which is needed to understand distances in a picture. Note that depending on the angle at which the camera is pointed at the intersection, different focal lengths will result. Once the camera is calibrated and the focal length is found, the images read in could be normalized for image processing and the front bumper of the RC cars can be more easily detected. Once the bumper was detected, trackers were created for each RC car\cite{8} which could be used to find distance by comparing with a base set of images. This base set of images defined the ratio of pixels to distance, so by comparing an identified pixel to the base set you can estimate the distance as shown in Figure 5. ![Figure 5](image) **Figure 5** Detect the front bumper use the pixels to approximate actual distance from the camera to the vehicle. ### 4.1.4 Preliminary results In Figure 6, the chart shows a comparison between the vehicle self-reporting error and the Detection System error. The Detection System has an error of approximately 2cm on average for true distance compared to actual distance. This uncertainty could be introduced by error in the perception algorithm itself. This error is small, though in a real-world scenario noisy perception data is likely and thus this methodology to obtain data will need to be tuned to any given environment. The results from testing show that safety of the intersection is increased because the likelihood of an accident is minimized, and the total throughput is increased because there are no accidents that result (where accidents cease throughput of cars through the intersection). Throughput here is a measure of managed vehicles divided by total wait time. ### 4.2 The Benefits of the Detection System Analyzing RIM Robust, four scenarios may occur shown briefly in Algorithm 2. Note that the positioning data reported by the CAVs is prone to higher amounts of error compared to the Detection System, which has positioning data that is not prone to external disturbance/misreporting and therefore the Detection System’s data overwrites the CAVs’ data. In the first scenario, the environmental data is different from the reported data from the vehicle. This scenario requires the IM to go into recovery mode and update the vehicle’s information packet to what is observed from the environmental data. The second scenario is that a request is received by the IM from a vehicle but the requesting vehicle is not detected by the Detection System. This implies an invalid request is coming from an attacker or an error occurred, therefore mark this user as an invalid user by implementing methods such as MAC blocking. This scenario requires that RIM Robust’s policy will be updated so as to handle attackers who are trying to slow throughput or cause harm. The third scenario is that the Detection System finds a vehicle entering the intersection which didn’t communicate. This scenario again requires RIM Robust’s policy will be updated to handle a rouge driver attack, where a vehicle outside the system maliciously goes rouge. Note the interactions for the three error scenarios described here are depicted in Figure 7. Finally in the last scenario, the vehicle’s data matches the Detection System’s data. This requires no change to the operation of RIM and so the algorithm continues as described in RIM. In order to test this system, RIM Robust was implemented using recovery mechanisms such as alerting CAVs of potential attacks, MAC blocking, and updating vehicle’s information. 4.3 Sybil Attack case study 4.3.1 Theory The Sybil attacker uses false data (e.g., ID) to authenticate itself and sends a request to the IM for passage through the intersection [4]. The attack would cause the IM to schedule a vehicle which isn’t actually present in the intersection with the intention of decreasing throughput through the intersection [6]. This leaves the intersection vulnerable in high traffic situations. To control such situations, the Detection System can monitor the traffic and determine whether or not the vehicle exists or not. If there is a vehicle detected using the environmental sensing data, the Detection System goes a step further and identifies the vehicle using the identification characteristics such as license plate. If the identification packet sent by the vehicle contains a matching license plate, the vehicle can continue communication with the intersection. If the vehicle does not match any existing approaching vehicles in the intersection the vehicle is labeled as a Sybil attacker and is marked as an invalid user in the intersection using MAC blocking. A large scale sybil attack could result in denial of service to valid vehicles entering the intersection because the sybil attacker is jamming the IM network with requests. To explain this in more detail, in a typical traffic situation there is a worst case time it takes a vehicle to go through an intersection; this would be in fast, high traffic situations. By simulating this traffic situation, the worst case downtime between requests can be approximated. The worst case downtime is representative of the time interval between requests in the case where the maximum number of requests are being made in a short period of time, and therefore the worst case downtime is the smallest time interval that can occur between requests in high traffic situations. If the interval were any smaller than the determined worst case downtime it would mean that vehicles were physically overlapping which is impossible. 4.3.2 Implementation In this experiment we used one ESP8266 microcontroller board for simulating the attacker. In the event that a sybil attack is sensed, based on the identification and information sent in the packet from the vehicle, the Detection System verifies that in the respective outgoing lane there is a vehicle that matches the identification information. If such a vehicle doesn’t exist, the first step is to alert CAVs in the intersection to a potential threat and to proceed with caution. The next step is to get the MAC of the malicious requesting vehicle and use the MAC address to block it from interacting with the IM and other CAVs on the network. 4.3.3 Results It was observed that as the number of these sybil attacks increases, the throughput of the intersection decreases drastically in RIM because RIM schedules all vehicles that make a request. However using RIM Robust, the vehicles are tracked and if a vehicle that is communicating with the IM isn’t detected, it is blocked from the intersection; therefore, the only vehicles scheduled are those physically present at the intersection and there is no throughput degradation. 4.4 Vehicle failure 4.4.1 Theory If vehicle fails to communicate with the IM, whether it be that the communication systems aren’t functional or possibly the vehicle doesn’t have enough power for communication, the intersection should be able to manage traffic. A distinction should be made here: a vehicle failure is not a latency issue in communication between IM and CAV. In the scenario of latency in communication and the vehicle is too close to the intersection, the vehicle would slow to a stop if necessary to initiate communication. However, in the situation where vehicles don’t have the ability to communicate at all, the Detection System should be able to identify them once they are within bounds of entering the intersection. 4.4.2 Implementation When the Detection System identifies a vehicle which has crossed the synchronization line and hasn’t communicated with the IM yet, RIM Robust can plan its scheduling accordingly. Two cases may occur if the vehicle doesn’t communicate with the intersection. The first is if the vehicle comes to a stop outside of the intersection. In this case vehicles already scheduled proceed normally and vehicles which are communicating to receive a schedule slow down. These vehicles wait for a notice from the IM, whose job is to observe the location of the vehicle. The second case is if the vehicle doesn’t stop before reaching the intersection. In this case the car continues through the intersection without communicating to the Detection System. For this situation, the vehicles already scheduled proceed with caution and vehicles which are communicating to receive a schedule slow down until the car has passed through the intersection. Once the vehicle which is not communicating exits the intersection, normal operation proceeds. For this case study, TRAXXAS RC cars went through the intersection without communicating with the IM. This was done to observe if the Detection System recognized that cars were present in the intersection and prevent a potential accident. 4.4.3 Results This is a necessary precaution for managing vehicles who cannot be scheduled. The broken-down vehicle situation eliminates a lane of traffic, which is extremely harmful to managing traffic properly. This case study didn’t implement managing this situation beyond alerting CAVs to the situation. In the other scenario of this case study where a vehicle proceeds through the intersection without communication, it is assumed the vehicle which cannot communicate with the IM is either a potentially malicious vehicle or it is a vehicle whose communication is down. Both are a threat to safe operation, and due to the unpredictable nature of this vehicle it is safest to clear the intersection of all vehicles and let this vehicle make its decision (pass through the intersection) before normal operation begins. Comparing throughput in this scenario, RIM may cease safe operation if a rogue car causes an accident but RIM Robust ensures no accident will occur so traffic will continue normally after the rogue car is handled. 4.5 Reporting error 4.5.1 Theory The vehicle may fail to maintain the expected trajectory of arrival or velocity of arrival, and this failure can cause a position error greater than the threshold set for an acceptable safety buffer. This leaves the intersection vulnerable to collision, so to validate this situation the Detection System monitors the vehicles’ positioning data and ensures scheduling doesn’t violates any safety buffer boundaries. 4.5.2 Implementation RIM Robust was tested for this scenario by hard-coding an error in the reporting mechanism of the TRAXXAS RC Car to be plus or minus one meter from a given position. The role of the Detection System is to monitor the actual position of the vehicle and report this to the IM. If the IM recognizes a discrepancy between the reported value from the vehicle and the observed value from the environmental sensing data the IM defaults to using the data provided by the Detection System and updates both the vehicle’s information and the scheduling algorithm inputs. 4.5.3 Results No safety buffers were violated in the RIM Robust. Violation of safety buffers may lead to accidents in RIM and halt operation of the intersection entirely, but this scenario won’t occur using RIM Robust. 5 Conclusion As processes for driving continue to become more automated, it becomes pertinent to ensure safe passage during traffic. Intersections become an area of concern for safe passage, as this is the most complex area of traffic to navigate given the infinite scenarios that can occur. IMs are typically a great way to increase efficiency of traffic, but ultimately IMs are unsuccessful if they cannot direct vehicles safely in all scenarios. Many researchers using IMs to conduct traffic have one source for position reporting and therefore lack redundancy. The advantage of using the Detection System is the high level of position certainty that can be obtained. Adding the Detection System to an IM makes the intersection more resilient to attack or inaccurate reporting because it increases the reliability of the system by duplicating positioning data sources. By relaying the information obtained by the Detection System back to the IM, and combining it with the connected data between vehicles and the IM, a more accurate portrayal of the intersection is obtained and vehicles can react safely to even more scenarios than was possible before. References 1 Patricia L Alfano and George F Michel. Restricting the field of view: Perceptual and performance effects. *Perceptual and motor skills*, 70(1):35–45, 1990. Edward Andert, Mohammad Khayatian, and Aviral Shrivastava. Crossroads - A Time-Sensitive Autonomous Intersection Management Technique. In *Proceedings of The 54th Annual Design Automation Conference (DAC)*, 2017. Tsz-Chiu Au and Peter Stone. Motion Planning Algorithms for Autonomous Intersection Management. In *Bridging the Gap Between Task and Motion Planning*, 2010. Karl C Bentjen. Mitigating the Effects of Cyber Attacks and Human Control in an Autonomous Intersection. Technical report, AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH WRIGHT-PATTERSON AFB United States, 2018. Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Zhuoqing Morley Mao, and Henry Xianghong Liu. Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. In *Proceedings of the 25th Network and Distributed System Security Symposium (NDSS’18)*, San Diego, CA, February 2018. John R Douceur. The sybil attack. In *International workshop on peer-to-peer systems*, pages 251–260. Springer, 2002. Kurt Dresner and Peter Stone. A multiagent approach to autonomous intersection management. *Journal of artificial intelligence research*, 31:591–656, 2008. Mohsen Kheirandish Fard, Mehran Yazdi, and Mohammadali MasnadiShirazi. A block matching based method for moving object detection in active camera. In *Information and Knowledge Technology (IKT), 2013 5th Conference on*, pages 443–446. IEEE, 2013. Chien-Liang Fok, Maykel Hanna, Seth Gee, Tsz-Chiu Au, Peter Stone, Christine Julien, and Sriram Vishwanath. A Platform for Evaluating Autonomous Intersection Management Policies. In *Proceedings of IEEE/ACM 3rd International Conference on Cyber-Physical Systems*. IEEE Computer Society, 2012. John E Greivenkamp. *Field guide to geometrical optics*, volume 1. SPIE Press Bellingham, WA, 2004. Mohammad Khayatian, et. al. RIM: Robust Intersection for Connected Autonomous Vehicles. In *RTSS*. IEEE, 2018. Joyoung Lee and Byunghyu Park. Development and Evaluation of A Cooperative Vehicle Intersection Control Algorithm under The Connected Vehicles Environment. *IEEE ITS Transactions*, 2012. Florent Perronnet, Abdeljalil Abbas-Turki, and Abdellah El-Moudni. Cooperative Intersection Management: Using Mini-Robots to Compare Sequenced-based Protocols. *Les Journées Nationales des Communications dans les Transports (JNCT)*, 2013. TrueView: A LIDAR Only Perception System for Autonomous Vehicle Mohammed Yazid Lachachi\textsuperscript{1} University of sciences and technologies d’Oran - Mohamed-Boudiaf, LMSE, Algeria email@example.com Mohamed Ouslim University of sciences and technologies d’Oran - Mohamed-Boudiaf, LMSE, Algeria firstname.lastname@example.org Smail Niar Université Polytechnique Hauts-de-France, France email@example.com Abdelmalik Taleb-Ahmed Université Polytechnique Hauts-de-France, France firstname.lastname@example.org Abstract Real time perception and understanding of the environment is essential for an autonomous vehicle. To obtain the most accurate perception, existing solutions propose to combine multiple sensors. However, a large number of embedded sensors in the vehicle implies to process a large amount of data thus increasing the system complexity and cost. In this work, we present a novel approach that uses only one LIDAR sensor. Our approach enables reducing the size and complexity of the used machine learning algorithm. A novel approach is proposed to generate multiple 2D representation from 3D points cloud using the LIDAR sensor. The obtained representation solves the sparsity and connectivity issues encountered with LIDAR-based solution. 2012 ACM Subject Classification Computing methodologies → Computer vision representations Keywords and phrases Ranging Data, Computer Vision, Machine Learning Digital Object Identifier 10.4230/OASIcs.ASD.2019.8 Category Interactive Presentation 1 Introduction Camera, Stereo-camera, RADAR, and LIDAR are the sensors that provide our view of the world. To enable machines to understand our world, multiple approaches have been developed. Camera-based systems are the most dominant [2, 19, 3]. Recently, approaches using depth information generated from stereo-camera have started to gain popularity, as they have proven to improve accuracy. Knowing that camera and stereo-camera are almost the same since the stereo-camera enable the recovery of depth information compared to the monocular camera. Similar Machine Learning (ML) algorithms for multi-class object detection and segmentation are used with minor modifications. On the other hand, the LIDAR has fallen behind performing mainly detection tasks [20, 17, 14] as the variance in the points coordinates ease the task. The richness and variation of data fed to an ML determine its complexity and size. These two factors have a direct impact on network accuracy. Images are well structured and rich in information, as each pixel has a non-zero value and adjacent to another pixel on a 2D plane. \textsuperscript{1} Corresponding author Licensed under Creative Commons License CC-BY Workshop on Autonomous Systems Design (ASD 2019) Editors: Selma Saidi, Rolf Ernst, and Dirk Ziegelnbein; Article No. 8; pp. 8:1–8:10 OpenAccess Series in Informatics OASICS Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany However, this richness adds more challenges like illumination conditions, shadows, colors, and textures. All these parameters require an ML architecture to have more layers to capture abstract aspects like car tires and window edges. A large amount of filters is also needed to accommodate the infinite changes that we can obtain like car shapes and the possible textures of an object. The LIDAR is an active sensor capable of operating in the majority of weather conditions and at any daytime. Unfortunately, due to its rotatory movement, the obtained points are unstructured, unordered and have no connectivity between them. These weaknesses make it difficult to use for multiple purposes when compared to the camera sensor. In this work, we propose a new approach to generate multiple 2D representations using only a 3D LIDAR. These representations reflect the real world and are immune to camera limitations. These representations allow us to see the silhouette of objects without the added textures, colors and illumination condition. Some of the generated representations are an up-sampled version of the ranging data projected into an image, where the new values are filled using interpolation. Further, the obtained representations simplify the ML architecture and reduce its size thus gaining in processing time and getting closer to real time. Our Contributions are as follow: - Novel range data up-sampling process to enable camera-based approaches to be used with LIDAR data. - Robust normal map estimation. - We present a new approach to reducing the complexity of current machine learning algorithms and their computation overhead. In Section 2, we present the related work to up-sampling the ranging data, then we introduce the concept in Section 3 and method to generate the representation in Section 4. We then conclude the paper by presenting the benefits of the proposed representations for machine learning algorithms. ## Related Work The first attempt to generate dense information from range data which corresponds to LIDAR points cloud in our case was made by Diebel et al [4]. The authors proposed a range of data and image fusion to generate a dense depth map from a low-resolution one. They fed the projected range data with the image to Markov Random Field regressor, then they generate the high-resolution depth map by iterating through the MRF. Their experiments showed that textured surfaces had a negative impact on the estimated values as color value changed. In [1], Andrasson et al. proposed 5 interpolation methods as a replacement to the MFR proposed by [4]. The nearest range (NR) and multi-linear interpolation (MLI) are color free estimations. The color was considered in the two modified version NRC and LIC. These approaches relied on an empirically predefined constant and parameter-free version of LIC was further introduced as PLIC. Their results in a laboratory environment under controlled illumination has proved that color improved accuracy. However, experiments in real conditions showed that color had the opposite effect. This limitation is caused mainly by variant illumination conditions. In [10], Yuhang et al proposed a new approach to generate depth, height and a normal map from the range data and image. They used different features to determine the value of the new pixels. The features were used to minimize the effects of textured surfaces and illumination conditions on the final result. However, their result accuracy varies according to the used window size. These representations have proven their effectiveness in the work of [9]. Further, the KITTI benchmark recently launched a competition to generate the depth map from the LIDAR data, when used solely or in conjunction with a camera. This competition saw the introduction of machine learning algorithms, where the best at the time of writing this paper is [15]. The authors considered the up-sampling task as a deep regression problem. They feed depth data and color sequences to the regression network. Ku et al [13] proposed a simpler approach to up-sample the range data, by using a computational fast process like morphological dilatation, filling and blurring. They were able to generate the depth map in 11ms on a CPU and their results were comparable to results obtained by convolutional neural networks. In [16], Schneider et al. propose to use the edge information to guide the up-sampling. The authors considered the up-sampling as a global energy minimization problem. Although the approach was developed for time-of-flight cameras, the authors were able to extend it to range data and compete in the KITTI depth completion. Dimitrievski et al [5] proposed a morphological neural network, their approach approximates morphological operations using a novel Contraharmonic Mean Filter layers. The proposed network is modified U-net architecture with morphological layers. Multiscale networks have produced very interesting results in the KITTI challenge. In [11], Huang et al proposed a hierarchical multi-scale network, they introduced three sparsity-invariant operations. These operations were used to create a sparsity-invariant multi-scale encoder-decoder network. The method was developed to deal with the sparsity problem in the range data generated by LIDAR. Although these approaches are able to generate dense depth map representations and more representations in some of them, the following problems arise: - A degraded image quality is obtained under unfavorable illumination conditions. - A large number of points must be used for the estimation. - The whole process must be repeated much time to obtain a different representation. This factor increases the processing time with the number of generated representations. Existing approaches use a window to retrieve the close points for the estimation. A wide window utilization could augment greatly the number of used points, thus generating false estimations at high variance regions. Furthermore, the number of points cannot be reduced due to adapt the algorithm to the hardware processing constraints. In this work, we consider a newly generated pixels as part of a triangle surface, where the value is an interpolation between three closest points. This approach removes the need for a fixed window and allows the generation of the representations without the need to repeat the process. ### 3 Optimized 3D representation for LIDAR data Real objects are in general modeled as 3D model mesh consisting of 3D points and their connectivity list. In this work, we propose to generate a 3D mesh from the LIDAR ranging data. The high accuracy of this data enables the creation of a mesh that mimics the environment of the vehicle. Greater control over desired the desired output resolution is then possible. This obtained mesh enable the generation of a set of representations, which we formulate as follows: \[ \mathbb{R}^3 \equiv \{\mathbb{R}^2, \mathbb{R}^2, |\mathbb{R}^2, ....\} \] (1) Figure 1 presents a 3D mesh obtained by our approach and Figure 2 shows the multiple obtainable representations. The Figures 2.b to 2.d representations show (respectively) the rendered \(X, Z, Y\) and the reflection of the surface. These representation using only the mesh Figure 1 Reconstructed mesh from point cloud. Figure 2 Rendered representations (from top to bottom) a) Initial image, b) up-sampled x coordinates, c) Up-sampled z coordinates, d) Up-sampled y coordinates, e) Reflection data, f) Estimated normal map (final result). Figure 3 Overall Algorithm. and points coordinates in the real world. The last representation is a 3-channel image, where each channel contains one of the normal parameter estimated from the three points making the surface. In the last representation (Figure 2.f), the coordinates of the points and their connectivity were used to generate the results. Further results can be acquired, such as object contours, using the mesh connectivity list and the angle between the points. This last feature is very interesting as it allows to obtain the contours with a relatively reduced processing. In the next section, we present our method to obtain the connectivity list. 4 Method A 3D mesh is a virtual construct composed of a 3D point set and their connectivity list. The LIDAR generates an accurate point cloud from its environment. These points can be considered as the first half of the mesh. However, the rotatory movement, the angular speed, the number of receptors and the used algorithm have a great impact on the number of points. These factors have an important variance in the possible results obtained. The steps to generate the representation are shown in Figure 3. We bring the reader attention to the fact that all the steps can be done in parallel. 4.1 Division and Filtering Point clouds are unordered and have no connectivity by nature. Attempting to generate a mesh in this format will be time-consuming. A simpler and effective approach is to process the points in 2D space. This allows to reduce the complexity of the algorithm and gives faster processing compared to 3D space representation. The projected point number can be also be reduced to accelerate the processing. Our experiments show that reducing the number of points will not greatly reduce the quality of the results. This point will be discussed in the experiments section. After the projection, the points are divided into a grid with equal dimensions. The number of points in each grid cell is then reduced based on distance criteria. This distance controls the number of points used to create the mesh. In this work, the Manhattan distance is used for its computation simplicity. In Figure 4, reduced points with different distances are shown. We attract the reader attention to the blue rectangle. As can be seen, the details of the scene are preserved even with a big distance. 4.2 Triangulation and mesh creation Delaunay triangulation is used to create the connectivity list between the points. Multiple variants of the algorithm exist from which we denote: Flip algorithms [12], Incremental [8, 7] and Divide and Conquer [6]. The Divide and conquer variant is chosen in our approach for two main reasons. First, generating these representations have to be as fast as possible. The work of Su et. Al [18] proved that this variant is the most performing approach. Secondly, the algorithm has been developed with GPUs in mind. The points in the grid cells can be processed separately and in parallel then merged at the end. 4.3 Rendering The rendering step is where the up-sampling is performed. For each triangle, the value and positions of the delimiting points are used to interpolate the new values at rendering time. Figure 5 presents four examples of rendered triangles. Figure 4 Ranging data projected after filtering with different distances: a) 1 pixel, b) 5 pixels, c) 10 pixels, d) 15 pixels. Figure 5 Samples of rendered triangles mimicking possible interpolations cases. Each example in Figure 5 represents a possible case. In this example P1, P2, and P3 are the delimiting points of the triangle, each point has a different color to mark its contribution to the interpolation. In 5.a), the three points have the same value to simulate points on the same surface. The three points contribute equally to the interpolation. In the case of 5.b), P2 and P3 are 0.05 the value of P1 to simulate the case of a distant point that is connected to close ones, it can be observed that P2 and P3 do not contribute. Case 5.c) simulates the case where the three points belong to the same object with a slight difference in the value. We bring the reader’s attention to the differences between this case and case In 5.a) for comparison. Case In 5.d) present a randomly shaped triangle. 5 Improving ML Machine Learning (ML) based algorithms is becoming popular where a large set of data must be processed in a reduced time period. The three most researched tasks in ML are classification, detection, and segmentation. With the proposed representations in this paper, detection and segmentation tasks are targeted for AV. We present two possible improvements to accelerate and train machine learning algorithms. Detection and segmentation algorithms are used to extract object shape, delimiters, and position from the provided images. In contrast to existing classification algorithms that have to differentiate between two visually different instance of the same object. We propose to use the generated representations as a replacement to camera provided images. The idea is that object in a scene can be detected using their silhouettes instead of their texture. Figure 6 shows the image of a car and the corresponding x, y and z representations. The reduced visual complexity produced by textures, illumination, and shadows allows the reduction of filters number inside layers, thus compressing the size of the model and accelerating the processing time. Furthermore, the generated normal map enables the clustering of points into surfaces and ease the differentiation between the multiple objects in a scene. In Figure 7 we present a scene that contains the normal that can be found in a complex environment. As a second improvement, we propose to train ML algorithms using synthesized representations using modeling software. In fact, the representations do not require any realism and can be used in real-world applications. 6 Experiments To evaluate the accuracy of the generated meshes, a ground-truth mesh is needed. However, this information is unavailable, as an alternative, the evaluation was carried using the generated representations. A 100 scene was chosen at random from different sets, and for each scene we generated the X, Y and Z representations with filtering distances in the range [5 - 25] pixels between the points, we found through experiments that a distances less than 5 pixels will create small triangles that cannot be rendered in the flowing step. The results are compared using the Root of Mean Squared Error (RMSE), Mean of Absolute Error (MAE) to the ranging data, and the number of triangles. The RMSE will give an insight on the standard deviation of interpolation error, whereas the MAE will reflect the common error value. Finally, the number of triangles in the mesh present us with the impact of rendering on the hardware. In Figure 7, the MAE and RMSE metric is plotted for the height (Z) representation, the results are in relation to pixels distance between projected points, in addition to triangles count. The result shows that with a distance of 5 pixels introduces a 1 cm absolute error and a 10 cm deviation compared to 3 cm absolute error with 25 pixels distance, it can be observed that standard deviation is only about 2 cm more for 25 pixels distance for 45% of the triangles counts. Thus, enabling the possibility to choose a balance between the desired accuracy and the dedicated processing power or processing time. Figure 8 The different fusion architectures. Table 1 Interpolation error MAE and RMSE in meters. | Error Metric per coord | Filtering distance in pixel | |------------------------|----------------------------| | | 5 | 11 | 19 | 25 | | X | | | | | | MAE | 0.160 | 0.320 | 0.443 | 0.498 | | RMSE | 1.857 | 1.902 | 2.053 | 2.119 | | Y | | | | | | MAE | 0.045 | 0.088 | 0.153 | 0.168 | | RMSE | 0.763 | 0.768 | 0.807 | 0.824 | | Z | | | | | | MAE | 0.009 | 0.019 | 0.026 | 0.029 | | RMSE | 0.100 | 0.102 | 0.109 | 0.113 | In Table 1, the interpolation error is presented, in relation to the distance by which the number of points is reduced. From the table, it can be observed that the error is strongly connected to the range. For example, values for the X coordinates range from 0 to 60 meters, where the mean absolute error increase from 16 cm to about 50 cm the more the filtering distance increase, which is not the case for the Z coordinates that range from −2m to 1m relative to LIDAR position. 7 Conclusion and Future Works This paper presents an ongoing work on generating multiple representations from LIDAR ranging data. Our aim is to introduce a novel approach to reduce the size of ML architectures and augmenting the training set. Currently, we are implementing the generation of the representation to run in parallel on a GPU. In the next steps, we will evaluate the impact of reducing the number of points on the processing time and results in accuracy. We will also validate our hypothesis of compressing ML architecture by testing it on a variety of detection and segmentation architectures. References 1 Henrik Andreasson, Rudolph Triebel, and Achim Lilienthal. Non-iterative vision-based interpolation of 3D laser scans. In *Autonomous Robots and Agents*, pages 83–90. Springer, 2007. 2 Florian Chabot, Mohamed Chaouch, Jaonary Rabarisoa, Céline Teulière, and Thierry Chaton. Deep MANTA: A Coarse-to-fine Many-Task Network for joint 2D and 3D vehicle analysis from monocular image. In *Proc. IEEE Conf. Comput. Vis. Pattern Recognit.(CVPR)*, pages 2040–2049, 2017. 3 Zhe Chen and Zijeng Chen. RBNet: A Deep Neural Network for Unified Road and Road Boundary Detection. In *International Conference on Neural Information Processing*, pages 677–687. Springer, 2017. 4 James Diebel and Sebastian Thrun. An application of markov random fields to range sensing. In *Advances in neural information processing systems*, pages 291–298, 2006. 5 Martin Dimitrievski, Peter Velaert, and Wilfried Philips. Learning Morphological Operators for Depth Completion. In *International Conference on Advanced Concepts for Intelligent Vision Systems*, pages 450–461. Springer, 2018. 6 Rex A Dwyer. A faster divide-and-conquer algorithm for constructing Delaunay triangulations. *Algorithmica*, 2(1-4):137–151, 1987. 7 Herbert Edelsbrunner and Nimish R Shah. Incremental topological flipping works for regular triangulations. *Algorithmica*, 15(3):223–241, 1996. 8 Leonidas J Guibas, Donald E Knuth, and Micha Sharir. Randomized incremental construction of Delaunay and Voronoi diagrams. *Algorithmica*, 7(1-6):381–413, 1992. 9 Saurabh Gupta, Ross Girshick, Pablo Arbeláez, and Jitendra Malik. Learning rich features from RGB-D images for object detection and segmentation. In *European Conference on Computer Vision*, pages 345–360. Springer, 2014. 10 Yuhang He, Long Chen, Jianda Chen, and Ming Li. A novel way to organize 3D LiDAR point cloud as 2D depth map height map and surface normal map. In *Robotics and Biomimetics (ROBIO), 2015 IEEE International Conference on*, pages 1383–1388. IEEE, 2015. 11 Zixuan Huang, Junming Fan, Shuai Yi, Xiaogang Wang, and Hongsheng Li. HMS-Net: Hierarchical Multi-scale Sparsity-invariant Network for Sparse Depth Completion. *arXiv preprint*, 2018. arXiv:1808.08685. 12 Ferran Hurtado, Marc Noy, and Jorge Urrutia. Flipping edges in triangulations. *Discrete & Computational Geometry*, 22(3):333–346, 1999. 13 Jason Ku, Ali Harakeh, and Steven L Waslander. In Defense of Classical Image Processing: Fast Depth Completion on the CPU. *arXiv preprint*, 2018. arXiv:1802.00036. 14 Jason Ku, Melissa Mozifian, Jungwook Lee, Ali Harakeh, and Steven Waslander. Joint 3d proposal generation and object detection from view aggregation. *arXiv preprint*, 2017. arXiv:1712.02294. 15 Fangchang Ma, Guilherme Venturelli Cavalheiro, and Sertac Karaman. Self-supervised Sparse-to-Dense: Self-supervised Depth Completion from LiDAR and Monocular Camera. *arXiv preprint*, 2018. arXiv:1807.00275. 16 Nick Schneider, Lukas Schneider, Peter Pinggera, Uwe Franke, Marc Pollefeys, and Christoph Stiller. Semantically guided depth upsampling. In *German Conference on Pattern Recognition*, pages 37–48. Springer, 2016. 17 Kiwoo Shin, Youngwook Paul Kwon, and Masayoshi Tomizuka. RoarNet: A Robust 3D Object Detection based on RegiOn Approximation Refinement. *arXiv preprint*, 2018. arXiv:1811.03818. 18 Peter Su and Robert L Scot Drysdale. A comparison of sequential Delaunay triangulation algorithms. *Computational Geometry*, 7(5-6):361–385, 1997. 19 Yan Yan, Yuxing Mao, and Bo Li. SECOND: Sparsely Embedded Convolutional Detection. *Sensors*, 18(10):3337, 2018. 20 Yin Zhou and Oncel Tuzel. Voxelnet: End-to-end learning for point cloud based 3d object detection. *arXiv preprint*, 2017. arXiv:1711.06396. Generation of a Reconfigurable Probabilistic Decision-Making Engine based on Decision Networks: UAV Case Study Sara Zermani Université de Guyane, Espace-Dev, UMR 228, Cayenne, France email@example.com Catherine Dezan Université de Brest, Lab-STICC, CNRS, UMR 6285, Brest, France firstname.lastname@example.org Abstract Making decisions under uncertainty is a common challenge in numerous application domains, such as autonomic robotics, finance and medicine. Decision Networks are probabilistic graphical models that propose an extension of Bayesian Networks and can address the problem of Decision-Making under uncertainty. For an embedded version of Decision-Making, the related implementation must be adapted to constraints on resources, performance and power consumption. In this paper, we introduce a high-level tool to design probabilistic Decision-Making engines based on Decision Networks tailored to embedded constraints in terms of performance and energy consumption. This tool integrates high-level transformations and optimizations and produces efficient implementation solutions on a reconfigurable support, with the generation of HLS-Compliant C code. The proposed approach is validated with a simple Decision-Making example for UAV mission planning implemented on the Zynq SoC platform. 2012 ACM Subject Classification Computer systems organization → Self-organizing autonomic computing; Computer systems organization → Embedded hardware Keywords and phrases Decision networks, Bayesian networks, HLS, FPGA Digital Object Identifier 10.4230/OASIcs.ASD.2019.9 Category Interactive Presentation Funding This work is supported by CNRS fundings through the PICS project SWARMS. 1 Introduction Embedded Decision-Making is necessary in a number of contexts including medical applications and autonomous vehicles. Embedded solutions make it possible to adapt to the constraints of a real-time response that would be impossible with centralized off-board decision making due to the need for communication media access. For instance, in the case of unmanned aerial vehicles (UAVs) or intelligent vehicles, on-board decision making based on image recognition enables real-time responses to propose appropriate action (e.g., to continue tracking or to dismiss) in an autonomous manner. Many examples of embedded decisions have been recently tested [26] [20] [6]. Among the techniques available for Decision-Making, three approaches have recently emerged in the literature [3]: 1) Multicriteria Decision-Making techniques, 2) Mathematical Programming techniques and 3) Artificial Intelligence. Nevertheless, to deal with uncertainty of the environment and of the system (external or internal hazards), fuzzy techniques [2] or stochastic/probabilistic models such as Bayesian Networks [21] are used. In this paper, we focus on Decision Networks (also called Influence Diagrams), which are considered as an extension to Bayesian Networks (BN), including a Decision-Making (DM) mechanism based on utility tables. Compared with a fuzzy model, a Decision Network (DN) is specified by a causality graph that encapsulates the expert knowledge of the system and provides a good comprehensive and efficient formulation for the designer. For an embedded version of a Decision-Making mechanism, the following features are of major importance: 1) achieving (real-time) performance under the constraints of memory or computation related to the embedded system, 2) ensuring quality of service under power consumption constraints. For Bayesian Networks, literature on embedded implementation can be found for both software [22] and hardware versions, the latter with reconfigurable hardware [16] [18] [25] using Field-Programmable Gate Array (FPGA). In [25], the authors propose BN in reconfigurable hardware, but the decision mechanism that integrates temporal specification in temporal logic is operated by the embedded processor. For embedded DN, the ARPHA framework [22] [7] makes it possible to design specific failure scenarios from fault tree specifications. ARPHA generates an embedded software version of a DN, but does not propose any hardware alternative. To the best of our knowledge, no hardware implementation of DN on reconfigurable platforms have been proposed as alternative embedded solutions. In this paper, we propose a design tool to generate a reconfigurable implementation of Decision Networks from high-level specifications of a Decision-Making engine. This is the first design tool that proposes automatic generation of Decision Networks on FPGA. The main contributions are: 1) the specific High Level Synthesis (HLS) transformations to produce a HLS-Compliant C Code, 2) the generation of adequate HLS directives for efficient implementation on an FPGA/SoC (System On Chip) platform. The paper is organized as follows. Section 2 gives an introduction to Decision Networks. Section 3 introduces the design tool to generate the embedded Decision-Making engine from DN specifications, with a specific focus on the dedicated HLS transformations and HLS directives for an efficient implementation on the FPGA/SoC platform. Section 4 presents a case study that validates the flow up to implementation on a Zynq platform. ## 2 Background on Decision Networks and Probabilistic Beliefs Decision Networks extend Bayesian Networks to provide a mechanism for making rational decisions by combining probability and utility theory. In addition to chance nodes defined by a BN, a DN also includes utility and decision nodes. Decision nodes represent the set of choices open to the decision maker, while utility nodes are used to express preferences among possible states of the world represented by the chance nodes and decision nodes. ### 2.1 Bayesian networks for probabilistic beliefs BNs are probabilistic graphical models used to understand and control the behaviour of systems [8] by providing diagnoses. They are composed of nodes and oriented arcs between nodes representing the knowledge expertise of the system. In Fig. 1 a), we propose to evaluate the probability of a UAV increasing or decreasing its altitude ($U\_A$) based on the information given by two sensors: the altimeter sensor ($S\_A$) and the barometer sensor ($S\_B$). The BN nodes of the networks represent random variables whose values can depend on specific states, and the arcs of the network indicate the conditional dependencies represented by the conditional probabilities defined with probability tables (CPTs). In the example, each node has two states, represented by the values $inc$ and $dec$. The probabilities of the BN are also known as the parameters of the network. To obtain the probability of one variable being in a specific state ($A$), we use an inference mechanism that takes into account some observations (evidence indicators) of the system in order to compute the posterior probabilities over $A$ using Bayes’ theorem (Eq. 1). $$P(A|B)P(B) = P(A \cap B) = P(B|A)P(A)$$ (1) We use Bayes’ theorem for our example (illustration in Fig. 1 b) to compute the probability of the variable $U\_A$ being in a state 'increasing' by taking into account the value of the altimeter $S\_A$ as evidence. This is done as follows: $$P(U\_A = Inc|S\_A = Inc) = \frac{P(S\_A = Inc|U\_A = Inc)P(U\_A = Inc)}{P(S\_A = Inc)}$$ $$= \frac{0.7 * 0.5}{0.7 * 0.5 + 0.2 * 0.5} = 0.778$$ We can thus say that the probability of the altitude status being "increasing" is equal to 0.778. If, for example, we add observations from the barometer sensor, also giving it an increasing value, the probability $P(U\_A = Inc|S\_A = Inc, S\_B = Inc)$ increases to 0.969. The probabilities can change over time. So it could be more appropriate to use dynamic BN to model the change. In the case of a UAV, if we have a greater chance of maintaining an increasing altitude if the UAV is already in this situation, and can model this with time-dependent variables as proposed in Fig. 1 c). As BN are dedicated to computing the probabilities of the states, we need an extra mechanism to express the decision making that takes into account these values for the choice of appropriate actions to safely continue a mission. We therefore use the Decision Networks for the Decision-Making process. 2.2 Example of a Decision Network DN are directed acyclic graphs (DAG) with nodes belonging to three different categories: chance nodes (ellipses or circles in graphical notation), which represent (as in BN) discrete random variables; decision nodes (rectangles), which represent actions or decisions with a predefined set of states; and value nodes (diamonds), which represent utility (or cost) measures associated with random or decision variables. Edges represent direct (possibly causal) influence between connected objects. An example of Decision-Making (see Fig. 1 d)), linking the two BNs (representing the probabilities of the UAV Altitude state and of the well-functioning Battery state), and the possible actions (Speed Up action, Slow Down action and Emergency Landing action) to be chosen with the respect of a utility table. The utility table (detailed in the Table 1) gives a score for each action relative to the BNs, and the choice of the adequate action is given by computing a utility function \((U_f)\) for each action. Table 1 Utility table for decision making with DN associated with the actions Speed Up (SU), Slow Down (SD) and Emergency Landing (EL). | UAV Alt. \((U_A)\) | inc | dec | |---------------------|-----|-----| | Battery \((H_E)\) | ok | bad | ok | bad | | Actions (A) | SU | SD | EL | SU | SD | EL | SU | SD | EL | | U | 100 | 0 | 0 | 0 | 0 | 100 | 0 | 100 | 0 | 0 | 0 | 100 | To compute the utility function we need the probabilities provided by the BNs. The utility function of each action is equal to the sum of the products of the action with the adequate probability concerning the UAV state and the battery state. The action to be chosen is the action that has the highest utility function. Let us consider the example of Fig. 1 d): \[ \text{Action\_to\_activate} = \text{Max}(U\_f_{SU}, U\_f_{SD}, U\_f_{EL}) \] where each \(U\_f_k(k = \{SU, SD, EL\})\) is equal to \[ U\_f_k = \sum_i \sum_j U(A = k, U_A = i, H_E = j) * P(U_A = i) * P(H_E = j) \] \((i = \{inc, dec\} \quad \text{and} \quad j = \{ok, bad\})\) In this example, if we take the BN probabilities \(P(U_A = inc) = 0.9\) and \(P(H_E = ok) = 0.8\) and the utility table in Table 1, then \(U\_f_{SU} = 72\), \(U\_f_{SD} = 8\) and \(U\_f_{EL} = 20\), which means that the action chosen is \(SU\) ('Speed up') this case. 3 Design Tool Proposal The proposed design tool (Fig. 2) incorporates the two following main layers: 1. In the first layer, the Bayesian core tool takes a DN as input. The DN specifications can be expressed in .net format or .m format to make them compatible with other tools such as Genie [14] or BNT [19] for Matlab. First, a series of dedicated high-level transformations are proposed for the BN part: AC compilation based on model patterns and evidence optimization. Then, optimizations on the whole DN part are proposed, such as bitwidth optimization and a functional/structural decomposition based on the choice of the elementary function for a hierarchical decomposition before the generation of the C-code. 2. In the second layer, a refinement of C-code is proposed by introduction of HLS directives for code parallelization, memory and interface management. This latter C-HLS compliant code is tailored for complete FPGA implementation on ZedBoard. The first layer proposes high-level transformations and provides parallel opportunities for the code, independent of the target platform. The second layer gives a more practical guide for parallel implementation on a FPGA/SoC platform. This second layer is platform dependent. In this presentation, we focus on specific high-level transformations for BN and on the generation of C-code in order to show the ability of the design tool to generate parallelism. We therefore do not detail the bitwidth adaptation and functional/structural decomposition. The probabilities are defined here in a floating-point representation in the different examples of Section 4, but they can easily be limited to fixed-point representation, thus saving some FPGA resources at the same time. ![Figure 2](image.png) **Figure 2** Proposed HLS Design tool for Decision Networks on an FPGA support. ### 3.1 Bayesian core tool for DN: Dedicated high-level transformations for DN In this section, we start with an introduction to the intermediate representation (arithmetic circuit compilation) used to synthesize the BN specifications. High-level transformations are then proposed to generate a synthesizable C-code for DN specifications. 3.1.1 Arithmetic circuit (AC) compilation for BN inference BN inference algorithms are used to answer queries when computing posterior probabilities. Classical inference algorithms are based on propagation on the junction tree. A major problem for embedded systems is the complexity of the computation. Algorithms based on ACs are powerful and can produce predictable real-time performances [4] [10]. The AC representation of BN can be built from the multilinear function (MLF) $f$ [11] associated with the marginal probabilities of the BN (Figure 3). The leaves of the arithmetic circuit are $\lambda$ (evidence indicator) and $\theta$ (network parameter), and the inner nodes of the tree represent a multiplication (*) or an addition (+), alternately. To compute the posterior probability $P(x|e) = \frac{f(x,e)}{f(e)}$ (where x is a variable and e the evidence) for the diagnostic, two steps are required: the first to evaluate $f(e)$ and the second to compute the circuit derivatives to obtain $f(x,e) = \frac{\partial f}{\partial X_x}$. $$ \begin{array}{c|c} A & \theta_A \\ \hline a & \theta_a = 0.3 \\ \overline{a} & \theta_{\overline{a}} = 0.7 \\ \end{array} \quad \begin{array}{c|c|c} A & B & \theta_{BA} \\ \hline a & b & \theta_{ba} = 0.1 \\ \overline{a} & b & \theta_{b\overline{a}} = 0.9 \\ a & \overline{b} & \theta_{a\overline{b}} = 0.2 \\ \overline{a} & \overline{b} & \theta_{\overline{a}\overline{b}} = 0.8 \\ \end{array} $$ $$ f = \lambda_a \theta_a (\lambda_b \theta_{b|a} + \lambda_{\overline{b}} \theta_{b|\overline{a}}) + \lambda_{\overline{a}} \theta_{\overline{a}} (\lambda_b \theta_{b|\overline{a}} + \lambda_{\overline{b}} \theta_{b|\overline{a}}) $$ (a) (b) Figure 3 (a) A Bayesian network with a multilinear function. (b) The corresponding arithmetic circuit. 3.1.2 Modular AC generation associated with model patterns It is possible to simplify the generation of AC if the BN structures correspond to identified patterns. For instance, in the examples of Section 4, the structure of BN is clearly repetitive and matches the pattern we named the FMEA_HM pattern, described in Fig. 4. Other patterns can also be used, like the SWHM (software Health Management) model proposed in [24]. The BN of FMEA_HM pattern evaluates the probability of well functioning for a specific item in the system providing the diagnosis, also called HM (Health Management). In such cases, the generation of the AC uses a modular approach of inference computation by taking advantage of the factorization of the MLF and the regular structure associated with the pattern. In the case of an FMEA_HM pattern, the AC MLF factorization is based on the relationship between child and parent nodes. The sub-MLFs for child nodes (if there is no conditional dependence between them) are represented by a + in the AC, and parent nodes combine them with a *. In this model, all error type nodes and all monitor nodes are children of the U node (unobservable status of the system). Since there is no conditional dependence between these nodes, their MLF can be calculated separately and in parallel, similar to the sub-BNs of each error type, where the parent node is the error type and the child nodes are the monitor and appearance context nodes. This allows us to have a hierarchical and modular AC. ![Figure 4](image) **Figure 4** FMEA_HM pattern for BN where the $S_U$, $S_Ei$ nodes represent the sensor nodes of either a hardware or a software monitor, the nodes $U$, $U_Ei$ are the internal states possibly affected by an error $Ei$, the $H_U$ node represents the health of the system, $H_S$ and $H_Ei$ nodes represent the health of the sensor, and the $A_H$, $A_H_Ei$ are the appearance contexts. This principle can be easily extended to Dynamic Bayesian Networks by considering the temporal variables. ### 3.1.3 BN optimization based on evidence In an AC, we can see that the values $(\lambda_x, \lambda_{\bar{x}})$ of evidence of a variable X are equal to: - $(\lambda_x, \lambda_{\bar{x}}) = (1, 1)$ when there is no observation on the variable X, - $(\lambda_x, \lambda_{\bar{x}}) = (1, 0)$ when the evidence is on the variable X and the observation is x, - $(\lambda_x, \lambda_{\bar{x}}) = (0, 1)$ when the evidence is on the variable X and the observation is $\bar{x}$. Furthermore, in our examples in Section 4, two types of node (observable and unobservable) are known: C, A and S nodes are observable (evidence), so they take the values (1, 0) or (0, 1) for evidence. The other nodes are unobservable, so they take the values (1, 1) for evidence. These observations and the symmetrical structure of the AC make it possible to reduce the AC as follows: - Delete the left (or right) topmost branch containing a C (or an H) node, and in all sub-branches where C (or H) appears, replace the probability parameters by a choice between the right or left value. We can simplify here, because the value of $(\lambda_x, \lambda_{\bar{x}})$ of these nodes is never equal to 1 at the same time, - Repeat this procedure for all C and H nodes, - Fix all the $\lambda_x$ values for the unobservable nodes at (1, 1). 3.1.4 C-synthesizable code for DN The decision-making approach is based on the utility function equation, taking the HM results from BNs, actions and utility table as input. The C-synthesizable code is generated for BN in two ways: a) in a hierarchical way, by choosing several kinds of elementary block, or b) in a flat way. In a hierarchical version, the elementary blocks are chosen considering the structure of the AC tree. The C-synthesizable code of the DN is given by the following algorithm: Algorithm 1 Decision Making. Require: Proba from BNs $HM_1$, $HM_2$, ..., $HM_n$, actions $A_1$, $A_2$, ..., $A_n$ and the utility table $U$ for all states $i_1$ of $HM_1$ do ... for all states $i_n$ of $HM_n$ do for all actions $A_k$ do // Compute utility function for each action $U_{f...A_k} = U(A_k, HM_1 = i_1, ..., HM_n = i_n)$ * $P(HM_1 = i_1) * ... * P(HM_n = i_n)$ end for end for ... end for return Maximum of $U_{f...A_k}$ 3.2 Generation of HLS directives for a SoC implementation on ZedBoard 3.2.1 ZedBoard target for SoC/FPGA implementation Our design approach is characterized by the separation of processing components from functional programmable components. The proposed design targets the ZedBoard incorporating a hybrid Zynq processor [9]. As shown in Figure 5, the architecture is built around the ARM Cortex-A9 processor (Zynq processing system PS). The processor communicates with dedicated HW accelerators using programmable logic through an Advanced eXtensible Interface (AXI) bus. For the SoC implementation on ZedBoard, numerous HLS directives have been proposed [1]. Here, we list only the main ones used for this experimentation. 3.2.2 Parallelization directives at function calls and for loops In order to increase the parallelism, the following main directives are chosen: 1. **INLINE**: Inlines this function call (does not create a separate level of RTL hierarchy) and allows resource sharing and optimization across hierarchy levels. 2. **UNROLL**: Duplicates computation inside the loop and increases computation resources, decreases number of iterations. 3. **PIPELINE**: Pipelines computation within the loop (or region) scope and increases throughput and computation resources. Most of the time, the resources available for the IP are limited because other applications can share the resource. So the parallelization directives are used considering resource constraints. ### 3.2.3 Memory management directives For the storage of the parameters of the Bayesian network, two main options are used for an embedded version inside the programmable logic component: 1. **BRAM**: with the directives `array_map` or `array_partition` 2. **LUT**: default option The data organization should be addressed correctly taking into account the interface mechanism. ### 3.2.4 Interface management The inputs of the SoC are the evidence of the networks that are data provided by sensors. These are stored in an external memory (DDR). As for the evidence of the networks, the parameters of the BN are inputs of the IP and can be stored either inside the SoC (BRAM, LUT or CACHE) or outside in an external memory. This choice depends on the designer’s needs and on the possible changes of the network parameter values. To access the external memory, different interface options are possible: 1. **STREAM**: AXI stream 2. **DMA**: Master DMA ### 4 Case Study of a Simple UAV Mission Plan In this section, we present a case study that validates the design flow up to implementation on the Zynq platform. In this section we consider a simple UAV mission that address two main failure scenarios: one related to GPS failure and the other to the battery failure. Both can be expressed by BN, considering the FMEA_HM pattern. #### 4.1 Bayesian networks for the health of the GPS receiver and of the battery The accuracy and reliability of the position given by a GPS depend on contextual factors affecting the satellite signal during its propagation or its reception. The sources of error can be identified at the system level by means of additional bias in the computation of pseudo-range measurements [17] [23]. These measurements can tune the GPS positioning accuracy from slightly imprecise to completely faulty. They can be improved by introducing observations [12] or real environments [13]. The main GPS localization errors are illustrated in Fig. 6 with a BN. ![Figure 6](image) **Figure 6** GPS potential errors and BN description. To model battery behaviour, we use a dynamic BN to represent the linear progression of the energy consumption over time. This dynamic Bayesian network is described at two time steps (2TBN, cf Figure 7) to take into account the previous past value. External events such as strong wind can increase the energy consumption, as may any application/component used in a period of time. Each status of an application ($U$ node) is associated with a command node ($C$) that represents an action to enable or disable the application. The battery level is given by a sensor that can fail; its health is reinforced by the appearance contexts (low temperature, for example). ### 4.2 Decision making with an influence diagram Figure 8 shows the decision-making mechanism of the mission considering the two cases of failure (GPS failure (GPS HM), Battery failure (Energy HM)) and three actions (Nothing to report, Change localization method, Emergency Landing). This figure illustrates the monitoring of the GPS HM, the energy consumption HM and the DM at each time. Figure 8.(a) shows the interest of the context appearance nodes, which reinforces the confidence in error types and sensor health. For example, from time $t = 0$ until $t = 4$, we observe no problem in the GPS localization and, due to the evidence on appearance contexts, the probability of the health of the system grows from 0.835 to 0.915. At time $t = 4$, a problem in the GPS localization is observed. Without observation on the appearance context nodes, the probability of the health of the system decreases to 0.365, but according to the evidence on appearance contexts it decreases to 0.143. Figure 8.(b) shows monitoring in a nominal case for energy consumption. According to observation of sensors and appearance contexts, the energy consumption is healthy but decreases over time because the related Bayesian Network evolves dynamically. Figure 8.(c) shows the evolution of Decision Making over time based on the health probability of the GPS localization and energy consumption. From time $t = 0$ until $t = 4$, the maximum of the utility functions is “nothing to report”, which reflects the case of “no problem in the mission”. At time $t = 4$, the maximum of the utility functions is “change localization method”, which reflects a problem in the mission, i.e., the GPS failure scenario is detected. ### 4.3 SoC implementation For our case study, Table 2 shows the evaluation of resources used for our implementation in terms of Bloc RAM (memory BRAM), Digital Signal Processors (DSP), Look Up Tables (LUT) and Flip Flop registers (FF). The total number of DSPs on the ZedBoard equals 220, that of LUTs is 53200 and that of FFs is 106400. The results are given for hardware solutions maximizing parallelism. The parallelism is better exploited in the case of GPS because there is less conditional dependency between nodes. The complete DM model uses the same number of DSPs as in case of GPS HM, which is explained by resource sharing. | | BRAM | DSP | LUT | FF | |----------------------|------|-----|-----|----| | GPS localization HM | 0% | 34% | 33% | 9% | | Energy consumption HM| 0% | 29% | 27% | 7% | | GPS HM+ Energy HM+ Decision | 0% | 34% | 51% | 14% | Table 3 shows the performance for the HW/SW implementation. We observe a good HW speed-up in all cases because the SW implementation is sequential. A better speed-up is observed in the energy case, which is due to the computational complexity from the dynamic BN. The complete DM model has a good speed-up, which could be improved, but only at Figure 8 Results for the Decision Making of a simple UAV mission. The results in Table 4 show the interest of a complete solution implemented in HW in terms of performance and energy consumption. Nevertheless with three actions, a good speed-up is already obtained for both versions of the DM, if HM are implemented in HW. 5 Summary and Conclusions We present an original design tool for the implementation of Decision Networks on FPGA. This tool helps the designer to specify and implement the Decision-Making process under real-time constraints and energy constraints, making it suitable for embedded solutions on autonomous vehicles. We detail the design flow, giving the specific HLS optimizations and transformations available to generate implementation on an FPGA/SoC platform. We propose a validation example that demonstrates the interest of such a tool by providing efficient HW implementation for the Decision-Making engine. Because of the complexity related to BN and DN definition and to their related classical inefficient implementation using junction trees [15], decision-making mechanisms based on DN were not really considered as a possible engine for embedded applications until now. Nevertheless, new compilation methods based on AC and on pattern identification for the BN description can help to achieve efficient implementation on both CPU and FPGA. These methods also help us to define a completely new embedded Decision-Network engine on the both supports. The present paper addresses this opportunity. As perspectives for future work, we propose to integrate the runtime constraints of the sensors to fit the constraints of the mission in a more realistic manner. In this way, we could extend and couple the presented offline tool, which provides HW/SW implementation of mission planning, by adding an online engine that can choose the most appropriate version of the decision core implementation considering the CPU load, the system constraints in terms of energy and timing, and which can take into account service quality requirements. If the implementation of the decision process can be achieved on an FPGA/SoC support, the HW/SW alternatives can be chosen dynamically at runtime in the same way as this is possible for other applications, such as those for image processing [5]. References 1. Vivado-HLS. https://www.xilinx.com/products/design-tools/vivado/integration/esl-design.html/. Accessed: 2016-09-30. 2. Kai-Yuan Cai and Lei Zhang. Fuzzy reasoning as a control problem. IEEE Transactions on Fuzzy Systems, 16(3):600–614, 2008. 3. Junyi Chai, James NK Liu, and Eric WT Ngai. Application of decision-making techniques in supplier selection: A systematic review of literature. Expert Systems with Applications, 40(10):3872–3885, 2013. 4. Mark Chavira and Adnan Darwiche. Compiling Bayesian Networks with Local Structure. In Leslie Pack Kaelbling and Alessandro Saffiotti, editors, IJCAI, pages 1306–1312. Professional Book Center, 2005. URL http://www.ijcai.org/papers/0931.pdf. 5. Hanen Chenini, Dominique Heller, Catherine Dezan, Jean-Philippe Diguet, and Duncan Campbell. Embedded real-time localization of UAV based on an hybrid device. In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 1543–1547. IEEE, 2015. 6. Hsin-Han Chiang, Yen-Lin Chen, Bing-Fei Wu, and Tse-Tian Lee. Embedded driver-assistance system using multiple sensors for safe overtaking maneuver. IEEE Systems Journal, 8(3):681–698, 2014. 7. Daniele Codetta-Raiteri and Luigi Portinale. Dynamic Bayesian networks for fault detection, identification, and recovery in autonomous spacecraft. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 45(1):13–24, 2015. 8. Robert G Cowell. Probabilistic networks and expert systems: Exact computational methods for Bayesian networks. Springer Science & Business, 2006. L.H. Crockett, R. Elliot, and M. Enderwitz. *The Zynq Book: Embedded Processing with the Arm Cortex-A9 on the Xilinx Zynq-7000 All Programmable Soc*. Stratichlyde Academic Media, 2014. URL: http://books.google.fr/books?id=9dIvoAEACAAJ. Adnan Darwiche. A differential approach to inference in Bayesian networks. *J. ACM*, 50(3):280–305, 2003. doi:10.1145/765568.765570. Adnan Darwiche. A differential approach to inference in Bayesian networks. *Journal of the ACM (JACM)*, 50(3):280–305, 2003. Fabio Dovis, Bilal Muhammad, Ernestina Cianca, and Khurram Ali. A Run-Time Method Based on Observable Data for the Quality Assessment of GNSS Positioning Solutions. *Selected Areas in Communications, IEEE Journal on*, 33(11):2357–2365, 2015. Vincent Drevelle and Philippe Bonnafait. Reliable positioning domain computation for urban navigation. *Intelligent Transportation Systems Magazine, IEEE*, 5(3):21–29, 2013. Marek J Drzazga. SMILE: Structural Modeling, Inference, and Learning Engine and GeNlc: a development environment for graphical decision-theoretic models. In *Aaai/Iaai*, pages 902–903, 1999. Frank Jensen, Finn V Jensen, and Søren L Dittmer. From influence diagrams to junction trees. In *Uncertainty Proceedings 1994*, pages 367–373. Elsevier, 1994. Z. Kulesza and W. Tylman. Implementation Of Bayesian Network In FPGA Circuit. In *Proceedings of the International Conference on Mixed Design of Integrated Circuits and System*, pages 711–715, June 2006. doi:10.1109/MIXDES.2006.1706677. Richard B Langley. The GPS error budget. *GPS world*, 8(3):51–56, 1997. Mingjie Lin, Ilia Lebedev, and John Wawrzyncek. High-throughput Bayesian Computing Machine with Reconfigurable Hardware. In *Proceedings of the 18th Annual ACM/SIGDA International Symposium on Field Programmable Gate Arrays*, FPGA ’10, pages 73–82, New York, NY, USA, 2010. ACM. doi:10.1145/1723112.1723127. Kevin Murphy et al. The bayes net toolbox for matlab. *Computing science and statistics*, 33(2):1024–1034, 2001. Kourosh Noori and Kourosh Jenab. Fuzzy reliability-based traction control model for intelligent transportation systems. *IEEE Transactions on Systems, Man, and Cybernetics: Systems*, 43(1):229–234, 2013. Judea Pearl. *Probabilistic reasoning in intelligent systems: Networks of plausible inference*. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1988. Luigi Portinale and Daniele Codetta-Raiteri. ARPHA: AN FDIR ARCHITECTURE FOR AUTONOMOUS SPACECRAFTS BASED ON DYNAMIC PROBABILISTIC GRAPHICAL MODELS. In *Proc. IJCAI workshop on AI on Space. Barcelona*, 2011. Daniel Salós, Christophe Macablan, Anaïs Martheau, Bernard Bonhoure, and Damien Kubrak. Nominal GNSS pseudorange measurement model for particular urban applications. In *Position Location and Navigation Symposium (PLANS), 2010 IEEE/ION*, pages 806–815. IEEE, 2010. Johann Schumann, Timmy Mbaya, Ole Mengshoel, Knut Pipatsrisawat, Ashok Srivastava, Arthur Choi, and Adnan Darwiche. Software health management with Bayesian networks. *Innovations in Systems and Software Engineering*, 9(4):271–292, 2013. Johann M Schumann, Kristin Y Rozier, Thomas Reinbacher, Ole J Mengshoel, Timmy Mbaya, and Corey Ippolito. Towards real-time, on-board, hardware-supported sensor and software health management for unmanned aerial systems. *International Journal of Prognostics and Health Management*, 6, 2015. Poorani Shivkumar. Intelligent controller for electric vehicle. In *2008 IEEE International Conference on Sustainable Energy Technologies*, pages 978–983. IEEE, 2008.
f1076180-acff-410e-b6d8-1301b72f2329
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
350,471
Program for Quantitative and Analytical Political Science at Princeton Kosuke Imai Department of Politics Center for Statistics and Machine Learning Presentation at the Advisory Council Meeting Department of Politics, Princeton University February 26, 2016 Quantitative Social Science Today - Internet and computing revolution over the last two decades - Transformed social science research and education - Data, Data, and Data! - Past: government data, national survey data - Today: more of old types of data and lots of new data - Randomized experiments and surveys conducted by researchers - Administration records: voter files, contributions, lobbying, ... - Economic data: trade, company information, finance, ... - Military data: casualty, insurgent attacks, ... - Social media data: websites, blogs, tweets, cell phones, ... - GIS data: satellite, climate, natural resource discoveries, ... - Text, images, sounds: news, speeches, bills, commercials, ... Examples of Recent Dissertation Research 1. Number and size of European states and their evolution over time - Traditional way: rich historical analysis of a few important cases - New way: Geocode state boundaries every 10 years over 400 years 2. Lobbying and trade policies - Traditional: hire research assistants hand-code lobbying reports - New: write a computer code to scrape and analyze 800,000 reports 3. Impact of supreme court opinion on lower courts’ decisions - Traditional: read lots of opinions! - New: use plagiarism detection software to compare 700,000 opinions Examples of Recent Faculty Research 1. Analysis of 160 million geocoded US voters from L2 to study neighborhood effects on turnout. 2. Analysis of 20 million roll calls in the state legislature to study polarization. 3. Analysis of the careers of all federal employees to understand bureaucratic policy making and personnel politics. Analysis of geocoded insurgent attacks and US airstrikes in Afghanistan and Iraq to study civil war dynamics Analysis of 3 trillion product level imports and exports between 150 countries over 25 years Challenges 1. Data availability is NOT the problem - Need for new algorithms, models, and methods - Need for new computing technologies - parallel computing - database management and visualization - natural language, image, and video processing 2. Everyone, not just statisticians and methodologists, are analyzing data - Need for methodological training at all levels - Undergraduates, not just graduate students - Curriculum development - Independent research - Job market in virtually all areas 3. Importance of ideas and theory - Big data $\Rightarrow$ what and where to look? - Game theory - How to connect theory to data Overview of Quantitative Social Science at Princeton - Courses - Certificate programs - High performance computing center - Quantitative Social Science Research and Education - Teaching - Infrastructure - Training - Consulting - Fellowships - Workshops - Project assistance Teaching 1. Undergraduate teaching - 8 years ago: No politics undergraduate course in statistics - Now, we offer 3 courses: - POL245 Visualizing Data (Freshman Scholars Institute): 30 students - POL345 Quantitative Analysis and Politics: 30 → 100 students - POL346 Applied Quantitative Analysis: 3 → 35 students - Courses in game theory and political economy - Certificate program: Statistics & machine learning, Political economy 2. Graduate teaching - 12 years ago: No sequence - Creation of sequences in statistics and game theory - Improved placements: Caltech, Chicago, Harvard, MIT, Yale, etc. - Options outside of academia: Facebook, political consulting, etc. Introductory statistics courses are unpopular - Non-politics introductory statistics courses in social sciences - 5 year average: 2008/09–2013/14 - Courses in ECO, PSY, SOC, and WWS | | Lectures | Assignments | Readings | Precepts | Overall | |------------------|----------|-------------|----------|----------|---------| | Statistics | 3.2 | 3.3 | 3.1 | 3.6 | 3.1 | | All PU courses | 3.8 | 3.7 | 3.7 | 4.0 | 3.9 | Politics introductory statistics courses: | Course | Lectures | Assignments | Readings | Precepts | Overall | |----------|----------|-------------|----------|----------|---------| | POL 245 | 4.4 | 3.9 | 3.5 | 3.9 | 4.3 | | POL 345 | 4.0 | 3.8 | 3.7 | 4.2 | 4.1 | What’s the secret of success? Why Teaching Introductory Statistics Courses is Hard 1. Students are not interested in statistics: | | Professor | Distribution Requirement | Departmental | Certificate Program | General Interest | |----------------------|-----------|--------------------------|--------------|---------------------|-----------------| | Statistics | 0% | 20% | 71% | 3% | 6% | | All PU courses | 6% | 12% | 32% | 7% | 42% | “Professor Imai tried hard to make statistics interesting. But, statistics is boring.” 2. Students have weak mathematical and programming background “as a person not naturally inclined towards statistics and probability, I don’t feel at all qualified to pass judgement on how the course might have been improved.” The Problems of Standard Introductory Statistics Courses - The Problem for social science students: **Boring!!** - only teaches statistical concepts but not actual data analysis - often does not teach basic statistical programming - How can we make these materials more **fun and relevant**? - Emphasize **applications** rather than methods themselves - forecasting election outcomes - gender and racial discrimination in labor market - disputed authorship of the Federalist Papers - Use of statistics in junior papers and senior thesis - Statistics as a useful skill for post-graduate career - Guest speakers from industry Senior thesis research: “I took your POL 345 course last semester, and I think I’m going to need to use statistical analysis skills in my research this semester. I’m currently studying abroad in Beijing, and working on a research project to assess which methods can best improve the quality of education and access to education for migrant children in Beijing…” Graduate school: “When I first decided to take Professor Imai’s statistics course as a senior majoring in Politics at Princeton, I was excited at the idea of gaining new skill sets but wasn’t entirely sure why statistics and learning R would be useful for me. In retrospect, I am very grateful for having taken the course, which helped me become fully ready for my present graduate studies in political science…” Finance: “It was a pleasure, and quite a coincidence, running into you on Wall St. the other week. I have actually been meaning to send you an e-mail to thank you for what Pol 345 has done for me. I recently returned from London for two months of training with DB, and spent a large majority of the time discussing options pricing models, which is highly contingent on statistical assumptions…” Small-town newspaper: “I graduated from Princeton last June, and took POL 345 a year ago. I was a history major, and my job now has little to do with statistics – I’m a sports reporter for a small-town newspaper. But I did find a way to employ R quite usefully…” 1. High performance computing center at Princeton - Collaboration across different departments - Originally built for natural science departments - Social sciences and humanities are now utilizing too - Growing demands for computational resources 2. Need training to use these and other resources - Computing workshops - Consulting services - 700 hours - 100 unique clients from 9 departments - Led by research specialists and postdocs Concluding Remarks - Everyone – undergrads, grad students, faculty – analyzes data - Need for better curriculum and infrastructure at all levels - Importance of human resources: teaching, training, consulting - methodologist faculty - research specialists - postdocs, graduate and undergraduate fellows - Coordination with other departments at Princeton: Center for Statistics and Machine Learning - Collaboration with private sectors, non-profits, and government agencies: data collection/sharing, joint projects, job placements - Internationalization: - Political Economy conferences in Venice - Political Methodology conferences in Asia
<urn:uuid:8430df42-47a9-4b6d-ba17-fb95e95b3428>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
8,746
Antiviral Agen ts Prevymis® (letermovir) Denavir (penciclovir) Sitavig® (acyclovir buccal tablet) Effective 01/02/2024 Plan ☒ MassHealth UPPL ☐Commercial/Exchange Program Type ☒ Prior Authorization ☒ Quantity Limit ☐ Step Therapy Benefit ☒ Pharmacy Benefit ☒ Medical Benefit Specialty Limitations N/A Contact Information Medical and Specialty Medications All Plans Phone: 877-519-1908 Fax: 855-540-3693 Non-Specialty Medications All Plans Phone: 800-711-4555 Fax: 844-403-1029 Exceptions Prevymis vial is available through both pharmacy and medical benefits. Overview Prevymis (letermovir) is a cytomegalovirus (CMV) DNA terminase complex inhibitor indicated for prophylaxis of CMV infection and disease in adult CMV-seropositive recipients [R+] of an allogeneic hematopoietic stem cell transplant (HSCT). Sitavig (acyclovir buccal tablet) is indicated for the treatment of recurrent herpes labialis (cold sores) in immunocompetent adults. | | No PA | Require PA | |---|---|---| | acyclovir capsule, tablet | | | | acyclovir injection | | | | cidofovir | | | | Cytovene® (ganciclovir injection) | | | | famciclovir | | | | foscarnet | | | | Valcyte® # (valganciclovir) | | | | Valtrex® # (valacyclovir) | | | | Xerese® (acyclovir/hydrocortisone) | | | | Zovirax® # (acyclovir suspension) | | | | Zovirax® # (acyclovir cream, ointment) | | | *A-rated generic available. Both brand and A-rated generic require PA. #This is a brand-name drug with FDA "A"-rated generic equivalents. PA is required for the brand, unless a particular form of that drug (for example, tablet, capsule, or liquid) does not have an FDA "A"-rated generic equivalent. Coverage Guidelines Authorization may be granted for members new to the plan who are currently receiving treatment with requested medication, excluding when the product is obtained as samples or via manufacturer's patient assistance programs. Authorization may be granted for members when all the following criteria are met: OR Denavir® (penciclovir) 1. Diagnosis of recurrent herpes labialis (cold sores, HSV-1, orolabial herpes) ALL of the following: 2. Member is ≥ 12 years of age a. acyclovir cream, ointment 3. Inadequate response or adverse reaction to ONE or contraindication to BOTH of the following: b. Xerese® a. Requested quantity is ≤ 5 grams/30 days 4. ONE of the following: b. Medical necessity for exceeding 5 grams/30 days (i.e. frequent outbreaks/large area) Prevymis® (letermovir) 1. Appropriate diagnosis of CMV prophylaxis in allogenic HSCT ALL of the following: 2. Member is at high risk for CMV reactivation 3. If request is for the injection formulation, clinical rationale why member cannot use tablet formulation Sitavig® (acyclovir buccal tablet) 1. Appropriate diagnosis of cold sores (HSV-1, orolabial herpes, herpes labialis) ALL of the following: 2. Adverse reaction or contraindication to oral acyclovir a. oral famciclovir 3. Inadequate response (in a previous episode), adverse reaction, or contraindication to BOTH of the following: b. valacyclovir a. Quantity requested is for 2 tablets per month 4. ONE of the following: b. Medical necessity for exceeding 2 tablets per month (i.e. frequent outbreaks) Continuation of Therapy Denavir (penciclovir): Reauthorization by prescriber will infer a positive response to therapy. Prevymis, Sitavig: See below for additional information Limitations a. Prevymis: 100 days 1. Initial approvals will be granted for: b. Denavir (penciclovir), Sitavig: 1 month a. Denavir (penciclovir): 6 months 2. Reauthorizations will be granted for: b. Prevymis i. 3 months - reauthorization is received and the member has received ≤ 3 months of therapy and continues to be high risk c. Sitavig ii. 6 months - reauthorization is received and the member has received ≤ 6 months of therapy and the prescriber documents active CMV viremia (no specific viral threshold needs to be met) i. 6 months - reauthorization is within three months of initial approval 3. Requests for Brand Name when generic is preferred: In addition to any prior authorization requirements that may be listed above, if an A-rated generic equivalent is available, such prior authorization requests require medical records documenting an allergic response, adverse reaction, or inadequate response to the generic equivalent drug (history of allergic reaction to the inactive ingredients used in the manufacturing process of a certain drug is acceptable). ii. 1 month - reauthorization is beyond three months of initial approval and will be treated as new outbreak 4. Requests for generic when Brand Name is preferred: There are some drugs for which the Plan has determined it will be cost effective to prefer the use of the Brand Name formulation. In this case, the generic equivalent formulation is considered non-preferred and requires prior authorization. These requests require medical records documenting an allergic response, adverse reaction, or inadequate response to the Brand Name formulation. For the most up to date list of drugs where the Brand Name formulation is preferred, see the MassHealth Brand Name Preferred Over Generic Drug List (BOGL) at www.mass.gov/druglist. Sitavig 50 mg buccal 5. The following quantity limits apply: 2 tablets per 30 days References 2. British Association for Sexual Health and HIV (BASHH). Clinical Effectiveness Group 2014 National Guideline for the Management of Genital Herpes [guideline on the internet]. 2014 [cited 2020 May 18]. Available from: https://www.bashhguidelines.org/media/1019/hsv_2014-ijstda.pdf. 1. Albrecht M. Treatment of genital herpes simplex virus infection. In: Basow DS (Ed). UpToDate [database on the internet]. Waltham (MA): UpToDate; 2019 [cited 2020 May 18]. Available from: http://www.utdol.com/utd/index.do. 3. Centers for Disease Control and Prevention. Sexually Transmitted Diseases Treatment Guidelines [homepage on the Internet]. Atlanta: Centers for Disease Control and Prevention: updated 2015 Jun 5; [cited 2020 May 18]. Available from: https://www.cdc.gov/std/tg2015/toc.htm. 5. Klein RS. Treatment of herpes simplex virus type 1 infection in immunocompetent patients. In: Basow DS (Ed). UpToDate [database on the internet]. Waltham (MA): UpToDate; 2019 [cited 2020 May 18]. Available from: http://www.utdol.com/utd/index.do 4. American College of Obstetricians and Gynecologists. ACOG practice bulletin: clinical management guidelines for obstetrician-gynecologists. Gynecologic herpes simplex virus infections. Obstet Gynecol. 2004;104(5):1111-7. 6. Denavir® cream [package insert on the Internet]. Morgantown (WV): Mylan Pharmaceuticals Inc.; 2018 Nov. 8. Prevymis® [prescribing information]. Whitehouse Station (NJ): Merck & Co, Inc; 2019 Aug. 7. Sitavig® [package insert]. Charleston (SC): BioAlliance Pharma; 2019 Dec. 9. Azevedo LS, Pierrotti LC, Abdala E, Costa SF, Strabelli TM, Campos SV, et al. Cytomegalovirus infection in transplant recipients. Clinics (Sao Paulo). 2015 Jul;70(7):515-23. doi: 10.6061/clinics/2015(07)09. Epub 2015 Jul 1. 10. Tomblyn M, Chiller T, Einsele H, Gress R, Sepkowitz K, Storek J, et al. Guidelines for preventing infectious complications among hematopoietic cell transplantation recipients: a global perspective. Biol Blood Marrow Transplant. 2009 Oct;15(10):1143-238. doi: 10.1016/j.bbmt.2009.06.019. 12. Acyclovir [package insert]. Morgantown (WV): Mylan Pharmaceuticals Inc.; 2010 Feb. 11. Micromedex® Healthcare Series [database on the Internet]. Greenwood Village (CO): Thomson Reuters (Healthcare) Inc.; Updated periodically [cited 2020 May 18]. Available from:http://www.thomsonhc.com/. 13. Famciclovir [package insert]. Weston (FL): Apotex Inc.; 2011 Mar. 15. Riley LE, Wald A. Genital herpes simplex infection and pregnancy. In: Basow DS (Ed). UpToDate [database on the internet]. Waltham (MA): UpToDate; 2020 [cited 2020 May 18]. Available from: http://www.utdol.com/utd/index.do. 14. Valacyclovir [package insert]. Morgantown (WV): Mylan Pharmaceuticals Inc.; 2011 Dec. 16. Wingard JR. Prevention of viral infections in hematopoietic cell transplant recipients. In: Basow DS (Ed). UpToDate [database on the internet]. Waltham (MA): UpToDate; 2020 Apr [cited 2020 May 18]. Available from: http://www.utdol.com/utd/index.do. 17. Fishman JA, Alexander BD. Prophylaxis of infections in solid organ transplantation. In: Basow DS (Ed). UpToDate [database on the internet]. Waltham (MA): UpToDate; 2019 Sep [cited 2020 May 18]. Available from: https://www.uptodate.com/contents/prophylaxis-of-infections-in-solid-organtransplantation. Review History 06/19/19 – Approved by P&T 06/25/18 – Reviewed 05/20/2020 – Reviewed and Updated May P&T; references updated; dosing updated to included oral and IV formulation; added started and stabilized statement. Effective 8/1/20. 02/08/2023 - Reviewed and updated for Feb P&T. Matched MH criteria. Added Overview table. Added Sitavig criteria and updated Prevymis criteria. Clarified approval durations. Updated references. Effective 4/1/23. 11/16/2022 – Reviewed for Nov P&T. Separated out MH vs Comm/Exch. No clinical changes 06/14/23 – Reviewed and updated for P&T. Admin update: Clarified that Prevymis vial is available through both pharmacy and medical benefits (dual). Effective 6/30/23 12/13/23 – Reviewed and updated for P&T. Policy update to reflect the removal of brand preferred status from Denavir (penciclovir) and added PA. Effective 1/2/24
<urn:uuid:cc6ac77f-4227-47d6-8583-0c1a40562fab>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
9,486
Produktbereich 05 Soziale Leistungen Produktbeschreibung Produktbereich 05 Soziale Leistungen Stadt Meckenheim Produktbereich 05 Soziale Leistungen strategische Ziele 5.1 Die Stadt bietet den Hilfeempfängern konkrete Unterstützung zum eigenverantwortlichen Handeln an. Die Rahmenbedingungen sind geschaffen, die es den Hilfeempfängern ermöglichen, in bezahlbarem menschenwürdigem Wohnraum integriert leben zu können. 5.2 Alle Bürgerinnen und Bürger Meckenheims sind gleichermaßen anerkannt und wertgeschätzt. Der Inklusionsgedanke wird gefördert und die Selbständigkeit unterstützt. 5.3 Die ehrenamtliche Arbeit wird gefördert und wertgeschätzt. Die Vernetzung ist ausgeweitet. Teilergebnishaushalt Produktbereich 05 Soziale Leistungen Stadt Meckenheim 41.980 3.000 22.700 Teilfinanzhaushalt Produktbereich 05 Soziale Leistungen Stadt Meckenheim 298.400 3.000 2.885.110 1.069.650 1.739.150 1.819.700 777.881 16.000 16.000 -16.000 -2.235.871 Produktbereich 05 Soziale Leistungen Soziale Leistungen Produktbeschreibung Produkt 311.1 Soziale Leistungen Stadt Meckenheim Produktbereich 05 Soziale Leistungen Produktgruppe 311 Soziale Leistungen und Leistungen für Asylbewerber Produkt 311.1 Soziale Leistungen Kurzbeschreibung - Behinderten- und Seniorenarbeit - durch Beratung, Betreuung und materielle Unterstützung wird die Existenzgrundlage der Zielgruppe abgesichert - Pflegeberatung Zielgruppen Leistungsempfänger nach dem Sozialgesetzbuch XII (SGB XII), freiwillig Wehrdienstleistende und Senioren, Pflegebedürftige und deren Angehörige externe Schnittstellen Arbeitsagentur, Verbände, Krankenkassen, Familienkassen, Kreisverwaltung, Bezirksregierung, Gerichte, Sozialkonferenzen interne Schnittstellen interne Fachbereiche Verantwortl. Person Monika Biesterfeldt/ Bettina Hihn Auftragsgrundlage Sozialgesetzbücher I, VI, X und XII (SGB I, VI,X und XII) Budgetierung Auf die im Vorbericht zum Haushaltsplan 2023/2024 dargestellten Budgeterläuterungen wird verwiesen. strategische Ziele siehe Beschreibung Produktbereich allgemeine Ziele - Sicherstellung der Existenzgrundlage der Zielgruppe - Absenkung der Sozialhilfeaufwendungen durch Entlassung der Hilfeempfänger aus der Betreuung - zeitnahe und kompetente Beratung hilfesuchender Einwohner/-innen - die Stadt Meckenheim ist eine familienfreundliche Stadt, in der die Kinder-, Jugend- und Seniorenarbeit, sowie die Integration eine hohe Rolle spielen - langfristiges Konzept für eine seniorenfreundliche Stadt Teilergebnishaushalt Produkt 311.1 Soziale Leistungen Stadt Meckenheim 200 200 41.360 1.000 40.360 50.200 97.810 70 18.400 12.550 1.500 4.350 200 200 7.485 2.500 4.800 100 85 Erläuterungen Sachkonto 4311000 Veranschlagt sind Gebührenerträge für die Ausstellung von Wohnberechtigungsscheinen und Zinssenkungsbescheigungen. Sachkonto 5233010 Für die im Fachbereich eingesetzten Programme "Open Prosoz" und "Wohngeld Plus", sowie die Teilergebnishaushalt Produkt 311.1 Soziale Leistungen Stadt Meckenheim Programmzugänge über die Citrix-Anbindung (VPN-Zugänge) fallen Aufwendungen in Höhe der Ansätze an. Für 2023 ist die Einführung der online Terminvergabe TEVIS geplant. Für die im Fachbereich eingesetzte Software "Wohnungswesen Plus" und die Programmzugänge über die Citrix-Anbindung fallen Aufwendungen in Höhe der Ansätze an. Für die im Fachbereich eingesetzte Software "Wohngeld Plus" und die Programmzugänge über die Citrix-Anbindung fallen Aufwendungen in Höhe der Ansätze an. Sachkonto 5291210 Veranschlagt werden Aufwendungen aus einer Kooperation mit dem Katholischen Verein für soziale Dienste (SKM). Dieser Verein unterstützt die Kommunen bei Räumungsklagen zur Abwendung von Wohnungs- und Obdachlosigkeit durch Beratung und Wahrnehmung von Ortsterminen. Unabhängig von Fallzahlen und Arbeitsaufwand findet eine Entgelterhebung anhand eines Berechnungsschlüssels von 0,30 Euro je Einwohner statt. Unter Zugrundelegung eines jährlichen Mittelbedarfs von 8.400 Euro insgesamt finden hier fünfzig Prozent Berücksichtigung. Sachkonto 5339010 Veranschlagt werden hier sonstige Aufwendungen zur Abwendung akuter sozialer Notlagen, wie Obdachlosigkeit oder ähnliches. Sachkonto 5412100 Berücksichtigt ist der Fortbildungbedarf für Personal im Bereich der Sozialhilfen, wie Grundsicherung und ähnliches. Sachkonto 5431090 Die Ansätze berücksichtigen die Mitgliedschaft im Deutschen Verein für öffentliche Fürsorge. Teilfinanzhaushalt Produkt 311.1 Soziale Leistungen Stadt Meckenheim 200 200 1.000 40.360 50.200 97.810 70 12.550 1.500 4.350 200 200 7.485 2.500 4.800 100 85 Produktbereich 05 Soziale Leistungen Leistungen für Asylbewerber Produktbeschreibung Produkt 311.2 Leistungen für Asylbewerber Stadt Meckenheim Produktbereich 05 Soziale Leistungen Produktgruppe 311 Soziale Leistungen und Leistungen für Asylbewerber Produkt 311.2 Leistungen für Asylbewerber Kurzbeschreibung Das Produkt umfasst die Leistungsgewährung nach dem Asylbewerberleistungsgesetz, insbesondere Beratung und Gewährung von finanziellen Hilfen. Zielgruppen Leistungsempfänger nach dem Asylbewerberleistungsgesetz (AsylbLG) externe Schnittstellen Arbeitsagentur, Verbände, Krankenkassen, Familienkassen, Kreisverwaltung, Bezirksregierung, Gerichte, Sozialkonferenzen, International Organisation for Migration (IOM) interne Schnittstellen interne Fachbereiche Verantwortl. Person Monika Biesterfeldt Auftragsgrundlage Sozialgesetzbücher I und X (SGB I und X), Flüchtlingsaufnahmegesetz (FlüAG), Aufnahmegesetz NRW (LAufG), Aufenthaltsgesetz, Asylbewerberleistungsgesetz (AsylbLG) Budgetierung Auf die im Vorbericht zum Haushaltsplan 2023/2024 dargestellten Budgeterläuterungen wird verwiesen. strategische Ziele siehe Beschreibung Produktbereich allgemeine Ziele - Gesundheitsfürsorge - Sicherstellung des Lebensunterhaltes Kennzahlen - Anzahl der Widersprüche - Anzahl der Leistungsempfänger - Anzahl stattgegebener Widersprüche Teilergebnishaushalt Produkt 311.2 Leistungen für Asylbewerber Stadt Meckenheim 2.843.750 2.625.000 218.750 276.550 214.980 16.660 44.900 10 15.100 4.200 6.000 4.900 1.819.500 890.000 185.000 153.000 30.000 400.000 35.000 120.000 6.500 2.800 500 2.300 Erläuterungen Sachkonto 4481010 Berechnung der Landesmittel erfolgt nach Anzahl der zugewiesenen Flüchtlinge. Pro Flüchtling Teilergebnishaushalt Produkt 311.2 Leistungen für Asylbewerber Stadt Meckenheim wird eine Summe von 12.000 € zugewiesen, darin sind 875 € als Betreuungspauschale für die Asylbewerber enthalten. Die Zahl der Zuweisungen steigt an. Als Kalkulationsgröße werden 250 Personen veranschlagt. Es wird zukünftig mit einem weiteren Anstieg gerechnet. Sachkonto 4481080 Veranschlagt sind hier ausschließlich die Erträge aus der Pauschale für die Betreuung der Asylbewerber. Auch hier findet das angenommene Kontingent von 250 Personen Berücksichtigung. Sachkonto 5233010 Für die im Fachbereich eingesetzte Software "Open Prosoz" und die Programmzugänge über die Citrix-Anbindung fallen Aufwendungen in Höhe der Ansätze an. Der Produktüberleitungsvertrag mit der regioIT sieht eine 2,0-prozentige Preissteigerung für die Jahre 2023 und 2024 vor. Sachkonto 5281090 Für die Betreuung der Asylbewerber werden u.a. verschiedene Verbrauchsmittel benötigt. Hierzu gehören Öle, Fette, Reinigungs- und Desinfektionsmittel, Verbandmaterial usw. Höherer Ansatz, da Anstieg der Personenanzahl. Sachkonto 5291210 Veranschlagt werden einerseits Aufwendungen aus einer Kooperation mit dem Katholischen Verein für soziale Dienste (SKM). Dieser Verein unterstützt die Kommunen bei Räumungsklagen zur Abwendung von Wohnungs- und Obdachlosigkeit durch Beratung und Wahrnehmung von Ortsterminen. Unabhängig von Fallzahlen und Arbeitsaufwand findet eine Entgelterhebung anhand eines Berechnungsschlüssels von 0,30 Euro je Einwohner statt. Unter Zugrundelegung eines jährlichen Mittelbedarfs von 8.400 Euro insgesamt finden hier fünfzig Prozent Berücksichtigung. Andererseits berücksichtigen die Ansätze auch Dolmetscherdienstleistungen zur zweifelsfreien muttersprachlichen Verständigung und sprachlichen Unterstützung bei Behördengängen und Arztbesuchen. Sachkonto 5331010 Asylbewerber, welche sich länger als fünfzehn Monate legal im Bundesgebiet aufhalten, erhalten Leistungen nach § 2 des Asylbewerberleistungsgesetzes (AsylbLG). Diese Leistungen werden analog zum Sozialgesetzbuch XII ermittelt und bewilligt. Derzeit erhalten Asylbewerber 449 Euro an monatlichen Leistungen. Je Leistungsfall wird mit einer jährlichen Kostensteigerung von zehn Euro kalkuliert. Die Verweildauer dieses Personenkreises kann nicht verlässlich prognostiziert werden, daher wird weiterhin eine hohe Verweildauer und ein hoher Anteil an Leistungsbeziehern in Meckenheim berücksichtigt. Planungsgröße 90 % von derzeit 220 Asylberwerbern = 198 Personen. Sachkonto 5331020 § 3 AsylblG differenziert den Bedarf eines alleinreisenden Erwachsenen zwischen dessen notwendigen Bedarf und dessen persönlichen Bedarf. An dieser Stelle wird der notwendige Bedarf nach § 3 Abs. 1 des AsylblG veranschlagt. Die monatlichen Leistungen betragen hierfür 204 Euro. Planungsgröße 30 % von 220 Asylbewerbern = 66 Personen; Es wird eine jährliche Steigerung von 10 € mtl. kalkuliert. Teilergebnishaushalt Produkt 311.2 Leistungen für Asylbewerber Stadt Meckenheim Sachkonto 5331030 Hier berücksichtigt der Ansatz den persönlichen Bedarf nach § 3 Abs. 2 AsylblG. Die monatlichen Leistungen betragen derzeit 163 Euro. Planungsgröße 30 % von 220 Asylbewerbern = 66 Personen; Es wird eine jährliche Steigerung von 10 € mtl. kalkuliert. Sachkonto 5331040 Hier werden die Kosten der Unterkunft nach § 3 Abs. 2 AsylblG für die Unterbringung der Asylbewerber in den städtischen Unterkünften veranschlagt. Sachkonto 5331050 Veranschlagt werden die notwendigen Aufwendungen für die Behandlung akuter Krankheiten und Schmerzzustände, für zahnärztliche Behandlungen sowie Hebammenleistungen bei Schwangerschaften und Entbindungen. Die Abrechnung derartiger Aufwendungen erfolgt beim Rhein-Sieg-Kreis und wird über eine Umlage auf die kreisangehörigen und teilnehmenden Gemeinden verteilt. Die in diesem Zusammenhang anfallenden Kosten sind aufgrund individueller Lebensumstände nicht verlässlich kalkulierbar. Aufgrund von Erfahrungswerten der letzten drei Jahre und der Berücksichtigung des jüngst zugewiesenen Personkreises ist eine Anpassung der Ansätze geboten. Sachkonto 5331070 Berücksichtigt sind hier unerlässliche Leistungen zur Sicherung des Lebensunterhaltes oder zur Sicherung der Gesundheit durch sofortige medizinische Hilfen. Auch die in diesen Zusammenhängen anfallenden Kosten sind wegen der Besonderheiten des Einzelfalles nicht verlässlich kalkulierbar. Sachkonto 5331080 Die geringe Abwanderung aus Meckenheim, der Anstieg der Mieten sowie die vermehrten Kündigungen von Wohnungen wegen Eigenbedarf und der aktuell veränderten Zuweisungen (Familien mit Kindern, Kriegsvertriebene und Afghanische Ortskräfte) ist die Möglichkeit der Neuanmietung und Herrichtung von Unterkünften unerlässlich. Die Kosten sind nicht kalkulierbar, da sie in Abhängigkeit der Zuweisungen stehen. Sachkonto 5431030 Die Ansätze berücksichtigen die Gebühren für die Telekommunikationsverträge des Mobilfunks. Teilfinanzhaushalt Produkt 311.2 Leistungen für Asylbewerber Stadt Meckenheim 2.625.000 218.750 214.980 16.660 44.900 10 15.100 4.200 6.000 4.900 890.000 338.000 30.000 400.000 35.000 120.000 6.500 2.800 500 2.300 Produktbereich 05 Soziale Leistungen Leistungen für Integration Produktbeschreibung Produkt 311.4 Leistungen zur Integration Stadt Meckenheim Produktbereich 05 Soziale Leistungen Produktgruppe 311 Soziale Leistungen und Leistungen für Asylbewerber Produkt 311.4 Leistungen zur Integration Kurzbeschreibung Das Produkt umfasst Projekte und Maßnahmen zum Ziel der Integration, z.B. Sprachausbildung, multikultureller Austausch. Zielgruppen Personen mit Asylrecht, Asylbewerber mit Leistungen nach dem Aslbewerberleistungsgesetz (AsylbLG), Personenkreis des Aufenthaltsgesetzes (AufenthG), Asylverffahrensrichtlinie, Dublin-III-Verordnung externe Schnittstellen Arbeitsgemeinschaften/ Arbeitskreise z.B. AG Migration und Integration, Caritas, kirchliche Träger, Volkshochschule, Ehrenamtler, Rheinflanke, Diakonie, Rhein-Sieg-Kreis interne Schnittstellen interne Fachbereiche Verantwortl. Person Monika Biesterfeldt Auftragsgrundlage Integrationsmaßnahmen unter Beachtung Asylbewerberleistungsgesetz (AsylblG), Integrationskursverordnung (IntV), Aufenthaltsgesetz (AufenthG), Dublin-III-Verordnung, Richtlinie für das Arbeitsmarktprogramm "Flüchtlingsintegrationsmaßnahmen" Budgetierung Auf die im Vorbericht zum Haushaltsplan 2023/2024 dargestellten Budgeterläuterungen wird verwiesen. strategische Ziele siehe Beschreibung Produktbereich allgemeine Ziele Zielorientierte Integrationsmaßnahmen, z.B. Sprachförderung, Vermittlung der deutschen Kultur (Sitten/Bräuche), intensive Unterstützung bis zur vollständigen Integration und dem Verständnis aller Rechte und Pflichten eines europäischen Staatsbürgers Kennzahlen Ein Kennzahlensystem ist noch zu erarbeiten. Teilergebnishaushalt Produkt 311.4 Leistungen zur Integration Stadt Meckenheim 32.820 25.840 2.000 4.980 72.000 72.000 600 600 -105.420 -105.420 -105.420 -105.420 -105.420 Erläuterungen Sachkonto 4141160 Die Mittel wurden in 2019 über die Landesregierung für Maßnahmen bis zum 30.11. 2020 zugeführt. Pandemiebedingt wurde der Verwendungszeitraum mit Erlass des MKFFI v. 14.04.20 bis 31.03.2022 verlängert. Hier wird auf einen Gesetzesentwurf zur Umsetzung der Teilhabe -und Integrationstrategie als Maßnahme für das kommunale Integrationsmanagement in den Gemeinden und Kreisen hingewiesen. Ob eine weitere Zuweisung erfolgen wird, ist ungewiss. Sachkonto 5281130 Die hier veranschlagten Mittel dienen der Finanzierung von Aktionen und Projekten zur Integration. Beispielhaft sind hier der "Tag der Kulturen" und der "Tisch des Dialoges" zu nennen. Sachkonto 5291210 Die Ansätze beinhalten die Kosten des Kooperationsvertrags mit der Caritas. Der Vertragsschluss erfolgte zum 15.10.22 für vorerst 2 Jahre. Vorsorglich wurden die Kosten bis 2026 weiter eingeplant. Teilfinanzhaushalt Produkt 311.4 Leistungen zur Integration Stadt Meckenheim 25.840 2.000 4.980 72.000 600 600 Produktbereich 05 Soziale Leistungen Soziale Einrichtungen Produktbeschreibung Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Produktbereich 05 Soziale Leistungen Produktgruppe 315 Soziale Einrichtungen Produkt 315.1 Soziale Einrichtungen Kurzbeschreibung - Unterstützung der Einwohner/-innen bei sozialen Belangen Zielgruppen Einwohner-/innen, die sich in sozialen Notlagen befinden und in der Gefahr sind, obdachlos zu werden externe Schnittstellen Arbeitsagentur, Verbände, Krankenkassen, Familienkassen, Kreisverwaltung, Bezirksregierung, Gerichte, Sozialkonferenzen interne Schnittstellen interne Fachbereiche Verantwortl. Person Monika Biesterfeldt Auftragsgrundlage Sozialgesetzbücher (SGBs) Budgetierung Auf die im Vorbericht zum Haushaltsplan 2023/2024 dargestellten Budgeterläuterungen wird verwiesen. strategische Ziele siehe Beschreibung Produktbereich allgemeine Ziele - Sicherstellung, dass Hilfesuchende untergebracht werden Teilergebnishaushalt Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Ertrags- und Aufwandsarten Ergebnis Ansatz Ansatz Ansatz Plan Plan Plan 2026 2027 41.980 41.980 3.000 3.000 30.170 78.540 6.080 15.560 30 5.500 13.000 800 25.600 41.300 2.750 28.000 17.300 10.000 23.400 2.500 28.410 16.000 1.200 420 22.700 150 22.550 251 2021 2022 2023 2024 2025 Teilergebnishaushalt Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Erläuterungen Sachkonto 4321160 Die Ansätze beinhalten die Erstattung von Unterkunftskosten durch Job-Center bzw. Eigenanmietung nur bei Rechtskreiswechsel oder Berufstätigkeit. Sachkonto 5241090 Die Ansätze berücksichtigen auch weiterhin eine Corona-bedingte Mehrkostenpauschale von 100 Euro im Monat. Sachkonto 5241160 Einrichtungen "Siebengebirgsring" Neben den Aufwendungen im Rahmen der allgemeinen Verkehrssicherung, soll im Jahr 2024 ein Abriss von 6 Asylunterkünften durchgeführt werden. Notunterkünfte Werferwiese und Siebengebirgsring 38a und 38b. Angesichts einer bislang kurzen Nutzungsdauer sind Maßnahmen zur Unterhaltung im Rahmen der allgemeinen Verkehrssicherung vorgesehen. Darüber hinaus sollen beide Gebäude mit Glasfaseranschlüssen versehen werden. Notunterkünfte Pater-Müller-Str. Angesichts einer bislang kurzen Nutzungsdauer sind Maßnahmen zur Unterhaltung im Rahmen der allgemeinen Verkehrssicherung vorgesehen. Containeranlage Werferwiese In dem Ansatz ist die temporäre Erstellung der Containeranlage für die Aufnahme von Kriegsvertriebenen und Flüchtlingen sowie die Erschließungs- und Gründungsarbeiten geplant. Notunterkünfte Pater-Müller-Str. Die Unterhaltung der Aufbauten und Betriebsvorrichtungen beinhaltet die zweijährliche Prüfung der Feuerlöscher. Sachkonto 5241220 Einrichtungen "Siebengebirgsring" In den Unterkünften beinhaltet die Unterhaltung der Aufbauten und Betriebsvorrichtungen lediglich die zweijährige Prüfung der Feuerlöscher. Sachkonto 5252000 Die Ansätze berücksichtigen den Bedarf für Reparatur und Austausch von Geräten und sonstigen Teilergebnishaushalt Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Gegenständen für die Nahrungszubereitung, die Körperhygiene und die Reinigung von Bekleidungsstücken. Sachkonto 5281090 Der Ansatz berücksichtigt den Bedarf an Desinfektionsmitteln, Waschpulver, Verbandmaterial, Bettwäsche etc. Corona-bedingt sind Ansatzanpassungen geboten. Sachkonten 5241240 Etliche angemietete Objekte werden seit geraumer Zeit nicht mehr als Flüchtlingsunterkünfte genutzt. Die entsprechenden Mietverhältnisse wurden daher beendet. Sachkonto 5431030 Veranschlagt werden die Gebühren aus dem Telefonvertrag für die Notrufnummer in den Notunterkünften im Siebengebirgsring. Sachkonto 5821170 Hier werden die Aufwendungen der Straßenreinigung und der übrigen Grundbesitzabgaben veranschlagt. Hierbei handelt es sich um interne Leistungsverrechnungen zu Gunsten der Produkte 541.1 - Verkehr und 611.1 - Steuern, allgemeine Zuweisungen und allgemeine Umlagen. Bislang wurden diese beim Sachkonto 5241070 veranschlagt. Sachkonto 5821180 Veranschlagt werden hier die Aufwendungen der Abwasserbeseitigung. Auch hierbei handelt es sich um interne Leistungsverrechnungen, und zwar zu Gunsten des Produktes 531.1 - Ver- und Entsorgung. Bislang wurden diese beim Sachkonto 5241040 dargestellt. Teilfinanzhaushalt Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Einzahlungs- und Auszahlungsarten Ergebnis Ansatz Ansatz Ansatz Plan Plan Plan 2026 2027 298.200 3.000 3.000 30.170 78.540 6.080 15.560 30 300.000 5.500 13.000 800 25.600 41.300 2.750 28.000 17.300 10.000 23.400 1.166.000 1.200 742.676 420 16.000 16.000 254 2021 2022 2023 2024 2025 Teilfinanzhaushalt Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim 16.000 -16.000 Erläuterungen Zugänge Fahrzeuge In 2023 soll ein gebrauchter Kleintransporter für Transporte und kleine Umzüge angeschafft werden. Auszahlungen f.d. Erwerb v. Vermögen bis 800 Euro Vorgesehen sind Anschaffung von kindgerechtem Mobiliar, wie Kinderbetten, Wickelkommoden oder Hochstühle. Auszahlungen für Hochbaumaßnahmen In 2023 ist ein Neubau einer Wohnunterkunft für Flüchtlinge vorgesehen. Investitionen Produkt 315.1 Soziale Einrichtungen Stadt Meckenheim Produktbereich 05 Produktgruppe 315 Produkt 315.1 Soziale Leistungen Soziale Einrichtungen Soziale Einrichtungen 4.000.000 4.000.000
<urn:uuid:1e46e3d8-72cc-4799-9375-166a2f4b9749>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
19,980
10% KEDVEZMÉNY* DANUBIUS MUNKATÁRSAK RÉSZÉRE Érvényesség: 2020. december 20-ig Szolgáltatás megnevezése: A DHSR Hévíz szálloda halljából nyíló ART CHRISTALL Galéria üzlet 10% kedvezményt biztosít féldrágakövekből készült egyedi ékszerek, órák, bizsu ékszerek széles választékára. Általános információk: telefonszám: +36 30 396 8486 nyitvatartás: hétfő zárva kedd - péntek 10:00 - 17:30 szombat 9.30 - 12:00 cím: Danubius Health Spa Resort Hévíz, 8380 Hévíz, Kossuth L. u. 9-11. *KEDVEZMÉNY ÉRVÉNYESÍTÉSE: - az üzletben, fizetés előtt kell felmutatni a kedvezményre jogosító a Danubius Tagkártyát - a kedvezmény a javítási szolgáltatásokra nem vonatkozik Amennyiben a Danubius tagkártya vásárláskor nem kerül felmutatása, úgy utólagosan a kedvezmény már nem érvényesíthető.
<urn:uuid:566ef71d-25d6-471e-a300-1ad073840081>
HuggingFaceFW/finepdfs/tree/main/data/hun_Latn/train
finepdfs
hun_Latn
811
am: 13. Januar 2010 | 1 Gestern berichteten die Tagesthemen in einer beachtlich aufklärerischen Sendung unter anderem davon, dass „Kommunen und Landkreise gegen Steuersenkungspläne der Regierung" sind. Es wurde gezeigt, zu welchen bürgerfeindlichen Ergebnissen die systematische Verarmung des Staates führt: immer geringere öffentliche Leistungen, höhere Gebühren, ungerechte Mehrbelastung jener, die nicht über viel Geld verfügen – und höhere Schulden für die Kommunen, wenn sie gegen den Trend steuern. Die hinter der Verarmung des Staates steckende Strategie habe ich in „Meinungsmache" ausführlich geschildert. Den Text des einschlägigen Kapitels 13 finden Sie weiter unten als Leseprobe. Albrecht Müller Es gab einmal in der Bundesrepublik ganz andere Zeiten. Da wusste man, dass die ausreichende Versorgung mit öffentlichen Leistung für alle in unserem Land wichtig ist und dass sie besonders wichtig ist für die finanziell schwächeren Familien. Nur Reiche können sich einen armen Staat leisten – das war eine Aussage die sogar von Besserverdienenden mitgetragen wurde. „Insgesamt soll die Steuerreform eine bessere Versorgung unserer Bevölkerung mit Leistungen, die nur noch die öffentliche Hand erbringen kann, ermöglichen." Das war einer der Kernsätze eines Steuerreformprogramms der SPD. Dann kam ein Inszenierter Meinungswandel gegen den Staat als Dienstleister. Heute liegt die Gesamtabgabenquote, das heißt das Aufkommen an Steuern und Sozialabgaben in Prozent des BIP, in Deutschland bei 39,3 Prozent und damit knapp unterhalb der 27 EUStaaten mit 39,9 Prozent. Die Abgabenquote in Deutschland liegt niedriger als in den skandinavischen Staaten, in Belgien, in Frankreich, in Italien, in den Niederlanden und in Österreich. Dänemarks Abgabenquote liegt fast 10 Punkte über der deutschen, bei 49,1 Prozent, die schwedische bei 48,9%. – Aber wir sind eben auch um vieles schlechter versorgt als die Bürgerinnen und Bürger in anderen europäischen Staaten. Es folgt der Auszug aus Albrecht Müller: Meinungsmache. Wie Wirtschaft, Politik und Medien uns das Denken abgewöhnen wollen: Kapitel 13 Die Verarmung des Staates als strategischer Hebel Im Jahr 1973 berichtete mir ein Freund, der kurz zuvor in den Bundestag gewählt worden war, in seinem Wahlkreis sei er massivem Druck wegen der hohen Abzüge an Sozialabgaben und Steuern ausgesetzt. Als Abgeordneter der größeren Regierungspartei würde er deshalb heftig attackiert. Heute würde man sich darüber nicht wundern; deshalb muss ich kurz den Hintergrund erklären: Wir hatten beide in der SPD-Steuerreformkommission mitgearbeitet, die unter dem Vorsitz des damaligen Entwicklungshilfeministers, Erhard Eppler, konkrete Vorschläge erarbeitet und diese im November 1971 vorgelegt hatte. Als erstes von vier Zielen war darin vorgegeben: »Insgesamt soll die Steuerreform eine bessere Versorgung unserer Bevölkerung mit Leistungen, die nur noch die öffentliche Hand erbringen kann, ermöglichen.« Ganz selbstverständlich ging man damals davon aus, dass die Bevölkerung zusätzliche öffentliche Leistungen braucht. Es gab in Deutschland einen riesigen Nachholbedarf bei Bildung, beim Ausbau der Infrastruktur, beim Umweltschutz, bei der Wasserversorgung und beim Städtebau. Die Kommission formulierte mit Bedacht, dass dieser zuallererst in der Regie der von den Bürgern bestellten öffentlichen Hände befriedigt werden könnte. Sie plädierte für eine bessere Versorgung der Bevölkerung mit (diesen) öffentlichen Leistungen. Dies sah übrigens nicht nur die Kommission unter Eppler so. Auch eine Kommission unter dem Vorsitz des späteren Bundeskanzlers Helmut Schmidt, linker Umtriebe wahrlich nicht verdächtig, die sogenannte Langzeitkommission, hatte ein Jahr nach dem Beschluss der Steuerreformkommission im Juni 1972 gefordert, der Anteil der öffentlichen Ausgaben am Bruttosozialprodukt solle von damals 29 Prozent auf 34 Prozent im Jahr 1985 angehoben werden. Priorität sollten die Ausgaben für Bildung und Wissenschaft sowie für Verkehr und Städtebau haben. Der Anteil der Ausgaben für Bildung und Wissenschaft sollte von 4,1 Prozent im Jahr 1972 auf 7,6 Prozent des Bruttosozialproduktes 1985 steigen. Heute verstehen auch Menschen, die keine Vorurteile gegenüber staatlicher Tätigkeit haben, solche ehrgeizigen Ziele für die Anhebung der öffentlichen Verantwortung nicht. So wirkt sich der Stimmungswandel aus. Was sachlich richtig ist, was notwendig ist, wird durch die Stimmung nicht abgebildet. Hätten wir nur ein bisschen davon realisiert und pragmatisch angegangen, was damals an Vorstellungen über mehr öffentliche Verantwortung entwickelt wurde, dann hätten wir heute weniger Sorgen wegen der Mängel bei Ausbildung und Bildung zum Beispiel und wegen einer abenteuerlich schlechten Integration jener Menschen und ihrer Kinder, die wir selbst als Aussiedler und Gastarbeiter nach Deutschland geholt haben. Jene zitierten Personen und politischen Gruppierungen, die vor über 30 Jahren für eine Erweiterung des Angebots von öffentlichen Leistungen warben und entsprechende programmatische Texte entwarfen, waren nicht geprägt von irgendeiner ideologisch am: 13. Januar 2010 | 3 begründeten Staatsvergötterung. Auch die Vorstellung, die Vergesellschaftung als solche löse unsere Probleme, spielte allenfalls in kleinen Zirkeln am Rande eine Rolle. Eher rationale Abwägungen standen im Vordergrund: Man wusste, dass manches Gut und manche Dienstleistung sinnvollerweise vom Staat produziert und zur Verfügung gestellt wird, weil das die ökonomischste Art der Produktion ist, wenn Wettbewerb wegen der Unteilbarkeit der Produktionsweisen nicht möglich oder nur mit Krücken konstruierbar ist. Und weil die Leistung in öffentlicher Regie auch noch die fairste ist. Der Satz »Nur Reiche können sich einen armen Staat leisten«, der damals in öffentlichen Debatten eingesetzt wurde, gründete nicht auf Staatsvergötterung, sondern auf der nüchternen Einschätzung, dass die große Mehrheit und insbesondere die Schwächeren ohne staatliche Tätigkeit auf ziemlich verlorenem Posten stehen. Nur die etwas Bessergestellten können sich die ergänzende Privatvorsorge zur Altersvorsorge leisten. Die anderen bleiben auf der Strecke; wenn sie älter werden, droht ihnen Altersarmut. Arme und Normalverdiener können sich Privatschulen kaum leisten. Und private Krankenkassen auch nicht. Spitzenverdiener wohnen in der Regel nicht an Ausfallstraßen, sondern in den besseren Quartieren und können sich auch sonst Umwelt- und Verkehrsbelastungen leichter entziehen. Die große Mehrheit der Menschen ist darauf angewiesen, dass der Staat, dass wir alle etwas tun, um die Belastungen zu verringern, dass wir insgesamt für mehr Lebensqualität sorgen. Sogar bei Naturkatastrophen wird sichtbar, wie sehr die finanziell Schwächeren auf einen starken Staat und seine Leistungsfähigkeit angewiesen sind. Den Verwüstungen des Hurrikans Katharina und seinen Folgen konnten sich die finanziell gut gestellten Bürgerinnen und Bürger von New Orleans wenigstens entziehen, die finanziell Schwachen konnten das nicht. Der inszenierte Meinungswandel gegen den Staat als Dienstleister Zwischen damals und heute liegt eine harte, die öffentliche Meinung prägende Kampagne gegen die öffentliche Hand als Versorger und für die Überantwortung öffentlicher Belange an Private, für Entstaatlichung und gegen die Wahrnehmung öffentlicher Aufgaben durch den Staat. Die Kampagne begann ungefähr zu der Zeit, als der erwähnte Bundestagsabgeordnete von seinen Erfahrungen im Wahlkreis berichtete. Innerhalb weniger Monate war die positive Stimmung für mehr öffentliche Leistungen und für eine rationale Abwägung zwischen privater Tätigkeit einerseits und öffentlicher Tätigkeit andererseits gekippt worden.73 Das ist die herrschende Grundstimmung bis heute. »Der starke Staat ist schlank«, lautet die Schlagzeile über einem Namensartikel des FDP-Vorsitzenden Guido Westerwelle in der »Frankfurter Rundschau« vom 8. April 2009. am: 13. Januar 2010 | 4 Der Bundesverband der Deutschen Industrie (BDI) hat im Juni 2008 ein sogenanntes »Manifest für Wachstum und Beschäftigung « zur Präsentation für die Bundesregierung formuliert, in dem bis zum Jahr 2020 die Reduktion der Staatsquote von rund 43 auf 35 Prozent verlangt wird. Er tut dies in der Hoffnung, mit einer solchen Forderung bei den meisten der Wirtschaft nahestehenden Personen, bei der Mehrheit der Medienschaffenden und darüber hinaus in einer breiten Öffentlichkeit Zustimmung zu finden. In den Köpfen der Multiplikatoren in unserem Land ist nämlich verankert, dass Deutschland ein Land mit einem weit überdurchschnittlich hohen Staatsanteil sei. Das ist aber eine Täuschung: Vom Papier des BDI berichtete die »Financial Times Deutschland« am 23. Juni 2008. Drei Tage später veröffentlichte Eurostat, das Statistische Amt der Europäischen Kommission, Ergebnisse eines Vergleichs zur Abgabenquote in der EU im Jahr 2006.74 Danach lag die gewichtete Gesamtabgabenquote75, das heißt das Aufkommen an Steuern und Sozialabgaben in Prozent des BIP, in Deutschland bei 39,3 Prozent und damit knapp unterhalb der 27 EU-Staaten mit 39,9 Prozent und schon immerhin um 1 Prozent unter jener der Eurozone mit 40,5 Prozent. Die Gesamtbelastung mit Steuern und Sozialabgaben in Deutschland ist nur die neunthöchste in Europa. Die Abgabenquote in Deutschland liegt niedriger als in den skandinavischen Staaten, in Belgien, in Frankreich, in Italien, in den Niederlanden und in Österreich. Dänemarks Abgabenquote liegt fast 10 Punkte über der deutschen, bei 49,1 Prozent, die schwedische bei 48,9. Eine solche Faktenlage wie auch die Frage danach, ob es in der heutigen Zeit angesichts der unerledigten öffentlichen Aufgaben sinnvoll ist, pauschal eine niedrigere Abgabenquote zu verlangen, interessiert einen so wichtigen Verband wie den Bundesverband der Deutschen Industrie nicht. Er agitiert weiter nach dem vor über 30 Jahren festgelegten Schema, und er tut dies heute auf der Basis einer staatsfeindlichen Grundstimmung, die in diesen Kreisen Fuß gefasst hat. »Hassfigur Vater Staat« überschreibt sogar das »Handelsblatt« einen Bericht zu einer »Road Show« stramm neoliberaler europäischer »Denkfabriken« und Institute in Berlin unter Führung des Wiener Hayek-Instituts. »Die Marktidee ist in Deutschland aus dem Leben verschwunden«, kann die Generalsekretärin dieses Instituts dort erklären, ohne ausgelacht zu werden. Das ist die radikale, die Realität ausblendende Agitation, auf der dann solche Gewächse wie das Manifest des BDI und seine Forderung nach weiterer Entstaatlichung gedeihen. Zur Entwicklung der Staatsquote zwischen 1960 und 2008 Die folgende Tabelle zeigt, wie sich die sogenannte Staatsquote zwischen 1960 und 2008 verändert hat. Das ist eine amtliche Tabelle des Bundesministeriums der Finanzen. Das Verständnis von Staatsquote weicht ab vom Begriff, der beim zitierten internationalen Vergleich zugrunde gelegt wurde. Das mindert jedoch nicht die Aussagekraft dieser Tabelle, weil es hier auf einen zeitlichen Vergleich in Die Verarmung des Staates als strategischer Hebel | Veröffentlicht Deutschland ankommt. »Die Regierung definiert die Staatsquote als statistische Größe, in der Ausga ben von Bund, Ländern und Gemeinden sowie der Sozialversicherung in Bezug zum nominalen Bruttoinlandsprodukt (BIP) gesetzt werden. « So heißt es in einer Meldung des Deutschen Bundestages vom 4. August 2008. »Eine sinkende Staatsquote zeige an, dass die staatlichen Ausgaben langsamer zugenommen haben als das nominale BIP, eine steigende Quote signalisiere einen vergleichsweise stärkeren Ausgabenzuwachs.« Zum Verständnis ist es hilfreich, sich den gesamten Zeitablauf anzuschauen. Zwischen 1960 und 1965, also zu Adenauers und Ludwig Erhards Zeiten, stieg die Staatsquote kräftig an. Zwischen 1970 und 1975 stieg sowohl der Anteil der Gebietskörperschaften als auch der Anteil der Sozialversicherungen. Dahinter stecken die gewollte Ausweitung der öffentlichen Tätigkeit in der sozialliberalen Koalition und die damaligen Reformen – vermutlich aber auch die Stagnation des Bruttoinlandsproduktes, also des Nenners dieser Quote, nach der ersten Ölpreisexplosion von 1973. Download: Entwicklung der Staatsquote [PDF – 12 KB] Mit der konjunkturellen Belebung in der zweiten Hälfte der siebziger Jahre sinkt dann die Staatsquote wieder. Das geht so weiter in der ersten Phase der Regierung Kohl. Damals war die Rückführung des Staatsanteils erklärte politische Absicht. Mit der deutschen Vereinigung kombiniert mit dem konjunkturellen Niedergang anfangs der neunziger Jahre steigt die Staatsquote 1996 auf ihren Höchstwert von 49,3 Prozent. Seitdem geht es in Schwankungen abwärts bis zu 43,9 Prozent im Jahr 2008. Den konjunkturellen Einfl uss kann man auch in diesen letzten zehn Jahren beobachten: Der kleine Boom zwischen 1996 und dem Jahr 2000 ließ den Quotienten Staatsquote sinken; der Abschwung in den darauffolgenden Jahren schlägt sich sofort in einer höheren Staatsquote nieder, die wirtschaftliche Belebung seit 2005 in Kombination mit Steinbrücks Sparversuchen dann in einem Rückgang der Staatsquote. Wenn man auf diese Tabelle des Verlaufs des Staatsanteils und des Anteils der Sozialversicherungen im Zeitraum von 47 Jahren auch noch eine Folie mit Daten zum Wohlergehen unseres Volkes legen würde, dann würde man vermutlich schnell begreifen, wie unbedeutend niedrige Staatsquoten waren und sind. Zu Beginn der siebziger Jahre begann die Stimmungsmache gegen staatliche Tätigkeit – übrigens interessanterweise parallel, auch zeitlich parallel, zum Putsch in Chile und der dort bewusst und unter Einfl uss der neoliberalen Chicago-Schule betriebenen Verringerung der Rolle des Staates. Es fügt sich, dass beim erwähnten aktuellen Versuch des HayekInstituts, die radikal neoliberalen Kräfte zu sammeln, Pinochets früherer Arbeitsminister José Piñera mitmacht. Der Einstieg über die hohen Abzüge war ausgesprochen geschickt. Dieses Thema erzielt noch heute die gewünschte Wirkung. Wer möchte nicht von Steuern und Abgaben entlastet werden? Wenn man diese Frage von den öffentlichen Leistungen trennt, dann ist das Ergebnis klar. Der Hinweis auf die hohen 207 Abzüge spaltet zudem die Arbeitnehmerschaft und lähmt die Gewerkschaften. Sie sind gezwungen, im Interesse ihrer Mitglieder für die Verringerung der Abzüge einzutreten, und wissen gleichzeitig, dass öffentliche Leistungen gerade für Arbeitnehmer und die Schwächeren unserer Gesellschaft lebenswichtig sind. Dieses Dilemma wird weidlich genutzt, so immer wieder von der »Bild«- Zeitung. Typisch der Kommentar in »Bild« vom 4. März 2008: am: 13. Januar 2010 | 8 »Steuer-Gier immer größer! Jetzt haben wir es erneut schwarz auf weiß: Steuern und Abgaben fressen uns auf! Ob Soli, Öko-, Mehrwert- und bald Abgeltungssteuer – die Gier des Staates wird immer größer. Die Leidtragenden sind vor allem die Millionen Beschäftigten! Denn bei den Löhnen tut sich im Gegenzug nichts. Die mäßigen Steigerungen sind zwar gut für die Bilanzen der Firmen. Aber im Geldbeutel der Arbeitnehmer kommt kein spürbares Plus an – die Inflation frisst alles wieder auf. Unterm Strich sind die Löhne in den letzten zehn Jahren sogar leicht gesunken. Gleichzeitig stiegen die Belastungen durch den Staat weiter an. Im Klartext: Arbeit und Fleiß lohnen sich nicht wirklich. Deshalb wird es höchste Zeit, dass die Politik Abgaben und Steuern senkt. Nur so gibt es wirklich mehr Netto für alle!« »Bild« untermauerte diesen Kommentar noch mit einem zweiten Artikel: »Steuern und Abgaben. So raubt der Staat uns aus«. Der Kommentator ist sinnigerweise Oliver Santen. Er kam von der Allianz zu »Bild« und betreibt dort Propaganda für die Privatvorsorge und gegen die gesetzliche Rente. Er ist also auch noch aktiv damit beschäftigt, für private Produkte wie Lebensversicherungen à la Riester und Rürup zu werben, die vom Staat hoch subventioniert sind. Dass das Geld dafür auch vom »gierigen« Staat bei den Bürgern kassiert wird, spielt dann natürlich keine Rolle. Denn die dafür notwendige Gier kommt seinen Freunden von der Finanzwirtschaft zugute. Sparen zu wollen ist populär, und Schulden hinzunehmen ist unpopulär. Darauf baut eine zweite Linie der Meinungsmache gegen öffentliche Leistungen auf. Sie erscheint uns im täglichen politischen Leben in vielen Variationen. Beliebt ist die Rolle des 208 Sparkommissars. Das ist ein Ehrentitel, den sich ein kluger PRMacher für den früheren Finanzminister Hans Eichel ausgedacht hatte; Peer Steinbrück versucht ihn mit allen Mitteln und ohne Rücksicht auf die konjunkturellen Gegebenheiten und dringlichen Aufgaben des Staates zu erobern. Hier wird eine der Veränderungen sichtbar, die gravierende Auswirkungen auf die Anti-Staats-Kampagne hatten: Sozialdemokraten mauserten sich von Befürwortern einer Erweiterung des öffentlichen Korridors zu Sparkommissaren. Selbstverständlich ist jeder anständige Mensch für Sparen und gegen Verschuldung; deshalb lädt dieses Thema profilierungsfreudige Jungpolitiker geradezu ein, sich seiner zu bemächtigen und dabei die Anerkennung wichtiger Meinungsführer in den Medien zu ergattern: Carsten Schneider (SPD), Oswald Metzger (nacheinander SPD, Die Grünen, CDU), Antje Hermenau (Die Grünen) haben sich so profiliert und das Thema in der Diskussion gehalten. Wir werden ständig und wiederum in vielen Variationen mit dem Problem zu hoher Staatsschulden konfrontiert. Wir werden vom Bund der Steuerzahler zum Blick auf die »Schuldenuhr« vor dem Büro dieses Bundes in Berlin eingeladen. Diese Vereinigung nennt sich Bund der Steuerzahler, ist aber mehrheitlich ein Bund von Unternehmen und Freiberufl ern. Seine »Schuldenuhr«, die den Zuwachs der öffentlichen Schulden dramatisch und optisch verwertbar anzeigt, wird von Fernsehjournalisten gerne zur Meinungsmache genutzt. So ist es gedacht und so funktioniert es. Die Bertelsmann Stiftung, die nicht fehlen darf, wenn es darum geht, Stimmung für Entstaatlichung zu machen, unterhielt uns Ende Juni 2008 mit einem Kommunalen Finanzund Schuldenreport 2008 über die finanzielle Lage der Kommunen in Deutschland. In einem Bericht von »SpiegelOnline«, über den »Spiegel« zu 25 Prozent im Eigentum einer Bertelsmann-Tochter, hieß es zum Einstieg schön stimmungsmachend: »Kommunen rechnen ihre Schulden schön«. Sie sind »viel stärker verschuldet als angenommen«. Lobend hieß es: »Manche Städte und Gemeinden hätten sich allerdings durch den Verkauf von kommunalem 209 Eigentum – wie beispielsweise Dresden durch die Privatisierung einer Wohnungsgesellschaft – weitgehend entschuldet.« Das zeigt die Stoßrichtung, die Forderung nach weniger Staat. Bei der stimmungmachenden Staatsschuldendebatte wird unverblümt ein Trick der Meinungsmache angewandt: die Ausblendung. Von der hohen Zunahme der Verschuldung durch die schlecht gemachte deutsche Vereinigung und die dabei begangenen teuren Untaten und Fehler spricht man nicht, obwohl es im Schnitt der neunziger Jahre jährlich Spitzenwerte von rund 80 Milliarden Euro waren. Hier gibt es offensichtlich eine Absprache unter den Meinungsmachern in Politik und Medien. Es wird weder über die miserable Leistungsbilanz der Treuhand noch über das Verscherbeln der ostdeutschen Banken an die westdeutschen gesprochen. Das Schweigen über wichtige Vorgänge ist ein besonderes Mittel der Meinungsmache. Und das Schweigen über die Rolle der so schlecht gemachten Vereinigung der beiden Teile Deutschlands ist eines der herausragenden Beispiele dafür. Zur Palette der Meinungsmache im Interesse der Reduzierung der Staatstätigkeit gehört weiter der wiederkehrende Vorwurf staatlicher Bürokratie, die Behauptung, die Manager in der Wirtschaft seien kompetent und die Politiker seien inkompetent, und der Vorwurf der Verschwendung. Es gibt Bürokratie, es gibt Verschwendung, es gibt inkompetente Politiker und inkompetente Verwaltungsbeamte. Aber zum einen trifft man auf diese Schwächen im privaten Sektor auch. Auch dort gibt es Bürokratien, auch dort gibt es Korruption, wie der Fall Siemens ausgiebig belegt, auch dort gibt es Inkompetenz. Was auf den Finanzmärkten zwischen 2001 und 2008 geschah, war entweder kriminell oder inkompetent oder beides. Zudem wäre immer zuerst noch die Frage zu stellen, was man tun kann, um Bürokratisierung, Bequemlichkeit und Unbeweglichkeit bei der Bereitstellung öffentlicher Güter und Dienstleistungen abzumildern und letztlich loszuwerden. Dass dies praktisch geht, sehen wir hierzulande mittlerweile in vielen Städten und Gemeinden, in Rathäusern und in Kreisverwaltungen, in 210 Landesverwaltungen und bei öffentlichen Unternehmen. Es gibt in Deutschland inzwischen gut organisierte Verwaltungen, es gibt effizient arbeitende öffentliche Verkehrsbetriebe und Stadtwerke. Und dann sollte man bei einer Bewertung noch beachten, dass wir es inzwischen mit neuen Bürokratien zu tun haben, die aus der Privatisierung wichtiger öffentlicher Einrichtungen und Unternehmen folgen. Weil die Privatisierung der Energiewirtschaft und der Telekommunikation, der Eisenbahn und des Fernsehens beziehungsweise des Hörfunks angesichts der sogenannten Unteilbarkeiten77 zu neuen privaten Monopolen und Oligopolen führen, sieht man sich gezwungen, sogenannte Regulierungsbehörden und – im Falle des Rundfunks – Medienkontrolleure zu installieren. Damit sind nolens volens neue Bürokratien entstanden. Ihre Entscheidungen sind nahezu willkürlicher Natur, und die betreibenden privaten Unternehmen bringen obendrein den Nachteil, dass sie nicht mehr öffentlich und schon gar nicht parlamentarisch verantwortet und kontrolliert sind. Einige der von der öffentlichen Hand entlassenen und privatisierten Unternehmen haben dann übrigens erst in dieser neueren befreiten Situation ihr Talent zur Verschwendung und zu abenteuerlichem Investitionsverhalten entdeckt. Die privatisierte Deutsche Telekom AG hat genauso wie die aus der direkten Kontrolle des Staates entlassene Deutsche Bahn AG die Verschwendung von finanziellen Mitteln auf den globalen Märkten für Beteiligungen richtig ausgekostet – der Spieltrieb der befreiten Manager vom Typ Ron Sommer und Hartmut Mehdorn konnte sich erst in dieser privatisierten beziehungsweise de facto privatisierten Konstellation richtig austoben. Fazit: Offensichtlich muss beim Urteil über die Frage öffentlich oder privat die Scheidelinie nicht zwischen der privaten Organisation einerseits und der öffentlichen Organisation einer Dienstleistung andererseits verlaufen. Unsinn ist bei beiden Formen des Eigentums möglich. Die notwendige Debatte und Beratung dieser Probleme ist heute angesichts der Vorherrschaft der Entstaatlichungs- und 211 Privatisierungsparolen kaum möglich. Die rationale sachliche Debatte wird überlagert durch die Vorherrschaft einer einseitigen Meinungsmache. Die Propaganda gegen die staatliche Tätigkeit und gegen öffentliche Leistungen wäre nicht annähernd so wirkungsvoll wie heute, wenn sie nicht unterfüttert und gestützt würde von politischen Entscheidungen, mit denen die Leistungsfähigkeit der öffentlichen Einrichtungen gefährdet und verschlechtert wird – das ist hier ähnlich wie bei der Zerstörung des Vertrauens in die gesetzliche Rente. Die Basis für die Meinungsmache wird politisch geschaffen: Man senkt die Steuern wie zum Beispiel mit der großen Unternehmenssteuerreform durch Rot-Grün und mit einem ansehnlichen Blumenstrauß von Steuersenkungen und -streichungen in Kohls Regierungszeit. Die Streichung der Vermögenssteuer und der Gewerbekapitalsteuer geht auf Kohl zurück; Letzteres hat die Kommunen viel Geld gekostet. Gewinner der vielen Steuersenkungsoperationen waren Unternehmen und vor allem große Kapitalgesellschaften, die z.B. ihre Aktienpakete verkaufen können, ohne den dabei realisierten Gewinn zu versteuern. Die Mehrheit der Bürgerinnen und Bürger war nicht unter den Gewinnern. Sie sehen aber die mangelhafte Leistung einer unterfinanzierten öffentlichen Hand und klagen darüber. Das ist das, was sie lernen sollen. Jetzt ist ein neues Instrument zur Begrenzung der Leistungsfähigkeit des Staates eingeführt worden. Die Politiker der großen Koalition haben sich die Idee einreden lassen, eine »Schuldenbremse « in die Föderalismusreform aufzunehmen und diese sogar im Grundgesetz zu verankern. Sie soll Bund, Länder und Gemeinden dazu zwingen, über einen Konjunkturzyklus hinweg die Haushalte ausgeglichen zu halten. Dieses Instrument ist schon makroökonomisch nicht zu verstehen, weil es eine prozyklische Politik stärkt, also die Konjunkturausschläge insbesondere nach unten zu verschärfen droht. Es wird dazu führen, dass die öffentlichen Hände dann am schlechtesten ausgestattet sind, wenn sie die Finanzmittel für öffentliche Leistungen am dringendsten brauchen würden.78 Außerdem wird dieses Instrument dazu führen, dass der Staat – und das sind wir alle – nicht mehr 13. Januar 2010 | 11 ausreichend fähig sein wird, neuen Bedarf an öffentlichen Leistungen, falls es diesen gibt, ohne sehr große Schwierigkeiten zu decken. Hätte es eine solche Schuldenbremse Ende der 1960er Jahre gegeben, wir hätten den völlig vernachlässigten Schutz von Umwelt und Gewässern wie auch den vernachlässigten Hochschulbau nicht finanzieren können. Die Schuldenbremse ist ein gutes Beispiel für eine politische Entscheidung, die vornehmlich durch Meinungsmache in die öffentliche Debatte und in den Entscheidungsprozess eingeführt wurde. Und wenn sie einmal eingeführt ist, dann wird sie immer wieder das Thema Sparen und Schulden am Kochen halten. Die Verarmung des Staates kostet uns sehr viel: Wir investieren nicht mehr ausreichend für die Zukunft Die »Frankfurter Rundschau« veröffentlichte am 10. Mai 2008 ein Interview mit dem Mitglied des Sachverständigenrates Peter Bofinger. Weil die Steuerschätzer – übrigens in gravierender Fehleinschätzung der krisenhaften Entwicklung – bis zum Jahre 2012 mit Mehreinnahmen für die öffentliche Hand in Höhe von 100 Milliarden Euro rechneten, folgte ein Vorschlag dem andern, die Steuern zu senken. Der Bundesfinanzminister dagegen wollte lieber Schulden abbauen. Peter Bofinger wies auf die Selbstverständlichkeit hin, das Geld für Bildung und die Infrastruktur auszugeben. Und er nannte es typisch, dass nur die anderen Optionen zur Debatte gestellt werden: Steuern senken oder Schulden abbauen. Aus seiner Sicht hat der »öffentliche Diskurs eine gefährliche Unwucht«. Das ist angesichts der nunmehr jahrzehntelangen aggressiven Diskussion gegen den Staat als Fiskus und daraus folgend als Leistungsträger kein Wunder. Unsere Infrastruktur wird schlechter. Kanalisationen verlottern, für Bildung und Ausbildung ist nicht ausreichend Geld da. Deutschland gibt für Bildung heute anteilsmäßig weniger aus als noch Mitte der neunziger Jahre. Damals standen 6,9 % des Bruttoinlandsproduktes für Bildung zur Verfügung, 2006 nur noch 6,2 %, so steht es im zweiten nationalen Bildungsbericht, der im Juni 2008 bekannt wurde. Mit 6,2 % liegt Deutschland unterhalb des Durchschnitts der OECD-Länder, also der vergleichbaren Industriestaaten auf der Welt. In den Medien wird über die Misere berichtet, zum Beispiel in der »Berliner Zeitung« am 13. Juni 2008: »Noch immer verlassen fast 8 Prozent eines Altersjahrgangs die Schule ohne Abschluss. 40 Prozent der ehemaligen Hauptschüler haben nach zwei Jahren noch keine Berufsausbildung begonnen. Der Zentralverband des Handwerks hält jeden vierten Jugendlichen für nicht ausbildungsfähig. Es studieren noch immer zu wenig junge Menschen; die Weiterbildung stagniert, die Benachteiligung von Migrantenkindern bleibt bestehen. Abhilfe ist kaum in Sicht. Laut Bildungsbericht wird der Nachwuchs an Lehrern und Erziehern immer knapper.« »Im Kern verrottet« überschreibt der »Spiegel« einen Bericht über den baulichen und sonstigen Zustand unserer Hochschulen.79 Wir wissen, was zu tun wäre, und es gibt sogar über alle Parteien hinweg einen erstaunlichen Konsens darüber, dass wir mehr in die Zukunft investieren müssen. Die Sonntagsreden unserer Politikerinnen und Politiker sind voll von sorgenvollen Analysen und von schönen Sprüchen: Bildung für alle, Wissensgesellschaft, Wissen als Rohstoff der Zukunft, Megathema Bildung (Herzog), Bildung sei die soziale Frage des 21. Jahrhunderts, deklamierte ein CDU-Parteitag schon vor über zehn Jahren. In der gleichen Zeit wurden die Kassen des Staates genau auch für dieses Aufgabenfeld immer ärmer ausgestattet. Was zu tun wäre, wissen wir: Wir brauchten mehr Ganztagsschulen und eine bessere Vorschulerziehung; die Lehrer-Schüler-Relation müsste verbessert, unsere Schulen und Universitäten saniert und modernisiert werden. Unsere Universitäten sind überlastet. In Seminarräumen für 50 werden 300 Studenten untergebracht. Die Studienbedingungen werden mit Recht als schlecht bis katastrophal empfunden. Wir wissen, wo wir investieren müssten. Die Ganztagsbetreuung in unseren Schulen wird zum Teil von 214 dafür nicht ausgebildeten Personen übernommen, auch damit man niedrigere Löhne zahlen kann. Also brauchen wir mehr Geld für Personal. Wir wissen, dass Kinder und Jugendliche aus einkommensschwächeren Schichten in unserem Bildungssystem immer noch Schwierigkeiten haben weiterzukommen. Wir wissen, dass unsere Hochschulen wegen der mangelhaften öffentlichen Hilfe tendenziell immer mehr von den Kindern der Bessergestellten, von Akademikerkindern besucht werden und die Kinder der finanziell Schlechtergestellten benachteiligt sind. Diese Vernachlässigung der Begabungsreserven ist unfair und gesellschaftspolitisch genauso dumm wie in den 1950er und 1960er Jahren, als dies »Bildungsnotstand« genannt wurde. Wir wissen, dass das dicke Ende dieser Fehlentwicklung noch auf unsere Gesellschaft zukommt. Wir wissen, dass diese Konsequenz der Verarmung des Staates die eigentliche Benachteiligung der jungen Generation ausmacht. Wir wissen das, aber es geschieht nichts Entscheidendes. Das gilt auch für benachbarte Bereiche unseres gesellschaftlichen Lebens: Wir wissen, dass wir mehr tun müssten für unsere Jugend – für Jugendzentren, für seelische Betreuung, für Jugendarbeit insgesamt. Und dennoch wird bei der Jugendhilfe immer noch gestrichen und sogar zusammengestrichen, statt neu zu investieren. Wir wissen, dass wir Integrationsprobleme haben. Wir brauchten mehr Sprachunterricht für Kinder von Aussiedlern und Ausländern. Aber die Mittel sind schon zu Kohls Zeiten gekürzt worden, obwohl gerade die Regierung Kohl besonders viele Aussiedler ins Land geholt hat. Die Verarmung des Staates werden künftige Generationen zu spüren bekommen. Und zwar sehr viel mehr, als die im Jahr 2008 von einigen Wortführern aus der jüngeren Generation und vom früheren Bundespräsidenten Herzog zum Symbol ihrer Benachteiligung durch die Rentner hochgespielte Rentenerhöhung um 1,1 Prozent die künftigen Generationen kosten könnte. Wir tun den jungen Leuten und Kindern einen Gefallen, wenn wir ihnen 215 eine gute, möglichst perfekte, moderne Infrastruktur hinterlassen. Jenen unter der jüngeren Generation, die heute über Staatsschulden und die daraus angeblich folgenden Benachteiligungen jammern, wäre zu wünschen, einen aufgeschlossenen Blick in die USA zu werfen oder wenigstens zu lesen, was von dort berichtet wird. Der »Spiegel«, sonst hier nicht besonders respektvoll zitiert, hat einen kritischen USA-Korrespondenten. Dieser berichtete am 2. August 2007: »Kollaps der USInfrastruktur. Marode Brücken, miese Straßen, morsche Dämme. Die Brücken-Katastrophe von Minneapolis ist ein Menetekel. Mehr als 160 000 Straßenbrücken in den USA gelten als einsturzgefährdet. Fernrouten, Tunnel, Dämme und Deiche sind in so miserablem Zustand, dass Ingenieure schon lange Alarm schlagen – bisher vergeblich.« Das sind die Folgen einer systematischen Verarmung des Staates. Das geht zu Lasten künftiger Generationen. Das müsste man doch eigentlich verstehen. Dagegen stehen bei uns nicht nur die herrschende Ideologie, sondern auch gut organisierte und meinungsstarke Interessen. Wer die Profiteure der Verarmung des Staates sind, liegt auf der Hand, neben den auf diesem Feld nun wirklich virulenten Ideologen der neoliberalen Wirtschaftsvorstellungen sind auch einige handfestere Interessen erkennbar: Wenn den öffentlichen Schulen und Universitäten das Geld für die notwendige Modernisierung fehlt, dann bieten sich private Träger an. Und Eltern gehen auf die Angebote ein, weil sie es mit ihren Kindern gut meinen. Die Verarmung des Staates sorgt am: 13. Januar 2010 | 15 indirekt dafür, dass die Kinder von Besserverdienenden eine größere Chance auf eine gute Ausbildung und damit auf ein privilegiertes Berufsleben haben. Mit der Verarmung des Staates von heute werden also die Weichen auf eine Segmentierung der Ausbildungs- und Berufschancen entsprechend der Herkunft und der finanziellen Stärke der Eltern gestellt. Wenn den Kreisen und Städten das Geld für die Krankenhäuser ausgeht und sie sich überfordert fühlen, dann privatisieren sie. Und große private Krankenhauskonzerne stehen bereit. Wenn unsere Kommunen Probleme haben, ihre Verwaltung ordentlich zu gestalten, dann steht die Bertelsmann-Tochter 216 Arvato bereit zur Übernahme. Damit ist 2007 in Würzburg begonnen worden. Verarmung und Entstaatlichung öffnen nach Einschätzung des Geschäftsführers von Arvato vor allem dieser Bertelsmann-Tochter ungeahnte neue Geschäftsfelder. Wenn dem Bundesverkehrsminister das Geld für Bundesstraßen und Autobahnen fehlt und die Staus wachsen, dann bieten sich Private zur Übernahme an; weil die nackte Privatisierung zu auffällig ist und Widerstände auslöst, wählt man seit ein paar Jahren – begonnen in Großbritannien – den angenehmer klingenden Weg über sogenannte ÖffentlichPrivate Partnerschaften. Wenn die Schulden wachsen, weil die Steuern zur Finanzierung der öffentlichen Aufgaben nicht reichen, dann rufen die Interessierten nach der Privatisierung öffentlicher Unternehmen, öffentlicher Einrichtungen und öffentlicher Wohnungsbestände. Dann verdienen die einen an der Transaktion staatlichen Eigentums zu privatem und die andern am günstigen Einkauf neuer Vermögenswerte. Und eine durch permanente Meinungsmache verbildete Öffentlichkeit glaubt wirklich, die staatlichen Stellen, die Gemeinden, die Länder, der Bund hätten etwas gewonnen, wenn sie ihre Bilanz verkürzen – links weniger Vermögen, rechts weniger Schulden. Wie in Dresden durch den Verkauf städtischer Wohnungen. Wenn dem Staat das Geld für eine ausreichende Ausstattung mit Finanzbeamten fehlt, dann haben es jene gut, die Steuern hinterziehen wollen. Dem Fiskus entgehen allein bei der Umsatzsteuer durch nationale und internationale Betrugsdelikte jährlich zweistellige Milliardenbeträge.80 Der Vorsitzende der deutschen Steuergewerkschaft, Dieter Ondracek, schätzt das Volumen der jährlichen Steuerhinterziehung auf rund 30 Milliarden Euro. Die Memo-Gruppe, eine Gruppe kritischer Wirtschaftswissenschaftler, sieht Ausfälle zwischen 70 und 100 Milliarden. Und dennoch lösen die Länder die Vereinbarung über eine bessere personelle Ausstattung der Steuerprüfung und Steuerfahndung nicht ein. Wenn der Staat mehr Geld zur Bedienung großer privater Interessen braucht, dann fehlt es übrigens nicht an Mitteln. In die 217 Großbetriebe der Landwirtschaft fl ießen nach wie vor die Milliarden an Subventionen, genauso wie in die Versicherungswirtschaft und selbstverständlich auch die Flugzeugindustrie; zur Rettung einer einzigen privaten Bank werden weit über 100 Milliarden bereitgestellt, die Aktionäre der eigentlich pleitegegangenen HRE, deren Kurs ohne staatlichen Rettungsschirm vermutlich bei 0,0 läge, sollen vom staatlichen Rettungsschirm SoFFin 1,39 € je Aktie erhalten (Stand: 1. Juni 2009). Das ist eine 290-Millionen-Euro-Prämie für die Zocker. Einfach so, unser Geld für wertlose Papiere. Die 480 Milliarden, die der Rettungsschirm insgesamt bereithält, machen insgesamt mehr als das Anderthalbfache des gesamten Bundeshaushalts aus. Einige andere Länder gehen bewusst einen anderen Weg. Die skandinavischen Länder zum Beispiel haben eine merklich höhere Staatsquote. Dänemark und auch Schweden »belasten« ihre Bürger um fast ein Viertel höher als wir. Die skandinavischen Länder erzielen trotz – oder vielleicht wegen – hoher Staatsquoten durchgehend bessere wirtschaftliche Erfolge. Das müsste doch zu denken geben. Das müsste zunächst dazu führen, dass wir unsere Sprache von Vorurteilen reinigen. Es ist eben falsch, von »Belastung« zu sprechen, wenn wir gemeinsam als Staat gute Leistungen zum Beispiel für Bildung und Infrastruktur bieten und dafür mehr Abgaben und Steuern einsammeln: ein besseres, durchlässiges Bildungswesen, eine gute Infrastruktur, ein gutes soziales Netz für den Fall der Arbeitslosigkeit und des Alters – das sind Leistungen, die offensichtlich ihren Preis wert sind und zu Unrecht »Belastungen« genannt werden.81 Die Tatsache, dass Entstaatlichung und wirtschaftlicher Erfolg durchgehend nicht positiv korreliert sind, müsste endlich doch auch bei unseren Meinungsführern Nachdenken auslösen. In der Praxis ist das nicht so. Die »Bild«-Zeitung, die Bertelsmann Stiftung, die Initiative Neue Soziale Marktwirtschaft, die Wirtschaftsverbände, die etablierten Parteien und eine Unzahl von Stiftungen, Initiativen und PR-Agenturen machen weiter ihre Propaganda gegen den Staat. Und Politiker profilieren sich 218 reihenweise mit ihrer Spartugend, die im Ernst wegen der damit verbundenen verschärften Abwürgung der Konjunktur gar keine ist. Und je weiter unser Land in eine wirkliche Wirtschaftskrise abrutscht, umso mehr wird diese primitive Profilierung zu Lasten öffentlicher Leistungen und zu Lasten einer aktiven Konjunkturpolitik zum Horror. Das traurige Ergebnis der gezielten Meinungsmache verhindert rationale politische Entscheidungen.
<urn:uuid:2ebc582b-4d8f-46ac-b852-8f514da859e6>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
37,785
BIBLIOGRAFIE în vederea atestării persoanelor fizice ca administratori de imobil ➢ Reglementări privind înființarea, organizarea funcționarea asociațiilor de proprietari 1. Legea nr.196/2018 - privind înființarea, organizarea și funcționarea asociațiilor de proprietari și administrarea condominiilor. 2. Ordin nr.1058/2019 - privind aprobarea conținutului-cadru al statutului asociației de proprietari și al regulamentului condominiului. 3. Legea Locuinței nr. 114/1996 republicată. 4. Hotărârea Guvernului nr. 1275/2000 privind aprobarea Normelor Metodologice pentru punerea în aplicare a prevederilor Legii Locuinței nr. 114/1996 republicată. 5. Ordinul A.N.R.S.C. nr.343/2010 pentru aprobarea Normei tehnice privind repartizarea consumurilor de energie termică între consumatorii din imobilele de tip condominiu, în cazul folosirii sistemelor de repartizare a costurilor pentru încălzire și apă caldă de consum. 6. Hotărârea Consiliului General al Municipiului București nr.40/2002-privind separarea consumurilor de apă rece, apă caldă și căldură ale agențiilor economici și instituțiile publice care au branșamente și racorduri comune cu asociațiile locatarilor/proprietarilor. 7. Hotărârea Consiliului General al Municipiului București nr.41/2002-privind contorizarea consumurilor de apă rece, apă caldă menajeră și căldură la apartamentele din cadrul asociațiilor de locatari/proprietari din Municipiul București. ➢ Reglementări privind contabilitatea 1. Ordinul nr. 3103/2017 privind aprobarea Reglementărilor contabile pentru persoanele juridice fără scop patrimonial. 2. Ordinul Ministerului Finanțelor Publice nr.2643/2015 (M.O. nr.910/09.12.2015) privind documentele financiar-contabile. 3. Legea Contabilității nr.82/1991, republicată, cu modificările și completările ulterioare.
<urn:uuid:c77280b7-34a3-4861-bf0b-bf6dde4aacc5>
HuggingFaceFW/finepdfs/tree/main/data/ron_Latn/train
finepdfs
ron_Latn
1,805
Ideografia Ogólnopolski konkurs projektowania graficznego, Poznań 2017 Kategoria A Kategoria A Kategoria A Kategoria B Imię Nazwisko Adres zamieszkania e-mail Nr telefonu Oświadczam, że zapoznałem się z treścią warunków Ideografii i w pełni je akceptuję. data i czytelny podpis Twórcy Ideografia Ogólnopolski konkurs projektowania graficznego, Poznań 2017 Kategoria A imię i nazwisko autora adres e-mail numer telefonu data realizacji technika druku Ideografia Ogólnopolski konkurs projektowania graficznego, Poznań 2017 Kategoria B imię i nazwisko autora adres e-mail numer telefonu data realizacji technika druku Tytuły prac zleceniodawca
<urn:uuid:54678519-99cc-45eb-99c2-8a28337cac35>
HuggingFaceFW/finepdfs/tree/main/data/pol_Latn/train
finepdfs
pol_Latn
668
LEGAL ALERT January 2, 2013 New Reliability Compliance Opportunities in 2013 The Federal Energy Regulatory Commission (FERC) closed out 2012 with several orders affecting reliability compliance. FERC adopted a revised definition of the "bulk electric system," authorized FERC access to e-Tags used to schedule power transmission, and affirmed the authority of the North American Electric Reliability Corporation (NERC) to assess monetary penalties against federally owned utilities. Industry participants should use the New Year as an opportunity to review facilities, information-sharing processes and contracts to help ensure compliance with these new reliability requirements. Revised Definition of the Bulk Electric System (Docket Nos. RM12-6 and RM12-7) In Order No. 773, FERC approved NERC's proposed revisions to the definition of the "bulk electric system" that establishes a bright-line threshold, and eliminates regional discretion, for identifying facilities subject to NERC's Reliability Standards. Under the new definition, all transmission facilities operated at or above 100 kV and all real and reactive power resources connected to the grid at 100 kV or higher are included; local distribution facilities are excluded. FERC also approved NERC's proposed exception process and form by which facilities can be added or removed from the definition on a case-by-case basis. The new definition will go into effect April 1, 2013 (the first day of the second calendar quarter after FERC approval), but newly identified facilities will have 24 months to come into compliance. (For additional background on the FERC and NERC proceedings leading up to Order No. 773, see Sutherland Legal Alerts – November 23, 2010, March 22, 2011 and January 31, 2012. Several categories of facilities are expressly included within the bulk electric system: [x] Transformers with the primary terminal and at least one secondary terminal operated at 100 kV or higher; [x] Generating resource(s) with a gross individual nameplate rating greater than 20 MVA or a gross plant/facility aggregate nameplate rating greater than 75 MVA, including in each case the generator terminals through the high-side of the step-up transformer(s) connected at a voltage of 100 kV or above; [x] Blackstart resources identified in a transmission operator's restoration plan, as well as cranking paths operated at or above 100 kV or necessary for bulk electric system operations; [x] Dispersed power producing resources (e.g., wind and solar facilities) with aggregate capacity greater than 75 MVA utilizing a system designed primarily for aggregating capacity and solely used to deliver the aggregate capacity to the bulk electric system at 100 kV or above; and [x] Static or dynamic devices (excluding generators) dedicated to supplying or absorbing reactive power that are connected at 100 kV or higher, or through a dedicated transformer with a high-side voltage of 100 kV or higher, or through a transformer meeting the criteria above. FERC also approved four facility configurations excluded from the bulk electric system: [x] Radial transmission systems that serve only load and/or certain smaller generating facilities (but not including tie-lines for generators otherwise falling within the definition); © 2013 Sutherland Asbill & Brennan LLP. All Rights Reserved. This communication is for general informational purposes only and is not intended to constitute legal advice or a recommended course of action in any given situation. This communication is not intended to be, and should not be, relied upon by the recipient in making decisions of a legal nature with respect to the issues discussed herein. The recipient is encouraged to consult independent counsel before making any decisions or taking any action concerning the matters in this communication. This communication does not create an attorney-client relationship between Sutherland and the recipient. www.sutherland.com 1 [x] Certain behind-the-meter generating units on the customer's side of the retail meter that serve retail load; [x] Local transmission networks (not including tie-lines for covered generators); and [x] Reactive power devices owned and operated by a retail customer solely for its own use. FERC also approved a case-by-case exception process for identifying additional facilities to be included and excluded from the definition. Facility owners may initiate the process, as can FERC, NERC and the Regional Entities. The status of a facility during the exception review remains unchanged, which means that compliance obligations for an otherwise non-regulated facility do not begin until a final determination has been made. FERC determined that it, rather than NERC, should oversee the exception process for determining whether facilities are excluded local distribution. FERC will apply Order No. 888's seven-factor test in such a determination and will consider any additional relevant facts and circumstances. FERC declined to allow facility owners to assert "in good faith" that their facilities, which would otherwise be part of the bulk electric system, are excluded local distribution facilities. Rather, facility owners unclear about whether their facilities are excluded local distribution must in the first instance seek a FERC determination. The revised definition represents "Phase 1" of NERC's efforts to develop the appropriate scope of regulated facilities to ensure reliable grid operation without unduly burdening facilities lacking any material impact on the grid. The stakeholder process is underway for "Phase 2," which should further strengthen the revised definition and address more specific concerns, such as whether to include demand response and protection systems. FERC Access to E-Tag Data (Docket No. RM11-12) FERC also moved to gain access to e-Tags, the schedules used to arrange transmission in interchange transactions that include data about the power transmitted, the injection and withdrawal points, and the parties involved in the transactions. Thus, in Order No. 771, FERC directed balancing authorities and eTag creators (typically purchasing-selling entities) to provide e-Tag data to FERC on a non-public and ongoing basis beginning March 15, 2013. They must also share this data with regional transmission operators (RTOs), independent system operators (ISOs), and their market monitors upon request, subject to confidentiality protections. FERC believes this information-sharing requirement will enhance its market monitoring capabilities, enable it to detect potential market manipulation, promote market efficiency, and help shape well-reasoned market policies. Rather than requiring NERC to provide e-Tag data to FERC as FERC had originally proposed, entities must designate FERC as an addressee on the e-Tags to provide FERC with view-only rights to the information. Market participants already should be capable of designating FERC as a recipient and therefore should require no significant changes to their data collection systems to comply with the order. FERC will access the e-Tags by contracting with a commercial vendor who will provide data management services for the e-Tags. FERC has not identified which vendor it intends to use. Order No. 771 is the most recent move by FERC in its ongoing efforts to enhance its market monitoring and strengthen its information analysis. FERC previously had established a new Office of Enforcement division focused on market surveillance, imposed more frequent market transaction reporting requirements on RTOs/ISOs, and, as reported in a Sutherland Legal Alert, broadened the scope of its Electric Quarterly Report (EQR) requirement. www.sutherland.com Monetary Penalty Against a Federal Entity Stands (Docket No. NP11-238) Finally, FERC affirmed its July 2012 determination that Section 215 of the Federal Power Act (FPA) authorizes NERC to impose monetary penalties against federally owned utilities that violate the NERC Reliability Standards. Specifically, FERC affirmed a $19,500 penalty against the Southwestern Power Administration (SWPA), a federal power marketing administration (PMA). (See Sutherland Legal Alerts – December 20, 2010 and July 24, 2012 for additional background.) FERC's December 20, 2012 order addressed rehearing requests filed by SWPA, the Departments of Energy and the Interior, and others. While FERC's order did not break new ground, key findings include: [x] NERC's authority under FPA Section 215 to impose monetary penalties on all users, owners and operators of the bulk-power system extends to federal entities; [x] The FPA's general civil penalty provision – Section 316A – does not limit NERC's penalty authority under Section 215 except to the extent FERC has adopted the Section 316A monetary cap ($1 million per day per violation) as applied to Section 215 penalties; [x] Due to Congressional oversight and the concerns of "preference power" customers, federal entities maintain a strong incentive to develop a culture of compliance to avoid monetary penalties, even where these costs may be passed through to consumers; [x] While the Flood Control Act requires that federal entities serve consumers at the lowest possible rates, this service must still be consistent with sound business principles, including compliance with all regulatory obligations, such as the Reliability Standards; and [x] Imposing monetary penalties on federal entities will not violate the Anti-Deficiency Act, which generally limits federal expenditures to amounts available in appropriations or funds, because appropriations are available to pay Section 215 penalties as "necessary expenses," which are not subject to the Anti-Deficiency Act limitations. It would not be surprising if SWPA and others appeal FERC's rulings to the federal courts. In the meantime, who will ultimately pay for reliability penalties imposed on federal entities remains to be seen. Implications for Compliance While facility owners should regularly review, as part of their reliability compliance programs, the facilities that may be subject to the NERC Reliability Standards, compliance officials should treat the New Year as an opportunity to review their facilities for possible inclusion or exclusion pursuant to the new bulk electric system definition. Industry participants with additional specific concerns should monitor and take part in NERC's "Phase 2" discussions. Compliance officials of balancing authorities and purchasing-selling entities also should review and modify their e-Tag processes to ensure that they will be in compliance with the new information-sharing requirements applicable to e-Tags by the March 15, 2013 compliance date. Finally, federal "preference power" customers should consider reviewing their power supply and other contracts with the PMAs to understand the potential for pass-through of reliability penalties. The dollars at stake in the SWPA case are not large, but future penalties could be material, even when spread among "preference power" customers. www.sutherland.com If you have any questions about this Legal Alert, please feel free to contact the attorneys listed below or the Sutherland attorney with whom you regularly work. www.sutherland.com 4
<urn:uuid:b80f62ae-ea54-498f-a6eb-3c97c961be6a>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
11,287
PROJEKT Uchwała Nr XV / 40 / 17 Rady Dzielnicy Wrzeszcz Górny z dnia 1 lutego 2017 roku w sprawie przeznaczenia środków finansowych na działalność statutową dzielnicy Wrzeszcz Górny Na podstawie §15 ust. 1 pkt 21, Statutu Dzielnicy Wrzeszcz Górny stanowiącego załącznik do Uchwały Nr LII/1183/14 Rady Miasta Gdańska z dnia 24 kwietnia 2014 roku w sprawie uchwalenia Statutu Dzielnicy Wrzeszcz Górny (Dz. Urz. Woj. Pomorskiego z 30.05.2014 r., poz. 2016 z późń. zm.) oraz uchwały Nr XXIX/801/16 Rady Miasta Gdańska z dnia 29 września 2016 r. w sprawie wyodrębnienia na rok 2017 środków finansowych na działalność statutową jednostek pomocniczych. Rada Dzielnicy Wrzeszcz Górny uchwala: § 1 Środki finansowe w wysokości 89 252,00 zł przydzielone przez Radę Miasta Gdańska na rok 2017 do dyspozycji Rady Dzielnicy Wrzeszcz Górny przeznaczyć na: 1. Projekt „Sąsiedzka Szkoła" – zajęcia sportowe dla dzieci młodzieży i dorosłych – 20 380,00 zł , 2. Zawody sportowe - dzielnicowy turniej smoczych łodzi – 2 000,00 zł , 3. Festyn „Sobótkowe święto Jaśkowej Doliny" i Biegowe Grand Prix Dzielnic Gdańska – 4 500,00 zł , 4. Rodzinna gra terenowa na orientację „Jaśkowy Las" – 1 500,00 zł , 5. Wsparcie działań edukacyjno kulturalnych dla mieszkańców i uczniów (Batorówka ZSS nr 1) – 2 000,00 zł , 6. Utrzymanie strony internetowej – 200,00 zł , 7. W rezerwie pozostaje – 58 672,00 zł. § 2 Uchwała wchodzi w życie z dniem podjęcia. Przewodniczący Rady Dzielnicy Wrzeszcz Górny Romuald Plewa
<urn:uuid:496ec489-535e-4170-b678-8499e8ae29bb>
HuggingFaceFW/finepdfs/tree/main/data/pol_Latn/train
finepdfs
pol_Latn
1,496
C Comunicato stampa Il Consiglio di Amminist semes trazione di Banca Fideuram ha approv strale consolidata al 30 giugno 2011 vato la Relazione - Utile netto consolidato € € 132,1 milioni (+ 40,7% rispetto al primo semestre 2010); - Raccolta netta totale pos sitiva per € 908 milioni (€ 1,4 miliardi nel pr rimo semestre 2010); - Masse amministrate € 73 3,7 miliardi (+3% rispetto al 31.12.2010); - Commissioni nette € 280 0,3 milioni (+ 9,9% rispetto al primo semestr re 2010); - Cost / Income ratio al 45 5,1% (47,4% al 30.06.2010). Roma, 4 agosto 2011 – Il Co Sanpaolo), presieduto da Salva consolidata al 30 giugno 2011. onsiglio di Amministrazione di Banca Fide atore Maccarone, ha approvato oggi la euram (Gruppo Intesa Relazione semestrale L'Amministratore Delegato di Ba sottolineato: "Dal punto di vis soddisfacenti. Il significativo incr soprattutto da precise scelte st effettuato, pur in avverse condizio e internazionale". anca Fideuram Matteo Colafrancesco comm sta economico e finanziario i risultati ot remento dell'utile netto nei primi sei mesi rategiche e da importanti investimenti che oni di mercato che tuttora contraddistinguono mentando i risultati ha ttenuti sono più che di quest'anno, deriva e la nostra Banca ha o lo scenario nazionale L'attività commerciale del primo milioni, (€ 1,4 miliardi nei primi s capitali acquisiti con il rimpatrio risparmio gestito ha mostrato riequilibrio dell'asset allocation d avvenuta nel 2010. semestre 2011 ha registrato una raccolta sei mesi del 2010 che, peraltro, era compost delle attività finanziarie detenute all'estero). o un saldo positivo di € 539 milioni, pro della clientela verso prodotti di risparmio ge netta totale di € 908 to per € 235 milioni da . La raccolta netta di oseguendo l'azione di estito in gran parte già A fine giugno 2011 le masse a miliardi, in aumento di € 2,2 milia rispetto al 30 giugno 2010. All'in raccolta netta, € 2,2 miliardi di m 1° giugno 2011), parzialmente co amministrate dal gruppo Banca Fideuram ardi (+3%) rispetto al 31 dicembre 2010 e di ncremento rispetto a dicembre 2010 hanno asse conseguiti con l'acquisto di Banca Sara mpensati dalla performance dei mercati. m erano pari a € 73,7 i € 4,2 miliardi (+6,1%) o contribuito, oltre alla a (perfezionato in data La componente di risparmio g delle masse totali. estito, pari a € 54,8 miliardi, costituiva a f fine semestre il 74,3% Al 30 giugno 2011 il numero provenienti dall'acquisizione di Ba pari a 4.779 (4.349 al 31 dicembr complessivo dei private banker (compr anca Sara) delle Reti Banca Fideuram e San re 2010 e 4.333 al 30 giugno 2010). resi 340 professionisti npaolo Invest risultava Di seguito l'andamento delle princ cipali componenti del conto economico conso olidato: Le commissioni nette, pari a € 2 9,9%) rispetto al saldo di € 255,1 essenzialmente alla crescita delle 280,3 milioni, hanno evidenziato un increme milioni registrato nei primi sei mesi del 201 e commissioni nette ricorrenti che, attesta ento di € 25,2 milioni (+ 0. L'aumento è dovuto atesi a € 302,6 milioni, hanno evidenziato un incremento 2010. o di € 29,6 milioni (+ 10,8%) rispetto al dato d del primo semestre del La crescita delle commissioni ne medie di risparmio gestito (fondi 48,7 miliardi del primo semestre e, in misura minore, alla maggiore tte ricorrenti è attribuibile in gran parte all'in comuni, gestioni patrimoniali e prodotti assic 2010 ai € 53 miliardi dei primi sei mesi dell' e redditività derivante dal mix di prodotti della cremento delle masse curativi), passate dai € anno in corso (+8,8%) a clientela. Il margine di interesse, pari a € rispetto ai primi sei mesi dello s portafoglio a tasso variabile che ha più che compensato la riduzio € 62,7 milioni, ha registrato un aumento di scorso anno. L'andamento favorevole è at ha beneficiato del rialzo dei tassi di interess ne dei volumi medi gestiti. € 6,1 milioni (+10,8%) tribuibile alla quota di se a breve termine ed Il risultato netto delle attività e milioni, in flessione di € 18,9 mil effetto delle minori plusvalenze da e passività finanziarie ha evidenziato un s lioni (- 87,5%) rispetto al primo semestre 20 a realizzo su titoli obbligazionari in portafoglio saldo positivo di € 2,7 10, principalmente per o (- € 12,3 milioni). Le rettifiche di valore nette pe milioni (erano risultate positive essenzialmente alla svalutazione 2020, decisa in conformità con finanziario alla Grecia. er deterioramento hanno evidenziato un sa per un importo immateriale nel primo se e, per € 6,5 milioni, di titoli governativi greci l'adesione del Gruppo Intesa Sanpaolo a aldo negativo di € 5,8 emestre 2010) dovuto con scadenza entro il all'offerta di sostegno Le spese di funzionamento, pa (+1%) rispetto all'analogo periodo ari a € 157,9 milioni, hanno registrato un au o del 2010 (€ 156,3 milioni). umento di € 1,6 milioni Le spese per il personale sono a dato dei primi sei mesi del 2010 milioni) alla diversa incidenza de due semestri, oltre che all'effett seconda parte del 2010. ammontate a € 66,2 milioni, in aumento di € 0 (+6,8%). Tale incremento è riconducibile e egli accantonamenti per le erogazioni di ret to trascinamento delle dinamiche salariali € 4,2 milioni rispetto al essenzialmente (+ 3,2 tribuzione variabile nei ordinarie relative alla Le altre spese amministrative, pa 1 milione (-1,2%) rispetto al p contenimento dei costi per servizi ari a € 85,1 milioni, hanno invece evidenziato rimo semestre dello scorso anno, attribui i resi da terzi (outsourcing IT e operations). o una diminuzione di € bile in larga parte al Il Cost / Income ratio è risultato pari al 45,1% (47,4% nel primo semestre del l 2010). Gli accantonamenti netti ai fo essenzialmente in linea (+ € 0,6 m ondi per rischi e oneri sono risultati pa milioni) con i primi sei mesi dello scorso eserc ari a € 22,4 milioni, cizio (€ 21,8 milioni). Gli utili delle partecipazioni, pa registrata dalla partecipazione d realizzata attraverso la cessione d ri a € 12,1 milioni, riflettono per € 4,9 milioni del 19,99% in Fideuram Vita e per € 7,2 della partecipazione in Fideuram Bank (Suiss la buona performance milioni la plusvalenza se) A.G. L'utile netto consolidato, pari a milioni) rispetto al primo semes ricorrenti che avevano influenza pari € 20,9 milioni (relativo agli o agli esercizi 2005-2006), l'utile ne a € 132,1 milioni, ha mostrato una crescita tre del 2010 (€ 93,9 milioni). Escludendo ato negativamente l'utile del primo semestre oneri stimati per la definizione di una contro etto ha registrato una crescita del 15,2% a del 40,7% (+ € 38,2 o le componenti non e 2010 per un importo oversia fiscale relativa Banca Fideuram SpA(www.fideuram.it) Media Relations(e-mail: mediarelations Responsabile Rapporti con i Media - Gia Comunicazione Banca Fideuram – Aless ) firstname.lastname@example.org) anluca Liguori (tel. 06 59022688) sandro Pavesi (tel. 06 59022526) I coefficienti patrimoniali cons livelli minimi richiesti dalla norm Capital ratio sono risultati rispettiv solidati di Banca Fideuram risultano ampia ativa. In particolare, al 30 giugno 2011, il vamente pari a 14,8% e 15,2%. amente al di sopra dei Tier 1 ratio e il Total *** Per consentire una completa inform prospetti relativi al conto economico Il dirigente preposto alla redazione anche di quanto previsto dal comm contabile contenuta nel presente co contabili mativa sui risultati conseguiti nei primi sei mes consolidato riclassificato e ai dati patrimoniali con dei documenti contabili societari, Paolo Bacciga ma 2 articolo 154 bis del Testo Unico della Fin municato corrisponde alle risultanze documental si del 2011 si allegano i nsolidati. a, dichiara - tenuto conto nanza - che l'informativa li, ai libri ed alle scritture Banca Fideuram SpA(www.fideuram.it) Media Relations (e-mail: mediarelations Responsabile Rapporti con i Media - Gia Comunicazione Banca Fideuram – Aless ) email@example.com) anluca Liguori (tel. 06 59022688) sandro Pavesi (tel. 06 59022526) Conto o economico consolidato (riclassificato e in milioni di euro) (*) Dati riesposti su basi omogenee per tener conto delle variazioni intervenute nel perimetro di consolidamento n.s.: non significativo Banca Fideuram SpA(www.fideuram.it) Media Relations(e-mail: mediarelations Responsabile Rapporti con i Media - Gia Comunicazione Banca Fideuram – Aless ) firstname.lastname@example.org) anluca Liguori (tel. 06 59022688) sandro Pavesi (tel. 06 59022526) Sta ato patrimoniale consolidato (riclassificato e in milioni di euro) (*) Dati riesposti su basi omogenee per tener conto delle variazioni intervenute nel perimetro di consolidamento Banca Fideuram SpA(www.fideuram.it) Media Relations(e-mail: mediarelations Responsabile Rapporti con i Media - Gia Comunicazione Banca Fideuram – Aless ) email@example.com) anluca Liguori (tel. 06 59022688) sandro Pavesi (tel. 06 59022526)
<urn:uuid:992a0a82-15e4-4262-a7e7-c7298ba78d73>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
8,902
starszego specjalisty ds. planowania i zagospodarowania przestrzennego w Wydziale Spraw Terenowych w Suwałkach 2018-02-09 Warunki pracy Warunki dotyczące charakteru pracy na stanowisku i sposobu wykonywania zadań Sporadyczna praca w terenie, w trudnych warunkach (lasy, tereny podmokłe) oraz praca administracyjno - biurowa w siedzibie urzędu. Użytkowanie sprzętu biurowego (komputer, drukarka, kserokopiarka, elektryczne urządzenia biurowe). Autorzy Ilość odsłon artykułu: 889
<urn:uuid:e5322526-a339-489f-a454-b256a8999e8c>
HuggingFaceFW/finepdfs/tree/main/data/pol_Latn/train
finepdfs
pol_Latn
483
Accertamento dei parametri ottimali per il processo di produzione di lastre sottili per pavimentazione in calcestruzzo Holger Stichel e Stefanie Schaarschmidt, Kobra Formen GmbH, Germania La società Excluton, presente sul mercato da ca. 30 anni, è uno dei produttori più importanti di blocchi in calcestruzzo nei Paesi Bassi. Il portafoglio è molto bene articolato. Excluton è rivolto verso l’innovazione ed è molto creativo. Molti nuovi prodotti, tra cui sistemi di masselli di grande formato oppure rivestimenti per pareti, sono sviluppi in proprio di Excluton. Anche lastre per pavimentazione in calcestruzzo, particolarmente sottili, il cui processo di produzione è molto complesso, fanno parte della gamma di prodotti dell’azienda. Per garantire una qualità costante di tutta la merce, Excluton punta quindi sull’ingegneria meccanica moderna e sugli utensili di gran pregio. Lo stampo per blocchi in calcestruzzo rappresentato dalla Fig. 1 (60x60x4cm) è stato sviluppato e realizzato dalla società Kobra Formen GmbH. Excluton e Kobra collaborano strettamente alla creazione di nuovi sistemi di blocchi che comincia già con il trasformare le idee, spesso disegni oppure fotografie, in prodotti realizzabili con gli stampi per blocchi in calcestruzzo. I servizi di assistenza di Kobra comprendono non solo il design del prodotto e la realizzazione dello stampo per blocchi in calcestruzzo, ma anche numerosi servizi per l’impiego dello stampo nello stabilimento per la produzione di blocchi in calcestruzzo. Nella fattispecie, lo stampo presentava un grado di usura superiore alla media rispetto al numero di cicli al punto che un’analisi delle cause è stata condotta alle condizioni reali, cioè durante il processo di produzione a cura di due ingegneri preposti all’assistenza Kobra. Nella produzione di blocchi in calcestruzzo molto bassi è fondamentale osservare che lo stampo presenta una stabilità limitata per via della sua altezza per l’appunto scarsa e che l’impostazione della macchina deve quindi prevedere un’azione della forza sull’utensile dosata con precisione. Inoltre, nell’esempio concreto, le piastre di pressione sono state realizzate con una mini-smussatura, sulla quale la sollecitazione durante la produzione è particolarmente elevata per via dello scarso rialzo dello Figura 1: Stampo per lastre 60x60x4cm Figura 2: Misurazione dei martelli stampo. Una ricetta con materie prime fortemente abrasive ha, per l’appunto, l’effetto di aumentare l’usura. Il compito di Kobra consisteva nell’analizzare le impostazioni della macchina per generare una sinergia sincrona dello stampo per blocchi in calcestruzzo con il pannello di appoggio. A tale scopo sono state misurate innanzi tutto le vibrazioni sulla macchina per escludere i danneggiamenti sulla tavola della macchina. Al centro c’è anche l’impostazione dei martelli sulla tavola vibrante perché in caso di irregolarità si può pervenire a risultati difformi di compattazione e, di conseguenza, ad altezze irregolari dei blocchi. Nella fase successiva si è provveduto a misurare le vibrazioni direttamente sullo stampo per blocchi in calcestruzzo durante il processo di produzione in corso con le impostazioni selezionate da Excluton per la macchina. Per poter analizzare il posizionamento e il comportamento della parte inferiore dello stampo rispetto al pannello, si è provveduto ad effettuare alcune riprese con la telecamera ad alta velocità che forniscono ulteriori importanti informazioni per l’usura di uno stampo, appena percettibili per l’occhio umano, ma che possono essere tuttavia elementari per l’ottimizzazione dei processi. Dopo aver interpretato tutti i dati, si è provveduto a modificare le impostazioni della macchina dietro raccomandazione di Kobra e ad analizzare nuovamente il processo di produzione tramite le misurazioni delle vibrazioni e le riprese ad alta velocità. I risultati di entrambe le serie di misure sono stati confrontati da Kobra e le impostazioni della macchina adattate in ulteriori serie di esperimenti fino ad ottenere il risultato desiderato e, quindi, i requisiti di produzione dettagliatamente adattati al prodotto. In collaborazione con i collaboratori responsabili di Excluton, nell’esempio qui illustrato è stato possibile accertare e calibrare i parametri ottimali per il processo di produzione delle lastre per pavimentazione in calcestruzzo con un’altezza dei blocchi bassa, i quali non sono solo essenziali per la qualità del prodotto, ma riducono comprovatamente anche il tasso di usura per lo stampo e la macchina. Kobra ha sponsorizzato la possibilità di scaricare gratuitamente il pdf di questo articolo per tutti i lettori di CuPI. Vi preghiamo di verificare il sito web www.cpi-worldwide.com/channels/kobra oppure di fare la scansione del codice QR con il Vostro smartphone per avere accesso diretto a questo sito web. **ALTRE INFORMAZIONI** **Kobra** Kobra Förmen GmbH Plohnbachstraße 1 08485 Lengenfeld, Germania T +49 37606 3020 F +49 37606 30222 email@example.com www.kobragroup.com **Excluton** Excluton B.V. Waalbandijk 155, 6651 Druten, Paesi Bassi T +31 487 516 200 firstname.lastname@example.org, www.excluton.nl
<urn:uuid:6e3d0b1b-3a2d-420e-959b-d7082099518d>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
5,190
LES ÉTAPES DU DÉNEIGEMENT NUIT ACCUMULATION DE NUIT Sortie dès 5 cm BORDAGE Enlèvement des bordages de nuit. Priorité: entrer/sortir de votre entrée. ARRÊT DES PRECIPITATIONS Début de la mise au propre dès 8h le matin. ALERTE-NEIGE Envoi de l’Alerte-neige (seulement lors de la mise au propre). FIN DES OPÉRATIONS JOUR ACCUMULATION DE JOUR Sortie dès 5cm pour l’enlèvement des bordages PRECIPITATIONS EN CONTINU Les opérations de déneigement continu -rotation des déblaiements -suivi des deneigeuses de la ville. FIN DES PRECIPITATIONS Fin des opérations pour la journée. BORDAGE Les bordages seront retirés de nuit. MISE AU PROPRE ET ALERTE-NEIGE La mise au propre débutera le lendemain matin dès 8h, Alerte-neige active.
<urn:uuid:22945329-a45f-4ee8-b6b7-4e8704490a69>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
734
Plataforma Llançadora Sol·licitud de participació - Mentoring 1. Dades de l'empresa Nom i cognoms Nom de l'empresa Area principal de treball i nombre de treballador/e/s Localització (ciutat) i pàgina web Telèfon Mòbil E-mail Idiomes de treball Estàs inscrit com a Demandant d'Ocupació No Ocupat (DONO) a l'Oficina de Treball? SI NO 2. Períodes de possible residència Explica aquí per què t'interessa participar, quants treballador/e/s penses involucrar en el projecte, i quina dedicació li penseu donar. Del 24 de març al 21 de juny Del 23 de juny al 20 de setembre Del 22 de setembre al 20 de desembre 3. Proposta d'horari
<urn:uuid:7ac4baee-aec0-4ae5-901d-eb1e91577b6c>
HuggingFaceFW/finepdfs/tree/main/data/cat_Latn/train
finepdfs
cat_Latn
643
NORMAND CHAURETTE DRAMATURGE, SCÉNARISTE, TRADUCTEUR NOTES BIOGRAPHIQUES Normand Chaurette est né en 1954 à Montréal. Il est l'auteur de douze pièces publiées depuis 1980 dont les plus connues sont Provincetown Playhouse, juillet 1919, j'avais 19 ans, (1981) ; Fragments d'une lettre d'adieu lus par des géologues (1986) ; Les reines (1991) ; Le Passage de l'Indiana, (pièce créée dans le cadre de la cinquantième édition du Festival d'Avignon, 1996) ; Le Petit Köchel (2000) ; Ce qui meurt en dernier (2008). Son théâtre est coédité par Leméac et Actes Sud – Papiers. La plupart de ses pièces ont été créées à Montréal depuis 1980 ; en outre, elles ont été produites à Toronto, Edmonton, Vancouver, New York et dans de nombreuses villes aux États-Unis ; il a aussi été joué à Paris (dont Les reines à la Comédie-Française en 1997), Bruxelles, Florence, Barcelone, Édimbourg. Ses textes les plus récents ont été traduits en anglais, en italien, en catalan, en espagnol et en allemand. Depuis 1995, Normand Chaurette et Denis Marleau d'Ubu compagnie de création, ont développé une grande complicité qui leur a valu une place de choix sur la scène internationale, grâce notamment aux festivals d'Avignon en 1996 et 2000. Normand Chaurette a aussi signé de nombreuses traductions de pièces de Shakespeare, ainsi que des textes français à partir de traductions littérales d'Ibsen et de Schiller. Quatre fois récipiendaire du Prix du Gouverneur Général du Canada, il a aussi reçu de nombreuses distinctions à l'étranger. Depuis 2005, il est membre de l'Ordre du Canada. THÉÂTRE Rêve d'une nuit d'hôpital Fêtes d'automne Provincetown Playhouse... La société de Métis La foresta Fragments d'une lettre d'adieu Curriculum vitae Mis à jour le 18 avril 2017 THÉÂTRE (suite) CINÉMA 2006 Gossip (En développement) Scénariste Productions : Cinémaginaire 2005 Roméo et Juliette Réalisation : Yves Desgagnés Productions : Cinémaginaire PIÈCES RADIOPHONIQUES 1995 Le passage de l'Indiana2 La belle au bois dormant (adaptation du conte de Charles Perrault) Entre Moscou et Saint-Pétersbourg 1994 L'enfant prodigue 1993 Nécrologie (adaptation d'une nouvelle de Dino Buzzati) L'admirateur 1992 Magnificat Curriculum vitae Mis à jour le 18 avril 2017 PIÈCES RADIOPHONIQUES (suite) 1991 La foresta2 1990 L'âne de Bethleem 1976 Rêve d'une nuit d'hôpital THÉÂTRE ET ROMAN The concise Köchel traduction en anglais de Le Petit Köchel,par Linda Gaboriau, Talonbooks, Vancouver, 2005, 96 p. Der Kleine Köchel, traduction en allemand de Le Petit Köchel, par Hinrich Schmidt-Henkel, Suhrkamp Verlag, Frankfurt/Main, 2000, 80 p. All the Verdis of Venice, traduction de Je vous écris du Caire, par Linda Gaboriau, théâtre, Vancouver, Talonbooks, 2000, 96 p. Le petit Köchel, théâtre, Arles, Actes Sud – Papiers / Leméac, 2000, 60 p. États financiers, monologue, Montréal, Les Éditions du Silence 1999, 24 p. Stabat Mater II, théâtre, Arles, Actes Sud – Papiers / Leméac, 1999, 60 p. Petit navire, théâtre, Arles, Actes Sud – Papiers, Heyoka Jeunesse / Leméac, 1999, 56 p. Fragments of a Farewell Letter Read by Geologists, traduction de Fragments d'une lettre d'adieu lus par des géologues, par Linda Gaboriau, théâtre, Vancouver, Talonbooks, 1998, 96 p. Le pont du Gard vu de nuit suivi du Poids des choses, nouvelles, Montréal, Leméac, 1998, collection Des bonheursdu-jour, 64 p. Le passage de l'Indiana, théâtre, Arles, Actes Sud \ Leméac, 1996, collection Papiers, 96 p. Je vous écris du Caire, théâtre, Montréal, Leméac, 1994, 96 p. The Queens, traduction de Les reines, par Linda Gaboriau, théâtre, Toronto, The Coach House Press, 1992, Introduction de Peter Hinton, 96 p. Curriculum vitae THÉÂTRE ET ROMAN (suite) Les reines, théâtre, Arles, Actes Sud / Leméac, 1991, collection Papiers, Introduction de Paul Lefebvre, 96 p. Scènes d'enfants, roman, Montréal, Leméac, 1988, collection Roman, 150 p. Fragments d'une lettre d'adieu lus par des géologues, théâtre, Montréal, Leméac, 1986, collection Théâtre Leméac No 155, Introduction de Michel Forgues, 105 p. La société de Métis théâtre, Montréal, Leméac, 1983, collection Théâtre Leméac No 118, Préface de Monic Robillard, 144 p. Fêtes d'automne théâtre, Montréal, Leméac, 1982, collection Théâtre Leméac No 112, Préface de René-Daniel Dubois, 138 p. Provincetown Playhouse, juillet 1919, j'avais 19 ans théâtre, Montréal, Leméac, 1981, collection Théâtre Leméac No 105, Préface de Gilles Chagnon, 132 p. Rêve d'une nuit d'hôpital théâtre, Montréal, Leméac, 1980, collection Théâtre Leméac No 87, Préface de Jean-Cléo Godin, 108 p. EN COLLECTIF Brèves d'Ailleurs - Stabat Mater I, Paris, 1997, Actes Sud Papiers, en collaboration avec la Maison du Geste et de l'Image, pp. 21 à 32. Il teatro del Quebec - Frammenti di una lettera d'addio letti dai geologi, traduction de Francesca Moccagata, Milan, 1994, Ubu libri, coll. dirigée par Franco Quadri, pp. 129 à 171. La Revue de la Nouvelle - Simplicité vaut mieux, Montréal, XYZ, 1991 . Avoir dix-sept ans- La panne, Montréal, Québec/Amérique, 1991, pp. 39 à 52. Nouvelle antérieurement parue dans Le Devoir, le 6 juillet 1991, en page 1 Quebec Voices, three plays , Provincetown Playhouse, traduction de William Boulet, Toronto, The Coach Press House, 1986, pp. 19 à 51. PRÉFACES ET ARTICLES THÉORIQUES "Interroger la place du texte au théâtre", communication, in Théâtre Multidisciplinarité et multiculturalisme, sous la direction de Chantal Hébert et Irène Perelli-Contros, Mtl, Nuit blanche éditeur, 1997, p. 191 et suiv. Les risques du métier, actes de la Rencontre Internationale des écrivains tenue au Mont-Gabriel du 27 avril au 1er mai 1990, publiés dans la revue Liberté. "Scènes délogées de la folie", réflexions critiques sur la saison 1982-1983 de l'Opéra de Montréal, in Jeu, cahiers de théâtre No 28 - 1983, 3, pp. 56 à 65. "Les murs communicants", sur la pièce Bachelor de Lise Roy et Louis Saia, in Jeu, cahiers de théâtre No 20 - 1981, 3. , pp. 132 à 136. "Écrire le Songe, c'est le réinventer", préface au Songe d'une nuit d'été de William Shakespeare traduit par Michelle Allen, Montréal, Leméac, 1990, collection Traduction et adaptation, pp. 7 à 10. "Le jeune homme et la mort", préface de 26 bis, Impasse du Colonel-Foisy de René-Daniel Dubois, Montréal, Leméac, 1983, collection Théâtre Leméac No 122, pp. VII à XXIV. "Le pouvoir et les mots" préface de Oh! Gerry oh! de Jacqueline Barrette, Montréal, Leméac, 1982, collection Théâtre Leméac No 114, pp. 7 à 18. "Les trois grâces ou Une ode aux natures vivantes", préface Les Trois grâces de Francine Ruel, Montréal, Leméac, 1982, collection Théâtre Leméac No 109,pp. VII à XXII. "Monsieur Arsenault désarmé ou l'infernale comédie", préface de Panique à Longueuil de René-Daniel Dubois, Montréal, Leméac, 1980, collection Théâtre Leméac No 88, pp. 7 à 25. TEXTES INÉDITS ET TRADUCTIONS 2005 Un ennemi du peuple, traduction de En Folkefiende d'Henrik Ibsen pour le Conservatoire d'Art dramatique du Québec, mise en scène de Suzanne Lantagne. 2003 Hermione et le Temps, livret d'opéra d'après Le conte d'Hiver de William Shakespeare, musique de Denis Gougeon pour le conservatoire d'Art dramatique du Québec, mise en scène de Suzanne Lantagne. 2002 La nuit des rois ou ce que vous voudrez, traduction de Twelfth Night or As you will, de William Shakespeare pour le TNM, mise en scène de Yves Desgagnés. 1999 Les joyeuses commères de Windsor, traduction de The Merry Wives of Windsor de William Shakespeare pour le TNM, mise en scène de Yves Desgagnés. 1998 La tragédie de Coriolan, traduction de The Tragedy of Coriolan de William Shakespeare pour le Théâtre de l'Athénée dans une adaptation libre de Joël Jouanneau, mise en scène de Joël Jouanneau. 1998 Roméo et Juliette, traduction de The Tragedy of Romeo and Juliet de William Shakespeare pour le TNM, mise en scène de Martine Beaulne. 1997 La tempête, traduction de The Tempest de William Shakespeare pour le Trident, mise en scène de Robert Lepage. 1995 Le songe d'une nuit d'été, traduction de A Midsomer Night Dream de William Shakespeare pour le Trident, mise en scène de Robert Lepage. 1995 Hedda Gabler, texte français de la pièce de Henrik Ibsen pour le TNM, mise en scène de Lorraine Pintal. 1994 Marie Stuart, texte français de Maria Stuart de Johann Christoph Fredrich von Schiller pour la NCT, mise en scène d'Alice Ronfard. 1991 Comme il vous plaira, traduction de As you Like it de William Shakespeare pour la NCT, mise en scène d'Alice Ronfard. 1991 La foresta, pièce à deux personnages originalement écrite en 1982. Créée à Radio-Canada, diffusion le 1er octobre 93 - dans le cadre du prix Italia. Musique originale de Pierre-Daniel Rhéault, avec Marie Tifo et Pierre Curzi, réalisation Line Meloche. 1988 Le More de Venise, traduction de Othello, the Moor of Venice, de William Shakespeare. PIÈCES JOUÉES *Cette recension exclut les représentations données par des troupes étudiantes ou amateur 2005-2006 Du 1er au 26 novembre, au Théâtre d'Aujourd'hui, Les reines, coproduction Théâtre UBU et Théâtre français du Centre National des Arts du Canada, mise en scène de Denis Marleau; avec Annick Bergeron, Louise Bombardier, Louise Laprade, Ginette Morin, Christiane Pasquier et Béatrice Picard. 2004-2005 Du 16 au 23 novembre, à La Station C, Provincetown Playhouse, production Le Pont Bridge; mise en scène, scénographie et vidéo de Carole Nadeau; avec Martin Bélanger, Christian Brisson-Dargis, Steeve Dumais. 2003-2004 Une vingtaine de représentations au Théâtre du Rivage (France et hors Paris), Petit navire; mise en scène de Pascale Daniel-Lacombe. Du 25 juin au 5 juillet, Les reines, production Howard Beye, à Halifax. 2002 Du 15 janvier au 21 février, au Théâtre du Nouveau Monde, Les joyeuses commères de Windsor, traduction de The merry wives of Windsor de William Shakespeare; mise en scène de Yves Desgagnés, musique de Catherine Gadouas (interprétée par Charles Imbeau et Benoît Paradis), scénographie de Martin Ferland, costumes de Judy Jonker, éclairages d'Éric Champoux; avec: Renaud Paradis, Rémy Girard, Frédéric Desager, Benoît Girard, Emmanuel Bilodeau, Jean-Pierre Chartrand, Jean-Sébastien Lavoie, Catherine Trudeau, Nathalie Gascon, Julie Vincent, Stéphane Jacques, Pierrette Robitaille, Robert Lalonde, Patrick Hivon et Normand Chouinard. 2001 23 et 24 novembre 2001 - Au studio du Tarragon Theatre, Toronto – The Consised Köchel, traduction par Linda Gaboriau du Petit Köchel, mise en lecture par Jacquie Maxwell, avec Martha Burns, Nancy Palk, Brenda Robbins et Dixie Seatle. 2000 Du 2 février au 12 mars – A la Sala Beckett de Barcelone, Fragments d'una carta de comiat llegits per gèolegs, traduction de Sergi Belbel de Fragments d'une lettre d'adieu lus par des géologues. Mise en scène de Sergi Belbel, avec Jordi Banacolocha, Miquel Bonet, Oriol Broggi, Fermi Casado, Laura Conejero, Pau Durà et Lluis Xavèr Villanueva. Du 12 février au 11 mars – Au Calgary Arts Center, Provincetown Playhouse, july 1919, traduction de William Boulet, production de Theatre in Exile, mise en scène de Gail Hanrahan, avec Kevin Rothery, Blair Wood, Jeff Gladstone et Jack Carver. 2000 Du 9 mai au 10 juin– Au Théâtre du Nouveau Monde, Le songe d'une nuit d'été, traduction de A midsummer Night Dream de William Shakespeare (1995), mise en scène de Yves Desgagnés. Assistant : Claude Lemelin. Décor Martin Ferland; costumes Judy Jonker; éclairages Éric Champoux; musique Catherine Gadouas. Avec Luc Chapdelaine, Jean-Pierre Chartrand, Henri Chassé, Frédéric Desager,Kathleen Fortin, Nathalie Gascon, Maxim Gaudette, JeanSébastien Lavoie, Didier Lucien, Jean Marchand, Renaud Paradis, Julie Perreault, Lorraine Pintal, Michel Poirier et Julie Vincent. Du 8 au 16 juillet – Festival d'Avignon, en coproduction avec l'Hexagone, scène nationale, Meylan, Festival d'Avignon et le Théâtre Ubu de Montréal, Le petit Köchel, du 8 au 16 juillet 2000, à la salle Benoit XII, mise en scène de Denis Marleau, avec Louise Bombardier, Louise Laprade, Ginette Morin et Christiane Pasquier. Scénographie de Michel Goulet, costumes de François Barbeau, éclairage de Martin Labrecque. Production reprise du 12 septembre au 7 octobre à Montréal, au Théâtre d'Aujourd'hui, puis en tournée européenne (France et Suisse) en octobre et novembre 2000. Du 8 septembre au 30 novembre 2000 – Espacio Cultural El Sotano, Montevideo, Uruguay, (trois représentations par semaine) – en reprise du 15 février au 30 mars 2001 – Las Reinas, traduction des Reines, trad. et mise en scène d'Eduardo Schinca, scénographie de Paolo Acosta, avec Ana Rosa, Rosana Blanco, Elsa Mastrangelo, Beatriz Massone, Nelly Antùnez et Judith Palados. 1999 Du 12 janvier au 15 mars 1999, au Théâtre du Nouveau Monde, puis en tournée à travers le Québec, Roméo et Juliette, traduction de The Tragedy of Romeo and Juliet de Shakespeare; mise en scène de Martine Beaulne, assistée d'Allain Roy, scénographie de Stéphane Roy, costumes de Mérédith Caron, éclairages de Michel Beaulieu et musique de Claude Lamothe. Avec Dany Gilmore et Isabelle Blais, et: Sylvain Bélanger, Éric Bernier, Jean-Robert Bourdages, David Boutin, Anne-Marie Cadieux, Marie Cantin, Martin Desgagnés, Paul Doucet, Hugues Fortin, Clermont Jolicoeur, Robert Lalonde, Philippe Lambert, Claude Lemieux, Jean Marchand, Gérard Poirier, Louise Portal, Gabriel Sabourin et Diego Thornton. Du 19 octobre au 16 décembre 1999, au Théâtre du Nouveau Monde puis en tournée à travers le Québec, Stabat Mater II; mise en scène de Lorraine Pintal, assistée de Lou Arteau, scénographie de Danièle Lévesque, costumes de François St-Aubin et éclairages de Michel Beaulieu. Avec Suzanne Champagne, Hélène Grégoire, Maude Guérin, Marie-France Marcotte, Marie Michaud, Huguette Oligny, Brigitte Paquette, Sylvie Potvin, Danielle Proulx, Michelle Rossignol, Monique Spaziani, Mireille Thibault, Marthe Turgeon et Nathalie Valiquette. 1998 Du 18 au 26 avril - Au Northern Light Theater d'Edmonton, Alberta, Fragments of a farewell letter read by geologists, traduction de Fragments d'une lettre d'adieu lus par des géologues, par Linda Gaboriau. Mise en scène de Lynda Adams, scénographie de Bretta Gerecke, musique de Ojas Joshi; avec James MacDonald, John Wright, Fred Zbryski, Ashley Wreight, Troy O'Donnell, Michele Brown et Elyne Quan 1998 Du 28 avril au 30 mai - au Théâtre du Trident, Québec: La tempête, traduction de The Tempest de William Shakespeare, mise en scène et scénographie de Robert Lepage, avec projections virtuelles en 3D par Mirage Multimédia, costumes de Janie Gagnon, éclairages de Atsushi Moryasu. Avec Paul Hébert, Lorraine Côté, Évelyne Rompré, Richard Fréchette, Jean Jacqui Boutet, Réjean Vallée, Francis Martineau, Marco Poulin, Pierre-Yves Charbonneau, Pierre Gauvreau, Michel Lee, Jacques Leblanc. 24 mai - A l'Institut culturel canadien, Les conférencières, lecture publique dans le cadre du Carrefour international de théâtre, dernière étape d'un atelier d'un an d'écriture commandé par le Théâtre Ubu. Mise en lecture: Denis Marleau, assisté de Michèle Normandin, avec Andrée Lachapelle, Marie Tifo, Louise Portal, Louise Laprade, Ginette Morin et Christiane Pasquier. Du 29 septembre au 7 novembre, au Théâtre Louis-Jouvet de l'Athénée, Paris, La tragédie de Coriolan, traduction et adaptation de The Tragedy of Coriolan de William Shakespeare, en collaboration avec Joël Jouanneau. Mise en scène de Joël Jouanneau, avec Christine Fersen, Jean-Quentin Châtelain, Yves Jenny, Raoul Teusher, Philippe Nahon, Bruno Marengo, Léo Maurice et Bastien Prévoto. Décors de Jacques Gabel, costumes de Patrice Cauchetier, Lumières de Frank Thévenon. Coproduction de l'Athénée Théâtre Louis-Jouvet, l'Eldorado et la Comédie de Genève. Tournée jusqu'au 16 janvier 1999, à Angoulème, Chambéry, Albi, Quimper, Chartres, Belfort et Genève. 1997 Du 6 mai au 20 juin, au Théâtre du Vieux-Colombier de la Comédie-Française, à Paris, Les reines, mise en scène de Joël Jouanneau. Décor de Jacques Gabel, costumes de Patrice Cauchetier, lumières de Frank Thévenon et bande son de Pablo Bergel. Avec Christine Fersen, Catherine Hiégel, Martine Chevallier, Emmanuelle Meyssignac, Cécile Garcia Fogel, et Océane Mozas. Prix CIC Paris Théâtre 1996. Prix du Syndicat de la critique pour les costumes de Patrice Cauchetier et pour Cécile Garcia Fogel (Prix Révélation). Du 11 octobre au 2 novembre - Au Théâtre du Périscope, à Québec, Les reines, mise en scène de Gil Champagne. Scénographie et éclairages de Jean Hazel, costumes d'Isabelle Larivière et Nicole Fortin. Avec Denise Gagnon, Paule Savard, Linda Laplante, Érika Gagnon, Marie Dumais et Lise Castonguay. 1996 Du 19 mars au 12 avril 1996 - au Théâtre du Nouveau Monde, Montréal, Hedda Gabler, texte français de la pièce de Henrik Ibsen, avec Sylvie Drapeau dans le rôle-titre, Pierre Lebeau, Germain Houde, Janine Sutto, Huguette Oligny, Denis Bernard et Julie McClemens; mise en scène de Lorraine Pintal. Du 10 au 16 juillet, dans le cadre de la cinquantième édition du Festival d'Avignon, au Tinel de la Chartreuse de Villeneuve-lez-Avignon, Le passage de l'Indiana, co-production du Festival d'Avignon, du théâtre Ubu et du Centre national des Arts d'Ottawa, avec Andrée Lachapelle, Jean-Louis Millette, Marc Béland et Julie McClemens. Mise en scène de Denis Marleau. Scénographie de Michel Goulet, musique de Denis Gougeon, éclairages de Guy Simard et costumes de Lyse Bédard. Production reprise en septembre au Centre national des Arts à Ottawa, puis au Théâtre du Nouveau Monde, du 5 novembre au 6 décembre 1996, avec prolongations au théâtre du Centaur, du 6 au 14 décembre. 1996 Du 4 au 27 juillet, dans le cadre du festival Blithe Spirit, Royal Lyceum, Edinburgh, Fragments of a farewell letter read by geologists, traduction de Fragments d'une lettre d'adieu lus par des géologues, par Linda Gaboriau. Production Color Clinic Company, mise en scène de Steven McNicholl, avec Steven McNicholl, Marc McDonnell, Morven McLean, Ian Cains et Joyce McMillan dans les principaux rôles. Du 5 au 15 novembre, sur la Scène Nationale de Chambéry et de Haute-Savoie, à Chambéry, Petit navire, coproduit par la Scène Nationale de Chambéry et de Haute-Savoie, le théâtre du Carrousel et le Centre national des Arts d'Ottawa, avec Lionel Villeneuve, Benoit Vermeulen, Mireille Brullhmans et Francine Beaudry. Mise en scène de Gervais Gaudreau. Production reprise dans plusieurs villes d'Europe et à la Maison de la Culture Frontenac (MaisonThéâtre) à Montréal du 16 mai au 1er juin 1997. 1995 Du 7 au 25 mars à la Salle Denise-Pelletier de la Nouvelle Compagnie Théâtrale, puis du 5 au 12 mai au Centre national des Arts à Ottawa, Marie Stuart, texte français de Maria Stuart de Fredrich von Shiller, d'après une traduction littérale de Marie-Elisabeth Morf; mise en scène d'Alice Ronfard. Avec Sophie Faucher, Marthe Turgeon, Françoise Faucher, Paul Latreille, Robert Marinier, Luc Bourgeoys, Jean-Guy Viau, Pascal Auclair, David de Charette, Michel Bérubé, Philippe Cousineau; scénographie de Robert-Marius Barbeau, costumes de Jean Boucher et éclairages de Michel Beaulieu. 4 juin - In the Wings of La Scala, traduction par Linda Gaoboriau (sous un titre provisoire) de Je vous écris du Caire, lecture publique de la pièce au Monument-National dans le cadre du Festival de Théâtre des Amériques, dirigée par Donald Dean Kugler, avec Michael Mc Manus, Robert Highden, Joel Miller, David Francis et Danette Mc Kay. Du 3 octobre au 8 novembre, au Théâtre du Trident, Québec: Le Songe d'une nuit d'été, traduction de A midsummer Night Dream de William Shakespeare, mise en scène de Robert Lepage, assisté de Philippe Soldevila, décor de Karl Filion, costumes d'Isabelle Larivière, éclairages de Sonoyo Nishikawa. Avec Bertrand Alain, Jacques Baril, Danyel Bélanger, Bobby Beshro, Sylvie Cantin, Simone Chartrand, Tony Conte, Julien Forcier, Marie-Thérèse Fortin, JacquesHenri Gagnon, Angela Laurier, Jacques Leblanc, Jean-François Maher, Jules Philip, Rychard Thériault, Réjean Vallée. Du 24 octobre au 16 novembre - Au Théâtre d'Aujourd'hui de Montréal, Fragments d'une lettre d'adieu lus par des géologues, mise en scène de Michèle Magny, assistée de Josée Kleinbaum, scénographie de Guillaume Lord, costumes de Véronique Borboën, avec Jacques L'Heureux, Jean-François Blanchard, Éric Cabana, Daniel Brière, Michel Laperrière, Mireille Deyglun et Denis Tran Van Mang. Novembre 1995 - Les 17 et 18, Au Pink Ink, Ruby Slippers et Théâtre la Seizième de Vancouver, All the Verdis of Venise et Je vous écris du Caire présentés en alternance dans le cadre de Act of Passion. Avec, dans la production anglaise (traduction de Linda Gaboriau) Ed Ashley, Alex Ferguson, Allan Grey, Ian MacDonald et Linda Quibel. Direction Katrina Dun. Avec, dans la version en français, Ghislain Basque, Alain Couture, Jean-Pierre Gonthier, Shaw MacDonald et Nocile Robert. Direction Paul Lefebvre. 1994 Du 10 au 20 janvier 1994: RSC Fringe Festival 1994, Stratford-on-Avon, Angleterre; The Queens (Les reines), traduction en anglais de Linda Gaboriau, mise en scène de Alison Humphrey, avec Anita Wright, Alexandra Gilbreath, Johanna Benyon, Jane Lapotaire, Kate Duchêne et Cherry Morris. Du 5 avril au 5 mai 1994: Comme il vous plaira, traduction de As you like it de William Shakespeare, à la Nouvelle Compagnie Théâtrale, mise en scène d'Alice Ronfard. Avec Martine Francke, Emmanuel Bilodeau, Jean-François Casabone, Pascal Auclair, Jacques Girard, Manon Arsenault, Claude Guay, Pierre Collin, Roger Larue. Costumes de François Barbeau; scénographie de Raymond-Marius Boucher, éclairages de Michel Beaulieu. Juin - Consultant aux dialogues et au scénario du Confessionnal, film écrit et réalisé par Robert Lepage. Octobre - The Queens à Edmonton. Mise en scène de Brad Moss. Distribution non parvenue à l'auteur. 21 novembre 94 - Salle Louis-Fréchette du grand Théâtre de Québec, dans le cadre des lundis Hydro-Québec, mise en lecture Les Reines par Gill Champagne, avec Marie-Josée Bastien, Lise Castonguay, Marie-Ginette Guay, Line Nadeau, Paule Savard et Denise Verville. 1993 Diffusion le 1er mars - Théâtre en clip sur les ondes de Radio-Canada FM, extraits Les Reines, et de Fragments d'une lettre d'adieu lus par des géologues, avec Sophie Faucher, Carl Béchard et Pierre Curzi, réalisation Line Meloche. Du 5 au 19 avril - Au Paines Plough Riversides Interchange studios de Londres, Provincetown Playhouse, july 1919, traduction de William Boulet, mise en scène de John Van Burek, avec Nigel Whitmey, Robert Ashe, Paul Taylor et Robert Jarvis. Du 13 août au 3 septembre 93: Au Unity Church de Winnipeg, The Queens (traduction Les Reines par Linda Gaboriau) mise en scène de Kim McKaw. Avec Jennifer Morehouse, Louise Chastney, Deborah Gibson, Estel Dove, Ellen Sagard et Dawn Applebaum. Diffusion le 1er octobre 93 - La foresta, dramatique radiophonique dans le cadre du prix Italia. Musique originale de Pierre-Daniel Rhéault, avec Marie Tifo et Pierre Curzi, réalisation Line Meloche. Du 1er au 13 octobre: Frammenti di una lettra d'addio letti dai geologi, traduction en italien de Fragments d'une lettre d'adieu lus par des géologues par Francesca Moccagatta, au Teatro della Limonai de Sesto Fiorentino (Florence), dans le cadre du Festival Intercity 1992; mise en scène de Paula de Vasconcelos, avec Riccardo Naldini, Roberto Gioffre, Gianluigi Tosto, Luca Camilletti, Silvano Panichi, Alessandra Bedino et Massimo Tarducci. Curriculum vitae Mis à jour le 18 avril 2017 1993 Octobre: traduction en italien de Provincetown Playhouse, juillet 1919, j'avais 19 ans, sous le titre de Provincetown Playhouse, juglio 1919, avevo 19 anni par Francesca Moccagatta, au Teatro della Limonai de Sesto Fiorentino (Florence), production dans le cadre du Festival Intercity 1993; mise en scène de Barbara Nativi. Du 4 octobre au 9 novembre 93: Les reines, traduites en Catalan, production d'El teatro nacional de Barcelone. Mise en scène de Teresa Pombo, avec Sonia Cavarro, Sene Rossala, Loia Linera, Paula Ruiz, Tessa Dangond et Lina Merge. Du 22 octobre au 14 novembre 93: Je vous écris du Caire, au Théâtre d'Aujourd'hui de Montréal, mise en scène d'Alexandre Hauswater, avec René Gagnon, Jean Marchand, Linda Sorgini, Luc Durand et Aubert Pallascio. Scénographie de Michel Demers, éclairages de Guy Simard et costumes de Véronique Borboën. Du 4 déc. 93 au 8 janvier 94: Au Classic Theater Company, Addison Center theater, Dallas, U.S.A. - The Queens, (Les reines), traduction en anglais de Linda Gaboriau), mise en scène de Janet Farrow, avec Lisa et Francess Peterson, Kristal Reid-Venhous, Carol Dearman, Laurel Hotsma et Constance Gold. 1992 Du 20 au 27 janvier - Au Canadian Stage Company de Toronto, ateliers en vue de la production Les Reines (The Queens) dans la traduction de Linda Gaboriau, et lecture publique, dirigée par Peter Hinton, avec Paulina Gillis, Allegra Fulton, Janet Laine-Green, Brenda Robbins, Patricia Collins et Marion Gilsenan. Du 10 mars au 11 avril, et représentations supplémentaires du 14 au 18 avril, Provincetown Playhouse, juillet 1919, j'avais 19 ans, à l'Espace GO de Montréal, mise en scène d'Alice Ronfard, avec René Gagnon, David LaHaye, Robert Brouillette et André Robitaille. Scénographie de Stéphane Roy, éclairages de Michel Beaulieu et costumes de François Barbeau. Du 17 au 22 mars : Les reines, au studio d'essai Claude-Gauvreau de l'Université du Québec à Montréal, mise en scène de Gervais Gaudreau avec douze comédiennes, scénographie de Nathalie Marcil et de Lucie Johnson. Du 23 mars au 11 avril: Au Nouveau Théâtre de Quat'sous de Bruxelles, Les reines, mise en scène de Jean-Marc Favorin. Avec Pascale Bonnarens, Véronique Bultiau, Barabara Dauwe, Sophie Lancel, Jacqueline Preseau et Aylin Yay. Production de la Compagnie théâtrale JAP. Du 2 au 23 octobre: La Societa di Metis, traduction en italien de La société de Métis par Barabara Nativi, au Teatro della Limonai de Sesto Fiorentino (Florence), dans le cadre du Festival Intercity 1992; mise en scène d'Alice Ronfard, avec Luca Camilletti, Silvia Guidi, Simona Arrighi, Stefano Laguni; scénographie de Dimitri Milopulos. Curriculum vitae 1992 Du 2 au 23 octobre: Frammenti di una lettra d'addio letti dai geologi, traduction en italien de Fragments d'une lettre d'adieu lus par des géologues par Francesca Moccagatta, au Teatro della Limonai de Sesto Fiorentino (Florence), dans le cadre du Festival Intercity 1992; mise en scène de Valerio Valoriani, avec Riccardo Naldini, Roberto Gioffre, Gianluigi Tosto, Luca Camilletti, Silvano Panichi, Allessandra Bedino et Massimo Tarducci. Du 11 au 31 octobre: Fragments of a farewell letter read by geologists (traduction de Linda Gaboriau), au Equity Showcase Theatre de Toronto; mise en scène de Ian Prinsloo, scénographie de Cheryl Mills, avec Michael Albert, Michael Carley, Denise Norman, John Ralston, Jovanni Sy, Todd Sandomirsky et Richard Waugh. Diffusion le 2 novembre - Théâtre en clip sur les ondes de Radio-Canada FM, extraits Les reines, de La société de Métis et de Provincetown Playhouse, juillet 1919, j'avais 19 ans, avec Sophie Faucher, Carl Béchard et Pierre Curzi, réalisation Line Meloche. Du 6 au 27 novembre - The Queens, (Les reines, traduction en anglais de Linda Gaboriau) au Canadian Stage de Toronto; mise en scène de Peter Hinton, scénographie de John Ferguson et chorégraphie de Denise Clark; avec Jennifer Morehouse, Siobhan McCormick, Tanja Jacobs, Margot Dionne, Marion Gilsenan et Denise Clarke. Du 5 au 12 décembre - The Queens, (Les reines, traduction en anglais de Linda Gaboriau) montées par Paula Dackert Au Rubby Slippers Company, Halifax. 1991 Du 18 janvier au 10 février, et supplémentaires du 10 au 16 février - Au Théâtre d'Aujourd'hui à Montréal - Les reines, mise en scène d'André Brassard, avec Andrée Lachapelle, Pol Pelletier, Michelle Rossignol, Marthe Turgeon, Linda Sorgini, Elise Guilbault; scénographie de Mérédith Caron. Du 13 au 17 février - Department of theatre, Concordia University, Faculty of fine arts, Montréal - Provincetown Playhouse, july 1919, (traduction de William Boulet), mise en scène de Walter Casidy, avec Mary Francis Moore, Leigh Hemsworth, Heather McCreath et Laurie Pumphrey. Décors de Lisa Leblanc. Du 21 février au 30 mars - A La Licorne, Montréal, Comme il vous plaira, traduction d'As you like it de William Shakespeare, dans une mise en scène d'Alexandre Hausvater (production du Théâtre de l'Archipel). Avec Josée Allard, Yvan Benoît, Carole Chatel, Isabelle Côté, Robert Daviau, Daniel Desputeau, Maryse Gagné, Sophie Laurin, Pierre Lavergne, Marcel Pomerlo et Marco Ramirez. Musique originale de Marco Giannetti, scénographie d'Hélène Turp. Du 1er au 13 juin - Au Playwrit's Colony de Banff, Alberta - The Queens, traduction Les reines par Linda Gaboriau, ateliers regroupant six comédiennes anglophones en vue d'une éventuelle production au Canada anglais. Stage offert par le Playwrit's Colony sous la direction de Kim McCaw. 1991 22 juin - Au Théâtre de la Colline, Paris, Les reines, atelier et lectures publiques dans le cadre du projet Montréal-Paris-Montréal. Mise en espace de Laurence Février. Avec Anne Benoît, Corinne Darmon, Nathalie Schmidt, Hélène Roussel, Dominique Ardens, Nane Germon. Du 13 au 27 août - Vancouver - dans le cadre du "Frange Summer Festival", Provincetown Playhouse, traduction de William Boulet, mise en scène de Paul Bettis, avec Richard Fellbaum, Earl Patsko, Brian MacDonald et Glenn White. 1990 Du 25 au 31 janvier - Fragments d'une lettre d'adieu lus par des géologues au Centre d'essai de l'Université de Montréal, mise en scène d'Isabelle Villeneuve. 27 avril - Au Théâtre du Petit Odéon, Paris, lecture publique de Provincetown Playhouse, juillet 1919, j'avais 19 ans, dirigée par Patrick Hagiag, avec Hervé de Bourjal, Thierry Hancisse, Hervé Ledantec et Yann Collin. Du 1er au 30 novembre - Projet BBKB - Lectures de Fragments d'une lettre d'adieu lus par des géologues à bord d'un bateau descendant les fleuves Oubangui et Congo Zaïre, sous la direction de François Campana, avec Normand Canac-Marquis, Anne Legault, Daniel Meilleur et une équipe de sept comédiens. Du 19 novembre au 24 décembre - Au Théâtre Boris Vian des Grandes Halles de la Villette, Paris, Fragments d'une lettre d'adieu lus par des géologues, mise en scène de Gabriel Garran. Scénographie de Jean-Claude De Bemels, musique de Pierre-Jean Horville et costumes de Steen Halbro. Avec Christophe Brault, Alain Rimoux, Jean-François Lapalus, Michel Fau, Jean Martin (dans le rôle du président), Yasmine Modestine et Jim-Adhi Limas. 6 décembre - Toronto - Fragments of a farewell letter read by geologists (traduction de Linda Gaboriau), Workshop reading dans le cadre du "Cahoots Theatre Projects", dirigé par Sky Gilbert. Du 8 au 12 décembre - Salle Alfred-Laliberté de Université du Québec à Montréal - Comme il vous plaira (traduction d'As you like it de William Shakespeare), mise en scène d'Alexandre Hauswater. 1989 Du 5 au 15 mars - dans le cadre des "Premières nocturnes" organisées par le ministère de la Communauté française de Belgique et de la RTBF - Radio 3 de Bruxelles - Production du théâtre Le Botanique de Bruxelles Fragments d'une lettre d'adieu lus par des géologues, lecture dirigée par Jean-Marie Piemme, avec Amid Chakir, Alain Legros, André Lenaerts, Linda Lewkowicz, Alain Montoisy, François Sikivie et Jean-Michel Vovk. Du 15 au 25 avril - Au "Prairie Theater Exchange" de Winnipeg - Fragments of a farewell letter read by geologists, traduction de Linda Gaboriau, mise en lecture de Kim McCaw, avec Kyle McCulloch, Kevein Bundy, Brian Drader, David Storch, Garrison Chrisjohn, Sarah Orenstein et Claude Dorge. 1989 Du 24 au 30 octobre - Fragments plus vrais que tragiques, récit événement sur un collage de textes de Normand Chaurette, par Isabelle Villeneuve, Monique Lavail et Ginette Prince, au centre culturel Calixa-Lavallée à Montréal. Éclairages et scénographie de Gordon Page. 11 novembre - Extraits de La capture des cigales lors du spectacle d'ouverture de la Nouvelle Licorne, mise en scène de Martin Faucher avec Marie Tifo, Luce Guilbault, Paule Baillargeon et Patricia Nolin. Diffusion le 25 décembre - L'âne de Bethléem sur les ondes de Radio-Canada FM, réalisation Jean-Pierre Saulnier, avec dans les principaux rôles Yvon Thiboutot, Sylvia Gariépy, Benoît Dagenais et Jacques Lavallée. 1988 Du 8 mars au 2 avril - Fragments d'une lettre d'adieu lus par des géologues, production du Théâtre de Quat'sous; mise en scène de Michel Forgues, avec Anne Caron, Larry-Michel Demers, Daniel Do, Martin Drainville, Pierre Drolet, Jean-Louis Roux et Jean-Guy Viau. 1987 Du 2 au 9 septembre dans le cadre des Lectures du Théâtre international de langue française de Paris et du Centre d'essai des auteurs dramatiques de Montréal au Sommet de la Francophonie de Québec - à l'Implanthéâtre de Québec et en reprise au Théâtre d'Aujourd'hui de Montréal, Fragments d'une lettre d'adieu lus par des géologues; mise en lecture de Michel Forgues, avec Jean-Louis Roux, Carl Béchard, Anne Caron, Daniel Do, Martin Drainville, Pierre Drolet et Sylvain Foley. Du 23 septembre au 17 octobre - La société de Métis, production du Théâtre d'Aujourd'hui; mise en scène de Joseph Saint-Gelais, avec Louise Bombardier, Denis Brassard, Monique Lepage et Julien Poulin. 1986 Du 2 au 29 novembre - La société de Métis, production "Les Têtes heureuses" à la Maison Carrée de Chicoutimi; mise en scène d'Isabelle Villeneuve, avec Lucette Papillon, France Goulet, Patrice Tremblay et Yvan Giguère. Du 2 au 21 décembre - Provincetown Playhouse, traduction de William Boulet, au Buddies in Bad Times Theater de Toronto; mise en scène de Paul Bettis, avec Richard Fellbaum, Earl Patsko, Brian MacDonald et Glenn White. 1985 Du 28 mai au 4 juin - Provincetown Playhouse, juillet 1919, j'avais 19 ans, même production présentée dans le cadre du Festival de théâtre des Amériques 1985. 1984 Du 16 au 29 octobre dans le cadre des lectures publiques organisées par le Centre d'essai des auteurs dramatiques au UBU Theater Repertory de New York - Provincetown Playhouse, mise en lecture par Cynthia B. Stokes, dans la traduction de William Boulet. Du 3 au 24 novembre - Provincetown Playhouse, juillet 1919, j'avais 19 ans, production "Les Têtes heureuses" à la Maison Carrée de Chicoutimi; mise en scène de Pierre Fortin avec Larry Tremblay dans les quatre rôles et un chœur composé de cinq comédiens. Curriculum vitae NORMAND CHAURETTE Mis à jour le 18 avril 2017 1982 28 mars - Provincetown Playhouse, juillet 1919, j'avais 19 ans, lecture publique au Centre culturel canadien de Paris avec dans les quatre rôles René-Daniel Dubois. Du 19 mars au 17 avril - Fêtes d'automne, au Théâtre du Nouveau Monde; mise en scène de Jean-Luc Bastien. Avec Yves Desgagnés, Johanne Fontaine, Monique Joly, Jacques Lavallée, Hélène Mercier et Marthe Turgeon. Musique originale de Pierre Moreau. Du 14 septembre au 30 octobre - Provincetown Playhouse, juillet 1919, j'avais 19 ans, au Café Nelligan; mise en scène de Michel Forgues, avec Jean-Luc Denis, Francis Reddy, Marc Francoeur et Jacques Lussier. 1980 Du 9 janvier au 24 février - Rêve d'une nuit d'hôpital, au Théâtre de Quat'sous; mise en scène de Gérard Poirier, avec Jean-Jacques Desjardins, Mireille Thibault, Serge Bradet, Benoit Dagenais, Hélène Grégoire, Louise Arbique, et Céline Cléroux au violoncelle. Musique originale de Jean- Philippe Beaudin. 1976 10 déc. (Reprise en juin 1977) - Rêve d'une nuit d'hôpital sur les ondes de Radio-Canada MF, réalisation Jean-Pierre Saulnier, avec dans les principaux rôles Dyne Mousseau, Janine Sutto, Yvan Canuel, Jacques Galipeau, Marc Messier, Lorraine Pintal, Michel Côté, Marc Briand et Marie-Josée Labossière. PRIX ET NOMINATIONS 2004 Masque de l'Académie pour La nuit des rois (catégorie traduction ou adaptation). 2002 Masque de l'Académie pour Le petit Köchel (catégorie texte original). 2001 Prix du Gouverneur Général du Canada pour Le petit Köchel. 1998 Masque de l'Académie pour Le passage de l'Indiana (catégorie texte original). 1997 Prix Essor du ministère de l'Éducation et de la Culture pour Stabat Mater I. Prix spécial de L'AQCT pour le rayonnement à l'étranger. Prix CIC Paris Théâtre pour Les reines. (Prix de la Banque de Crédit Industriel et Commercial décerné annuellement à une production de la Comédie-Française). 1996 Masque de l'Académie pour Le songe d'une nuit d'été (catégorie traduction adaptation). Prix du Gouverneur général du Canada pour Le passage de l'Indiana. Curriculum vitae PRIX ET NOMINATIONS (SUITE) 1996 Grand Prix Tchicaya U Tam'Si offert par l'Agence de la Francophonie ACCT de Radio-France International, et Bourse d'écriture de l'Association Beaumarchais, à Paris, pour Petit navire. 1993 Dora Moore's Award pour The Queens, Toronto, juin Prix F. Lloyd Chalmers pour la meilleure pièce présentée au Canada anglais pour The Queens (Les reines), traduction de Linda Gaboriau. 1991 Pour Les reines, nomination au prix du Journal de Montréal. 1989 Pour Scènes d'enfants: finaliste au Prix du Gouverneur général, au prix Molson de 'Académie canadienne française, au prix Air-Canada, au Grand Prix du Livre de Montréal, au prix France - Québec et au prix QuébecParis. 1988 Prix de l'Association québécoise des critiques de théâtre pour le meilleur texte créé à la scène pour Fragments d'une lettre d'adieu lus par des géologues. 1986 Finaliste au Prix du Gouverneur général pour Fragments d'une lettre d'adieu lus par des géologues. 1976 Prix Paul-Gilson décerné par la Communauté radiophonique de langue française, Lausanne, pour Rêve d'une nuit d'hôpital. Premier prix du IVe concours d'œuvres dramatique de Radio-Canada pour Rêve d'une nuit d'hôpital. Participation à de nombreux échanges et colloques, dont Le Sommet de la Francophonie en septembre 1987, La Rencontre internationale des écrivains en avril 1990 et en avril 1997, le Festival Montréal-Paris-Montréal en 1991, le Festival Intercity de Florence en 1992 et 1993, le Congrès d'études canadiennes de Venise en mai 1994. PRINCIPAUX ARTICLES DE FOND SUR L'ENSEMBLE DES TEXTES DE NORMAND CHAURETTE JOURNAUX, PÉRIODIQUES Note : cette recension d'articles, qui ne se veut pas exhaustive, s'arrête en 1992, et couvre la première décennie des pièces jouées au Québec. Par la suite, les entrevues et articles divers parus dans les quotidiens sont devenus trop nombreux, et souvent trop routiniers, pour qu'il soit possible ou pertinent de les recenser. Par ailleurs, la revue VOIX et IMAGES parue au printemps 2000 (numéro consacré à Normand Chaurette) propose la bibliographie fort substantielle et la plus complète à ce jour des articles de presse sur N.C) NORMAND CHAURETTE - Un jeune dramaturge... par Jacques Larue-Langlois, Le Devoir, Montréal, 19 janvier 1980. NORMAND CHAURETTE, DRAMATURGE, par Robert Lévesque, Le Devoir, Montréal, 20 mars 1982. FÊTES D'AUTOMNE AU TNM - par Martial Dassylva, La Presse, Montréal, 20 mars 1982. LA MAGIE DE L'UNIVERS TEXTUEL DE CHAURETTE - par Paul Lefebvre, dans Virus Arts, Montréal, septembre 1982. ONE DAY MY PRINCE WILL COME - par Rodrigue Villeneuve, Protée, Chicoutimi, été 1984. DEUX DRAMATURGES DE L'AVENIR - par Jean-Cléo Godin, Études littéraires, Vol. 18 No 3, Québec, Hiver 1985 - pp. 113-122. UNE OEUVRE QUI FLIRTE AVEC LE GÉNIE - par Raymond Bernatchez, La Presse, Montréal, 2 juin 1985. PROVINCETOWN; TIGHTLY WRITTEN POETIC PIECE - par Pat Donnely, The Montreal Gazette, 3 juin 1985. CHAURETTE, L'AUTEUR QUI ATTEND - par Robert Lévesque, Le Devoir, Montréal 4 juin 1985. A PROPOS DU DÉSIR - par Gilbert David, Jeu, cahiers de théâtre, 1985, No 1. UN THÉÂTRE AFFRANCHI - par Robert Lévesque (coll. spéciale), dans Le magazine littéraire No 234, Paris, octobre 1986. DEUX PIÈCES EN FORME D'INTERROGATOIRE - par André G. Bourrassa, Lettres québécoises, 1986, No 4. LA RENTRÉE THÉÂTRALE: LES TROIS COUPS AVEC CHAURETTE, DUBOIS, LABERGE... par Robert Lévesque, Le Devoir, Montréal, 12 septembre 1987. NORMAND CHAURETTE AUX LECTURES DU T.I.L.F. - par Robert Lévesque, Le Devoir, Montréal, 3 septembre 1987. Curriculum vitae NORMAND CHAURETTE Mis à jour le 18 avril 2017 PRINCIPAUX ARTICLES DE FOND SUR L'ENSEMBLE DES TEXTES DE NORMAND CHAURETTE (suite) LES QUÉBÉCOIS BOUDENT LES AFRICAINS - par Carole Beaulieu, Le Devoir, Montréal, 4 septembre 1987. NORMAND CHAURETTE, LA LIGNE DE VIE, LE THÉÂTRE DU TEMPS, par Jean Barbe, Voir, Vol. 1 No 43, - 6 octobre 1987. SEXUAL GAMES, HYPERTHEATRICALLITY IN RECENT QUEBEC PLAYS - par Jane Moss, The American Review of Canadian Studies, Vol.XVII, No 3, New York, autumn 1987. UNE DRAMATURGIE A DEUX VITESSES - par Gilbert David, in Parachute No 52, Montréal, octobre-novembre 1988. CROQUIS ADULTES POUR PIANO - par Jean Ethier-Blais, Le Devoir, Montréal, 31 décembre 1988. NORMAND CHAURETTE - L'ÉCRITURE EST UN ACTE DE SÉDUCTION - par Paul Eliani, Nuit Blanche, No 34, Montréal, Janvier-février 1989. L'HORREUR PRÉSENTÉE AVEC FROIDEUR - par Réginald Martel, La Presse, Montréal, 28 janvier 1989. FAITS DIVERS - par Jean-François Chassey, Spirale No 85, Montréal, février 1989. SCENES D'ENFANTS DE NORMAND CHAURETTE - par Hélène Marcotte, Québec français No 74, Montréal, mai 1989. CHAURETTE PLAYHOUSE - par Jean-Cléo Godin, Etudes françaises No 26-2, "L'Amérique de la littérature québécoise", pp. 53-59. LES REINES HALLUCINÉES DE CHAURETTE - par Alain Pontaut, Le Devoir, Montréal, 12 janvier 1991. NORMAND CHAURETTE - par Irène Sadowska-Guillon, Paris-Tête d'affiche, février-mars 1991, Numéro 18, pp. 10-11. NORMAND CHAURETTE - UN ART SCIENTIFIQUE DU LANGAGE - par Irène Sadowska-Guillon, Acteurs, No 86-87 - février 1991. SHAKESPEARE, QUÉBEC 1991; "LES REINES" -- par Wladimir Krysinski, Cahiers de théâtre JEU, No 60, septembre 1991, pp. 121-124. LES TERRITOIRES IMAGINAIRES DE NORMAND CHAURETTE - reprise de Provincetown Playhouse, juillet 1919, j'avais 19 ans - par Gilbert David, Le Devoir, Montréal, 7 mars 1992. Curriculum vitae Mis à jour le 18 avril 2017 PRINCIPAUX ARTICLES DE FOND SUR L'ENSEMBLE DES TEXTES DE NORMAND CHAURETTE (suite) DU TEXTE A LA SCÈNE, Provincetown Playhouse, juillet 1919, j'avais 19 ans, deux articles; 1- "A la lettre" par Gilbert David; 2- "Le triomphe de la beauté" par Marta Dickman; Cahiers de théâtre JEU, No 64, septembre 1992, pp. 123130. THÈSES, MÉMOIRES, MONOGRAPHIES De la création poétique à la spécificité théâtrale, analyse des deux premières pièces de Normand Chaurette, dramaturge québécois, Mémoire de Licence en Philologie par Marie DESTRAIT, 1983, Université de Louvain, Faculté de Philosophie et des Lettres. Le discours métathéâtral dans la dramaturgie québécoise des années 80, thèse de doctorat en Théâtre québécois contemporain par Luis ARAUJO, 1991, Université de Montréal, Faculté des Etudes Supérieures. La société de Normand Chaurette, figures et manières, publication du Théâtre Ubu dirigée par Jean-Michel Sivry réunissant des textes de Irène Sadowska-Guillon, Gilles Costaz, Gilbert David, Paul Lefebvre, Rodrigue Villeneuve, Larry Tremblay, Paula de Vasconcelos, Jean Marchand, Barbara Nativi, Stéphane Lépine, Denis Marleau, Denis Gougeon et Normand Chaurette. Montréal, 1996, Théâtre Ubu, 84 p. Riendeau, Pascal, La cohérence fautive, l'hybridité textuelle dans l'œuvre de Normand Chaurette, 1997, Montréal, Nuit Blanche éditeur, 168 p. VOIX ET IMAGE, printemps 2000 – Numéro consacré à Normand Chaurette. ANTHOLOGIES Gauvin, Lise, et Mailhot, Laurent, Anthologie des auteurs québécois, Les Presses de l'Université de Montréal, sous la dir. de Lise Gauvin et Jean-Cléo Godin, Montréal, 1987, PUM, pp. 123 à 126. Erman, Michel, et Wyczynski, Paul, Littérature canadienne française et québécoise, anthologie critique, Bordas, Beauchemin, 1992, pp. 412 - et 476 à 481. Hamill, Tony, You're Making a Scene, Scenes from Canadian Plays, Playrights Canada Press, Toronto, 1993, sous la direction de Tony Hamill, Ann Jensen, Marion Gilsenan et David Ferry, pp. 272 à 278.
<urn:uuid:b5dc0153-1113-4ca3-9144-4e171ae93011>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
44,194
VISTOS: A) Las atribuciones emanadas de Art. 24 de la Ley Orgánica Constitucional de Municipalidades, B) Las disposiciones de la Ley General De Urbanismo y Construcciones en especial el Art.116, su Ordenanza General y el Instrumento de Planificación Territorial. C) La solicitud de aprobación, los planos y demás antecedentes debidamente suscritos por el propietario y profesionales correspondientes al expediente P.OM.-22.214.171.124B N° 2023/568 ingresada con fecha 18-07-2023. D) El Certificado de Informaciones Previas N° 2508 de fecha 11-04-2022. E) El informe favorable de Revisor Independiente N° (cuando corresponda) F) Documento que acredita el cumplimiento de informes de mitigación de impactos al sistema de movilidad (En caso que sea obligatorio elaborar un IMIV): - Resolución N° de fecha , emitido por que aprueba el IMIV - Certificado N° de fecha , emitido por que implica silencio positivo, o el - Certificado N° 2220/2023 de fecha 20-05-2023, emitido por SBIM que acredita que el proyecto no requiere IMIV. (Según N° 16 del Art. 5.1.6. OGUC -exigible conforme a plazos del Artículo primero transitorio de la Ley N° 20.958-, no se puede conceder el presente permiso si no se acompaña alguno de estos documentos) G) Otros (especificar): RESUELVO: 1 Conceder permiso para modificar sin alterar la estructura, HABILITACION LOCAL COMERCIAL en 305,27 m2, con una superficie total de permiso original de 1366,93 m2 y que no se ve alterado por este permiso, de 2 pisos de altura, destinado a COMERCIO ubicado en calle / avenida / camino GREGORIO CORDOVEZ N° 687 - LOCAL 104 Lote N° Manzana Localidad o Loteo Sector URBANO Zona ZPT-1 del Plan Regulador COMUNAL (URBANO RURAL) Comunal o Internacional aprobando los planos y demás antecedentes, que forman parte de la presente autorización mencionados en la letra C de los VISTOS de este permiso. 2 Dejar constancia que la Obra que se aprueba NO APLICA los beneficios del D.F.L.-N°2 de 1959. (Mantiene o pierde) 3 ANTECEDENTES DEL PROYECTO 3.1 DATOS DEL PROPIETARIO | NOMBRE O RAZÓN SOCIAL DEL PROPIETARIO | R.U.T. | |--------------------------------------|--------| | INMOBILIARIA EMSA SA | | | REPRESENTANTE LEGAL DEL PROPIETARIO | R.U.T. | |-------------------------------------|--------| | MARÍA FERNANDA DECEBAL-CUZA | | | DIRECCIÓN: Nombre de la vía | Nº | Local/Of/Dpto | Localidad | |-----------------------------|----|---------------|-----------| | | | | | | COMUNA | CORREO ELECTRÓNICO | TELÉFONO FIJO | TELÉFONO CELULAR | |--------|--------------------|--------------|------------------| | HUECHURABA | | | | | PERSONERÍA DEL REPRESENTANTE LEGAL: | SE ACREDITÓ MEDIANTE | |-------------------------------------|----------------------| | ACTA REUNION DE DIRECTORIO | DE FECHA 05-07-2021 Y REDUCIDA A ESCRITURA PÚBLICA CON FECHA 12-08-2021 ANTE NOTARIO SR(A) JUAN CRISTIAN BERRIOS CASTRO (SUPLENTE) | 3.2 INDIVIDUALIZACIÓN DE LOS PROFESIONALES | NOMBRE O RAZÓN SOCIAL de la empresa del ARQUITECTO (cuando corresponda) | R.U.T. | |------------------------------------------------------------------------|--------| | | | | NOMBRE DEL PROFESIONAL ARQUITECTO RESPONSABLE | R.U.T. | |----------------------------------------------|--------| | DIANA PLANT LARSEN | | | NOMBRE DEL CONSTRUCTOR(*) | R.U.T. | |--------------------------|--------| | ARTICULO 1.2.1 O.G.U.C. | -- | Este documento ha sido firmado electrónicamente de acuerdo a la Ley N° 19.799. Para verificar la integridad y autenticidad de este documento diríjase al sitio https://firmadigital.domdigital.cl/ e ingrese el siguiente código: 030-231019-I91GBWSZ-S Sitio verificador | NOMBRE DEL INSPECTOR TÉCNICO DE OBRA (cuando corresponda según incisos 4 y 5 del Art. 143 LGUC) | INSCRIPCIÓN DEL REGISTRO | | --- | --- | | CATEGORÍA | N° | | NOMBRE DEL REVISOR INDEPENDIENTE (cuando corresponda) | REGISTRO | CATEGORÍA | (*) Podrá individualizarse hasta antes del inicio de las obras ### 4 CARACTERÍSTICAS PROYECTO DE OBRA MENOR MODIFICACIONES SIN ALTERAR SU ESTRUCTURA | EDIFICIOS DE USO PÚBLICO (original con modificación) | TODO | PARTE | NO ES EDIFICIO DE USO PÚBLICO | | AUMENTO EN LA CARGA DE OCUPACIÓN TOTAL QUE GENERA LA MODIFICACIÓN (personas) según artículo 4.2.4 OGUC. | 0 | | DENSIDAD DE OCUPACIÓN DE LA MODIFICACIÓN (personas/hectárea) | 0 | #### 4.1 DESCRIPCIÓN DE LAS OBRAS | BREVE DESCRIPCIÓN DE LAS OBRAS | LOCAL COMERCIAL, SE AGREGAN TABIQUES INTERIORES PARA INCLUIR RECINTOS INTERIORES DE ATENCIÓN Y SERVICIOS | | --- | --- | | TIPO DE OBRAS | EMPLAZADAS EN: | | --- | --- | | TABIQUES | 1° | SALA DE VENTAS Y VESTIDORES | | TABIQUES | -1° | TRASTIENDA, BODEGA, OFICINA | #### 4.2 SUPERFICIES | SUPERFICIE TOTAL DEL PREDIO (m²) | 627.75 | #### 4.3 PROTECCIONES OFICIALES | NO | SI, especificar | ZCH | ICH | ZOI | OTRO; especificar | | --- | --- | --- | --- | --- | --- | | MONUMENTO NACIONAL: | ZT | MH | SANTUARIO DE LA NATURALEZA | #### 4.4 CÁLCULO PRELIMINAR DEL PORCENTAJE DE CESIÓN DE LA MODIFICACIÓN (sólo en casos de proyectos de crecimiento urbano por densificación) Elige conforme a plazos del Artículo primero transitorio de la Ley N° 20.958 (artículo 2.2.5. Bis OGUC). | PROYECTO | PORCENTAJE PRELIMINAR DE CESIÓN | | --- | --- | | CON DENSIDAD DE OCUPACIÓN HASTA 8.000 Personas/Hectárea | (DENSIDAD DE OCUPACIÓN) 0 x 11 = 0 % | | CON DENSIDAD DE OCUPACIÓN SOBRE 8.000 Personas/Hectárea | 44% | Nota 1: En el proyecto de Obra Menor, Modificación sin alterar la estructura, se debe efectuar el cálculo solo de la presente Modificación. Nota 2: Para calcular la Densidad de Ocupación, se debe considerar la carga de ocupación (según art. 4.2.4. de la OGUC) que se incrementa en el o los terrenos del proyecto, sin considerar en el cálculo, la cantidad de personas que ocupaban las edificaciones existentes, incluso si estas fueran demolidas para materializar el proyecto. Sólo podrá descuentarse la carga de ocupación de edificaciones a demoler, en los casos que el permiso de demolición se solicite en forma conjunta con la solicitud de permiso de edificación, y se adjunten los antecedentes respectivos a dicha solicitud, conforme al inciso final del artículo 5.1.e. y al inciso 2º del artículo 8.1.4., ambos de la OGUC. Nota 3: La Densidad de Ocupación, se obtiene de la siguiente fórmula: \[ \text{Carga de ocupación del proyecto calculada según el art. 4.2.4. de la OGUC} \times 10.000 \] Superficie del terreno (que considera el terreno más la superficie exterior hasta el eje del espacio público adyacente existente o previsto en el IPT hasta un máximo de 30 m) #### 4.5 CÁLCULO ACUMULADO CON CESIONES O APORTES DE PERMISO(S) ANTERIOR(ES) (Art. 2.2.5. Bis C. de la OGUC) | PERMISO Nº | DE FECHA | PORCENTAJES DE CESIÓN O APORTE EFECTIVAMENTE EFECTUADOS | | --- | --- | --- | | | | % | | | | % | | PRESENTE MODIFICACIÓN (a) o (b) del cuadro 5.4 | - | 0 % | | (c) TOTAL CESIONES O APORTES ACUMULADOS | 0 % | #### 4.6 PORCENTAJE FINAL DE CESIÓN (Art. 2.2.5. Bis C. de la OGUC) | PORCENTAJE FINAL DE CESIÓN DE LA PRESENTE MODIFICACIÓN | 0 % | El porcentaje final de cesión corresponderá al porcentaje preliminar (detrás (a) o (b)) del cuadro 5.4 anterior, salvo que dicho porcentaje, sumado a los efectivamente efectuados en permisos anteriores (terra (c) del cuadro 5.3) supere el 44%. En este último caso, el porcentaje preliminar deberá rebajarse hasta que el acumulado sea de 44%. #### 4.7 CÁLCULO DEL APORTE (EN LOS CASOS QUE CORRESPONDA) | AVALÚO FISCAL VIGENTE A LA FECHA DE LA SOLICITUD DE LA MODIFICACIÓN, CORRESPONDIENTE AL O LOS TERRENOS (no se debe incluir valor de edificaciones existentes) | 0 | | PORCENTAJE DE BENEFICIO POR CONSTRUCTIBILIDAD | 0 | | AVALÚO FISCAL INCREMENTADO, CORRESPONDIENTE AL O LOS TERRENOS (*) [a] + [(e) x (f)] | 0 | | % FINAL DE CESIÓN [(d)] | 0 | | APORTE EQUIVALENTE EN DINERO [(g) x (d)] | 0 | (*) El Avalúo Fiscal debe incrementarse en la misma proporción que el aumento de constructibilidad obtenido por un beneficio normativo (inciso 2º art. 2.2.5. Bis C. OGUC) 5 DERECHOS MUNICIPALES (a) PRESUPUESTO (Aportado por el profesional competente que proyectó las obras) | | $ | $ | |--------------------------|--------|--------| | SUBTOTAL DERECHOS MUNICIPALES [(a) x (1,0% N° 3 del Art. 130 LGUC)] | | 145.000 | | DESCUENTO 30% CON INFORME DE REVISOR INDEPENDIENTE [(b) x (30%)] | (-) | 0 | | DESCUENTO MONTO CONSIGNADO AL INGRESO SOLICITUD | (-) | 0 | | TOTAL DERECHOS A PAGAR [(b) - (c) - (d)] | | 145.000 | GIRO INGRESO MUNICIPAL NÚMERO: 11882 FECHA: 12-10-2023 6 GLOSARIO D.F.L.: Decreto con Fuerza de Ley I.P.T: Instrumento de Planificación Territorial SAG: Servicio Agrícola y Ganadero D.S.: Decreto Supremo LGUC: Ley General de Urbanismo y Construcciones SEREMI: Secretaría Regional Ministerial EISTU: Estudio de Impacto Sistema Transporte Urbano MH: Monumento Histórico SEIM: Sistema de Evaluación de Impacto en Movilidad GIM: Giro de Ingreso Municipal MINAGRI: Ministerio de Agricultura ICH: Inmueble de Conservación Histórica MINVU: Ministerio de Vivienda y Urbanismo ZCH: Zona de Conservación Histórica IMIV: Informe de Mitigación de Impacto Vial MITT: Ministerio de Transportes y Telecomunicaciones ZOT: Zona de Interés Turístico INE: Instituto Nacional de Estadísticas OGUC: Ordenanza General Urbanismo y Construcciones ZT: Zona Típica NOTAS: (SOLO PARA SITUACIONES ESPECIALES) P.O.M. Nº52 DE 13.10.2023.SUP. DEL PREDIO 627,75 M2. / SUP. HABILITACION 305,27 / SUP. EDIF. 1.366,93 M2. NO HAY CRECIMIENTO URBANO, NO APLICA APORTE. DISTRIBUCIÓN. INTERESADO. CORRELATIVO DOM. EXP. Nº58/2023 FRZ/CSC/MNP/MAR/AOC,- FERNANDO RUIZ ZAMARCA DIRECTOR DE OBRAS FIRMA Y TIMBRE FRZ/MNP/MAR
<urn:uuid:ae3b67b3-cd79-4f21-9663-3017885d8062>
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
9,974
Viking Eggeling och Diagonalsymfonin – en dematerialisering av konstobjektet Av: Jimmy Pettersson Handledare: Cecilia Strandroth Abstract: The aim of this thesis is to study Viking Eggeling’s artwork *Diagonal Symphony* together with Eggeling’s own art theoretical writings. This method of reading Eggeling’s art theoretical writings with the aim to try and create a deeper understanding of his art and especially *Diagonal Symphony* is a new approach in Eggeling’s art historical discourse. The thesis starts with a description of how the field of art history has understood Eggeling and his art primarily through art historical research aimed at Hans Richter. I then argue that the method of understanding Eggeling’s art through his own art historical writings is a way to create an independent understanding about Eggeling’s art away from its explanatory relation with Richter. To understand and to analyze the relation between Eggeling’s art and art theoretical writings the thesis theoretical viewpoint are a system theoretical one with a special focus on cybernetics and the terms feedback and control. The thesis then establish that Eggeling, in his art and art theoretical writings, tried to compose his own method for creating the form figures we can see appearing in *Diagonal Symphony* and that this method of creating form was a way for Eggeling to control his creativity and to build up a structured system of forms. The study then concludes with the statement that Eggeling worked with the movie and the scrolls *Diagonal Symphony* as artistic material formations of a system of forms called *Diagonal Symphony* and that the system of forms called *Diagonal Symphony* is the result of Eggeling’s systematic method to generate form in a structured and organised way. Keywords: Viking Eggeling, Hans Richter, art history, systems theory, system, cybernetics, feedback, systems aesthetics, universal language, Diagonalsymfonin, Diagonal Symphony, Symphonie Diagonale Innehåll 1. Inledning s. 2 Syfte s. 2 Teori och Metod s. 4 Forskningsläge s. 6 Material s. 8 2. Viking Eggeling s. 13 Viking Eggeling åren 1880 - 1919 s. 13 Viking Eggeling åren 1919 - 1925 s. 16 3. Receptionen av Diagonalsymfonin s. 20 Tidig forskning om Diagonalsymfonin s. 20 Diagonalsymfonin tolkad som Universellt språk, Absolut konstverk och Kommunikationsmaskin s. 22 Diagonalsymfonin, en konstruktivistisk film s. 25 4. Analysens början, en introduktion av Generalbasen s. 31 En början mot en Generalbas s. 31 Generalbas s. 32 5. Diagonalsymfonin, ett system av relationer s. 35 Cybernetik s. 36 Första formen, ett öppet system av relationer, en beskrivning av ett hur s. 37 Det första tinget s. 37 Kontrollen över formen s. 42 En balans mellan ordning och kaos s. 43 Diagonalsymfonin, en dematerialisering av konstens objekt s. 46 6. Sammanfattning s. 50 7. Litteratur s. 52 Tryckta källor s. 52 Övriga källor s. 55 8. Bildförteckning s. 56 1. Inledning Viking Eggeling var en svenskfödd konstnär som under sin levnadstid ständigt umgicks med och arbetade i det europeiska avantgardets framkant. Eggeling var tillsammans med Hans Richter en av dem som under 1900-talets andra decennium utvecklade de första abstrakta konstfilmerna och hans film *Diagonalsymfonin* är tillsammans med Ingmar Bergmans de enda svenska filmer som är självskrivna i den internationella filmvetenskapen. Den konsthistoriska berättelsen om Eggeling är en berättelse som naturligt har växts in i det europeiska avantgardets historia. Men, jag frågar mig om det inte bakom den bild som historieskrivningen har tecknat fortfarande finns något att upptäcka i Eggelings konstnärskap. Under sin levnadstid publicerade Eggeling konstteoretiska artiklar och hans anteckningsböcker finns bevarade hos Yale University Art Gallery. Trots att dessa anteckningar är bevarade och publicerade så har det historiskt sett skett en förvånansvärd liten forskningsinsats mot dem och de har ansetts vara en avvikande del i hans konstnärliga verksamhet. Jag anser tvärtom att Eggelings anteckningar är en öppning och en möjlighet till att utforska hans komplexa konstnärskap. Det jag upplever när jag läser dessa ouppmärksammade konstteoretiska skrifter är en konstnär som försöker bryta sig fri från konstnärliga traditioner för att själv utforska och utveckla regler för hur konst kan skapas och vad konst kan tänkas vara. Jag kommer att se det som denna rapportens övergripande mål att utforska denna upplevelse och söka förklara hur Eggelings konst samverkar med hans skrifter om konst. Syfte Den huvudsakliga motiveringen till rapportens relevans är att tidigare forskning kring Viking Eggelings konstverk *Diagonalsymfonin* bundit sina analyser av verket mot tanken att detta konstverk, med sina abstrakta figurer, är Eggelings sökande och experimenterande mot ett rent och strukturellt universellt formspråk i en konstruktivistisk anda. Konstverken som Eggeling skapade under det sena 1910-talet och det tidiga 1920-talet har länge förståtts utifrån tolkningen att Eggeling tillsammans med Hans Richter sökte efter ett strukturellt språk där varje form var bestämd och hade en transcendental egenskap, att ett kommunicerbart objektivt formspråk var deras mål. Som flertalet manifest berättar och konsthistoriker har visat så var sådana mal inget nytt inom det tidiga 1900-talets konstvärld utan var för många av avantgardes abstrakta konstnärer en naturlig retorik. Men, om man närläser Eggelings egna konstteoretiska skrifter så kommer en annan sida av hans konstnärskap fram, en sida som jag anser inte stämmer överens med den rådande bilden av Eggeling. Anledningen till detta är att Eggelings egna konstteoretiska skrifter har förpassats till bakgrunden när tidigare forskning har försökt skapa en förståelse av hans konstnärliga verksamhet. Jag tror mig urskilja två huvudsaker till detta, dels att hans skrifter är författade på flera olika språk som ofta blandas i en och samma text samt att dessa anteckningar har en fragmentarisk struktur och inte karaktären av en sammanhållen helhet. Den andra möjliga anledningen torde vara att Eggeling i regel har placerats i ett större konsthistoriskt sammanhang där det är han som ska passas in i en färdig kontext. Eggelings person och konst har då ofta tolkats i en underordnad relation till andra konstnärer och konstnärliga grupperingar. Att Eggelings konstnärliga produkter befinner sig i ett gränsland mellan konstvetenskap och filmvetenskap kan sannolikt också ha haft en negativ effekt på forskarvärldens intresse. Rapportens inledande tes är att Eggelings konstverk *Diagonalsymfonin* inte är ett exempel på ett första trevande steg mot ett strikt strukturellt formspråk att jämföra med alfabetet eller musikens toner. Jag vill i min rapport ta mig förbi dessa tidigare tolkningar av *Diagonalsymfonin* för att analysera konstverket och Eggelings egna konstteoretiska texter utifrån ett alternativt teoretiskt perspektiv. Jag vill göra detta för att väcka konstverket ur dess traditionella tolkning och visa att det finns något att upptäcka i den relation som finns mellan Eggelings konstteoretiska texter och *Diagonalsymfonin*. För att skapa en ny förståelse av konstverket *Diagonalsymfonin* och visa på dess nära relation med Eggelings konstteoretiska skrifter anläggs ett systemteoretiskt perspektiv på detta material. Anledningen är att jag anser att konstverket, genom att förstås utifrån en systemteoretisk begreppsbildning, uppvisar en helt annan karaktär som enligt min uppfattning befinner sig i en större harmoni med Eggelings egna konstteoretiska texter än tidigare tolkningar. Att tolka utifrån tanken om system i relation till Eggeling och *Diagonalsymfonin* är något jag finner i bakgrunden i ett par källor men det är aldrig ett resonemang som lyfts fram, formuleras eller utforskas kritiskt. Malcolm le Grice skrev redan år 1977, i sin studie *Abstract Film and Beyond*, tillsynes oreflekterat och i förbifarten att *Diagonalsymfonin* "[…]seem to have most in common with the programmed, systematic and conceptual art of a more recent period."¹ Rapportens huvudtes är att konstverket *Diagonalsymfonin* grundar sig på och existerar i relation till en systematisk struktur och att denna struktur formade och styrde Eggelings konstnärliga arbete. Att konstverket *Diagonalsymfonin* grundar sig på ett komplext formfödande system och att detta system, utifrån de av Eggeling definierade reglerna, genererar de visuella former som filmen visar. Det jag vill lyfta fram och djupare förklara är hur sambandet mellan det rationella och det irrationella, det ordnade och det oordnade, utgör grunden i Eggelings konstnärliga filosofi och hur denna filosofi präglar *Diagonalsymfonin*. Att då förstå detta konstverk genom en terminologi grundad i systemteori anser jag vara nödvändigt för att lyckas vidga förståelsen om hur Eggeling arbetade. Den fråga som jag medvetet lämnat utanför undersökningen är frågan om *varför* Eggeling valde att skapa den systematiska struktur som jag hävdar existerar i relation till och utgör konstverket *Diagonalsymfonin*. Anledningen till detta förfarande är att rapporten inte har som sitt syfte att fråga *varför* utan *hur*. Att fråga *hur* istället för *varför* har att göra med min vilja att förstå *Diagonalsymfonin* utifrån tanken om ett system och mina frågor kommer att ställas utifrån ett systemteoretiskt perspektiv som behandlar *hur* ett system blir till och *hur* det verkar. Även om mitt sökande efter ett *hur* möjligtvis kommer att ge antydningar om ett *varför* är det frågan om ett *hur* som alltid kommer att vara i rapportens fokus. Denna rapports huvudsakliga syfte är således att med en systemteoretisk begreppsflora analysera den förklarande relationen som finns mellan Eggelings egna konstteoretiska utsagor och hans konst med syftet att skapa en ny förståelse för både hans konstteoretiska utsagor och hans konstverk *Diagonalsymfonin*. **Teori och Metod** Rapporten tar alltså sin teoretiska utgångspunkt i en systemteoretisk begreppsbildning. Inom det konstvetenskapliga fältet är systemteori inget nytt teoretiskt perspektiv utan dess första analytiska rötter finns i den angloamerikanska konstkritiken från slutet av sextioalet. Inom den angloamerikanska konstdiskursen användes ett systemteoretiskt --- ¹ Le Grice, Malcolm, *Abstract film and beyond*, Studio Vista, London, 1977, s. 24. tänkande av vissa konstkritiker för att förklara hur viss konst under den tiden kunde förstås förhålla sig till det som kallades en *systemets estetik*.\(^2\) Konstkritikern Jack Burnham beskrev i sin då nydanande artikel ”Systems Esthetics” hur ”[w]e are now in a transition from an *object-oriented* to a *systems-oriented* culture. Here change emanates, not from *things*, but from the *way they are done*.”\(^3\) Jag kommer inte att ta dessa tidiga artiklar som teoretiska modeller färdiga att tillämpas inom ramen för denna studie utan jag kommer att använda dessa tidiga analysers bruk av systemteori som ett kreativt bollplank i min analys av *Diagonalsymfonin* och Eggelinges konstteoretiska skrifter. I min tillämpning av systemteoretiska begrepp använder jag mig framför allt av begreppsförklaringar ur Francis Halsalls studie *Systems of Art: Art, History and Systems Theory* och Norbert Wieners forskningsarbeten *Cybernetics or control and communication in the animal and the machine* och *The human use of human beings: cybernetics and society*.\(^4\) Halsall utforskar i *Systems of Art* den verkan som ett systemteoretiskt angreppssätt kan ha inom konstvetenskapen. Halsall har delat upp studien i flera kapitel där han i varje kapitel visar på hur systemteori kan användas som ett verktyg inom konstvetenskapen. Halsall ger förslag på och visar hur ett systemteoretiskt perspektiv kan skapa en alternativ förståelse för konstvärlden, konsthistorieskrivningen och konstobjektet. Norbert Wieners båda studier är de som etablerade det systemteoretiska fältet cybernetik och i dessa studier så skapar Wiener en förståelse och en begreppsbildning för teorier om styrning och kontroll inom ett system. Wiener rör sig fritt över olika vetenskapliga fält och berör allt från biologiska, teknologiska och sociala system för att inom dessa vitt skilda områden visa på cybernetikens tvärvetenskapliga funktion och förklarande värde. Jag kommer även att förhålla mig till andra teoretiska texter men dessa två forskare är de som främst kommer att präglra rapportens teoretiska riktning. För att kunna finna och etablera en egen plats för denna rapports analys av *Diagonalsymfonin* att verka inom så kommer jag först att sammanställa och undersöka tidigare forskning om konstverket. Jag kommer att söka visa på hur denna forskning har bundit sina analyser av Viking Eggeling och *Diagonalsymfonin* i en underordnad kontextuell relation mot andra konsträrer och konstmärliga grupperingar. --- \(^2\) Se bland annat Bochner, Mel, ”The Serial Attitude” *Artforum*, nr. 4, 1967, s. 28-33, Burnham, Jack W. Burnham, ”Systems Esthetics” *Artforum*, vol. 7, nr. 1, 1968, s. 30-35 & Burnham, Jack, *Beyond modern sculpture: the effects of science and technology on the sculpture of this century*, 2. pr., Braziller, New York, 1969. \(^3\) Burham, 1968, s. 31. [Kursivt i original] \(^4\) Halsall, Francis, *Systems of art: art, history and systems theory*, Peter Lang, Bern, 2008, Wiener, Norbert, *Cybernetics or control and communication in the animal and the machine*, 2. ed., MIT Press, New York, 1961 & Wiener, Norbert, *The human use of human beings: cybernetics and society*, Houghton Mifflin, Boston, 1950. Jag kommer efter min beskrivning och analys av tidigare forsknings tolkningar av *Diagonalsymfonin* att söka etablera en egen tolkning av konstverket tillsammans med Eggelings egna konstteoretiska texter. Dessa artiklar och anteckningar har en mycket fragmentarisk och lakonisk språklig struktur och de innehåller ibland resonemang som har en motsägelsefull relation till andra resonemang i texten. Eftersom Eggelings texter har denna språkliga struktur, med få gränser och en stor öppenhet för tolkning, så kommer jag, i min användning av dessa texter, att hela tiden förhålla mig till hur de stycken och meningar jag finner intressanta relaterar till texten som helhet och de intilliggande styckena. Jag kommer i min tolkande akt att hela tiden att ställa mig frågan om min tolknings giltighet i relation till texten som helhet. Rapportens huvudsakliga undersökande metod kommer således att vara en analys av konstverket *Diagonalsymfonin* i samverkan med en textanalys av Eggelings egna konstteoretiska skrifter i anslutning till det övergripande systemteoretiska perspektivet. **Forskningsläge** Rapportens huvudkälla för information om Viking Eggeling är Louise O’Konors doktorsavhandling *Viking Eggeling 1880-1925 Artist and Film-Maker Life and Work* som framlades år 1971 vid Stockholms Universitet.\(^5\) Denna avhandling är nödvändig att läsa i forskning riktad mot Eggeling och *Diagonalsymfonin* eftersom den har en explorativ forskningskaraktär. I avhandlingen har O’Konor sammanställt en stor mängd tidigare utspridd information om Eggelings liv och konstnärliga verksamhet, publicerat Eggelings konstteoretiska skrifter och sammanställt den hittills mest kompletta katalogen över Eggelings konstnärliga produktion. Avhandlingen är ett standardverk för information om Eggeling då den inom konst och filmvetenskapen är den enda källa som hittills sammanställt och skrivit Eggelings konsthistoria. En orsak till att avhandlingen fick en omedelbar internationell uppmärksamhet är att O’Konor granskade vad som hände med Eggelings konstnärliga arbeten efter hans död. I avhandlingen och med hög akribi hävdar O’Konor att Hans Richter, efter Eggelings död, kopierat vissa av Eggelings konstverk och sålt dessa som originalverk till olika museer i Europa och USA och hur Richter har klippt bort bildrutor och ändrat i en tidig kopia av \(^5\) O’Konor, Louise, *Viking Eggeling 1880-1925 Artist and Film-Maker Life and Work*, Almqvist & Wiksell, Stockholm, 1971. filmen *Diagonalsymfonin* som sedan spridits över hela världen. O’Konor ger även exempel på hur vissa av Richters utsagor om hans och Eggelings konstnärliga äventyr kan tolkas annorlunda genom att använda sig av andra historiska källor än Richters egen berättelse.\(^6\) Richter har kommenterat avhandlingen i en recension som i vissa avsnitt är informativ då Richter oväntat tillskriver Eggeling den teoretiskt kreativa delen i deras konstteoretiska publiceringar men recensionen är i stort en polemisk skrift mot O’Konors avhandling. ”It is much less a scholarly book than a personal pamphlet disguised as art historical research”, skriver Richter och fortsätter, ”[i]t is a perfect example of how art history should not be written: prejudiced and without respect for facts if the facts do not fit the pretext of the writer.”\(^7\) John E. Jones recension kan i detta fall agera som en kontrast och visa på hur konstvetenskapen som akademiskt forskningsämne tog emot avhandlingen. Jones beskriver hur: “O’Konors book goes a long way to dispel our ignorance. In the best tradition of objective art-historical detective work, it brings together all the facts a tenacious researcher can dig out before the sources dry up. [...]the book has that thoroughness of documentation of original source material that characterizes the best academic work.”\(^8\) Jag kommer i rapporten att varken ifrågasätta O’Konors avsikt eller hennes resultat utan instämmer med den uppsjö av tidigare konst- och filmvetare som refererar till avhandlingen och ser den som en oubärlig källa för information i sin forskning. Till skillnad från O’Konors forskning, som var först med att endast rikta sig mot Eggeling, finns ett större material där han nämns dels i relation till Hans Richter dels i ett mer jämförande och generellt konst- och filmhistoriskt sammanhang och där han i regel behandlas utan djupare analytiska ansatser. Den allmänna konsthistoriska förståelsen av Eggeling och *Diagonalsymfonin* har som rapporten kommer att visa sin grund i texter som främst fokuserar på Richter. I dessa studier utvecklas tolkningsar av Richters konstnärliga verksamhet som sedan används för att även förklara Eggelings konst. I de texter som behandlar Richter och Eggeling, tillsammans eller var för sig, anses detta tolkningsförfarande vara normalt då de under en --- \(^6\) O’Konor, 1971, s. 58-71. \(^7\) Richter, Hans, ”A Review Article”, *The Journal of Aesthetics and Art Criticism*, Vol. 30, Nr. 4, 1972, s. 545. \(^8\) Jones, John E., [utan titel], *Leonardo*, Vol. 7, Nr. 1, 1974, s. 81. För ytterligare en recensents försvar av O’Konors avhandling se Reveaux, Anthony, [utan titel], *Film Quarterly*, Vol. 29, Nr. 4, 1976, s. 29. tid arbetade tätt tillsammans. Att Eggeling avled i en tidig död och inte hade möjligheten att med egna ord uttala sig i artiklar, böcker och intervjuer, som Richter sedan gjorde om deras konstnärliga verksamhet tillsammans, bör sannolikt ha påverkat detta. De utsagor som jag anser vara av största betydelse i förståelsen av Eggeling idag är fortfarande de uttalanden som Richters gjort om deras tid tillsammans och vad de ville med sin konst. Dessa olika uttalanden har sedan femtiotalet präglat förståelsen av vad både Richters egna och Eggelings konstnärliga arbete ämnade åstadkomma. Två aktuella studier som sökt skapa en ny förståelse för Richters konst har likaså både direkt och indirekt även påverkat förståelsen för Eggeling. Dessa båda studier är *Harmony and Dissent: Film and the Avant-Garde Movements in the Early Twentieth Century* av Bruce R. Elder och antologin *Hans Richter.* Förutom dessa två studier kommer rapporten i sin undersökning av den forskning som tidigare ägnats åt Eggeling att självklart presentera och analysera ytterligare texter. **Material** Det huvudsakliga analysobjektet och materialet i denna studie är de faktiska konstverken (bildrullarna och filmen) *Diagonalsymfonin* och de konstteoretiska texter som skrevs av Viking Eggeling. *Diagonalsymfonin* är namnet på en film som har en speltid på cirka 8 minuter och som innehåller ett flertal olika abstrakta former som visas efter varandra. I filmen *Diagonalsymfonin* framträder och förändras flera olika vita geometriska former mot en svart bakgrund i en ständig rörelse. Denna rörelse gör det svårt för betraktaren att fokusera och urskilja en enskild bestämd form utan upplevelsen av filmen kan beskrivas som visualisering av formernas ständiga utveckling. Bild. 1. Viking Eggeling, *Diagonal Symphony I*, 50x534cm, Kunstmuseum Basel. --- 9 Elder, R. Bruce, *Harmony and Dissent: Film and the Avant-Garde Movements in the Early Twentieth Century*, Wilfred Laurier University Press, Canada, 2008 & Foster, Stephen C., (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998. 10 För att till fullo förstå rapporten, då en textbaserad beskrivning av filmen i sin helhet inte på något sätt skulle kunna likställas med upplevelsen av att se den, så rekommenderar författaren er att se filmen *Diagonalsymfonin*. Filmen finns representerad i Moderna Museet i Stockholms samlingar men för en kortare version av filmen se <http://www.ubu.com/film/eggeling.html> [2010-10-28]. Enligt tidigare forskning har filmen *Diagonalsymfonin* sitt ursprung i en samling av fyra sammanhängande bildrullar som Eggeling också namngav *Diagonalsymfonin* och som han skapade innan han påbörjade filmen *Diagonalsymfonin*. Dessa två olika men sammankopplade konstverk delar förutom sitt gemensamma namn även samma uppsättning av abstrakta figurer som visas i dem. De mycket långa bildrullarna *Diagonalsymfonin* (se bild 1) är teckningar som är avsedda att läsas från vänster till höger och visar även de tydliga drag på tanken om formernas utveckling. Dessa bildrullar nämns emellertid sparsamt i tidigare forskning och de förklaras i regel som tidiga arbetsskisser alternativt som en synopsis till filmen *Diagonalsymfonin* och jag kommer, när det är nödvändigt, att skilja dem åt genom att skriva *bildrullarna Diagonalsymfonin* eller *filmen Diagonalsymfonin*. När filmen *Diagonalsymfonin* visades för första gången inför en privat publik är ett omtvistat faktum men dess första visning för allmänheten skedde den 3 Maj år 1925 på UFA-Theater am Kurfürstendamm i Berlin tillsammans med bland andra Hans Richters film *Film ist Rhythmus*, Walther Ruttmans filmer *Opus 2, 3* och *4* samt Fernand Léger och Dudley Murphys film *Ballet Mécanique*.¹¹ Det finns till dags dato inte ett känt original av Eggelings film *Diagonalsymfonin* som direkt kan kopplas samman med den film som visades år 1925 utan endast ett flertal olika versioner som i sin tur inte är identiska med varandra. Den version av filmen *Diagonalsymfonin* som rapporten kommer att förhålla sig till är den mest kända och den finns representerad i Moderna Museet i Stockholms samlingar.¹² Att jag endast kommer förhålla mig till en av versionerna i min analys innebär inget större problem då de skillnader som finns kopiorna sinsemellan ofta inte är märkbara och de skillnaderna som finns påverkar inte heller denna studies analys. Vad som har hänt med Eggelings konstnärliga arbeten och hur de efter hans död, av hans konstnärskollegor, har förvaltas är i sig själv ett forskningsområde. Denna rapport kommer inte heller att förhålla sig kritiskt till frågor angående filmen *Diagonalsymfonins* förändring efter Eggelings död utan acceptera filmen *Diagonalsymfonin* så som den existerar idag och se den som en nära referens till hur den såg ut då.¹³ Rapportens andra huvudsakliga material är de två konstteoretiska artiklar som --- ¹¹ O’Konor, 1971, s. 53. ¹² Eggelings konstnärliga kvarlåteneskap är spridd över hela världen och de främsta samlingarna finns vid Moderna Museet i Stockholm, Kunstmuseum i Basel, Yale University Art Gallery och Musée National d’Art Moderne i Paris, dessutom finns i Sverige och troligen också i Schweiz ett flertal verk i privat ägo. ¹³ Frågan om hur filmen *Diagonalsymfonin* kan ha förändrats efter Eggelings död finns upptagen i följande artikel i det franska cinematekets tidskrift: Auger, Pascal, "Histoire d’une falsification. La Symphonie diagonale, Viking Eggeling (1925-1927-1941)" *Cinémathèque*, nr. 11, 1997, s. 84-93. Eggeling publicerade, de bevarade konstteoretiska anteckningar som Eggeling privat skrev ned och utkastet till pamfletten *Universelle Sprache* som Eggeling tillsammans med Richter publicerade år 1920. Artiklarna och anteckningarna har sammanställts och publicerats av Louise O’Konor i hennes doktorsavhandling och dessa anteckningar grundar sig på de fotostatkopior som Carl Nordenfalk är 1950, i samband med Eggelingutställningen på Nationalmuseum samma år, fick av Hans Richter.\(^{14}\) Originalmaterialet till dessa fotostatkopior finns nu bevarade hos Yale University Art Gallery som en del i den samling av Eggelings kvarlatenskap som Richter deponerade där. Utkastet till pamfletten *Universelle Sprache* som publicerades år 1920 finns utgiven i faksimil i antologin *Hans Richter* med en översättning från tyska till engelska av Harald Strader, detta utkast har även kommenterats av Richter i artikeln ”My Experience with Movement in Painting and Film.”\(^{15}\) Den artikel som Eggeling publicerade under eget namn i tidskriften *M/A*, år 1921 har titeln ”Elvi fejtegetések a mozgóművészetről” vilket av O’Konor har översatts dels på svenska till ”Principiellt om rörelsekonsten” och dels på engelska till ”Theoretical presentations of the art of movement”. \(^{16}\) Eggelings artikel överensstämmer förutom ett tillagt stycke med den artikel som Richter publicerade under sitt namn i tidskriften *De Stijl* med titeln ”Prinzipielles zur Bewegungskunst”. \(^{17}\) O’Konor beskriver i sin avhandling hur hon är övertygd om att Eggeling är ensam författare till denna artikel trots att Richter står som författare på en av dess publiceringar. O’Konor förankrar sin tolkning i att Eggelings artikel ursprungligen skrevs på tyska av Eggeling och att den stilistiskt och innehållsmässigt stämmer överens med resten av Eggelings texter. O’Konor skriver “[p]ersonally I regard *Theoretical presentations of the art of movement* as Eggeling’s spiritual property.” och hur artikeln ”[b]oth in spirit and in its choice of words this part also conforms to Eggeling’s other writings.”\(^{18}\) O’Konor pekar även på att Richters text --- \(^{14}\) O’Konor, 1971 & Nordenfalk, Carl & Richter, Hans (red.), *Viking Eggeling 1880-1925: Tecknare och filmkonstnär : 27 oktober-19 november*, Nationalmuseum, Stockholm, 1950. \(^{15}\) Eggeling, Viking & Hans Richter, ”Demonstration of the ‘Universal Language”, Foster, Stephen C. (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 184-240. Harald Stadlers översättning av Eggeling, Viking & Hans Richter, [okänd titel], [utan datering] & Richter, Hans, ”My Experience with Movement in Painting and Film” Kepes, Gyorgy (red.), *The nature and art of motion*, Braziller, New York, 1965, s. 142-157. \(^{16}\) Eggeling, Viking, ”Principielt om rörelsekonsten” i O’Konor, 2006, s. 77-80. Louise O’Konors översättning av Eggeling, Viking, ”Elvi fejtegetések a mozgóművészetről” *M/A*, vol. 6, nr. 8, 1921, s. 105-106. \(^{17}\) Richter, Hans, ”Prinzipielles zur Bewegungskunst.” *De Stijl*, vol. 4, nr. 7, 1921, s. 109-112 i O’Konor, 1971, s. 90-91. \(^{18}\) O’Konor, 1971, s. 70. [Kursivt i original] publicerades efter att en meningsskiljaktighet hade fått Eggeling att flytta ifrån Richters föräldrars hus där de tillsammans arbetade och bodde.\textsuperscript{19} Den andra artikeln skrevs tillsammans med Raoul Hausmann och publicerades år 1923 med titeln "Zweite präsentistische Deklaration. Gerichtet an die internationalen Konstruktivisten" i tidskriften \textit{MA}.\textsuperscript{20} Denna artikel, som O'Konor har översatt till \textit{Andra presentistiska deklarationen. Riktad till de internationella konstruktivisterna}, har mer karaktären av ett manifest och vänder sig med en avståndstagande och polemisk attityd mot konstruktivismen. De av Eggeling efterlämnade anteckningarna har O'Konor i sin avhandling, efter Eggelings övergripande struktur, samlat och delat in i fyra olika avsnitt. Två av dessa avsnitt har Eggeling själv rubricerat med rubrikena "Film" och "Gemeinschaft" och två av dessa har O'Konor själv rubricerat med "On the spiritual element in man. On different methods of composition" och "On composition. On criticism" då de saknade rubricering av Eggeling. Förutom dessa fyra avsnitt finns det ytterligare sju separata blad med ett par skisser och textavsnitt på varje sida. Texterna "Film", "Gemeinschaft" och "On the spiritual element in man. On different methods of composition" finns översatta till svenska i den skrift O'Konor gav ut år 2006. Av texten "On composition. On criticism" finns mindre delar översatta till svenska i den artikel O'Konor publicerade år 1967 i tidskriften \textit{Konstrevy} men rapporten kommer att i stor del förlita sig på författarens egna översättningar av ”On composition. On criticism” och de sju separata bladen.\textsuperscript{21} I dessa anteckningar framgår det inte under vilka år de är författade och forskare har i efterhand inte heller lyckats med att datera dem. För att kortfattat beskriva innehållet så består avsnittet med rubriken ”Film” nästan uteslutande av fria citeringar ur filosofen Henri Bergsons text \textit{L'évolution créatrice} som publicerades år 1907 och till dessa citeringar följer kommentarer av Eggeling.\textsuperscript{22} Avsnittet med rubriken ”Gemeinschaft” handlar om konstens gemensamma och andliga betydelse för människan. Eggeling citerar den tyska konsthistorikern Wilhelm Worringer och hans studie \textit{Abstraktion und Einfühlung} som publicerades år 1907 när han diskuterar kring \textsuperscript{19} O'Konor, 1971, s. 70. \textsuperscript{20} Hausmann, Raoul & Eggeling, Viking, ”Andra presentistiska deklarationen. Riktad till de internationella konstruktivisterna” i O'Konor, 2006, s. 81-85. Louise O'Konors översättning av Hausmann, Raoul & Eggeling, Viking, ”Zweite präsentistische Deklaration. Gerichtet an die internationalen Konstruktivisten” \textit{MA}., vol. 8, 1923. \textsuperscript{21} O'Konor, 2006 & O'Konor, Louise, ”Översättning av Viking Eggeling”, \textit{Konstrevy}, nr. 4., 1967. \textsuperscript{22} Bergson, Henri, \textit{Creative evolution}, Holt, New York, 1911. relationen mellan abstrakt och föreställande konst.\textsuperscript{23} "On the spiritual element in man. On different methods of composition" innehåller väldigt många olika tankar om konstens syfte och det är svårt att återge en sammanfattad helhet av avsnittet, Eggeling citerar i detta avsnitt en passage ur kompositören Ferruccio Busoni essä \textit{Entwurf einer neuen Ästhetik der Tonkunst} som publicerades år 1907 när Busoni befann sig i Berlin.\textsuperscript{24} Avsnittet "On composition. On criticism" kan i sin början liknas vid utkastet till pamfletten \textit{Universelle Sprache} då både strukturen och innehållet i avsnittet liknar pamfletten. På varje sida i början av denna text finns det flera små skisser av geometriska figurer som förändras och utvecklas och till dessa figurer tillkommer flera korta kommentarer, precis som i pamflettens utkast. Avsnittet avslutas även med en kortare text där Eggeling diskuterar relationen mellan konstnär, kritiker och publik samt vad som krävs av dem som innehar dessa roller. Det är tydligt när man läser dessa artiklar och anteckningar att Eggeling var en person som tog del av konstdebatten som pågick under 1900-talets två första decennier. Eggeling hade onekligen den teoretiska förmågan att både formulera sina egna tankar om konst och analysera andra författares teoretiska texter om konst. "I would consider", skriver Malcolm Le Grice, "Eggeling to have been the more advanced artist, clearer about his intentions, and the nature of his artistic problems" i sin jämförelse mellan Richter och Eggeling.\textsuperscript{25} \begin{footnotesize} \begin{enumerate} \item Worringer, Wilhelm, \textit{Abstraction and empathy}, Ivan R. Dee Publisher, Chicago, 1997. \item O’Konor, 1971, s. 80. \item Le Grice, 1977, s. 20. \end{enumerate} \end{footnotesize} 2. Viking Eggeling Syftet med denna sammanfattande inledning av Viking Eggelings konstnärliga liv och utveckling är att ge läsaren en bakgrund och en förståelse för den konstnärliga kontext Eggeling verkade inom. Fokus kommer att ligga på den avantgardistiska miljö som Eggeling ständigt befinner sig inom och tillsammans arbetar med, hur Eggeling hela tiden är intresserad av och söker sig mot en ny konst som i slutet genererade konstverket Diagonalsymfonin. Denna inledning till Eggeling är indelad i två delar, innan och efter Hans Richters entré i Eggelings liv, med anledning av att hans konstnärliga verksamhet tog en vändning i och med hans vänskap med Richter. Kapitlets främsta källa är Louise O’Konors doktorsavhandling om Eggeling och anledningen till att huvudsakligen använda en snart 40 år gammal källa är att den fortfarande är ett portalverk in i fältet och att ingen efter henne har format en ny berättelse om Eggeling eller på ett betydande sätt reviderat den som finns. Viking Eggeling åren 1880-1919 Viking Eggeling, född år 1880 och död år 1925, tog sina första steg mot att bli en del av det europeiska avantgarden när han sexton år gammal emigrerade från Sverige och sin födelsestad Lund.\(^{26}\) Under dessa första år utanför Sverige finns inte så mycket kännedom om vad Eggeling gjorde förutom att han i den tyska staden Flensburg började studera handelslära. O’Konor menar att Eggelings val att studera handelslära "was of course not from choice, but because he was driven by the necessity of securing a livelihood" och att valet föddes ur "a desire and a compelling urge to create, struggling with the need of providing the necessaries of life."\(^{27}\) Eftersom Eggeling var en mycket språkkunnig person och talade tyska, franska och italienska var Västeuropa ett område där han kunde göra sig förstådd och som hans levnadsteckning visar så rörde han sig ganska fritt under hela sin livstid. Efter studietiden i Flensburg finns inte många klara spår efter Eggeling men genom att pussla samman olika källor har O’Konor styrkt påståendet att Eggeling först arbetade som \(^{26}\) O’Konor, 1971, s. 14. \(^{27}\) O’Konor, 1971, s. 21. bokhållare i Schweiz innan han till sist från år 1901 till 1907 fann en stabilitet i tillvaron och arbetade som bokhållare i Milano, Italien.\textsuperscript{28} Under tiden i Milano var Eggelings egna konstnärliga arbete mest fokuserat på måleri och landskapsmotiv men han studerade även konsthistoria vid en akademi, det var även här som hans egen övertygelse om konsten började formas.\textsuperscript{29} I ett brev till sin syster, daterat år 1902, finns spår av de tankar som jag anser berättar mycket om hans personliga övertygelse om konsten, en övertygelse som genomstrålar hans vuxna liv och som lyfts fram ännu tydligare i Eggelings senare texter. Eggeling beskriver i brevet hur han uppfattar konstnärens villkor och mål. Han skriver: \begin{quote} huru jag önskade att kunna tala med någon av mina syskon, tala om mina planer, för jag har ett mål, och jag är säker att man numera ej vill småle och tänka, hah, ungdomskonstnärsvillor. Nej, det är hela mitt väsen som numera uppgår i tanken på konsten, jag tillbakadrager från hvart s. k. nöje, ensamheten är blott det jag söker. Jag vet allt för väl att en artist måste lida, och vara beredd på att lida, men hvilken oändligt hög lott är det ej\textsuperscript{30} \end{quote} År 1911 innebar den riktiga starten på Eggelings avantgardistiska intresse och period eftersom han då, efter att först flyttat tillbaka till Schweiz från Milano och arbetat ett par år som teckningslärare där, bosatte sig i Paris.\textsuperscript{31} I Paris befann sig Eggeling mitt i modernismens och händelsernas centrum, han knöt band med flera andra konstnärer och imponerades av bland andra Fernand Legérs och André Derains konst. Under sina fyra år i Paris delade Eggeling boende med den italienske konstnären Amedeo Modigliiani och blev mycket god vän med Jean Arp.\textsuperscript{32} Det var under denna tid i Paris som Eggeling allvarligt började intressera sig för konstteori och han kan inte ha undgått att få kännedom om de nya tankar om konst som ofta hade sitt epicentrum just i Paris och Frankrike. Arp har senare beskrivit hur "Eggeling was painting little in those days, instead he discussed about his art for hours."\textsuperscript{33} Efter första världskrigets utbrott år 1914 var dock tillvaron i Paris mycket orolig och år 1915 valde Eggeling att återigen flytta till det då neutrala Schweiz och denna gång först till Ascona och senare till Genève.\textsuperscript{34} Det var under denna tid i Ascona och Genève, mellan \begin{footnotesize} \begin{itemize} \item[28] O’Konor, 1971, s. 21. \item[29] O’Konor, 1971, s. 21. \item[30] Eggeling, Viking, "Letter from Viking Eggeling to Sara Oelrich", 1902, faksimil i O’Konor, 1971, s. 27-31. \item[31] O’Konor, 1971, s. 35. \item[32] O’Konor, 1971, s. 35. \item[33] Verkauf, Willy (red.), \textit{Dada: monograph of a movement}, Academic Ed., London, 1975, s. 87. \item[34] O’Konor, 1971, s. 36. \end{itemize} \end{footnotesize} år 1915 och 1918, som Eggeling lade grunden till och skapade de bildrullar som senare har förklarats omvandlades och användes som inspiration till filmen *Horizontal-vertikal-orkester*. Även om det idag inte finns någon känd kopia av filmen *Horizontal-vertikal-orkester* så existerar fortfarande dess bildrullar och dessa liknar i sitt uttryck och i sin konstnärliga metod *Diagonalsymfonins* bildrullar. Det var således under denna period, från år 1915 i Schweiz, som Eggeling på allvar kom att etablera sig inom de avantgardiska kretsars som till en början samlades kring Cabaret Voltaire i Zürich. Det var även Cabaret Voltaires nytänkande anda som fick Eggeling att år 1918 flytta till Zürich för att på så sätt komma närmare denna konstnärligt fria atmosfär. Flytten till Zürich var emellertid inte Eggelings första möte med Cabaret Voltaires dadaistiska gruppering utan Eggeling hade redan år 1916 ställt ut två bildrullar där. "On the walls:", börjar en anteckning där Tristan Tzara beskriver Cabaret Voltaire år 1916, "van Rees and Arp, Picasso and Eggeling, Segal & Janco, Slodky, Nadelman, coloured papers, ascendancy of a NEW ART, abstract art." Så när Eggeling anlände till Zürich hade han redan innan träffat på och någorlunda lärt känna konstnärer som Tristan Tzara, Sophie Tauber, Marcel Janco, Richard Huelsenbeck och Hans Richter. Eggeling spelade en relativt aktiv roll i Zürich konstliv, i den dadaistiska rörelsen hjälpte han till att utarbeta flera manifest och han undertecknade ett par av dem. Eggeling höll även ett föredrag med titeln "Elementär gestaltning och abstrakt konst" på den åttonde DADA-soarén år 1919 och fick samma år två litografier publicerade i tidskriften DADA. Eggeling hann även med att få en figur ur bildrullen *Diagonalsymfonin* publicerad i Zürichs sista dadaistiska tidskrift *Der Zeltweg* och en egen utställning vid Galleri Wolfsberg innan Zürichs dadaistiska gruppering kom att skingras i slutet av år 1919 med anledning av krigets slut och de europeiska gränsernas öppnande. Förutom denna involvering i DADA så var Eggeling också medlem i *Das neue Leben* som ville främja kontakten mellan dadaister och andra progressiva konstnärer i Schweiz. Eggeling var även en av initiativtagarna till konstnärsgruppen *Radikale Künstler* som bildades i --- 35 Författarens översättning av ”Sur les murs: van Rees et Arp, Picasso et Eggeling, Segal & Janco, Slodky, Nadelmann, couleurs papiers, ascendance ART NOUVEAU, abstrait” (Tzara, Tristan, “Chronique Zurichoise 1915-1919” i *Dada Almanach*, Richard Huelsenbeck (red.), Erich Reiss Verlag, Berlin, 1920, s. 10. <http://sdrc.lib.uiowa.edu/dada/da/pages/010.htm> [2010-11-08].) 36 O’Konor, 1971, s. 38. 37 *D.A.D.A.*, Tzara, Tristan (red.), nr. 4/5. Zürich, 1919, <http://sdrc.lib.uiowa.edu/dada/dada/4_5/index.htm> [2010-11-27]. 38 O’Konor, 1971, s. 38. 39 O’Konor, 1971, s. 48. Zürich år 1919 och som hade bland andra Arp och Augusto Giacometti som medlemmar.\textsuperscript{40} När man läser om Eggeling blir det tydligt att perioden mellan år 1915 och 1919 kom att bli avgörande för hans konstnärliga utveckling och riktning. Han deltog aktivt i det offentliga samtalet om konst och det var under denna tid som Eggeling på allvar började ta itu med de konstnärliga tankar och projekt som skulle leda fram till det filmiska förverkligandet av \textit{Diagonalsymfonin}. \textit{Viking Eggeling åren 1919-1925} År 1918 hade Viking Eggeling genom Tristan Tzara träffat och lärt känna Hans Richter. Detta möte var något som skulle bli början på en ny period i Eggelings liv och en tre år lång arbetsrelation och vänskap med Richter. Richter har trettio år senare beskrivit detta möte: Tristan Tzara knocked at the wall which separated our rooms in a little hotel in Zürich and introduced me to Viking Eggeling. [...] Our complete agreement on esthetic as well as on philosophical matters, a kind of “enthusiastic identity” between us, led spontaneously to an intensive collaboration.\textsuperscript{41} Så när konstlivet i Zürich började skingras till andra delar av Europa valde Eggeling att följa med Richter till Berlin. I Berlin blev Eggeling snabbt vän med Raoul Hausmann som han ett par år senare skulle författa en artikel med. Eggeling lärde också känna de andra i Berlin DADA och besökte Berlins första dadaistiska utställningar.\textsuperscript{42} Eggeling blev även medlem i \textit{Novembergruppe} som var en samlings radikala konstnärer och arkitekter som hade grundats i Berlin år 1918.\textsuperscript{43} Vistelsen i Berlin blev emellertid inte så långvarig då Eggeling i slutet av år 1919 valde att följa med Richter till hans familjehem i Klein-Kölzig, ungefär 100km sydost från Berlin, för att inleda ett två år långt intensivt konstnärligt arbete tillsammans med honom. Det har spekulerats att Eggelings flytt med Richter främst motiverades av hans ekonomiska problem och att Klein-Kölzig innebar en konstnärlig \textsuperscript{40} O’Konor, 1971, s. 48. \textsuperscript{41} Richter, Hans, ”Easel-Scroll-Film” \textit{Magazine of Art}, 1952: feb, s. 79. \textsuperscript{42} Roditi, Edouard, ”Interview with Hannah Höch by Edouard Roditi” Lippard, Lucy (red.), \textit{Dadas on Art}, Prentice-Hall, New Jersey, 1971. \textsuperscript{43} O’Konor, 1971, s. 45. fristad där han tillsammans med Richter kunde få ett ekonomiskt andrum och fokusera på konsten.\textsuperscript{44} Det var under denna tid i Klein-Kölzig som Eggelings och Richters idé att använda filmen som ett konstnärligt medium verkligen tog fart. Richter har beskrivit hur bildrullarna "[...] looked at us and it seemed to ask for real motion. That was just as much of a shock to us as it was a sensation. Because in order to realize movement we needed film."\textsuperscript{45} En detaljbild ur den mycket långa bildrullen \textit{Horizontal-vertical-orkestern} (se bild 2) som illustrerade Eggelings artikel "Elvi fejtegetések a mozgómüvészetről", där han talar starkt för filmens roll i konsten, kan med sin växande utveckling från vänster till höger illustrera Eggelings och Richters resonemang om hur deras bildrullar bad om att få visualiseras i en utvecklande rörelse definierad i den filmiska tiden. "Bild 2. Detaljbild ur Viking Eggeling, \textit{Horizontal-vertical Orchestra I}, 51.5x456cm, Kunstmuseum Basel. "Det råder ingen tvekan", skriver Eggeling i en kontext där filmkonst var ett oetablerat fält på väg att skapas, "om att konstnärerna snabbt och oförväget kommer att ta filmen i anspråk som ett nytt arbetsfält i produktionen av bildkonst."\textsuperscript{46} Under tiden i Klein-Kölzig författade också Eggeling och Richter pamfletten \textit{Universelle Sprache} som skulle förklara deras konstnärliga projekt. Denna pamflett finns idag inte bevarad i sin helhet men i dess utkast finns formuleringar som kan användas som en förklaring för vad de ville åstadkomma i sitt arbete med film, till exempel så skrev Eggeling och Richter att de med filmen ville "[p]lay decisively with the space in between." i relation till skisser av sammanhängande geometriska figurer.\textsuperscript{47} Förutom att försöka ge \textsuperscript{44} O’Konor, 1971, s. 50. \textsuperscript{45} Richter, Hans, \textit{Hans Richter}, Holt, Rinehart and Winston, New York, 1971, s. 96. \textsuperscript{46} Eggeling [1921], 2006, s. 80. \textsuperscript{47} Eggeling & Richter [utan datering], 1998, s. 213. konstteoretiska förklaringar till deras konstnärliga arbete var ett av huvudsyftena med pamfletten att bifoga den i utskick till olika kulturpersoner och institutioner där de bad om finansiell hjälp till deras kostsamma filmprojekt. Det var även efter ett utskick som innehöll denna pamflett som UFA (Universum Film Aktiengesellschaft, det vid tiden största tyska filmbolaget) valde att ge Eggeling och Richter möjligheten att förverkliga sina projekt genom att bistå dem med både ekonomiskt stöd och teknisk hjälp.\textsuperscript{48} Tillsammans i Klein-Kölzig började Eggeling och Richter då att omvandla dels Eggelings bildrulle \textit{Horisontal-vertikal-orkester} och dels Richters bildrulle \textit{Präludium}, som senare av Richter omarbetades till filmen \textit{Rythmus 21}, till filmer. Hur Eggelings första projekt tog sin slutgiltiga form får vi antagligen aldrig veta eftersom det idag inte finns några exemplar kvar av denna film utan endast ekfrastiska spår av den i artiklar som besökare i Klein-Kölzig har författat. Att Eggeling och Richter med sina filmiska experiment arbetade i den europeiska konstens framkant kan exemplifieras med att flera konstnärer och tidskrifter visade intresse för deras arbeten. Richter har senare beskrivit hur "[t]wo years after our [Eggeling och Richter] first meeting, these ideas were to bring us into association with van Doesburg and later with Mondrian, Malevitch, Gabo, Mies van der Rohe, Lissitzky and others."\textsuperscript{49} Bland annat har Theo Van Doesburg, efter ett besök hos Eggeling och Richter år 1921, beskrivit deras filmer utförligt i tidskriften \textit{De Stijl} och artikeln avslutas med följande beskrivning av deras konstnärliga arbete. \begin{quote} This motion-picture composition cannot only serve as a medium for collaboration of all the arts according to a new harmony but it can also release the modern artist from the old primitive method of manual oil-painting.\textsuperscript{50} \end{quote} I slutet av år 1921 så uppstod en oklar meningsskiljaktighet mellan Eggeling och Richter som fick Eggeling att återigen flytta till Berlin och aldrig ta upp den nära vänskapen med Richter igen.\textsuperscript{51} Väl i Berlin övergavs efter ett tag också arbetet med filmen \textit{Horisontal-vertikal-orkester} och arbetet med att filmen \textit{Diagonalsymfonin} påbörjades. I Berlins radikala konstvärld så blev Eggeling nära vän med Raoul Hausmann och Erich Buchholz, han umgicks även regelbundet med bland andra Hannah Höch och El Lissitzky. Eggeling \begin{footnotesize} \textsuperscript{48} O’Konor, 1971, s. 46. \textsuperscript{49} Richter, 1952, s. 79. \textsuperscript{50} Doesburg Van, Theo, "Abstract Film Composition" i O’Konor, 1971, s. 46-48. Louise O’Konors översättning av Doesburg Van, Theo, "Abstracte filmbeelding" \textit{De Stijl}, vol. 4. nr. 5, 1921, s. 71-75. \textsuperscript{51} O’Konor, 1971, s. 50 \end{footnotesize} fick nu även större uppmärksamhet för både sina konstverk och konstteoretiska texter. Det skrevs flertalet tyska och ryska artiklar om Eggelings arbeten och även i Sverige fanns ett intresse för Eggeling då Birger Brinck-E:son, efter ett besök i Berlin år 1923, skrev i tidskriften *Filmjournalen* om Eggelings filmiska experiment och konstsamlaren Hjalmar Gabrielsson inhandlade vid samma tid två bildrullar av Eggeling.\(^{52}\) Även Halmstadgruppens Axel Olson besökte Eggeling i Berlin och beskrev honom i ett brev hem som radikalare än GAN och att Eggeling "fört in måleriet på en helt ny väg" och "att det upphört att vara måleri i gammal mening."\(^{53}\) Arbetet med filmen *Diagonalsymfonin* kom till sitt slut när den första gången visades offentligt, den 3 Maj år 1925.\(^{54}\) Innan denna offentliga visning, arrangerad av Novembergruppe på en UFA-biograf i Berlin, hade Eggeling flertalet gånger visat den inför en privat publik och arbetat om filmen allt eftersom.\(^{55}\) Eggeling kunde tyvärr inte närvara vid *Diagonalsymfonins* premiär då han sedan månader tillbaka var svårt sjuk. Två veckor efter *Diagonalsymfonins* premiär avled dessutom Viking Eggeling endast fyrtiofem år gammal.\(^{56}\) I tillägg till att både konsthistorikern Adolf Behne och El Lissitzky skrev minnesrunor över Eggeling så har László Moholy-Nagy, kort efter Eggelings död, beskrivit honom som "[...] en av de klaraste tänkarna och gestalterna bland de unga samtida konstnärerna. Hans betydelse kommer de somnambuliska historieskrivarna upptäcka och basunera ut inom några år."\(^{57}\) Det jag försökt beskriva i detta inledande kapitel är hur Eggeling rörde sig fritt över geografiska och konstnärliga gränser och att det enda konstanta i Eggelings platslösa tillvaro var konstens experimenterande rum. Hur Eggelings väsen, i hela hans vuxna liv, uppgick i tanken på konsten. --- \(^{52}\) Brinck-E:son, Birger, "Linjemusik på vita duken. 'Konstruktiv film', ett intressant experiment av en svensk konstnär" *Filmjournalen*, Stockholm, vol. 5, nr. 4, 1923, s. 50 & Lärkner, Bengt, *Det internationella avantgardet och Sverige 1914-1925*, Diss., Stenvall, Lund : Univ., Malmö, 1984, s. 153. För en lista på de med Eggeling samtida artiklar om honom och *Diagonalsymfonin* se O’Konor, 1971, s. 50-51. \(^{53}\) Holmér, Folke, Östlund, Egon & Lindegren, Erik, *Halmstadgruppen: Waldemar Lorentzon, Axel Olson, Erik Olson, Ezaias Thorén, Sven Jonson, Stellan Mörner, Rabén & Sjögren*, Stockholm, 1947, s. 30. \(^{54}\) O’Konor, 1971, s. 53. \(^{55}\) O’Konor, 1971, s. 52. \(^{56}\) O’Konor, 1971, s. 53. \(^{57}\) Författarens översättning av ”Er war einer der klarsten Denker und Gestalter unter den jungen heutigen Künstler. Seine Bedeutung werden die somnambulen Geschichtsschreiber in einigen Jahren posaunend entdecken” i Moholy-Nagy, László, *Malerei, Photographie, Film*, Langen Vlg, München, 1925, s. 16. 3. Receptionen av *Diagonalsymfonin* Detta kapitel i rapporten kommer att innehålla en presentation och analys av de tolkningar som gjorts både direkt och indirekt av *Diagonalsymfonin* och ett försök att spåra hur dessa tolkningar utvecklats och tagit en plats inom Viking Eggelings konsthistoriska diskurs. Jag kommer att söka skapa en veritabel karta över *Diagonalsymfonins* dominerande tolkningsmodeller i syfte att utvidga förståelsen för hur både Eggeling och *Diagonalsymfonin* har behandlats i konsthistorien. Det är inte viktigt för denna studie att exakt redovisa vad dessa tidigare analyser av *Diagonalsymfonin* har kommit fram till. Det viktigt är istället att beskriva hur de har kommit fram till sin tolkning, vilket tillvägagångssätt de har haft när de sökt skapa en förståelse av konstverket *Diagonalsymfonin*. I den forskning som gjorts om *Diagonalsymfonin* finns endast ett fåtal nyckelverk och ett fåtal originella tolkningar att ta del av. De få tolkningar som gjorts och de som jag kommer att presentera riktar sig också i regel till filmen *Diagonalsymfonin* och inte till bildrullarna. Jag hoppas att detta kapitel kommer att sätta dessa texter i ett sammanhang som ger läsaren en god orientering och förståelse för hur forskningen om *Diagonalsymfonin* och Eggeling har gjorts och i vilket syfte. *Tidig forskning om Diagonalsymfonin* Louise O’Konors doktorsavhandling om Viking Eggeling är den som etablerade det forskningsfält som nu finns om honom och *Diagonalsymfonin*. Avhandlingen har en karaktär av gedigen grundforskning och dessförinnan den fanns det ingen vetenskaplig källa för studier av Eggeling och *Diagonalsymfonin*. Den information och kunskap om Eggeling och *Diagonalsymfonin* som fanns innan O’Konors doktorsavhandling hittades i texter om och av Hans Richter och i historier som var fragmentariska och berättade av hans konstnärskollegor, historier som byggde mer på tillit till berättaren än på vetenskaplig noggrannhet. O’Konor lade sin tyngdpunkt i avhandlingen på att söka samla in all denna information om Eggeling och bygga upp en sammanhållen historia om honom, en historia som tidigare inte var skriven utan som O’Konor nu skapade. O’Konor har som sagt sammanställt en stor mängd utspridd information om Eggeling från olika historiska källor --- 58 O’Konor, 1971. för att bygga upp den bild av Eggeling som än idag är den vedertagna, ”Det som bevarats av Eggelings arbeten”, beskriver O’Konor, ”är fragment av hans livsverk, spridda över världen; att samla in materialet har varit som att vandra i en labyrint.”\textsuperscript{59} Det har självklart tillförlts ytterligare information om Eggeling men denna forskning förhåller sig ofta till O’Konors avhandling och använder den som en startpunkt och en klangbotten för sina resonemang. Eftersom O’Konor fokuserade på att främst att skapa en sammanhållen helhet av Eggeling så finns här ingen djupare analys av \textit{Diagonalsymfonin}. När O’Konor söker förklara \textit{Diagonalsymfonin} beskriver hon i regel bokstavligen det som sker i filmen mer än hon tolkar det. Dessa beskrivningar är exempelvis ofta av sorten "[t]his part starts out with a simple motif, a trianglelike form with a number of off-shoots. It is projected for one second during which it slowly vanishes."\textsuperscript{60} Frånvaron av ett tolkande resonemang är dock förståeligt då syftet med avhandlingen inte varit att tolka utan att sammanställa och skapa en historia om Eggeling och hans konstnärliga arbeten. Det finns visserligen ett fåtal analytiska inslag i ett par meningar i hennes doktorsavhandling men dessa tolkningar faller på att de aldrig får utvecklas eller förklaras bortom sitt korta konstaterande uttryck i texten. Exempelvis skriver O’Konor "[w]hat Eggeling aimed at with his compositions was to penetrate beyond tangible reality; his theme is a metaphysical one." utan att riktigt förankra detta i ett teoretiskt tolkande resonemang.\textsuperscript{61} Effekten av att O’Konors inte försöker etablerar en egen förståelse genom en djupare analys av konstverket \textit{Diagonalsymfonin}, bortom dess förklarande relation till Richter, blir att \textit{Diagonalsymfonin} fortfarande förstås i en kontextuell inramning med Richters konstnärliga anspråk i fokus. Det viktiga som O’Konor emellertid gjorde i sitt särskiljande mellan Eggelings konstnärliga liv och Richters var att etablera Eggeling som en självständig person i konsthistorien. Detta separerande mellan Eggeling och Richter skapade en egen diskursiv plats för Eggeling där framtida tolkningsutsagor möjliggörs och tillåts att födas och agera. Så även om O’Konor inte fokuserade på att tolka \textit{Diagonalsymfonin} så menar jag att hon genom att skapa en konsthistorisk plats för Eggeling öppnade verket för framtida tolkningsar. Två konstvetare som också, relativt samtidiga med O’Konor, riktade sitt intresse mot den tidiga abstrakta filmen och kommenterade \textit{Diagonalsymfonin} var Standish D. Lawder i \textsuperscript{59} O’Konor, 2006, s. 13. \textsuperscript{60} O’Konor, 1971, s. 133. \textsuperscript{61} O’Konor, 1971, s. 133. The Cubist Cinema och Malcolm Le Grice i Abstract Film and Beyond.\textsuperscript{62} Det Lawder gör är att söka visa på förhållandet mellan 1920-talets abstrakta film och den tidens moderna konst, där modern konst underförstått är lika med kubistisk konst. Lawder beskriver i sin text hur det kubistiska måleriet tog sin första filmiska form i Eggelings, Richters och Walter Ruttmans tidiga abstrakta filmer. Lawder skriver även att Diagonalsymfonin "must be regarded as much a demonstration of a theory of art as a work of art in itself."\textsuperscript{63} Le Grice möter dessa tidiga avantgardistiska abstrakta filmer och konstnärer på ett annat sätt. I sin studie så väljer le Grice att lyfta fram och tolka dessa konstmärsers och filmers konstnärliga strategier och metoder för att visa på dess aktualitet i det, då samtida, sena 1970-talets filmiska och nymedia-baserade konst.\textsuperscript{64} Det intressanta som kommit ur dessa båda undersökningar började med Lawders ansats att särskilja Richters och Eggelings filmer åt. Lawder inledde här ett nytt kapitel i Eggelings konsthistoriska diskurs och börjar bryta ner den vanliga historieskrivningen där Eggeling alltid tolkats och placerats bakom Richter genom sitt försök att lyfta fram det särskilda i filmen Diagonalsymfonin. Lawder börjar här också ytligt spåra det som le Grice sedan ytterligare skulle utveckla i Abstract Cinema and Beyond som skillnaden mellan dem båda, nämligen, att Richter utforskar former i en rumslighet och Eggeling i en tidslighet. Det viktigaste som jag anser att Lawder och le Grice åstadkommer är inte att deras olika tolkningar om rumslighet och tidslighet, som sedan inte förtydligats eller etablerats inom fältet i en större utsträckning, utan skedet innan denna tolkning och deras ständiga särskiljande mellan Eggelings konst och Richters konst. Att de båda möter konstverken utan tvånget att förklara och placera dem tillsammans i en gemensam kontext, att de med detta icke-kontextuella bemötande lyckas lyfta fram Eggelings film Diagonalsymfonin ur Richter tolkningsskugga för att se den i sin enskildhet. \textit{Diagonalsymfonin tolkad som Universellt språk, Absolut konstverk och Kommunikationsmaskin} Även om le Grice och Lawder gjorde ett försök att särskilja Richters och Eggelings filmer åt genom en analys av dess uttryck så fortsatte trots allt Richters kontextuella inramning på Eggeling att reproduceras och präglar dess diskursiva regler. I den övergripande forskningen och konsthistorieskrivningen om Eggelings konst, både ensam och \textsuperscript{62} Lawder, Standish D., \textit{The Cubist Cinema}, New York University Press, New York, 1975 & Le Grice, 1977. \textsuperscript{63} Lawder, 1975, s. 54. \textsuperscript{64} Le, Grice, 1977. tillsammans med Richter, tolkas han fortfarande i regel utifrån en position som tar större hänsyn till Richters konstnärliga diskurs och de berättelser om Eggeling som denna diskurs gett upphov till. De utsagor som fortfarande präglar den allmänna konsthistoriska uppfattningen av Eggeling har ofta sitt ursprung i följande citat av Richter: In 1920, we published a small pamphlet called *Universelle Sprache*. This pamphlet elaborated our thesis that the abstract form offers the possibility of a language above and beyond all national language frontiers. The basis for such language would lie in the identical form perception in all human beings and would offer the promise of a universal art as it had never existed before. With careful analysis of the elements, one should be able to rebuild men’s vision into a spiritual language in which the simplest as well as the most complicated, emotions as well as thoughts, objects as well as ideas, would find a form.\(^{65}\) We saw in the completely liberated (abstract) form not only a new medium to be exploited, but the challenge towards a ‘universal language’.\(^{66}\) Eggeling and I thought we had found the key to a ‘universal language’. As this language was based upon the polar relationship of elementary forms and corresponded to the laws of perception it ought to be independent of nationality and race = universal.\(^{67}\) Dessa ovan nämnda citat har inspirerat både forskare och översiktsverk. De används ständigt i både kortare förklaringar och som stöd i djupare resonemang till vad Eggelings och Richters filmer kan tänkas syfta till att vara. Det är emellertid kanske inte så underligt att Richters utsagor om Eggelings konstnärliga arbeten har format deras gemensamma och individuella diskurs. Anledningen till detta beteende är sannolikt att de trots allt arbetade tillsammans under en längre tid och att Richter länge var upphovsmannen till de flesta utsagor om Eggeling. Det som jag dock ser som underligt är att ett fåtal utsagor om att deras konst var ett sökande efter ett universellt språk så tydligt har präglat den allmänna uppfattningen av Eggelings konst och speciellt *Diagonalsymfonin* trots att arbetet med *Diagonalsymfonins* bildrullar påbörjades innan Richter och Eggeling träffades och att filmen påbörjades och slutfördes efter att de skiljts åt. Även det tidigare nämnda brevet från Eggeling till sin syster år 1902 innehåller en satsmening som gett näring till vissa uttolkare av Eggeling då de här anser sig finna belägg \(^{65}\) Richter, 1965, s. 144. \(^{66}\) Richter, Hans, ”The Film as an Original Art Form”, *College Art Journal*, Vol. 10, nr. 2., 1951, s. 157. \(^{67}\) Richter, 1971, s. 24. för tanken om att Eggeling tidigt i sin konstnärliga karriär ville skapa ett universellt språk som i sin kommunikativa struktur skulle vara baserat på visuella former, Eggeling skriver i brevet "[j]ag har gjort allahanda försök för att konstruera en ny kommunikationsmaskin.]"68 Detta brev kan tolkas annorlunda om man i uttalandet tar hänsyn till hela meningsstrukturen och inte bara fokuserar på den inledande satsen i meningen. I sin helhet börjar meningen med uttalandet, "[j]ag har gjort allahanda försök för att konstruera en ny kommunikationsmaskin" men fortsätter sedan med: men jag är naturligtvis hindrad att göra några praktiska försök, motorerna och det öfriga materialet äro för dyrbara, det vore naturligtvis fördelaktigt att ej öfverlämna planerna till främmande, och som finanserna stå nu är det aldeles omöjligt att utföra.69 Det flera uttolkare av Eggeling har gjort är att lyfta fram den första huvudsatsen i meningen som ett belägg för hans tankar om konstens uppgift, att konsten ska vara en kommunikationsmaskin och att det syftar mot tanken om ett universellt språk, utan att hänvisa till den andra huvudsatsen trots att de tillsammans hör ihop och bildar hela satsmeningen. Jag hävdar att man ska se meningen och speciellt brevet för vad det är i sin helhet, ett brev med uppgift, att till sin syster, ge subtila signaler att han är i behov av pengar. Min tolkning styrks även av att det i såväl andra brev som det hans syskon berättat för O’Konor framgår att Eggeling genom hela sitt vuxna liv fick ekonomisk hjälp av sina syskon.70 Päståendet att Eggeling behöver pengar för att skapa en ny kommunikationsmaskin kan i detta brev förstås i relation till den italienske fysikern Guglielmo Marconi.71 Marconi konstruerade under samma tid utrustningen för trådlös telegraf, något väldigt kostsamt, och skickade det första meddelandet över Atlanten, något som naturligtvis var en världsnyhet.72 Genom att anspela på denna världsnyhet och säga att han själv hade ritningarna för en ny maskin så försökte Eggeling, troligen, göra det lättare för både sig själv att få pengar och för systemet att ge. Eggeling avslutar även brevet med att skriva: "[j]ag vill ej blifva afrädd och jag försäkrar att ej visa --- 68 Eggeling [1902], 1971. 69 Eggeling [1902], 1971. 70 O’Konor, 1971, s. 25. 71 O’Konor nämner Guglielmo Marconi men tolkar i sin text att Eggeling inspirerades av Marconi och tanken på konst som kommunikation. (O’Konor, 2006, s. 30.) 72 Nationalencyklopedin, ”Guglielmo Marconi”, <http://www.ne.se/lang/guglielmo-marconi> [2010-10-25]. mig otacksam om man på något sätt [och] vis kan och vill understödja mig."73 Brevet skrevs även minst ett decennium innan Eggelings första bildrulle *Horisontal-vertikal-orkester* skapades och i en tid då Eggeling mest koncentrerade sig på akvarell och landskapsmålery. Förutom att *Diagonalsymfonin* ofta förstas som ett sökande mot ett universellt språk så kombineras det vid vissa tolkningstillfällen med den bokstavliga tolkningen av *Diagonalsymfonins* och *Horisontal-vertikal-orkesters* egennamn. Detta har givit upphov till yttranden att *Diagonalsymfonin* var ett konstruktivistligt sökande och ett försök att föra samman det visuella (diagonalen, bilden) och det auditiva (symfonin, musiken) till ett allkonstverk, som en sinnesförmimmelernas samverkan.74 Att Eggeling med den abstrakta filmen ville förena den konst som använder rummet, bildkonsten, med den som använder tiden, musiken. Denna tolkning återfinns eller förankras inte Eggelings egna texter utan när denna tolkning nämns så refereras det i regel till den förklaring som Theo Van Doesburg gav efter sitt besök hos Eggeling och Richter i Klein-Kölzig. Van Doesburg skrev då i tidskriften *De Stijl* hur deras filmer har möjligheten att "serve as a medium for collaboration of all the arts according to a new harmony[]"75 *Diagonalsymfonin, en konstruktivistisk film* Två aktuella studier i forskningen om Hans Richter som direkt sökt förändra förståelsen av Richters tidiga filmer och placerat dessa i en ny kontextuell inramning har även, både direkt och indirekt, påverkat förståelsen för Viking Eggeling och *Diagonalsymfonin*. Den senaste av dessa är R. Bruce Elders *Harmony + Dissent*, där texten som behandlar Eggeling och Richter även är omarbetad och publicerad i artikelformat i tidskriften *Avant-Garde and Critical Studies*, och den lite äldre är Stephen. C. Foster utgivna antologi *Hans Richter*.76 Dessa båda studier har olika infallsvinklar men de försöker i grund och botten förklara Richters och Eggelings filmer som konstruktivistiska. Eftersom den konsthistoriska benämningen konstruktivism har en flytande och varierad betydelse så urgår jag ifrån --- 73 Eggeling [1902], 1971. 74 För tolkningar om universellt språk i översiktsverk se exempelvis: Nationalencyklopedin, ”Hans Richter”, <http://www.ne.se/lang/hans-richter> [2010-11-08]. För den mest avancerade tolkningen av *Diagonalsymfonin* som en visualisering av musik och allkonstverk se exempelvis: Werner, Gösta & Edlund, Bengt, *Viking Eggeling Diagonalsymfonin: Spjutspets i en återvändsgård*, Novapress, Lund, 1997 & Elder, R. Bruce, ”Hans Richter and Viking Eggeling: The Dream of Universal Language and the Birth of The Absolute Film” *Avant-Garde and Critical Studies*, vol. 23, 2007, s. 3-53. 75 Doesburg Van [1921], 1971, s. 48. 76 Elder, 2008, Elder, 2007, s. 3-53 & Foster, 1998. författarnas förklaring av vad konstruktivism är, nämligen att "[c]onstructivism is characterized by the systematization of forms in an anti-individualistic sense, a fixed syntax, and a logical composition" och att "[c]onstructivism strived to generalize the principles of form and sought a supra-individualist basis for artistic construction. It attempted to discover a lawfulness in the making of art."77 I antologin *Hans Richter* så söker Justin Hoffmann i sin text "Hans Richter: Constructivist Filmmaker" förklara hur Richters ansträngningar att utveckla ett språk av abstrakta former inte kan förklaras utifrån DADA utan att dessa undersökningar överensstämmer mer med De Stijls och Suprematismens försök i Holland och Ryssland. I sin tolkning så kommer Hoffmann till slutsatsen att Richters konstnärliga arbeten från år 1916 och framåt verkar vara bestämda av en konstruktivistisk konstfilosofisk hållning och i denna tolkning av Richters rörelse mot konstruktivismen så finns Eggeling genomgående med i resonemanget. Hoffmann söker dock inte spåra huruvida Eggeling hade några egna konstruktivistiska intentioner utan förstår honom primärt utifrån Richters konstruktivistiska engagemang och utsagor. I sin studie så finner Hoffmann således sin slutsats om hur och med vilket syfte Eggeling arbetade genom att ständigt tolka honom utifrån och i en underlägsen position gentemot Richter. En annan kortare text som med en mer essäistisk stil närmat sig Eggeling genom ett raster präglat av Richters påståenden om deras gemensamma konstruktivistiska intressen är skriven av den brittiske filmteoretikern Peter Wollen.78 Wollen tolkar även han i sin studie hur "Eggeling can now be seen not so much as a dadaist, but as a slightly unorthodox figure in the world of international Constructivism" genom att referera till påståendena av Richter.79 Även i Elders studie tolkas Eggeling primärt genom Richter och i det, till deras del i studien, inledande kapitlet "Hans Richter and Viking Eggeling: The absolute film as the fulfillment of modern art movements" så nämns överhuvudtaget inte ens Eggelings namn förutom i titeln till kapitlet. Eggeling nämns istället för första gången i nästa kapitel när Elder går igenom Richters konstruktivistiska historia. Genomgående i dessa kapitel, när Elder skriver om hur Eggeling och Richter tänkte och handlade, så refererar Elder endast till uttalande som Richter har gjort. Det finns flera exempel men Elder skriver ofta meningar som "[t]he drive to uncover the universal laws of art making fuelled Eggeling --- 77 Hoffman, Justin, "Hans Richter: Constructivist Filmmaker" Foster, Stephen C., (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 74 & Elder, 2008, s. 129. 78 Wollen, Peter, *Paris Hollywood: writings on film*, Verso, London, 2002. 79 Wollen, 2002, s. 53. and Richter's research into what they called a universal language of art." och refererar till ett påstående av Richter.\textsuperscript{80} Detta är något som genomgående sker och när slutsatser ska förankras så hamnar Eggeling ofta i bakgrunden och Elder väljer att citera eller referera till Richter. Exempelvis skriver Elder: Their goal was to offer a new universal language – universal both in the sense that it applied to all visual media and in the sense that it applied to all cultures (notwithstanding their different natural languages). They wanted to develop a system of communication based on the visual perceptions, whose mechanisms, they were certain, were universal. "Every person would have to react to such a language and for the very reason that it was based on the human ability to see and record", Richter wrote.\textsuperscript{81} Jag förstår det som att Elder i sin studie implicit lägger tyngdpunkten på Richter i sin tolkning men att han måste ta med Eggeling i resonemanget då de, under den tid av Richters historia som Elder är intresserad av, arbetade tätt tillsammans. Följden av detta blir att det inte tas någon hänsyn till Eggelings egna konstnärliga intentioner utan att Eggeling binds till den skugga av intentioner som faller från Richter. Elder var kanske medveten om detta förfarande då han i slutet i sin text, i ett appendix, erbjuder läsaren en separat analys av filmen \textit{Diagonalsymfonin}. Denna analys är emellertid mindre en analys än en beskrivning och liknar i sin beskrivande struktur O'Konors beskrivning av \textit{Diagonalsymfonin} då även Elder bokstavligt beskriver filmen. Exempelvis: "Shape 1 appears in the centre of the screen with its base angled toward the top left. The shape appears to recede from the centre to the upper left of the screen, then disappears."\textsuperscript{82} Det som jag även anser kan ge upphov till uppenbara tvivel om tolkningen att förstå Eggeling som en konstruktivistisk filmskapare är den polemiska artikel mot konstruktivismen som han skrev med Raoul Hausmann och att Bernd Finkeldey i antologin \textit{Hans Richter} beskriver hur Richters samhörighet med de internationella konstruktivisterna byggdes upp efter att han och Eggeling skiljdes åt.\textsuperscript{83} Finkeldey visar genom olika historiska källor hur djupt involverad Richter blev i de konstruktivistiska grupperingarna och tankar som florerade kring honom i Holland och Tyskland under åren 1922-1927. Att sedan låsa historien bakåt och se något som hände senare med Richter \textsuperscript{80} Elder, 2008, s. 132. \textsuperscript{81} Elder, 2008, s. 144. \textsuperscript{82} Elder, R. Bruce, "Appendix: Viking Eggeling's \textit{Diagonal-Symphonie}: an analysis" i Elder, 2008, s. 450. \textsuperscript{83} Finkeldey, Bernd, "Hans Richter and the Constructivist International" Foster, Stephen C., (red.), \textit{Hans Richter: Activism, Modernism, and the Avant-Garde}, The MIT Press, Cambridge & London, 1998, s. 92-121. som något som kan förklara Eggeling's konst både innan år 1922 och tre år senare måste betraktas med viss tväksamhet. Att Eggeling är 1923, tillsammans med Raoul Hausmann, skrev artikeln "Zweite präsentistische Deklaration. Gerichtet an die internationalen Konstruktivisten" som vänder sig med en avständstagande och polemisk attityd mot konstruktivismen måste även uppmärksammans.\(^{84}\) Eggeling och Hausmann skriver där att "[v]årt arbete måste börja där den moderna vetenskapen slutar, eftersom den är icke-objektiv" och hur "[k]onsten är ju det enda produktionsområde inom vilket lagen om orsak och verkan inte kan tillämpas" vilket står i direkt konflikt till den konstruktivistiska uppfattning som han tillsammans med Richter tillskrivs i forskningen.\(^{85}\) Att denna, inte på något sätt okända, artikel av Eggeling varken nämns i Elders studie eller i Fosters antologi när de försöker förklara honom som en konstruktivistisk konstnär är anmärkningsvärt då den kan betraktas som oförenlig med deras centrala argument. Eggeling skriver även själv i sina egna anteckningar om vikten av att "[a]lltid vara medveten om det torftiga i en rationalistisk-sinnelig åskådning."\(^{86}\) Att denna sida av Eggeling inte nämns kan kanske förklaras med och agera som ett exempel på det konsthistoriska tolkningsföreträde Richter har över Eggeling, att det är Eggeling som ska passa in i Richters konsthistoria och inte tvärtom. En text som starkt kritiserar påståendet att Richter var en konstruktivistisk filmskapare är Malcolm Turveys artikel "Dada between Heaven and Hell: Abstraction and Universal Language in the Rhythm Films of Hans Richter", artikeln publicerades år 2003 och kan förstås som ett direkt svar på Hoffmans text och Fosters antologi.\(^{87}\) I sin artikel behandlas endast Richter filmer och inte Eggeling's eftersom Turvey förklarar att "[...]while there are similarites between the films, there are also profound differences[.]"\(^{88}\) Jag håller med om detta påstående men jag menar även att Turvey indirekt bemöter tolkningar av *Diagonalsymfonin* då han bryter ner den tolkningsgrund som konstruktivistiska uppfattningar av *Diagonalsymfonin* har använt sig av. Turvey argumenterar i sin artikel för hur Richters sökande efter ett universellt språk inte kan förstås ha en konstruktivistisk agenda utan att det ursprungligen förhåller sig till \(^{84}\) Hausmann & Eggeling [1923], 2006, s. 82. \(^{85}\) Hausmann & Eggeling [1923], 2006, s. 84. \(^{86}\) Eggeling, Viking, *utan datering* "Gemenskap" i o'Konor, 2006a, s. 137. \(^{87}\) Turvey, Malcom, "Dada between Heaven and Hell: Abstraction and Universal Language in the Rythm Films of Hans Richter" *October*, vol. 105, 2003, s. 13-36. \(^{88}\) Turvey, 2003, s. 18. dadaistiska syften. Att Richters sökande efter ett universellt språk inte ska förstås ordagrant utan att begreppet universellt språk har en komplex idéhistoria med flera olika sidor. Turvey visar i sin artikel hur Richter mycket väl var medveten om begreppets komplexitet genom att citera motsägelsefulla uttalanden i Richters böcker, artiklar och intervjuer.\(^{89}\) Turvey argumenterar för hur "[t]he search for a universal language is common to both rationalist and antirationalist traditions in the West" och att Richters tillämpning av begreppet universellt språk var en metod att kombinera det rationalistiska med det oförklarligt mystiska i sitt konstnärliga arbete och inte ett veritabelt försök till ett nytt esperanto.\(^{90}\) Att Richters filmer ska förklaras som ett sökande mot en balans mellan *unreason* och *reason* och inte ett sökande som endast riktas mot *reason*. Anledningen till att Richters filmer då är dadaistiska och inte konstruktivistiska är att om DADA förstås, som Richter definierar det, "as an attempt to restore the lost balance between reason and unreason in modernity" så arbetar Richter, enligt Turvey, av allt att döma i en dadaistisk tradition och inte i en konstruktivistisk tradition.\(^{91}\) Det viktiga med Turveys artikel är att den avslöjar en annan sida av Richters konstnärskap och visar att en alternativ tolkning kan formas. Turveys analys rör sig även nära den polaritet som jag anser mig finna i Eggelinges konstteoretiska skrifter, nämligen att Eggeling utformade ett system som skulle ge honom verktyg att arbeta med en ordning i en oordning. Det är dock problematiskt att förklara Eggeling som antingen dadaist eller konstruktivist då dessa två konströrelser influerade och stod varandra nära. Även om dessa försök att placera Eggeling i en konstnärlig gruppering åstadkommer intressanta tolkningar anser jag att man först måste möta Eggeling utanför dessa och börja i konstverket och i de konstteoretiska skrifterna. Vad jag har försökt visa är att när Richters filmer tolkas så finns alltid *Diagonalsymfonin* i bakgrunden och påverkas. *Diagonalsymfonin* har sålunda främst blivit förklarat och förstådd utifrån en kontextuell inramning där Hans Richter har spelat huvudrollen. På grund av detta så har inte *Diagonalsymfonin* tolkats från en position där den ensam är i fokus utan den har i regel alltid befunnit sig i en undergiven kontextuell förklarandeprocess till Richter. Även bildrullarna *Diagonalsymfonin* befinner sig inom denna forskning i en undergiven relation gentemot filmen då de knappt nämns och om de gör det så nämns de endast som arbetsskisser till filmerna. Dessa bildrullar skapades emellertid, som O'Konors \(^{89}\) Turvey, 2003, s. 27. \(^{90}\) Turvey, 2003, s. 29. \(^{91}\) Turvey, 2003, s. 29. forskning har visat, utan föreställningen att de skulle uttryckas filmiskt och det är i efterhand och med en historisk intention som dessa bildrullar fråntagits sin självständighet som konstverk och använts som en förklaring för var figurerna i filmen *Diagonalsymfonin* har sitt ursprung.\(^{92}\) Det som dock är mest förvånade i forskningen kring Eggeling är frånvaron av hans egna konstteoretiska skrifter. Dessa skrifter är nyckeln in i många intressanta tolkningar av *Diagonalsymfonin* och resten av rapporten kommer ägnas åt att, genom dessa skrifter, försöka skapa en förståelse för Eggelings konst som kan överskrida dess nu undergivna relation till Richter. \(^{92}\) O’Konor, 1971. 4. Analysens början, en introduktion av Generalbasen Detta kapitels syfte är att leda in läsaren i rapportens övergripande idé, att Viking Eggeling i sitt konstnärliga arbete ville använda sig av en systembaserad arbetsmetod för framställning av form. Det jag kommer att visa är att Eggelings egna konstteoretiska skrifter inte bara var en mindre och avvikande del i hans konstnärskap, som tidigare forskning antagit, utan att de tillsammans med konstverket *Diagonalsymfonin* formar sig till en helhet i relationen mellan teori och praktik. Analysen börjar med Eggelings artikel "Elvi fejtegetések a mozgóművészetröl" då den är en naturlig och nödvändig inledning till denna tanke. *En början mot en Generalbas* Av de konstteoretiska skrifter som Viking Eggeling skrev eller var medförfattare till är det endast utkastet till pamfletten *Universelle Sprache* och artikeln "Elvi fejtegetések a mozgóművészetröl" som hanterats kritiskt i konstvetenskapliga texter.\(^{93}\) Inom konstvetenskapen har de anteckningar som O’Konor sammanställt inte bearbetats i en större omfattning utan dessa har mest uppfattats som en avvikande del av Eggeling konstnärliga verksamhet och den artikel som Eggeling skrev med Raoul Hausmann har som sagt inte alls diskuterats i forskning som är riktad att förstå Eggeling och Hans Richter som konstruktivistiska konstnärer. De få texter som behandlar artikeln "Elvi fejtegetések a mozgóművészetröl" möter den ofta genom en underordnad läsning av den mer kända och i princip exakt överensstämmande artikeln som Richter, efter Eggelings publicering, publicerade under sitt namn i tidskriften *De Stijl* med titeln "Prinzipielles zur Bewegungskunst".\(^{94}\) Den som hittills gjort den mest utforskande forskningsinsatsen till pamfletten *Universelle Spraches* utkast och artikeln "Prinzipielles zur Bewegungskunst" är R. Bruce Elder i *Harmony+Dissent* och i artikeln "Hans Richter and Viking Eggeling: The Dream of Universal Language and the Birth of The Absolute Film".\(^{95}\) I dessa två texter läser Elder artikeln "Prinzipielles zur Bewegungskunst" och utkastet till pamfletten *Universelle Sprache* --- \(^{93}\) Eggeling [1921], 2006, s. 77-80 & Eggeling & Richter [utan datering], 1998. \(^{94}\) Richter [1921], 1971. \(^{95}\) Elder, 2008 & Elder, 2007. med avsikten att tolka och redogöra för dessa skrifters konstruktivistiska syften. I sin undersökning fokuserar Elder främst på Richters artikel och det musikaliska begreppet *generalbas* som nämns i den och tar i sitt tolkande resonemang mindre hänsyn till det som pamfletten *Universelle Spraches* utkast kan tänkas uttrycka. Jag kommer i denna del också att främst fokusera på det musikaliska begreppet *generalbas* men i analysens nästa kapitel vävs det samman med resten av Eggelings konstteoretiska och konstnärliga produktion. Eftersom O’Konor i sin avhandling övertygande argumenterar att Eggeling är ensam författare och ägare till det intellektuella material som vart till två i princip likadana artiklar, Eggelings ”Elvi fejtegetések a mozgómüvészetröl” och Richters ”Prinzipielles zur Bewegungskunst”, så kommer jag anta att Eggeling är ensam upphovsman och utveckla mitt resonemang utifrån detta sakförhållande.\(^{96}\) Utkastet till pamfletten *Universelle Sprache* kommer också att uppfattas vara huvudsakligen Eggelings tankefoster då Richter i efterhand har uttalat sig om att det var Eggeling som i första hand stod för den teoretiskt kreativa sidan i deras arbete tillsammans.\(^{97}\) **Generalbas** Eggeling betonar starkt i artikeln ”Elvi fejtegetések a mozgómüvészetröl” att konsten inte är en individs subjektiva explosion utan att den måste ha en förutbestämd kompositionsmetod, att den måste agera mot en *generalbas*.\(^{98}\) När Eggeling i artikeln förklarar sin kompositionsmetod som en generalbas sätter han sig i en historisk relation till J. W. Goethe och i en mer samtida till Wassily Kandinsky som båda sökte efter en måleriets *generalbas*. Ordet *generalbas* har sitt etymologiska ursprung inom den europeiska barockmusiken och utvecklades som ett begrepp där ”ackompanjemang improviserades fram över en given baslinje, till vilken fogats en sifferkod som angav vilka harmonier som spelare skulle använda gentemot melodistämmnan.”\(^{99}\) Elder förklarar detta begrepp utförligt i sin studie och nämner att “[t]hough the bass line itself could not be modified, the player who --- \(^{96}\) O’Konor, 1971. \(^{97}\) Richter, 1972, s. 545. \(^{98}\) Eggeling [1921], 2006, s. 79. \(^{99}\) Nationalencyklopedin, ”Generalbas”, <http://www.nc.se/lang/generalbas> [2010-11-12]. J. S. Bach och de flesta av de europeiska kompositörerna från år 1600 till 1750 använde sig av denna då dominerande ackompanjemangspraxis när de skapade musik. I utkastet till pamfletten *Universelle Sprache* kommenterar och beskriver även Eggeling J. S. Bachs kompositionsmetod i *Fugue in f-minor* (Eggeling & Richter [utan datering], 1998, s. 213.) realized the harmonies had considerable freedom." Som jag förstår det musikaliska begreppet generalbas så är det en kompositionsmetod med syfte att få en kreativ framställning av musik som ändock ska förhålla sig till vissa, av kompositören, upprättade grundregler. Det är inte viktigt för denna studies syfte att läsaren ska få en komplett förståelse för det musikaliska begreppet generalbas utan endast få en förståelse för dess användning inom musiken, att den skulle agera som en kontrollfunktion och styra den improvisatoriska friheten i den musikaliska framställningen. Det var i denna bemärkelse Goethe använde ordet generalbas och även om Goethe etablerade en teoribildning för upplevelsen av färg, som fick stor användning inom bildkonsten, så beskriver Elder hur Goethe likväil "accused painting of lacking any generalbas, that is, any accepted theory for creating forms by following established principles." Elder tolkar det som att Eggelings och Richters konstnärliga projekt var ett svar på detta problem och att de tillsammans sökte skapa en teoribildning för formen. Elder läser sin analytiska blick i det strukturella som finns i begreppet generalbas för att visa på hur Eggelings och Richters intresse för begreppet hade en konstruktivistisk agenda. Deras undersökning av begreppet generalbas var då, enligt Elder, en början mot en bildkonst som skulle vara präglad av förståndet. Att Eggeling och Richter ville att bildkonsten skulle använda sig av en definierad och färdig abstrakt formstruktur, som musiken har sina toner och tonarter, för att skapa något nytt med och i denna struktur. Elder beskriver och tolkar detta formspråk med att "[i]t would be a objective language – that is, it’s grammar would give instructions on the correct ordering of forms." och att Eggeling och Richter såg "the elimination of subjective expression as a purifying process." Men där Elder tolkar Richters och Eggelings tankar om begreppet generalbas som att de ville röra sig mot musikens lagar i en strikt konstruktivistisk tradition vill jag istället lyfta fram den andra sidan i begreppet generalbas, en sida som Elder i sin tolkning bortser ifrån. Det Eggeling lyfter fram i sina teoretiska skrifter om begreppet generalbas och som jag hävdar inspirerade honom är relationen mellan det kontrollerade och det fria som finns inneboende i begreppet. Denna motsägelsefulla polaritet i tanken om ett styrt men fritt uttryck får i anteckningarna en tydlig plats och jag förstår det som att det var denna polaritet som intresserade Eggeling. Han skriver i sin artikel "Elvi fejtegetéseak a --- 100 Elder, 2008, s. 140. 101 Elder, 2008, s. 143. 102 Elder, 2008, s. 145. 103 Elder, 2008, s. 145-146. mozgómüvészetrol" hur "[v]etenskaplig problemställning innebär inte en hämning av intuitionen" och att impulsen i konsten är en förutsättning för skapandet.\textsuperscript{104} Under rubriken \textit{generalbas} beskriver Eggeling i artikeln hur "«Språket» (form-språket) som där «talas» grundar sig på ett «alfabet» framväxt ur en elementär åskådningsprincip: polaritet."\textsuperscript{105} Jag tolkar det som att den polaritet som åsyftades är den som finns i det musikaliska begreppet generalbas, den mellan det fria och det kontrollerade uttrycket. Eggelings idé om en måleriets generalbas förankrar min tes om att han ville skapa ett system och en egen arbetsmetod för framställning av former i bildkonsten. Eggeling skriver även i sina anteckningar hur "[a]lla älskar ordning lidelsefullt, men inte de regler man blir tilldelad, utan de man själv skapar."\textsuperscript{106} I begreppet generalbas fann Eggeling en väg mot denna ordning och en teoretisering av den balans han sökte mellan intuitionen och intellektet i sitt egna konstnärliga skapande. Jag förstår det som att Eggeling genom att undersöka begreppet generalbas och översätta det till en apart arbetsmetod för framställning av former i sin bildkonst kunde han fram till det som han, i sina anteckningar, uttryckligen eftersträvade och låta "the truth of the chaotic to be expressed [...] controlled by the will: the manifest law." och att hans former skulle skapas med "[o]ordning jämsides med ordning."\textsuperscript{107} Det jag nedan vill visa på är att det som i bildrullarna och i filmen \textit{Diagonalsymfonin} "först ter sig som en godtycklighet visar sig till sist vara en mycket precis formernas ordning."\textsuperscript{108} \begin{footnotesize} \begin{enumerate} \item Eggeling [1921], 2006, s. 80. \item Eggeling [1921], 2006, s. 77. \item Eggeling, Viking, [utan datering] "Om det andliga i människan, om olika kompositionsmetoder" i O'Konor, 2006b, s. 114. \item Eggeling & Richter [utan datering], 1998, s. 209 & Eggeling, Viking, [utan datering] "Film" i O'Konor, 2006c, s. 86. \item Kandinsky, Wassily, \textit{Öm det andliga i konsten}, [Ny utg.], Vinga press, Göteborg, 1994, s. 121. \end{enumerate} \end{footnotesize} 5. Diagonalsymfonin, ett system av relationer Det är rapportens övergripande tes att bildrullarna och filmen *Diagonalsymfonin* har sin grund i och kan förklaras genom en systemstruktur. Denna systemstruktur kontrollerade Viking Eggelings formgivning av *Diagonalsymfonin* och jag hävdar att hans tankar om en måleriets generalbas inledde och utformade denna systemstruktur. Jag kommer nedan att försöka identifiera och förklara den uppsättning regler och villkor som denna systematiska struktur innehåller, hur Eggelings skapande relation till och i den bildar ett system som utför en funktion med syftet att generera och utföra visuella former. I min analys av både skapande av och det färdiga konstverket *Diagonalsymfonin* tänker jag sålunda använda mig av systemteoretiska begrepp. Systemteori är studiet av system och jag kommer utifrån mitt teoretiska perspektiv att från början förstå och beskriva konstverket *Diagonalsymfonin* som skapat ur en systemstruktur som kan förklaras genom systemteori. Begreppet *system* har en väldigt öppen definition och Francis Halsall beskriver det kortfattat i sin studie *Systems of Art: art, history and systems theory* på följande sätt: Broadly speaking a system is a set of elements integrated with one another to such an extent that they form a recognisable and coherent whole. In addition, this recognisable and coherent whole performs some type of recognisable function. Thus, in general a system is a collection of components that by virtue of its organisation and function, becomes meaningful in its own right.\(^{109}\) Det som däremot inte har en lika öppen och flytande struktur är de begrepp som ska förklara systemets organisation och funktion. Det är denna analytiska begreppsapparat som jag ska använda mig av och som i kombination med texterna har möjligheten att utöka förståelsen av Eggelings arbetsmetod och det faktiska konstkonceptet *Diagonalsymfonin*, ett koncept, som denna analys ska uppenbara, är en relation mellan bildrullarna, filmen och den övergripande systematiska strukturen. \(^{109}\) Halsall, 2008, s. 23. Det Eggeling fann intressant och användbart i det musikaliska begreppet generalbas var en öppning mot en teori och en praktik för styrning och kontroll av det konstnärliga uttrycket. Inom systemteori är cybernetiken den förgrening som förenar studiet av strukturer för kontroll inom ett system. Den som först behandlade och introducerade detta tema inom systemteorin var Norbert Wieners studie *Cybernetics: Or Control and Communication in the Animal and the Machine* som publicerades år 1948.\(^{110}\) Den text som dock gjorde cybernetiken populär och som i sin utformning tydligt visade på teoribildningens tvärvetenskaplighet, då den undviker den första studien avancerade matematiska symbolism, är Wieners andra studie *The human use of human beings: cybernetics and society* publicerad år 1950.\(^{111}\) Det syfte som Wiener hade med etableringen av cybernetiken var att identifiera och upprätta en vokabulär genom vilken han kunde beskriva "[the] [e]ssential unity of the set of problems centring about communication, control and statistical mechanics, whether in the machine or in living tissue."\(^{112}\) Det Wiener sökte göra i dessa båda publikationer var att visa hur hela tillvaron i princip fungerar och kan förklaras på samma sätt som ett system, nämligen enligt principen om kontroll och kommunikation. Ross Ashby beskriver i *An introduction to cybernetics* hur cybernetiken "treats, not things, but ways of behaving.", att cybernetiken inte frågar vad denna sak är utan vad den gör.\(^{113}\) Pamela M. Lee beskriver i sin studie *Chronophobia: On Time in the Art of the 60s* hur cybernetiken inte ska handla om ett *vad* utan om ett *bur*, inte hur saker är, *ontologi*, utan hur saker blir, *ontogenesis*.\(^{114}\) Cybernetiken ska som jag tolkar det behandla *bur* ett system blir till och *bur* det verkar, identifiera *bur* relationer definierar och formar systemet och klargömma *bur* den interaktiva och omvandlande dynamiken som systemet undergår behåller det som en helhet. En funktion som är av största betydelse i systemets egen kontroll är dess *feedback*-funktion. Funktionen *feedback* har inom ett system till uppgift att kontrollera den information som tillförs systemet så att systemets inre organisering upprätthålls och viljan mot entropi undertrycks. Feedbackfunktionen är systemets egenskap att kunna förändra sina framtida beteenden utifrån resultatet av tidigare beteenden. Wiener beskriver --- \(^{110}\) Wiener, 1961. \(^{111}\) Wiener, 1950. \(^{112}\) Wiener, 1961, s. 19. \(^{113}\) Ashby, W. Ross, *An introduction to cybernetics*, New York, 1956, s. 1. \(^{114}\) Lee, Pamela M., *Chronophobia: On Time in the Art of the 60s*, MIT Press, 2004, s. 64. feedback som att "[i]n its simplest form, the feedback principle means that behavior is scanned for its results, and that the success or failure of this results modifies future behavior" och att den är "a method of controlling a system by reinserting into it the results of its past performance."\textsuperscript{115} Funktionen feedback ger således systemet egenskapen att assimilera sig då det lär sig av tidigare tillförd information hur det ska hantera och organisera framtida tillförd information så att det inte blir ett entropiskt tillstånd i systemet med resultatet att dess inre organisation upplöses och det blir kaos. Det är främst med cybernetiska begrepp med inriktning mot feedback som jag kommer att förklara tillkomsten av \textit{Diagonalsymfonin} som ett konstkoncept. \textit{Första formen, ett öppet system av relationer, en beskrivning av ett hur} I Eggelings egna konstteoretiska skrifter finns tydliga spår av systemteoretiska tankegångar då han i dessa använder begrepp som system, kommunikation och organisation för att förklara sin konst och fenomenet konst. Exempelvis så beskriver Eggeling hur konst och kultur ska inrikta sina krafter på att bilda "ett system av relationer."\textsuperscript{116} Det innebär att varje enskild del därv hänger samman med helheten på så vis att den är giltig endast i förhållande till denna helhet, äger sanning endast i relation till den, kan begripas och förklaras endast utifrån den.\textsuperscript{117} Med utgångspunkt från Eggelings tankar ämnar jag förstå konstverket \textit{Diagonalsymfonin} och dess figurer som delar i ett system. Jag kommer nedan att söka förklara \textit{hur} detta system bildas och verkar, jag kommer sålunda söka förklara Eggelings arbetsmetod. \textit{Det första tinget} Eggeling skriver i en av sina anteckningar att "[i] det första tingets ursprungliga enhet ligger alla tings ursprung."\textsuperscript{118} Denna tanke genomstrålar alla Eggelings skrifter då han i dem på olika sätt skriver om hur en \textit{dominant}, en \textit{constant} eller ett \textit{theme} ska forma \textsuperscript{115} Wiener, 1950, s. 69. [Kursivt i original] \textsuperscript{116} Eggeling [utan datering], 2006b, s. 104. \textsuperscript{117} Eggeling [utan datering], 2006b, s. 104. \textsuperscript{118} Eggeling [utan datering], 2006b, s. 106. skapandet.\textsuperscript{119} Eggeling skriver bland annat hur man ska "[u]nderkasta varje bild en enda rytm, en dominant." och hur det i skapandet ska ske en "[r]e-evaluation of the constant."\textsuperscript{120} Vad är då detta första ting som sedan ligger som grund för alla andra tings ursprung? Jag tolkar att dessa tankar om en \textit{dominant} eller en \textit{constant} har sin grund i Eggelings undersökning av det musikaliska begreppet \textit{generalbas}.\textsuperscript{121} Att Eggeling i sin konst åsyftade att använda sig av en grundform som han i sitt improviserade konsträrliga skapande skulle finna inspiration från och hela tiden förhålla sig mot. Vad denna \textit{dominant} eller \textit{constant} skulle vara skriver inte Eggeling i ord utan han ger ofta visuella exempel på hur förändring kan ske om man utgår från en grundform. Eggelings anteckningar är fyllda av liknande exempel som de som ses i bild 3. Bild. 3. Fotografi ur pamfletten som publicerats i faksimil i Eggeling, Viking & Hans Richter, "Demonstration of the 'Universal Language'" Foster, Stephen C. (red.), \textit{Hans Richter: Activism, Modernism, and the Avant-Garde}, The MIT Press, Cambridge & London, 1998, s. 194. I denna bild ser man enkelt och tydligt hur jag menar att Eggeling tänker sig att denna konstant ska fungera. Eggeling har här numrerat varje formutveckling och man kan i \textsuperscript{119} Jag tolkar att även när Hans Richter, i följande citat ur sin artikel "Easel-Scroll-Film", skriver om en \textit{dominant} eller \textit{constant} resonerar kring en \textit{principle}. "As much as we [Eggeling och Richter] both loved the early work of Kandinsky, we still thought that such free improvisations as his would have to come “later,” after a general principle had been established. [...] This principle would be the challenge, a point of resistance, against any anarchistic abuse of freedom and, as such, a psychological stimulus—not a chain." (Richter, 1952, s. 79.) \textsuperscript{120} Eggeling [utan datering], 2006b, s. 119 & Eggeling & Richter [utan datering], 1998, s. 203. \textsuperscript{121} Generalbasen innehåller, som beskrivits i kapitel 4, en sifferkod som ska ange och styra vilka harmonier som den improviserande musikern ska förhålla sig mot. bilden tolka hur alla dessa figurer förhåller sig till konstanten som har numreringen 7. Det framgår även att varje figur på de olika horisontella nivåerna är en utveckling av den föregående och att varje ny rad börjar med en utveckling från konstanten. Med start i grundformen, konstanten, sker således en horisontell formutveckling på varje rad och en vertikal formutveckling som ska starta en ny horisontell formutveckling på varje rad. Eggeling beskriver i regel hur skapandet av en ny form sker visuellt men vid ett fåtal tillfällen så skriver han kortfattade men innehållsrika reflexioner till dessa visuella beskrivningar. Under rubriken ”utvecklingslära” i en av sina anteckningar så skriver Eggeling om en ”[f]ormernas logiska arvsföljd” och hur ”[h]ela tiden framträder gruppkarakterärerna som gemensamma teman som varje undergrupp varierar på sitt speciella sätt. Förhållandet mellan den som alstrar och det som alstrats: ideala familjeband.”122 Eggeling förklarar även hur ”[k]onstnärlig rikedom ligger inte i godtyckligt uppfinnande utan i formomvandling av de enklaste motiven” och hur ”[f]ree improvisation. Creating new form. Minimal expression before maximal expression.”123 Ovanstående bild och citat skapar en förståelse av hur Eggeling menade att det första tingets ursprungliga enhet kan se ut. Enligt Eggelings skrifter så ska det vara en form med ett minimalt och enkelt uttryck, det behöver emellertid inte vara en geometrisk grundform utan Eggeling ger i sina skrifter flera exempel på icke-geometriska grundformer som ska agera som konstanter i skapandet. Utifrån denna grundform byggs således ett formsystem upp där en mängd formfigurer samlas och där alla figurer har sitt ursprung i denna konstanta grundform. Eggeling förklarar denna skapande process i sin artikel ”Elvi fejtegetések a mozgómüvészetről” när han skriver om en kraft som skapar ”från en gemensam rot till en oändlig, mångfaldig form (inte addition, utan syntes).”124 Det är med denna metod och i ett formsystem som jag menar att formerna i bildrullarna och filmen Diagonalsymfonin har skapats. Jag förstår det som att Eggeling med det relativt slumpmässiga skapandet av en grundform vill låsa in sin konstant i ett formfödande system som innehåller en positiv feedback-loop. 'Locked-in' means that in a situation where any number of states possible for a system to achieve the system becomes phased-locked into one developmental path, regardless of the merits of the 122 Eggeling [utan datering], 2006c, s. 85. 123 Eggeling & Richter [utan datering], 1998, s. 227. & Eggeling [utan datering], 2006c, s. 107. 124 Eggeling [1921], 2006, s. 78. [Kursivt i original] alternatives; and that this occurs through a combination of random factors, the effects of which are accentuated by positive feedback.\textsuperscript{125} När då systemet läser in fenomen 'A' istället för fenomen 'B' i en positiv-feedback är den ordning som följer i systemet hela tiden en utveckling och en förstärkning av 'A'. Den förstärkande effekten av positiv feedback sker eftersom systemet har ett minne och eftersom det har detta minne så är varje tillstånd av systemet därav relaterat till och en utveckling av det föregående tillståndet systemet hade. Så när ett system läser in sig kring ett exempel med en positiv feedback blir det svårt att gå tillbaka och ändra det beteende som systemet har låst in sig mot utan att förstöra systemet och strukturen som sådan. Ett ekonomhistoriskt exempel på positiv-feedback ger W. Brian Arthur i artikeln "Self-Reinforcing Mechanisms in Economics", i artikeln så förklaras historien om VHS-och Betamax-standarden i systemteoretiska termer.\textsuperscript{126} Arthur visar där hur VHS på grund av olika faktorer får övertaget i deras konkurrens situation och hur detta lilla övertag mångfaldigas till marknadsdominans genom inläsning och positiv-feedback. Arthur beskriver hur: The initial starting state combined with early random events or fluctuations acts to push the dynamics into the domain of one of the asymptotic states and thus to select the structure that the system eventually locks into.\textsuperscript{127} Det Halsall använder de systemteoretiska begreppen inläsning och positiv feedback till i sin studie \textit{Systems of Art} är att förklara konstvärldssystemet. Halsall läser dessa systemteoretiska begrepp mot Arthur Dantos och George Dickies teoretiseringar av konstvärlden och konstobjektets status för att ge exempel på hur man genom dessa begrepp kan söka blottlägga konstvärldssystemets strukturella mönster och sociala hegemoni.\textsuperscript{128} Det Eggeling torde syfta till när han gör sina skisser till formsystemet \textit{Diagonalsymfonin}, som sedan filmen eller bildrullarna \textit{Diagonalsymfonin} kommer att baseras på, är att läsa in sin formkonstant i en positiv-feedback så att den ordning som följer hela tiden är en \textsuperscript{125} Halsall, 2008, s. 76. \textsuperscript{126} Arthur, Brian, W., "Self-Reinforcing Mechanisms in Economics" Anderson, Philip W., Arrow, Kenneth J. & Pines, David, Addison-Wesley (red.), \textit{The economy as an evolving complex system: the proceedings of the evolutionary paths of the Global Economy Workshop}, , Redwood City, Calif., 1988. \textsuperscript{127} Halsall, 2008, s. 75. \textsuperscript{128} Halsall, 2008, s. 68–73. utveckling och en förstärkning av denna konstant och systemet som sådant. Varje ny form som Eggeling formger utifrån systemet skapar då ett nytt tillstånd i formsystemet som både relaterar tillbaka till det föregående tillståndet och till konstanten. Jag tolkar det som att Eggeling skriver om dessa olika tillstånd i följande mening: "[e]ach moment must be able to exist in itself, i.e. it must be completed, a world of its own . . . and open for the next, imply the next."129 Eftersom Eggelings formsystem läser in sig mot en formkonstant med positiv feedback så blir det svårt att gå tillbaka och ändra i en tidigare fastlagd formutveckling av systemet utan att rubba helheten och förstöra systemet som sådant. En bild ur Eggelings texter som illustrerar min tanke att varje tillstånd i skapelsen av ett formsystem ska relatera till det föregående tillståndet och till konstanten samt att varje tillstånd i det skapande formsystemet bildar en odelbar helhet är följande bild. Bild. 4. Fotografi ur pamfletten som publicerats i faksimil i Eggeling, Viking & Hans Richter, "Demonstration of the 'Universal Language'" Foster, Stephen C. (red.), Hans Richter: Activism, Modernism, and the Avant-Garde, The MIT Press, Cambridge & London, 1998, s. 192. Denna bild visar hur Eggeling föreställer sig att alla former relaterar tillbaka till de föregående formerna och till konstanten, att de tillsammans skapar en "[f]ormernas logiska arvsföljd."130 I artikeln "Elvi fejtegetéseak a mozgóművészetről", som även illustreras med figurer ur en av bildrullarna, skriver Eggeling om en "[s]kapande växelverkan och logiskt likt och olikt i konceptionen av det föreliggande arbetet."131 Denna mening belyser hur varje form och tillstånd i Eggelings formsystem skapas att vara logiskt lik den föregående men även olik då det är en utveckling av den, det finns således en polaritet i skapandet mellan det logiskt lika och olika. ____________________ 129 Eggeling & Richter [utan datering], 1998, s. 209. 130 Eggeling, Viking, [utan datering], 2006c, s. 85. 131 Eggeling [1921], 2006, s. 78. De bilder som jag ovan använt som exempel visar tydligt på en formernas logiska utveckling, men vilka former i detta system accepteras vara en logisk lik och olik form i utvecklingen av konstanten och den föregående formen? Eggeling måste själv ha ställt inför detta problem men han beskriver det endast en gång. Eggeling skriver kortfattat men träffande: At first the problem (the source) is not clear. According to which law are the changes 'allowed' to occur? What kind of freedom is there? What does it consist of? where are the limits - since the possibilities are un-limited (answer p. 5).132 Detta förblir en obesvarad fråga eftersom Eggeling genomgående i sina texter, även på sidan fem i utkastet till pamfletten *Universelle Sprache* som han i citatet ovan hänvisar till, istället skriver entusiastiskt om formens möjligheter i den utvecklande processen och inte dess begränsningar. Problemet om en lag för formens förändring verkar inte heller vara ett praktiskt problem, eftersom han av allt att döma i sitt konstnärliga arbete hela tiden måste ha bedömt hur de skapade formerna förhöll sig till systemets helhet, utan ett teoretiskt. Eggeling skriver också om hur "[f]örnuftet söker kausalitet, samma verkan i det oändliga." och hur "[f]örnuftet förmår inte ta till sig det som ligger fördolt i skapandet."133 Jag förstår det som att Eggeling med detta menar att formernas utveckling i den praktiska verkligheten inte kan kopplas samman på ett sätt som fångar dem i en labgbunden teori. Att de undflyr att bestämmas genom det inneboende mystiska i det konstnärliga skapandet och om de teoretiskt kunde bestämmas så skulle konstnären vara mer ett medium för den labgbundna teorin istället för att "vara mindre medium, mer magiker."134 När jag tolkar Eggelings granskande beteende till de genererade figurerna verkar han själv framträda som en feedback-funktion i den formskapande processen inom systemet. Eggeling beskriver hur former inte bara bildas genom en syntes med varandra utan även att konstnären har en avgörande roll i systemets skapande och prövande process. Eggeling skriver hur "[s]yntesen är det skapande förhållandet mellan individen och den enhet i --- 132 Eggeling & Richter [utan datering], 1998, s. 205. 133 Eggeling [utan datering], 2006c, s. 88. 134 Författarens översättning av "Weniger Medium mehr Magier sein" (Eggeling, Viking, [utan datering] "Gemeinschaft" i O'Konor, 1971, s. 105.) då översättningen i (Eggeling [utan datering], 2006a, s. 136.) enligt författaren är felaktig. vilken individen ingår, ett logiskt förhållande av skapande, icke-matematisk art."135 Den formulering jag främst fastnar för i denna mening är att Eggeling säger att han ingår i ett icke-matematiskt logiskt förhållande av skapande. Denna formulering implicerar att det sker en subjektiv bedömning i skapandet som involverar Eggeling själv. Genom att Eggeling subjektivt bedömer och kontrollerar varje form som placeras inom formsystemet så styr han informationen inom det. Skapandet av former sker som jag tolkar det inte helt slumpmässigt utan måste förhålla sig till systemet som en helhet och det är Eggelings uppgift att bedöma om den information som tillförs systemet är en logiskt lik och olık del så att systemet kan behålla sin helhet. Vid sidan om sina visuella exempel på formutveckling anger Eggeling, vid flera tillfällen, beskrivande ord som formutvecklingen ska förhålla sig till, exempelvis så står det på samma sida som bild 4 är tagen ifrån "geometrical, repetitious, strong, round."136 Jag förstår det som att Eggeling med dessa skriftliga ledord om hur formen kan utvecklas skapar något att förhålla sig mot, att han internaliserar en uppsättning villkor som sedan styr bedömningen och skapandet av nya former i formsystemet. Konstnären agerar då som en feedback-funktion som kontrollerar införandet av information i systemet så att detta ska kunna fortsätta existera. Efter varje form som tillförs formsystemet lär sig feedback-funktionen av sitt beteende och denna funktion kan då förändra och anpassa dess framtida beteende utifrån resultatet av dess tidigare beteende. Eggeling innehar förutom sin skapande roll också en kontrollerande roll i formsystemets process då han lär sig av systemets tidigare beteenden. På så vis kan Eggeling bli det som han beskriver som en "[ö]dets överman." och genom detta beteende "[b]estämt sikta på den bästa möjliga utvecklingen för framtiden."137 En balans mellan ordning och kaos I det citat som gav upphov till resonemanget i föregående kapitel så finns det ytterligare en fråga att öppna för tolkning och det är frågan om var gränsen för utvecklingen av formsystemet går. Eggeling frågar sig: "where are the limits - since the possiblitites are unlimited."138 För att besvara denna fråga och samtidigt föreställa sig hur Eggeling tänkte --- 135 Eggeling [1921], 2006, s. 79. 136 Eggeling & Richter [utan datering], 1998, s. 195. 137 Eggeling [utan datering], 2006a, s. 135-136. 138 Eggeling & Richter [utan datering], 1998, s. 205. kommer jag nedan att först söka förklara *Diagonalsymfonins* formsystem som ett komplext system. Ett komplext system är först och främst öppet och dynamiskt.\(^{139}\) Ludwig Von Bertalanffy beskriver i *General System Theory* hur "[a]n open system is defined as a system in exchange of matter with its environment, presenting import and export, building-up and breaking-down of its material components."\(^{140}\) Det kan i *Diagonalsymfonins* fall förstås som att dess formsystem inte själv skapar formerna utan att de i den skapande processen formges utanför men i relation till formsystemet. Att systemet är komplext har heller ingenting att göra med om det är stort eller att det är komplicerat utan komplexiteten refererar till hur ett system fungerar. Den systemteoretiska definitionen av ett komplext system har en flytande betydelse men Francis Heylighen har i en artikel försökt fånga dess grundläggande innebörd.\(^{141}\) För att hitta kärnan i de olika systemteoretiska koncepten om begreppet komplexitet så börjar Heylighen med att gå tillbaka till det ursprungliga latinska ordet *complexus* som betyder hoptvinnad och/eller sammanflätad. Heylighen menar att för att kunna ha en komplexitet så måste det då finnas två eller fler komponenter som är sammanlänkade på ett sådant vis att det är svårt att sära på dem. Heylighen beskriver komponenternas sammanflätade beteende som att: Here we find the basic duality between parts which are at the same time distinct and connected. Intuitively then, a system would be more complex if more parts could be distinguished, and if more connections between them existed.\(^{142}\) Anledningen till att vissa system således uppvisar en dynamisk och komplex struktur är på grund av den interaktion som finns mellan systemets delar, att de är skilda delar som tillsammans skapar en odelbar helhet.\(^{143}\) *Diagonalsymfonins* formsystem är enligt mig ett komplext dynamiskt system då det existerar en koppling mellan systemets olika delar. Det är komplext då varje formfigur i formsystemet *Diagonalsymfonin* bidrar till det övergripande \(^{139}\) Dynamiska system är system som uppvissar dynamiska mönster i sitt beteende, med andra ord, de är system som förändrar sig över tid. \(^{140}\) Bertalanffy, Ludwig von, *General system theory: foundations, development, applications*, Rev. ed., 4. pr., Braziller, New York, 1973, s. 141. \(^{141}\) Heylighen, Francis, "What is complexity?" i *Principia Cybernetica Web*, 1996, <http://pespmc1.vub.ac.be/complexi.html> [2010-11-24] \(^{142}\) Heylighen, 1996. Att komponenterna i ett komplext system ska vara *distinct* och *connected* bär enligt mig även en likhet med den dualism som Eggeling beskriver formerna med, nämligen att de ska vara logiskt lika men olika. \(^{143}\) Halsall, 2008, s. 48. systemet som en helhet och för att formerna existerar i ett symbiotiskt förhållande med varandra. Om man följer Heylighens resonemang så beror uppkomsten av komplexitet inom ett system på en balansering mellan dels dess *connection*, att dess delar måste vara sammankopplade, dels dess *differentiation*, att dess delar måste vara distinkta från varandra. Heylighen förklarar att desto högre grad av sammankoppling det finns inom ett system desto högre grad av ordning inom systemet, ett sammankopplat system kommer därför att uppvisa en mindre grad av entropi (ordning) och en högre grad av negativ-entropi.\(^{144}\) En total sammankoppling inom ett system, där alla delar är direkt kopplade mot alla andra delar, leder mot en fullständig ordning inom systemet. "An example of a completely order [sic] system", skriver Halsall, "would be a perfect crystal in which the position of each molecule within the crystal is related to every other molecule in a completely interconnected structure."\(^{145}\) Differentiering, däremot, betyder att delarna inom systemet är skilda från varandra med resultatet att det blir en variation inom systemet och att olika delar inom systemet kommer att bete sig olika. En ökad differentiering inom ett system leder inte bara till en ökad komplexitet utan även mot oordning, en total differentiering inom ett system leder således till total oordning.\(^{146}\) Ett system kan då bara vara komplext om det existerar en balans mellan dess sammankoppling och dess differentiering. Ett komplext system är då både ordnat och oordnat, det har en struktur men också variation och det uppväxer ett dynamiskt beteende med möjlighet till förändring. Balansen mellan oordning och ordning tillåter det komplexa systemet att vara kreativt och förändras över tid men bara till den grad att det behåller sin identitet och helhet. Ett totalt sammankopplat system, som Halsalls kristallexempel, tillåter inte möjligheten till förändring då det skulle förstöra systemet och ett totalt differentierat system kan inte heller förändras då det befinner sig i maximal entropi. Heylighen beskriver hur denna komplexa balans mellan kaos och ordning har lett till att komplexitet inom systemteorin har kommit att kallas *The Edge of Chaos*. Brian Goodwin beskriver hur "[c]omplex systems that can evolve will always be near the edge of chaos, poised for the creative step into emergent novelty that is the essence of the evolutionary process."\(^{147}\) \(^{144}\) Heylighen, 1996. \(^{145}\) Halsall, 2008, s. 50. [Antagligen ska det stå "ordered" och inte "order"] \(^{146}\) Heylighen, 1996. \(^{147}\) Goodwin, B. C., *How the leopard changed its spots*, Weidenfeld & Nicolson, London, 1994, s. 175. Formsystemet till *Diagonalsymfonin* uppvisar denna en komplexa och dynamiska struktur, det är inte stabiliserat utan befinner sig i en ständig rörelse tillsammans med den skapande processen. När Eggeling då frågar sig "where are the limits – since the possiblitites are un-limited" frågar han sig alltså var kanten av kaos är, hur länge han kan bibehålla ordningen i oordningen.\(^{148}\) Möjligheterna för förändring i den formstruktur som börjar i konstanten är, som Eggeling påpekar, obegränsade. När då Eggeling skapade formsystemet till *Diagonalsymfonin* och nya former inom det så började en ständig kamp med att upprätthålla balansen inom det. Utelämmandet bör förstås sålunda: Om en produkt har låt oss säga 21 delar men sju räcker för att återge alla dess goda och verksamma uttryckselement kan man lugnt låta de 14 överflödiga delarna falla bort.\(^{149}\) Man kan förstå ovanstående citat som att Eggeling kommenterar detta sökande efter balans, som ett exempel på hur Eggeling kan ha tänkt om kontrollen av formsystemets differentiering. Eftersom det är balansen mellan oordning och ordning i systemet som tillåter Eggelings komplexa formsystem att vara kreativt och förändras utan att förlora sin identitet så var denna kontroll avgörande. Utan en kontroll av balansen mellan ordning och oordning så skulle inte former kunna utvecklas inom formsystemet *Diagonalsymfonin*. Om det inte fanns en ordning i oordningen skulle inte Eggeling veta var nästa steg i formutvecklingen skulle ske och hur denna form skulle relatera till de andra formerna i systemet. Utan det asymptotiska sökandet mot balans skulle formsystemet *Diagonalsymfonin* falla över kanten till kaos. *Diagonalsymfonin, en dematerialisering av konstens objekt* Det som ovan förklaras är hur de figurer som visas i bildrullarna och filmen *Diagonalsymfonin* har skapats i samverkan med och i en systematisk struktur, hur denna struktur är det centrala i Eggelings konstteoretiska utsagor och i hans konstnärliga verksamhet. Den konsekvens som följer ur tanken om ett formsystem är att Eggeling arbetade med bildrullarna och filmen *Diagonalsymfonin* som en materiell gestaltning av formsystemet *Diagonalsymfonin* och att formsystemet *Diagonalsymfonin* är resultatet av ett \(^{148}\) Eggeling & Richter [utan datering], 1998, s. 205. \(^{149}\) Eggeling [utan datering], 2006b, s. 108. Arbetssätt grundat i en formfödande systematisk struktur, en struktur innehåller vissa regler och villkor för skapandet av form. Att bildrullarna *Diagonalsymfonin*, i sin materiella gestaltning, är väldigt olika filmen *Diagonalsymfonin* hindrar inte dess överordnade likhet då *Diagonalsymfonin* inte är en film eller en bildrulle, utan i sin essens är ett formsystem fyllt med former som kan uttryckas och fixeras av en mängd olika konstnärliga medier. Det finns således ingen materiell mediumspecificitet i konstkonceptet *Diagonalsymfonin* da dess formsystem, som utgör grunden i dess materialiserade konstverk, inte har en definierad materialitet. Detta resonemang leder till att Eggeling i princip skulle ha kunnat använda sig av vilket konstnärligt medium som helst för att arbeta med formsystemet *Diagonalsymfonins* fixering och att filmen och bildrullarna är två olika materiella uttryck som Eggeling valt att använda för att fixera och materialisera detta formsystem. Filmen och bildrullarna *Diagonalsymfonin* är således två exempel på det formsystem som innehåller möjligheten att kunna framställas och fixeras i en mängd olika material. Studiens övergripande analys öppnar även för tolkningen att det betraktaren ser i filmen och i bildrullarna kan vara en demonstration av alla former i formsystemet *Diagonalsymfonin* eller bara ett urval av former i något som är mycket större. Som Egggelings egna anteckningar ger uttryck för så kan han också ha arbetat och experimenterat med flera olika formsystem.\(^{150}\) Detta resonemang öppnar för tolkningen att *Diagonalsymfonin* och *Horizontal-vertikal-orkester* är två formsystem som av flera möjliga har valts ut för att få en fullständig genomarbetning och fixering i ett materiellt konstnärligt medium. Som jag har sökt förmedla är det även svårt att skilja Egggelings konstteoretiska utsagor från hans konstnärliga praktik då båda dessa verksamheter ligger varandra nära. Dessa verksamheter formar sig till ett konstnärligt arbetsfält utan klara gränser där Eggeling praktiskt följde en teoretiskt konstnärlig idé. En idé som syftade till att hans konst skulle utgå från en systematisk struktur med avsikten att generera ett formsystem som har möjligheten att uttryckas och fixeras i en mängd olika materiella medium. *Diagonalsymfonin* kan då förstås som ett tidigt exempel på den dematerialisering av konstobjektet som \(^{150}\) Se Eggeling och Richters pamflett *Universelle Sprache* (Eggeling & Richter [utan datering], 1998,) och Egggelings anteckningar *On composition, On criticism* som publicerats i faksimil i O’Konor, 1971 för fler, som jag tolkar det, exempel på påbörjade och potentiella framtida formsystem. skedde femtio år senare och där flytten av emfas från det estetiska objektet till den estetiska idén tydligare tog både sin teoretiska och materiella form.\textsuperscript{151} Konstkonceptet \textit{Diagonalsymfonin} har som en konstnärlig idé även mycket gemensamt med det som jag nämnde i inledningen och som Jack Burnham förklarade som en \textit{systemets estetik}. Om formsystemet \textit{Diagonalsymfonin} och dess materiella produkter, bildrullarna och filmen \textit{Diagonalsymfonin}, presumtivt hade skapats år 1970 så påstår jag att de skulle ha passat in i utställningen \textit{Software: Information Technology. Its new meaning for art} som Burnham då kurerade för The Jewish Museum i New York. Edward Shanken beskriver hur Burnham i kontrast till andra konstutställningar, som mellan åren 1966 - 1972 mer fokuserade på den praktiska tillämpningen av teknologi på konst, istället tänkte på begrepp som \textit{Software} och \textit{Informationsteknologi} som metaforer för konst. He [Burnham] conceived of "software" as parallel to the aesthetic principles, concepts, or programs that underlie the formal embodiment of the actual art objects, which in turn parallel "hardware." In this regard, he interpreted contemporary experimental art practices, including conceptual art, as predominantly concerned with the software aspect of aesthetic production.\textsuperscript{152} Det är denna förståelse som jag har för konstkonceptet \textit{Diagonalsymfonin}, att dess formsystems tillblivelse och varande kan förstås som en mjukvara som ger upphov till och formar dess hårdvara, bildrullarna och filmen \textit{Diagonalsymfonin}. Konstnären Les Levine ger i katalogen till Burnhams utställning följande kommentar: "[t]he object is the end of a system. The software is an open continuing system."\textsuperscript{153} Detta uttalande är en träffande beskrivning av formsystemet, bildrullarna och filmen \textit{Diagonalsymfonin}. Som studien argumenterar är formsystemet \textit{Diagonalsymfonin} ett öppet komplext system, det är ständigt öppet för förändring. Efter att bildrullarna och filmen \textit{Diagonalsymfonin} har fixerats och skapats ur detta formsystem finns således fortfarande möjligheten till förändring inom formsystemet och dess villkor men inte inom dess produkter. Bildrullarna och filmen \textit{Diagonalsymfonin} befinner sig i slutet av detta system, de \begin{footnotesize} \textsuperscript{151} Lippard, Lucy & Chandler, John, "Konstens dematerialisering" Sven-Olov Wallenstein(red.), \textit{Konceptkonst}, Raster Förlag, Stockholm, 2006, s. 55-78. Kim Wests översättning av Lippard, Lucy & Chandler, John, "The Dematerialization of Art", \textit{Art International}, vol. 12, nr. 2, 1968. \textsuperscript{152} Shanken, Edward A., "Art in the Information Age: Technology and Conceptual Art", \textit{Leonardo}, Vol. 35, nr. 4, 2002, s. 434. \textsuperscript{153} Levine, Les, \textit{Software: Information Technology. Its new meaning for art}, utst. kat. Jewish Art Museum, New York, 1970, citeraad i Wardrip-Fruin, Noah & Montfort, Nick (red.), \textit{The new media reader}, MIT Press, Cambridge, Mass., 2003, s. 255. \end{footnotesize} är fixerade i sin materialitet medan systemet i sig befinner sig i en ständigt flytande förändring. Det är denna rapports konklusion att konstverket *Diagonalsymfonin* är och blir något annat än tidigare forskning tänkt sig om man tar hänsyn till Eggelings egna konstteoretiska skrifter. Konstverket *Diagonalsymfonin* är och bildar då en gränslös konceptuell helhet i relationen mellan dess teoretiska premisser och dess praktiska utförande, det var för Viking Eggeling och är för oss idag ett frågande konstkoncept som hade som sitt syfte att problematiserar sin egen tillblivelse och kontrollen över den skapande processen. 6. Sammanfattning Rapportens syfte har varit att ur systemteoretiska begrepp förstå och förklara relationen mellan Viking Eggelings egna konstteoretiska utsagor och hans konstverk *Diagonalsymfonin*. Inledningsvis presenteras den konstnärliga kontext som Eggeling under sin levnadstid befann sig inom och tillsammans arbetade med. Rapporten söker beskriva hur Eggeling ständigt befann sig i det europeiska avantgardets framkant och hur detta umgänge öppnade Eggelings föreställningsvärld för ny konst och nya konstteoretiska tankegångar. Rapporten fortsätter sedan med att beskriva tidigare forskning som gjorts om Eggelings konstverk *Diagonalsymfonin*. Det rapporten kommer fram till är att Eggelings konstnärskap och *Diagonalsymfonin* främst blivit förklarat utifrån en kontextuell inramning där Hans Richter agerat huvudrollen. Tolkningar av *Diagonalsymfonin* har ofta favoriserat Richters konstnärskap och de utsagor som präglar hans konstnärliga diskurs. Sålunda har *Diagonalsymfonin* inte tolkats från en position där det ensam är i fokus utan *Diagonalsymfonin* har alltid, både direkt och indirekt, befunnit sig i en undergiven kontextuell förklarandeprocess där Richters konstnärliga anspråk och utsagor har dominerat tolkningen. Efter redogörelsen för de tidigare tolkningarna av *Diagonalsymfonin* så presenteras min analys. Rapportens tolkande metod är att samla Eggelings konst tillsammans med Eggelings egna konstteoretiska skrifter i ett teoretiskt ramverk präglat av systemteori. Det är analysens argument att både filmen och bildrullarna *Diagonalsymfonin* har sin grund i och kan förklaras genom en systemstruktur. Denna systemstruktur har av Eggeling formgivits med inspiration av det musikaliska begreppet *generalbas*. Det Eggeling fann användbart i detta begrepp var en öppning mot en teori och en praktik för styrning och kontroll av det konstnärliga uttrycket. Studien söker sedan utifrån sitt teoretiska perspektiv förklara hur Eggeling, i sitt konstnärliga skapande, utgår ifrån en grundform som sedan styr utvecklingen och skapar ett system av efterföljande former. Att det centrala i Eggelings konstnärliga verksamhet således var att skapa ett system av former, det är sedan detta formsystem som tar materiell gestalt i filmen och bildrullarna *Diagonalsymfonin*. Eggelings arbetsmetod för att skapa detta formsystem förklaras med det cybernetiska begreppet *feedback* och studien tolkar det som att Eggeling vill låsa in sin grundform i en positiv-feedback loop som sedan ger upphov till systemets skapelse, att formsystemet *Diagonalsymfonin* utgörs av figurer som bildar och bildas i ett system av relationer. *Diagonalsymfonins* formsystem har även karaktären av en dynamisk och komplex struktur. Det är således föränderligt över tid och uppvisar en interaktion mellan systemets olika delar som även fast de är skilda tillsammans skapar en odelbar helhet i systemet. Att varje formfigur i *Diagonalsymfonin* bidrar till det övergripande systemet som en helhet och de existerar i ett symbiotiskt förhållande med varandra. Den konsekvens som följer ur rapportens resonemang om ett formsystem är att Eggeling då arbetade med *filmen* och *bildrullarna Diagonalsymfonin* som en materiell gestaltning av *formsystemet Diagonalsymfonin* och att *formsystemet Diagonalsymfonin* då är resultatet av ett arbetssätt grundat i en formfödande systematisk struktur. Denna struktur har Eggeling skapat med inspiration från det musikaliska begreppet *generalbas* och innehåller vissa regler och villkor för skapandet av form. Det finns således ingen materiell mediumspecificitet i den systemstruktur som denna studie anser har skapat *filmen* och *bildrullarna Diagonalsymfonin*. *Filmen Diagonalsymfonin* är ett exempel på ett materiellt konstnärligt uttryckssätt som Eggeling använder sig av för att fixera och konstnärligt uttrycka denna formstruktur. 7. Litteratur Tryckta källor Arthur, Brian, W., "Self-Reinforcing Mechanisms in Economics" Anderson, Philip W., Arrow, Kenneth J. & Pines, David, Addison-Wesley (red.), *The economy as an evolving complex system: the proceedings of the evolutionary paths of the Global Economy Workshop*, Redwood City, Calif., 1988. Ashby, W. Ross, *An introduction to cybernetics.*, New York, 1956. Auger, Pascal, "Histoire d'une falsification. La Symphonie diagonale, Viking Eggeling, (1925-1927-1941)", *Cinémathèque*, nr. 11, 1997, s. 84-93. Bergson, Henri, *Creative evolution*, Holt, New York, 1911. Bertalanffy, Ludwig von, *General system theory: foundations, development, applications*, Rev. ed., 4. pr., Braziller, New York, 1973. Bochner, Mel, "The Serial Attitude", *Artforum*, nr. 4, 1967, s. 28-33. Brinck-Esson, Birger, "Linjemusik på vita duken. 'Konstruktiv film', ett intressant experiment av en svensk konstnär", *Filmjournalen*, vol. 5, nr. 4, Stockholm, 1923, s. 50. Burnham, Jack W., "Systems Esthetics" *Artforum*, vol. 7, nr. 1, 1968, s. 30-35. Burnham, Jack, *Beyond modern sculpture: the effects of science and technology on the sculpture of this century*, 2. pr., Braziller, New York, 1969. Doesburg Van, Theo, "Abstract Film Composition" i O'Konor, 1971, s. 46-48. Louise O'Konors översättning av Doesburg Van, Theo, "Abstracte filmbeelding" *De Stijl*, vol. 4. nr. 5, 1921, s. 71-75. Eggeling, Viking & Hans Richter, "Demonstration of the 'Universal Language" Foster, Stephen C. (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 184-240. Harald Stadlers översättning av Eggeling, Viking & Hans Richter, [okänd titel], [utan datering]. Eggeling, Viking, [utan datering] "Film" i O'Konor, Louise, *Viking Eggeling 1880-1925: Modernist och Filmpionjär*, Atlantis, Stockholm, 2006c. Eggeling, Viking, [utan datering] "Gemeinschaft" i O'Konor, 1971, s. 105. Eggeling, Viking, [utan datering] "Gemenskap" i O'Konor, Louise, *Viking Eggeling 1880-1925: Modernist och Filmpionjär*, Atlantis, Stockholm, 2006a. Eggeling, Viking, "Letter from Viking Eggeling to Sara Oelrich", 1902, faksimil i O'Konor, Louise, *Viking Eggeling 1880-1925 Artist and Film-Maker Life and Work*, Almqvist & Wiksell, Stockholm, 1971. Eggeling, Viking, [utan datering] "Om det andliga i människan, om olika kompositionsmetoder" i O'Konor, Louise, *Viking Eggeling 1880-1925: Modernist och Filmpionjär*, Atlantis, Stockholm, 2006b. Eggeling, Viking, "On composition. On criticism", faksimil i O'Konor, Louise, *Viking Eggeling 1880-1925 Artist and Film-Maker Life and Work*, Almqvist & Wiksell, Stockholm, 1971. Eggeling, Viking, "Principiellt om rörelsekonsten" i O'Konor, 2006, s. 77-80. Louise O'Konors översättning av Eggeling, Viking, "Elvi fejtegetések a mozgóművészetről" *MA.*, vol. 6, nr. 8, 1921, s. 105-106. Elder, R. Bruce, "Hans Richter and Viking Eggeling: The Dream of Universal Language and the Birth of The Absolute Film", *Avant-Garde and Critical Studies*, vol. 23, 2007, s. 3-53. Elder, R. Bruce, *Harmony and Dissent: Film and the Avant-Garde Movements in the Early Twentieth Century*, Wilfred Laurier University Press, Canada, 2008. Finkeldey, Bernd, "Hans Richter and the Constructivist International" Foster, Stephen C., (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 92-121. Foster, Stephen C., (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998. Goodwin, B. C., *How the leopard changed its spots*, Weidenfeld & Nicolson, London, 1994. Halsall, Francis, *Systems of art: art, history and systems theory*, Peter Lang, Bern, 2008. Hausmann, Raoul & Eggeling, Viking, "Andra presentistiska deklarationen. Riktad till de internationella konstruktivisterna" i O'Konor, 2006, s. 81-85. Louise O'Konors översättning av Hausmann, Raoul & Eggeling, Viking, "Zweite präsentistische Deklaration. Gerichtet an die internationalen Konstruktivisten" *MA.*, vol. 8, 1923. Hoffman, Justin, "Hans Richter: Constructivist Filmmaker" Foster, Stephen C., (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 74 & Elder, 2008, s. 129. Holmér, Folke, Östlund, Egon & Lindegren, Erik, *Halmstadgruppen: Waldemar Lorentzon, Axel Olson, Erik Olson, Esaias Thorén, Sven Jonson, Stellan Mörner, Rabén & Sjögren*, Stockholm, 1947. Jones, John E., [utan titel], *Leonardo*, Vol. 7, Nr. 1, 1974, s. 81-82. Kandinsky, Wassily, *Om det andliga i konsten*, [Ny utg.], Vinga press, Göteborg, 1994. Lawder, Standish D., *The Cubist Cinema*, New York University Press, New York, 1975. Le Grice, Malcolm, *Abstract film and beyond*, Studio Vista, London, 1977. Lee, Pamela M, *Chronophobia: On Time in the Art of the 60s*, MIT Press, 2004. Levine, Les, *Software: Information Technology. Its new meaning for art*, utst. kat. Jewish Art Museum, New York, 1970 citerad i Wardrip-Fruin, Noah & Montfort, Nick (red.), *The new media reader*, MIT Press, Cambridge, Mass., 2003. Lippard, Lucy & Chandler, John, "Konstens dematerialisering" Sven-Olov Wallenstein (red.), *Konceptkonst*, Raster Förlag, Stockholm, 2006, s. 55-78. Kim Wests översättning av Lippard, Lucy & Chandler, John, "The Dematerialization of Art", *Art International*, vol. 12, nr. 2, 1968. Lärkner, Bengt, *Det internationella avantgardet och Sverige 1914-1925*, Diss., Stenvall, Lund : Univ., Malmö, 1984. Moholy-Nagy, László, *Malerei, Photographie, Film.*, Langen Vlg, München, 1925. Nordenfalk, Carl & Richter, Hans (red.), *Viking Eggeling 1880-1925: Tecknare och filmkonstnär : 27 oktober-19 november*, Nationalmuseum, Stockholm, 1950. O’Konor, Louise, *Viking Eggeling 1880-1925 Artist and Film-Maker Life and Work*, Almqvist & Wiksell, Stockholm, 1971. O’Konor, Louise, *Viking Eggeling 1880-1925: Modernist och Filmpionjär*, Atlantis, Stockholm, 2006. O’Konor, Louise, ”Översättning av Viking Eggeling”, *Konstrevy*, nr. 4., 1967. Reveaux, Anthony, [utan titel], *Film Quarterly*, Vol. 29, Nr. 4, 1976, s. 27-29. Richter, Hans, *Hans Richter*, Holt, Rinehart and Winston, New York, 1971. Richter, Hans, ”A Review Article”, *The Journal of Aesthetics and Art Criticism*, Vol. 30, Nr. 4, 1972, s. 545-549. Richter, Hans, ”Easel-Scroll-Film” *Magazine of Art*, 1952:feb, s. 78-86. Richter, Hans, ”The Film as an Original Art Form”, *College Art Journal*, Vol. 10, nr. 2., 1951, s. 157-161. Richter, Hans, ”My Experience with Movement in Painting and Film” Kepes, Gyorgy (red.), *The nature and art of motion*, Braziller, New York, 1965, s. 142-157. Richter, Hans, "Prinzipielles zur Bewegungskunst." *De Stijl*, vol. 4, nr. 7, 1921, s. 109-112 i O’Konor, 1971, s. 90-91. Roditi, Edouard, ”Interview with Hannah Höch by Edouard Roditi” Lippard, Lucy (red.), *Dadas on Art*, Prentice-Hall, New Jersey, 1971. Shanken, Edward A., "Art in the Information Age: Technology and Conceptual Art", *Leonardo*, Vol. 35, nr. 4, 2002, s. 433-438. Turvey, Malcom, ”Dada between Heaven and Hell: Abstraction and Universal Language in the Rythm Films of Hans Richter”, *October*, vol. 105, 2003, s. 13-36. Verkauf, Willy (red.), *Dada: monograph of a movement*, Academic Ed., London, 1975. Wardrip-Fruin, Noah & Montfort, Nick (red.), *The new media reader*, MIT Press, Cambridge, Mass., 2003. Wiener, Norbert, *Cybernetics or control and communication in the animal and the machine*, 2. ed., MIT Press, New York, 1961. Wiener, Norbert, *The human use of human beings: cybernetics and society*, Houghton Mifflin, Boston, 1950. Werner, Gösta & Edlund, Bengt, *Viking Eggeling Diagonalsymfonin: Spjutspets i en återvändsgränd*, Novapress, Lund, 1997. Wollen, Peter, *Paris Hollywood: writings on film*, Verso, London, 2002. Worringer, Wilhelm, *Abstraction and empathy*, Ivan R. Dee Publisher, Chicago, 1997. **Övriga källor** *DADA*, Tzara, Tristan (red.), nr. 4/5. Zürich, 1919, <http://sdrc.lib.uiowa.edu/dada/dada/4_5/index.htm> [2010-11-27] Eggeling, Viking, *Diagonalsymfonin*, <http://www.ubu.com/film/eggeling.html> [2010-10-28] Heylighen, Francis, "What is complexity?" i *Principia Cybernetica Web*, 1996, <http://pespmc1.vub.ac.be/complexi.html> [2010-11-24] Nationalencyklopedin, ”Generalbas”, <http://www.ne.se/lang/generalbas> [2010-11-12] Nationalencyklopedin, ”Guglielmo Marconi”, <http://www.ne.se/lang/guglielmo-marconi> [2010-10-25] Nationalencyklopedin, ”Hans Richter”, <http://www.ne.se/lang/hans-richter> [2010-11-08] Tzara, Tristan, ”Chronique Zurichoise 1915-1919” i *Dada Almanach*, Richard Huelsenbeck (red.), Erich Reiss Verlag, Berlin, 1920, s. 10. <http://sdrc.lib.uiowa.edu/dada/da/pages/010.htm> [2010-11-08] 8. Bildförteckning Bild. 1. Viking Eggeling, *Diagonal Symphony I*, 50x534cm, Kunstmuseum Basel i O’Konor, 1971, s. 218. Bild. 2. Viking Eggeling, *Horizontal-vertical Orchestra I*, 51.5x456cm, Kunstmuseum Basel i O’Konor, 1971, s. 209. Bild. 3. Eggeling, Viking & Hans Richter, ”Demonstration of the ‘Universal Language” Foster, Stephen C. (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 194. Bild. 4. Eggeling, Viking & Hans Richter, ”Demonstration of the ‘Universal Language” Foster, Stephen C. (red.), *Hans Richter: Activism, Modernism, and the Avant-Garde*, The MIT Press, Cambridge & London, 1998, s. 192.
4b225dbf-de74-40c1-a10e-1b8d8f344bfe
HuggingFaceFW/finepdfs/tree/main/data/swe_Latn/train
finepdfs
swe_Latn
138,517
На основание чл.21, ал.1, т.12 от ЗМСМА и чл.8, ал.8 от Закона за общинската собственост, с 0 /нула/ гласа „за”, „против”- няма, „въздържали се” – 13, Общинският съвет не прие РЕШЕНИЕ № 12 Гласящо: Приема Стратегия за управление на общинската собственост в община Божурище за периода 2016-2019г. Протоколист: /Н.Костова/ Председател на ОбСъвет: /В. Симеонов/ На основание чл. 21, ал.1, т.7 от ЗМСМА, чл. 66, ал.1 от ЗМДТ и чл.17 от Наредбата за определянето и администрирането на местните такси и цени на услуги на територията на община Божурище, във връзка с чл.8, ал.1 от ЗМДТ и чл. 64, ал.2, т.2 от Правилника за организацията и дейността на Общинския съвет, неговите комисии и взаимодействието му с общинската администрация с 13 гласа „за”, както следва: 1. Аспарух Аспарухов за 2. Ваня Аризанова за 3. Венцислав Симеонов за 4. Весела Иванова-Петрова за 5. Веселка Симова за 6. Георги Димитров за 7. Грета Станкова за 8. Иван Миланов за 9. Мая Спасова за 10. Паулина Дудова за 11. Петрана Котупанова за 12. Снежана Славейкова за 13. Юлиян Методиев за „против”- няма, „въздържали се” – няма, Общинският съвет РЕШИ: I. ОДОБРЯВА ПЛАН - СМЕТКА за необходимите средства и тяхното разходване за поддържане на чистотата на населените места в община Божурище за 2016 година | Приходи, в т.ч. | 985000 | |----------------|--------| | 1. От такса битови отпадъци | 685500 | | за гр. Божурище | 405500 | | за селата | 280000 | | 2. Прогнозен остатък от 2015 година | 300000 | | за гр. Божурище | 165000 | | за селата | 135000 | | Разходи, в т.ч. | 1118200 | |----------------|---------| | 1. За осигуряване на съдове за битови отпадъци | 12500 | | За гр. Божурище | 7500 | | За селата | 5000 | | 2. За сметосъбиране и сметоизвозване | 383900 | | За гр. Божурище | 192500 | | За селата | 191400 | | 3. За депониране на отпадъци | 141500 | | За гр. Божурище | 72800 | | За селата | 68700 | | 4. За поддържане на териториите за обществено ползване | 277200 | | За гр. Божурище | 140000 | 5. Отчисления по чл. 64 от Закона за управл. на отпадъците | За гр. Божурище | 87400 | |-----------------|-------| | За селата | 82500 | II. Определя цени на съдове за съхранение на битови отпадъци за услугите по сметосъбиране и сметоизвозване и обезвреждане на битовите отпадъци на регионално депо, както следва: **Цени за гр. Божурище** 1. 104,00 лева за съд “Мева” 110 л., при кратност 4 пъти месечно. 2. 836,00 лева за съд “Бобър” 1100 л., при кратност 4 пъти месечно. 3. 1 672,00 лева за съд “Бобър” 1100 л., при кратност 8 пъти месечно. **Цени за всички села** 1. 104,00 лева за съд “Мева” 110 л., при кратност 4 пъти месечно. 2. 836,00 лева за съд “Бобър” 1100 л., при кратност 4 пъти месечно. III. Определя размер на такса за битови отпадъци за 2016г., за предприятията, както следва: 1. Предприятията заплащат такса битови отпадъци в размер на **3 промила** върху по-голямата стойност между данъчната оценка и отчетната стойност на недвижимите имоти, в т.ч: - 1.1. За събиране на битови отпадъци, транспортиране до регионално депо – **1 промил**; - 1.2. Проучване, проектиране, изграждане, поддържане, експлоатация, закриване и мониторинг на депо за битови отпадъци, вкл. отчисленията по чл. 64 от ЗУО - **1 промил**. - 1.3. За почистване на улични платна, площади, алеи, паркове и други обществени места – **1 промил**. 2. Когато предприятията не ползват услугата по сметосъбиране и сметоизвозване и са декларирали това обстоятелство, заплащат такса за поддържане на чистотата на обществени територии в размер на **1 промил** върху по-голямата стойност между данъчната оценка и отчетната стойност на недвижимите имоти. 3. Когато предприятията ползват услугата по сметосъбиране и сметоизвозване на база количество съдове по предварително подадена декларация, съгласно чл. 23, ал. 2 от Наредбата за определянето и администрирането на местни такси и цени на услуги на територията на община Божурище, заплащат стойността на съдовете и **1 промил** върху по-голямата стойност между данъчната оценка и отчетната стойност на недвижимите имоти за почистване на улични платна, площади, алеи, паркове и други обществени места. IV. Определя размер на такса за битови отпадъци за 2016г. за населението по населени места, както следва: 1. За имоти, попадащи в границите на районите за сметоизвозване и сметосъбиране и поддържане чистотата на териториите за обществено ползване, определени със заповед № РД-352/30.10.2015г. на кмета на община Божурище, таксата се определя като промил върху данъчната оценка на недвижимите имоти (земя и сграда): 1.1 За територията на гр. Божурище – **5 промила**, разпределени по услуги, както следва: - Събиране на битови отпадъци и транспортиране до депо - **2 промила** - Обезвреждане на битовите отпадъци чрез депониране, включително отчисленията по чл. 64 от ЗУО - **2 промила** - Почистване на улични платна, площади, алеи, паркове и други обществени места - **1 промил** 1.2 За територията на с. Гурмазово, с. Пожарево, с. Росоман, с. Златуша, с. Делян, с. Пролеша, с. Хераково и с. Храбърско – **10 промила**, разпределени по услуги както следва: - Събиране на битови отпадъци и транспортиране до депо - 5 промила - Обезвреждане на битовите отпадъци чрез депониране, включително отчисленията по чл. 64 от ЗУО - 4 промила - Почистване на улични платна, площади, алеи, паркове и други обществени места - 1 промил 2. За имоти, попадащи в границите на районите за за почистване на терени за обществено ползване, определени със заповед № РД-352/30.10.2015г. на кмета на община Божурище, таксата се определя като промил върху данъчната оценка на недвижимите имоти (земи и сгради) за услугата: - Почистване на улични платна, площади, алеи, паркове и други обществени места - 2 промила. Протоколист: /Н. Костова/ Председател на ОСС: /В. Симеонов/ На основание чл.1, ал.2 ЗМДТ и чл.21, ал.2 от ЗМСМА, с 12 гласа „за”, „против”-няма, „въздържали се” – 1, Общинският съвет РЕШИ: Изменя Наредбата за определяне размера на метните данъци на територията на община Божурище, приета с решение №9/14.02.2008 г. на ОбСъвет – гр.Божурище; изменена с Решение №101/18.12.2008 г.; изменена с Решение №2 от 22.01.2009 г.; изменена с Решение №5/28.01.2010 г.; изменена с решение №39/28.04.2011г., изменена и допълнена с решение №140 от Протокол №10/2013-15 от 19.12.2013г., както следва: 1. В чл.41 се правят следните изменения: 1.1 Алинея 1, точка 5 се изменя така: „5. над 110 kW – 1,25 лв. за 1 kW;” 1.2 Алинея 3 се изменя така: „2. над 125 до 250 куб. см. включително – 30 лв. 3. над 250 до 350 куб. см. включително – 40 лв. 4. над 350 до 490 куб. см. включително – 50 лв. 5. над 490 до 750 куб. см. включително – 70 лв. 6. над 750 куб. см. – 100 лв.” 1.3. Алинея 6 се изменя така: „Данъкът за товарен автомобил до 12 т. технически допустима максимална маса е в размер 10 лв. за всеки започнат тон товароносимост.” 1.4. Алинея 7 се изменя така: „(7) Данъкът за седловия влекач и влекач за ремарке, се определя в зависимост от допустимата максимална маса на състава от превозни средства, от броя на осите и вида на окачването на влекача, посочени в свидетелството за регистрация на влекача, както следва: | Брой оси на седловия влекач/влекача за ремарке | Допустима максимална маса на състава от превозни средства, посочена в свидетелството за регистрация на влекача (в тона): | Данък (в лева) | |-----------------------------------------------|----------------------------------------------------------------------------------|----------------| | | равна или повече от | по-малка от | задвижваща ос/оси с пневматично или с окачване, прието за еквивалентно на пневматичното | други системи за окачване на задвижващата ос/оси | | А) с две оси | - | 18 | 10 | 30 | | | 18 | 20 | 30 | 65 | | | 20 | 22 | 65 | 150 | 1.5. Алинея 8 се изменя така: "(8) Данъкът за специализирани строителни машини (бетоновози, бетон-помпи и други), автокранове, специализирани ремаркета за превоз на тежки или извънгабаритни товари и други специални автомобили, без тролейбусите, е в размер от 100 лв." 1.6. Алинея 13 се изменя така: "(13) Данъкът за товарни автомобили с допустима максимална маса над 12 т. се определя в зависимост от допустимата максимална маса, броя на осите и вида на окачването, както следва: | Брой оси на моторното превозно средство | Допустима максимална маса | Данък (в лв.) | |----------------------------------------|--------------------------|---------------| | | равна или повече от | | | | помалка от | | | | задвижваща ос/оси с пневматично или с окачване, прието за еквивалентно на пневматичното | други системи за окачване на задвижващата ос/оси | | А) с две оси | 12 | 13 | 30 | 61 | | | 13 | 14 | 61 | 170 | | | 14 | 15 | 170 | 240 | | | 15 | - | 240 | 550 | | Б) с три оси | 15 | 17 | 61 | 110 | | | 17 | 19 | 110 | 220 | | | 19 | 21 | 220 | 290 | | | 21 | 23 | 290 | 440 | | | 23 | - | 440 | 675 | | В) с четири оси | 23 | 25 | 290 | 300 | | | 25 | 27 | 300 | 450 | | | 27 | 29 | 450 | 710 | | | 29 | - | 710 | 1050 | 1. В чл.45 се правят следните изменения: 1.1. Алинея 1 се изменя така: "(1) За превозните средства с мощност на двигателя до 74 kW вкл., снабдени с действащи катализаторни устройства и несъответстващи на екологичните категории "Евро 3", "Евро 4", "Евро 5", "Евро 6" и "EEV", определеният данък за съответната година се заплаща с намаление от 40 на сто." На основание чл.21, ал.2 от ЗМСМА, със 7 гласа „за”, „против”- 1 , „въздържали се” – 5, Общинският съвет РЕШИ: Отменя решение №108 от протокол №11/2015-15 от проведено заседание на Общински съвет Божурище на 22.10.2015 г. Протоколист: /Н.Костова/ Председател на ОбС: В. Симеонов На основание чл.21, ал.1, т.8 и чл.27, ал.4 и ал.5 от ЗМСМА, чл.14, ал.6 и ал.7 от Закона за общинската собственост, и чл. 64, ал.2, т.2 от Правилника за организацията и дейността на Общинския съвет, неговите комисии и взаимодействието му с общинската администрация с 12 гласа „за”, както следва: 1. Аспарух Аспарухов за 2. Ваня Аризанова за 3. Венцислав Симеонов за 4. Весела Иванова-Петрова за 5. Веселка Симова за 6. Георги Димитров за 7. Грета Станкова за 8. Иван Миланов за 9. Мая Спасова за 10. Паулина Дудова за 11. Петрана Котупанова за 12. Снежана Славейкова за против – няма, „въздържал се” – 1 - Юлиян Методиев, Общинският съвет РЕШИ: Общински съвет-Божурище дава съгласието си да се отдават под наем без търг или конкурс, след подаване на заявление, за срок от 3 години, на помещения, определени за предоставяне на здравни дейности, находящи се в: 1. Сградата на Поликлиниката – гр.Божурище, с административен адрес: 2. гр. Божурище, пл."Първи май" № 1 3. Сградата на Кметство с.Хераково, община Божурище 4. Сградата на Кметство с.Пролеша, община Божурище 5. Сградата на Кметство с.Храбърско, община Божурище на следните лица: 1. МДЦ "САЗДАНОВСКИ МЕДИКА НОВА" ООД - кабинет № 10, находящ се на втори етаж в сградата на Поликлиниката в гр.Божурище; 2. Д-р Радка Димитрова Йосифова-Дончева - кабинет № 2, находящ се на първи етаж в сградата на Поликлиника в гр.Божурище (съвместява се с д-р Минев, по график); 3. Д-р Светла Господинова Вълкова - stomatологичен кабинет, находящ се в СОУ „Летец Христо Топракчиев”; 4. Д-р Людмила Младенова Живкова - кабинети № 5 и № 6, находящи се на първия етаж в сградата на Поликлиниката в гр.Божурище; 5. Д-р Ирина Станиславова Тимева - 1. Медицински кабинет, находящ се в сградата на Кметство с.Пролеша; 2. Медицински кабинет – две преходни помещения, намиращи се на първия етаж в сградата на Кметство с.Храбърско; 6. Д-р Нели Боянова Недялкова – 1. Кабинет по дентална медицина, намиращ се на втори етаж в сградата на Кметство с.Хераково; 2. Стоматологичен кабинет № 16, намиращ се на втори етаж в сградата на Поликлиниката в гр.Божурище; 7. Д-р Теменужка Борисова Божкова - кабинети № 3 и № 4, находящи се на първия етаж в сградата на Поликлиниката в гр.Божурище; 8. Д-р Зорка Янева Гигова - кабинет № 11, находящ се на втория етаж в сградата на Поликлиниката в гр.Божурище; 9. Д-р Катя Димитрова Пулева - стоматологичен кабинет №15, находящ се на втори етаж в сградата на Поликлиниката в гр.Божурище; Протоколист: /Н.Костова/ Председател на Община: /В. Симеонов/ На основание чл.21, ал.1, т.23 и ал.2 от ЗМСМА, с 13 гласа „за”, „против”- няма, „въздържали се” – няма, Общинският съвет РЕШИ: 1. Дава съгласие за участие на община Божурище, в проект „Дигитализация на културно-историческото наследство на Софийска област“, разработен от Областна администрация на Софийска област, за кандидатстване по Програма за трансгранично сътрудничество Интеррег-ИПП България-Сърбия 2014-2020г. 2. Дава съгласие културно-историческите обекти на територията на община Божурище, да бъдат включени в дейностите на проекта, и да бъдат обект на дигитализация. 3. Възлага на кмета на община Божурище и го упълномощава, да подготви необходимите документи, за подкрепа и участие в проекта, описан в т.1. 4. Протоколист: /Н.Костова/ Председател на ОбС: В.Симеонов На основание чл.21, ал.1, т.12 от ЗМСМА, във връзка с чл.26а, ал.2 от Закона за народните читалища, с 13 гласа „за”, „против” – няма, „въздържали се” – няма, Общинският съвет РЕШИ: Приема Годишна Програма за развитие на читалищната дейност в Община Божурище за 2016г. Протоколист: /Н.Костова/ Председател на ОбСъвет /В.Симеонов/ На основание чл.21, ал.1, т.1 и т.23, във връзка с чл.27, ал.4 и ал.5 от ЗМСМА, чл.8, ал.2 от Закона за уреждане правата на граждани с многогодишни жилищно спестовни влогове, във връзка с чл.16, ал.3 от Правилника за прилагането му и чл. 64, ал.2, т.2 от Правилника за организацията и дейността на Общинския съвет, неговите комисии и взаимодействието му с общинската администрация с 13 гласа „за”, както следва: 1. Аспарух Аспарухов за 2. Ваня Аризанова за 3. Венцислав Симеонов за 4. Весела Иванова-Петрова за 5. Веселка Симова за 6. Георги Димитров за 7. Гreta Станкова за 8. Иван Миланов за 9. Мая Спасова за 10. Паулина Дудова за 11. Петрана Котуланова за 12. Снежана Славейкова за 13. Юлиян Методиев за „против” – няма, „въздържали се” – няма, Общинският съвет РЕШИ: 1. Определя местната комисия по жилищно спестовните влогове в община Божурище да се състои от 5 (пет) членове, от които 2 (двама) представители на Общински съвет – Божурище и 3 (трима) представители на общинската администрация. 2. Определя: 2.1. За председател на местната комисия Виктория Петрова Йосифова – представител на общинската администрация, телефон за връзка 08********* и за членове: 2.2. Габриела Антонова Дончева - представител на общинската администрация, телефон за връзка 08********* 2.3. Цветелина Петрова Димитрова - представител на общинската администрация, телефон за връзка 08********* 2.4. Паулина Жорова Дудова - представител на Общинския съвет, телефон за връзка 08********* 2.5. Гreta Димитрова Станкова - представител на Общинския съвет, телефон за връзка 08********* 3. Възлага на кмета на общината, да изпрати уведомление до Управителния съвет на Националния компенсационен жилищен фонд към МС, за утвърждаване на комисията, съгласно изискванията на чл.16, ал.3 от ПП ЗУПГМЖСВ. Протоколист: /Н.Костова/ Председател на ОбС /В.Симеонов/ На основание чл. 21, ал.1, т.23 от ЗМСМА, във връзка с чл. 10, ал .4 от Закона за регулиране на водоснабдителните и канализационни услуги (ЗРВКУ), с 13 гласа „за”, „против” – няма, „въздържали се” – няма, Общинският съвет РЕШИ: Съгласува допълнение на одобрения бизнес план за развитието на дейността на Водоснабдяване и канализация ЕООД – София за периода 01.01.2016г. - 31.12.2016г. Протоколист: /Н.Костова/ Председател на ОбС: /В.Симонов/ На основание чл.21, ал.1, т.15 от ЗМСМА, във връзка с чл. 12, ал.2 и чл. 27, ал. 1 от Устава на НСОБР и чл. 64, ал.2, т.2 от Правилника за организацията и дейността на Общинския съвет, неговите комисии и взаимодействието му с общинската администрация, с 13 гласа „за”, както следва: 1. Аспарух Аспарухов за 2. Ваня Аризанова за 3. Венцислав Симеонов за 4. Весела Иванова-Петрова за 5. Веселка Симова за 6. Георги Димитров за 7. Гreta Станкова за 8. Иван Миланов за 9. Мая Спасова за 10. Паулина Дудова за 11. Петрана Котупанова за 12. Снежана Славейкова за 13. Юлиян Методиев за „против” – няма, „въздържали се „ – няма, Общинският съвет РЕШИ: 1. Определя за делегат в Общото събрание на Националното сдружение на общините в Република България председателя на Общинския съвет Венцислав Теофилов Симеонов 2. При невъзможност за участие на определения по т. 1, делегат в заседание на Общото събрание, той ще бъде заместван от Иван Илиев Миланов зам. председател на Общинския съвет. Протоколист: /Н.Костова/ Председател на ОбС: /В.Симеонов/ На основание чл. 26, ал. 1 от ЗМСМА и чл. 17, ал. 1 от Правилника за организацията и дейността на Общинския съвет, неговите комисии и взаимодействието му с общинската администрация, с 12 гласа „за”, „против” – няма, „въздържали се” - 1, Общинският съвет РЕШИ: Определя основно трудово възнаграждение на Председателя на Общински съвет Божурище, за цялостната му работа при 8 часов работен ден в размер на 90% от възнаграждението на кмета на общината. Размерът на възнаграждението при намалено работно време се определя пропорционално на неговата продължителност, определена от Общинския съвет, съгласно действащия правилник. Протоколист: /Н. Костова/ Председател на ОС: /В. Симеонов/ На основание чл.21, ал.1, т.5 от ЗМСМА, във връзка с Приложение № 5 към чл.2, т.4 от Постановление на МС № 67 от 14 април 2010г. за заплатите в бюджетните организации и дейности, с 0 гласа „за”, „против” – 4, въздържали се 9, Общинският съвет не прие РЕШЕНИЕ: Гласяще: Определя основни трудови възнаграждения на кметовете на кметства, считано от 01.01.2016г., както следва: 1. Кмет на кметство Гурмазово – 700 лв. 2. Кмет на кметство Пожарево – 700 лв. 3. Кмет на кметство Пролеша – 800 лв. 4. Кмет на кметство Хераково – 800 лв. 5. Кмет на кметство Храбърско – 800 лв. Протоколист: /Н.Костова/ Председател на ОБС: /В. Симеонов/ На основание чл. 21, ал.1, т.23 от ЗМСМА, във чл.7 ал. 4, т.3 от НПОС и чл. 92 от КСО, с 13 гласа „за”, „против” – няма, „въздържали се „ – няма, Общинският съвет РЕШИ: Да се внесе предложение чрез Националния осигурителен институт до Министерски съвет за отпускане на персонална пенсия на Лилия Петрова Петрова с ЕГН ********** и адрес: с. Пролеша, ул. „Боян Тошев“ № 2. Протоколист: /Н.Костова/ Председателя на ОбС гр. Божурище: Симеонов/ На основание чл. 52, ал. 1, т. 3 от Закона за водите и чл.21, ал.1, т.23 и ал.2 от ЗМСМА, с 13 гласа „за”, „против” – няма, „въздържали се „ – няма, Общинският съвет РЕШИ: Общински Съвет - Божурище дава съгласието си за издаване разрешително, за ползване на воден обект – микроязовир „Храбърско“, публична общинска собственост, съгласно АПОС № 25 от 04.07.1997г., за спортен и любителски риболов. Протоколист: /Н.Костова/ Председател на ОБС: /Д.Симонов/ На основание чл. 21, ал.1, т.23 и ал. 2 от ЗМСМА, чл.8, ал.6 от Закона за местни данъци и такси, чл.8, ал.3 от Наредба за определянето и администрирането на местните такси и цени на услуги на Община Божурище, с 13 гласа „за”, „против” – няма, „въздържали се,” – няма, Общинският съвет РЕШИ: Освобождава от такса битови отпадъци за 2016 г. Фондация „Защитено жилище Заедно”, ЕИК 175121344, по данъчна партида №7302F3885. Протоколист: /Н. Костова/ Председател на ОБС: /В. Симеонов/ На основание чл. 21, ал. 1, т. 23 от ЗМСМА, с 11 гласа „за“, „против“- няма, „въздържали се“ - 2, Общинският съвет РЕШИ: Удостоверява, че дейностите по проект “Ремонт на Църква Св.Троица, гр.Божурище“, Община Божурище, с кандидат Църковно настоятелство на Църква ”Св.Троица”, гр.Божурище по Програма за развитие на селските райони 2014 – 2020г., подмярка 7.6 „Проучвания и инвестиции, свързани с поддържане, възстановяване на културното и природното наследство на селата“, не са в противоречие на приоритетите на Общински план за развитие на Община Божурище 2014 – 2020г. Протоколист: /Н.Костова/ Председател на ОбС: В.Симонов
<urn:uuid:81ee8598-5322-4cf4-9afe-f4ddb73307f9>
HuggingFaceFW/finepdfs/tree/main/data/bul_Cyrl/train
finepdfs
bul_Cyrl
21,698
Uchwała Nr LVIII/491/2018 Rady Powiatu Sanockiego z dnia 15 października 2018 roku w sprawie zmiany uchwały budżetowej Powiatu Sanockiego na 2018 rok Na podstawie art. 12 pkt. 5 ustawy z dnia 5 czerwca 1998r. o samorządzie powiatowym (t.j. Dz. U. z 2018 r. poz. 995 z późn. zm.) oraz art. 212 ust. 1 ustawy z dnia 27 sierpnia 2009r. o finansach publicznych (t.j. Dz. U. z 2017r. poz. 2077 z późn. zm.) Rada Powiatu Sanockiego uchwala, co następuje: § 1 W uchwale budżetowej Powiatu Sanockiego na 2018 rok, wprowadza się następujące zmiany: 1. W tabeli nr 1 uchwały budżetowej zwiększa się dochody Powiatu Sanockiego w: dziale 758 – Różne rozliczenia o kwotę 1.073 zł rozdz. 75814 – Różne rozliczenia finansowe o kwotę 1.073 zł Dochody bieżące Wpływy z pozostałych odsetek o kwotę 1.073 zł (odsetki bankowe) 2. W tabeli nr 2 uchwały budżetowej zwiększa się wydatki Powiatu Sanockiego w: dziale 758 – Różne rozliczenia o kwotę 1.073 zł rozdz. 75801 – Część oświatowa subwencji ogólnej dla jednostek samorządu terytorialnego o kwotę 1.073 zł Wydatki bieżące, w szczególności na: zwrot do budżetu państwa nienależnie pobranej subwencji ogólnej za lata poprzednie o kwotę 1.073 zł Starostwo Powiatowe w Sanoku § 2 Wykonanie uchwały powierza się Zarządowi Powiatu Sanockiego. § 3 Uchwała wchodzi w życie z dniem podjęcia. [Podpis] PRZEWODNICZĄCY RADY Waldemar Och
<urn:uuid:c7fbab8f-72c2-4aeb-ade0-d5abd00a7645>
HuggingFaceFW/finepdfs/tree/main/data/pol_Latn/train
finepdfs
pol_Latn
1,402
. VIGÊNCIA INÍCIO: IDENTIFICAÇÃO AU-013/2022 FOLHA (Nº/DE) 1/1 FIM: TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 REFERÊNCIAS TEMA: AU – Auditoria Interna PALAVRAS-CHAVE: estratégia da função de auditoria interna, plano de negócios PROCESSO 12.04 – Gerenciar auditoria interna CÓDIGO DE CLASSIFICAÇÃO 010.01 CLASSIFICAÇÃO DA INFORMAÇÃO Ostensivo O CONSELHO DE ADMINISTRAÇÃO DO SERVIÇO FEDERAL DE PROCESSAMENTO DE DADOS – SERPRO, no uso das competências que lhe atribuem os art. 19 e 42 do Estatuto Social do SERPRO, em atendimento à Norma 2050 - Coordenação e Confiança da Estrutura Internacional de Práticas Profissionais (IPPF), ao Regimento Interno da Auditoria Interna do SERPRO e alinhado ao previsto no KPA 2.6 - "Plano de Negócio de Auditoria Interna" do modelo IA-CM (Internal Audit Capability Model for the Public Sector), recomendado pela Portaria CGU nº 777/2018, DELIBERA: 1.0 Aprovar a Estratégia da Função Auditoria Interna 2022 – 2024 para estabelecer a diretriz de Auditoria Aberta e respectivas ações, conforme detalhado no Anexo 1, buscando o melhor resultado conjunto das instâncias internas e externas de controle, em termos de preservar e adicionar valor empresarial. 2.0 Cancelar a Deliberação AU-019/2019, de 29 de outubro de 2019. MARCO PAULO REIS TANURE Presidente do Conselho – em exercício DEIVI LOPES KUHN Conselheiro Representante dos Empregados JOÃO MANOEL DA CRUZ SIMÕES Conselheiro RAFAEL BICCA MACHADO Conselheiro Independente CÉSAR AUGUSTO GUIMARÃES Conselheiro FERNANDO ANDRÉ COELHO MITKIEWICZ Conselheiro JOÃO PEDRO VIOLA LADEIRA Conselheiro Independente 1 TIPO DOC. DELIBERAÇÃO IDENTIFICAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 1/9 VERSÃO - 1.0 AUDITORIA ABERTA O que é Auditoria Aberta? Para nós, Auditoria Aberta é buscar o melhor resultado conjunto das instâncias de controles, em termos de preservar e adicionar valor empresarial. Nós criamos essa expressão inspirados nas práticas de Inovação Aberta, muito aplicada no setor de tecnologia para manter a competitividade. Por meio da descentralização estruturada, da coordenação e da confiança (combined assurance), nossa estratégia é ampliar a cobertura sobre governança, gestão de riscos e controles internos, assim como sustentar entregas relevantes e de valor agregado, buscando abordagens novas e mais eficientes. E o que não é? Auditoria Aberta não é perda da independência e da objetividade, típicas da 3ª linha, pois respeita as competências e segregações de funções. Entendemos que a cultura forte e o maior nível de maturidade que alcançamos, assim como as demais linhas, nos permite buscar resultados descentralizados de modo consistente para reforçarmos o cumprimento do propósito, da missão e da própria definição de Auditoria Interna. O que muda em relação ao que já fazemos? A busca de maior coordenação e a definição de critérios para asseguração combinada (combined assurance). Para isso, trouxemos para o centro da Estratégia 2022 a 2024 a melhoria dos canais com clientes internos (gestores, 2ª linha), com provedores externos de avaliação e consultoria, com reguladores, órgãos de controle interno e externo, com auditorias internas públicas e privadas. Estratégia participativa. O sucesso dessa estratégia depende da postura dos profissionais da Auditoria Interna, assim como dos parceiros internos e externos. Sendo assim, precisa incluir iniciativas que promovam a cultura participativa, de maior abertura, assim como ações orientadas ao desenvolvimento da coordenação de planos de trabalho, da asseguração combinada e do intercâmbio de conhecimentos e de boas práticas. 2.0 DEFINIÇÃO, PROPÓSITO, MISSÃO, VISÃO E DOS VALORES DA AUDITORIA INTERNA Definição. Auditoria Interna é definida como uma atividade independente e objetiva de avaliação e de consultoria exercida pela AUDIN, atuando tipicamente na terceira linha. Propósito. Aumentar e proteger o valor empresarial, contribuindo para melhorias operacionais, gerenciais e estratégicas Missão. Auxiliar a empresa a realizar seus objetivos, por meio da aplicação de uma abordagem sistemática, disciplinada e baseada em riscos para avaliar e aprimorar os processos de governança, de gerenciamento de riscos e de controles internos Visão. Ser inovadora para induzir as melhores práticas de governança, gestão de riscos, controles e auditoria, colaborando com as instâncias internas e externas de controle. Valores. A conduta ética dos profissionais da Auditoria Interna deve estar em consonância com o Código de Ética, Conduta e Integridade do Serpro, com o Código de Ética do The IIA e com os Princípios Fundamentais para a Prática da Atividade de Auditoria Interna Governamental aplicáveis ao SCI, adotando os seguintes valores: TIPO DOC. IDENTIFICAÇÃO 1 DELIBERAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 a) integridade; b) objetividade e autonomia técnica; c) confidencialidade e sigilo profissional; d) competência, proficiência e zelo profissional; e) alinhamento às estratégias, objetivos e riscos do Serpro; f) atuação respaldada em adequado posicionamento e em recursos apropriados; g) qualidade e melhoria contínua; e h) comunicação eficaz; Estratégia Plurianual. De modo a orientar a atuação da Auditoria Interna para o cumprimento do propósito, da missão e da visão, o titular da Auditoria Interna submeterá proposta de estratégia plurianual da atividade de auditoria interna, incluindo o nível de capacidade pretendido, à aprovação pelo Conselho de Administração, após análise pelo Comitê de Auditoria. FOLHA(Nº/DE) 2/9 VERSÃO - 1 TIPO DOC. DELIBERAÇÃO IDENTIFICAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 3.0 ESTRATÉGIA 2022 – 2024 Fonte: adaptado de https://distrito.me/blog/inovacao-aberta-open-innovation/ FOLHA(Nº/DE) 3/9 VERSÃO - 1 TIPO DOC. DELIBERAÇÃO IDENTIFICAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 4/9 VERSÃO - 4.0 ROADMAP PARA AUDITORIA ABERTA TIPO DOC. IDENTIFICAÇÃO 1 DELIBERAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 5/9 VERSÃO - 5.0 DETALHAMENTO DAS AÇÕES PARA AUDITORIA ABERTA Apresentamos a seguir as ações da Estratégia 2022-2024 para Auditoria Aberta, organizadas por tipos de produtos da Auditoria Interna. 5.1 Principais Riscos (Governança) O que: Estabelecer e manter Mapa de cobertura combinada de objetivos, riscos e controles. Porque: Permitir futura visão integrada da Asseguração Combinada (Combined Assurance), considerando o grau de independência e o resultado dos trabalhos. Onde: Em sistema corporativo com painel para a alta administração. Como: Catalogar trabalhos das 3 linhas, de avaliadores e consultores externos, conectando os resultados a objetivos, riscos e controles corporativos 1.2 O que: Estabelecer critérios para incorporar, depositar confiança ou complementar trabalhos de terceiros. Porque: Requisito de qualidade para viabilizar práticas de Combined Assurance, visando o melhor resultado sistêmico de GRC para o Serpro. Onde: Decisão Setorial, Manual Operacional e PGMQ. Como: Estabelecer cenários típicos e os procedimentos esperados da Audin para aproveitar resultados de trabalhos de terceiros. 1.3 O que: Contribuir para a gestão de riscos de integridade, por meio da consolidação de trabalhos da Audin. Porque: Fortalecer a gestão corporativa de riscos de integridade (fraude, corrupção ou desvios de conduta ética) por meio dos trabalhos de auditoria interna. Onde: Em pauta do Comitê de Integridade Como: Consolidar periodicamente o resultado de avaliações da Audin sobre riscos de integridade e compartilhar com o Comitê de Integridade. 1.4 O que: Aumentar a cobertura de GRC por meio do Combined Assurance de objetivos, riscos e controles. Porque: Obter o melhor resultado sistêmico para a empresa a partir do Mapa de cobertura combinada de objetivos, riscos e controles. Onde: Em sistema corporativo com painel para a alta administração. Como: Atribuir pesos considerando grau de independência e resultados dos trabalhos, priorizando os objetos auditáveis. 1.5 O que: Intercâmbio profissional com especialistas internos e com auditores em outras organizações. Porque: Realizar imersão de auditores para oxigenar conhecimentos, abordagens e metodologias, sem prejudicar independência e objetividade. Onde: Oportunidades de intercâmbio priorizadas. Como: Prospectar oportunidades de intercâmbio de interesse e buscar profissionais com o perfil desejado. 1 TIPO DOC. DELIBERAÇÃO IDENTIFICAÇÃO AU-013/2022 TÍTULO FOLHA(Nº/DE) 6/9 VERSÃO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 - 1.6 O que: Revisar o PAINT considerando o Mapa de Combined Assurance de objetivos, riscos e controles. Porque: Aumentar o valor adicionado pela Audin, considerando o monitoramento do Combined Assurance de objetivos, riscos e controles. Onde: No Plano Anual de Auditoria Interna 2023. Como: Focando em preencher lacunas entre maior nível de risco e menor nível de asseguração combinada, considerando rotação de ênfase. 1.7 O que: Fomentar a realização de reuniões abertas do PGMQ (Fórum de Qualidade) com outras empresas. Porque: Facilitar a troca de experiências e a internalização de boas práticas de auditoria interna. Onde: Videoconferência e presencial. Como: Apresentar proposta de reuniões abertas de qualidade ao fórum de empresas no Rio de Janeiro. 1.8 O que: Fortalecer a imagem da Auditoria Interna do Serpro perante parceiros externos. Porque: Aumentar a confiança de parceiros externos na auditoria interna da empresa, visando facilitar a abertura de canais externos de interlocução. Onde: Conbrai 2022 (Videoconferência). Como: Pleitear vaga de palestrante no Congresso Brasileiro de Auditoria Interna – Conbrai 2022. 1.9 O que: Medir o progresso do Serpro em práticas de Combined Assurance Porque: Evidenciar os avanços em direção às melhores práticas de Combined Assurance, visando o melhor resultado sistêmico de GRC para o Serpro. Onde: Relatório de Autoavaliação em Combined Assurance. Como: Mapear boas práticas e estágios de maturidade em Combined Assurance, visando identificar estágio atual e próximos passos. 5.2 Principais Contratos (Compliance) 2.1 O que: Mapa de cobertura combinada de contratos. Porque: Permitir futura visão integrada da asseguração combinada (Combined Assurance) sobre contratações, considerando o grau de independência e os resultados dos trabalhos. Onde: Em sistema corporativo com painel para a alta administração. Como: Catalogar trabalhos das 3 linhas, de avaliadores e consultores externos, compilando reincidências de falhas para devolutiva às equipes de gestão. 2.2 O que: Estabelecer esteiras de auditoria contínua para apoiar o fortalecimento da cobertura pelas demais linhas. Porque: Contribuir com ferramentas para Asseguração Combinada com demais linhas baseada em red flags (KRI). Onde: Em sistema corporativo para monitoramento dos red flags, com painel para a alta administração. Como: Implantar lógica de backlog, de priorização conjunta e de consolidação do resultado de trilhas de auditoria contínua. O que: Aumentar cobertura de contratos porCombined Assurance. TIPO DOC. IDENTIFICAÇÃO 1 DELIBERAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 7/9 VERSÃO - Porque: Obter o melhor resultado para a empresa em termos de compliance de contratações, a partir do Mapa de cobertura combinada. Onde: Em sistema corporativo com painel para a alta administração. Como: Atribuir pesos considerando grau de independência e resultados dos trabalhos, priorizando os contratos auditáveis. 5.3 Contabilidade Fidedigna (Viabilidade) 3.1 O que: Benchmark de auditoria em ERP. Porque: Acelerar a curva de aprendizado para aprimorar os resultados de auditorias realizadas com base no ERP. Onde: MXM – ERP Corporativo. Como: Realizar reuniões técnicas com outras auditorias de empresas (privadas ou públicas) que utilizem ou tenham experiência de auditoria nesse ERP. 3.2 O que: Implantar boas práticas de auditoria contínua em ERP. Porque: Contribuir com o uso do ERP como fonte confiável de informação empresarial, buscando extrair o melhor resultado da sua implantação. Onde: ERP, Datalake e ferramentas de BI. Como: Prospectar e implantar boas práticas de auditoria em ERP por meio de benchmark com outras empresas e organizações. 3.3 O que: Aumentar cobertura sobre ERP por Combined Assurance. Porque: Permitir futura visão integrada da asseguração combinada (Combined Assurance) sobre a contabilidade no ERP, considerando o grau de independência e os resultados dos trabalhos. Onde: MXM – ERP Corporativo. Como: Atribuir pesos considerando grau de independência e resultados dos trabalhos, priorizando as contas contábeis auditáveis. 5.4 AUDIN Confiável (Confiabilidade) 4.1 O que: Fomentar capacitação em dados aplicada a auditoria interna e funções de controle. Porque: Visando a expansão do uso de auditorias contínuas, realizar imersão de auditores em abordagens baseadas em dados. Onde: Datalake e ferramentas de BI. Como: Prospectar perfis com potencial e desenvolver projetos aplicados de cruzamentos de dados para auditoria e controle. 4.2 O que: Atingir nível de capacidade 4 no IA-CM. Porque: Requisito de qualidade para viabilizar a presente estratégia. Onde: Relatório de Autoavaliação no IA-CM. Como: Consolidar a gestão de auditoria baseada em métricas objetivas e fortalecer a imagem interna e externa da Audin. NÚMERO 1 TIPO DOC. DELIBERAÇÃO IDENTIFICAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 8/9 VERSÃO - 4.3 O que: Atingir nível de capacidade 5 no IA-CM. Porque: Buscar melhoria contínua para a auditoria a partir do monitoramento das métricas definidas e da visão prospectiva. Onde: Relatório de Autoavaliação no IA-CM. Como: Implantar Plano de Melhoria Contínua no PGMQ, monitorando ações decorrentes dos indicadores apurados e da visão prospectiva de auditoria. 4.4 O que: Prestar contas do progresso na presente Estratégia 2022-2024. Porque: Governança das ações voltadas a realizar o propósito, da missão e da visão da Auditoria Interna do Serpro. Onde: Relatórios quadrimestrais aos colegiados. Como: Reporte do andamento do Plano de Ações da Estratégia 2022-2024. 4.5 O que: Revisar a Estratégia 2022-2024. Porque: Requisito de qualidade para corrigir rumos da Estratégia para Combined Assurance, visando o melhor resultado sistêmico de GRC para o Serpro. Onde: Deliberação da Estratégia 2022-2024. Como: A partir do balanço do Plano de Ação, avaliar necessidade de revisão da Estratégia. 4.6 O que: Manutenção do Selo de Qualidade QA-IIA. Porque: Garantia da conformidade com a Estrutura Internacional de Práticas Profissionais de Auditoria Interna (IPPF). Onde: Relatório de Autoavaliação no QA-IIA. Como: Revisar o pleno cumprimento dos elementos obrigatórios das IPPF, a partir da Autoavaliação no QA-IIA (Blue Book). 5.5 Órgãos de Controle (Enforcement) 5.1 O que: Norma de escalada de pendências. Porque: Contribuir com a efetividade dos apontamentos de auditoria, por meio da escalada hierárquica de pendências. Onde: Sistema de auditoria, com painéis para a alta administração. Como: Aprovação de Deliberação pelo CA regulamentando as hipóteses e prazos para escalada. 5.2 O que: Mapa de cobertura combinada com externos. Porque: Permitir futura visão integrada considerando os externos da Asseguração combinada (Combined Assurance), levando em conta o grau de independência e o resultado dos trabalhos. Onde: Em sistema corporativo com painel para a alta administração. Como: Catalogar trabalhos das 3 linhas, de avaliadores e consultores externos, conectando os resultados a objetivos, riscos e controles corporativos. 5.3 O que: Estabelecer e manter canal aberto de interlocução com prestadores externos de avaliação e consultoria. Porque: Facilitar a internalização de boas práticas e melhorias necessárias na visão de avaliadores e consultores externos. TIPO DOC. IDENTIFICAÇÃO 1 DELIBERAÇÃO AU-013/2022 TÍTULO ESTRATÉGIA DA FUNÇÃO DE AUDITORIA INTERNA 2022-2024 FOLHA(Nº/DE) 9/9 VERSÃO - Onde: Em sistema corporativo para acompanhamento da execução do plano de trabalho. Como: Programar plano de trabalho (agenda de reuniões e pauta) com avaliadores e consultores externos. 5.6 Sistemas de Governo (Eficácia) 6.1 O que: Implantar abordagem de auditorias como projetos. Porque: Desconcentração da responsabilidade nas equipes e uso de abordagens descentralizadas voltadas a resultados de alto valor agregado. Onde: PAINT. Como: Auditores experientes como responsáveis por projetos de auditoria, inclusive pelo resultado, equipe e novas abordagens. 5.7 Projetos Estratégicos (Estratégia) 7.1 O que: Aumentar a proximidade da Audin em temas estratégicos da empresa e das diretorias. Porque: Favorecer a análise contextualizada e a capacidade da Audin de adicionar valor à estratégia e às operações, sem prejudicar a independência e a objetividade dos trabalhos. Onde: Em colegiados estatutários, de governança e estratégicos, assim como nas diretorias. Como: Participar como convidado (sem decisão) nos fóruns citados 5.8 Principais Processos (Eficiência) 8.1 O que: Ampliar a responsividade do PAINT. Porque: Plano de auditoria mais responsivo frente a novos desafios empresariais, visão prospectiva de riscos e a gaps de Combined Assurance. Onde: PAINT. Como: Estabelecer revisão periódica do backlog e sistemática de repriorização de trabalhos. 5.9 Ambiente De Controle (Maturidade) 9.1 O que: Implantar esteiras para (auto)avaliação dos controles pelas demais linhas. Porque: Permitir uma visão comum entre as linhas da maturidade de riscos e controles. Onde: Em sistema corporativo para monitoramento e hierarquização, com painel para a alta administração. Como: Capacitar agentes de risco e agentes corporativos para realizarem (auto)avaliação de controles usando o COSO ICIF.
<urn:uuid:f72af88a-319a-4b13-b03b-9e2a3f8e0d1a>
HuggingFaceFW/finepdfs/tree/main/data/por_Latn/train
finepdfs
por_Latn
18,353
Stokeinteignhead Parish Council Clerk: Mrs Rachel Avery, 7 Trafalgar Close, Newton Abbot, TQ12 2SJ (01626) 335813 / email@example.com AGENDA FOR THE MEETING OF STOKEINTEIGNHEAD PARISH COUNCIL PLANNING COMMITTEE TUESDAY 25 APRIL 2017 IN THE COMMITTEE ROOM, STOKEINTEIGNHEAD VILLAGE HALL You are hereby SUMMONED to attend the Meeting of the Council, which is to be held in the Committee Room, Stokeinteignhead Village Hall on Tuesday 25 April 2017 at 1930 for transacting the following business: | No | Subject | |---|---| | 1 | The Chairman will open the Meeting and receive apologies. | | 2 | To declare any interests arising at this meeting and to consider any dispensation requests relating to this meeting. | | | The Council will adjourn for the following items: | | 3 | Public Question Time: A period of 15 minutes will be allowed for members of the public to ask questions or make comment regarding the work of the Council or other items that affect Stokeinteignhead. | | | The Council will convene to conduct the following business: | | 4 | To consider the following planning applications: 17/00888/TEL Installation of 20m mast with 3 antennae and 2 microwave dishes and two equipment cables (Higher Gabwell Farm, Stokeinteignhead/Telefonica UK Ltd) 17/00886/FUL Demolition of the existing detached garage and replacement with a new attached office and garage building and new roof over existing porch (Deane House, Deane Road, Stokeinteignhead/Mr P French) 17/00828/FUL and 17/00829/LBC Re-thatching the existing roof including formation of a new eyebrow window in the master bedroom on the east elevation (2 Myrtle Cottage, Deane Road, Stokeinteignhead/Mr W Dagworthy) | | 5 | To note the date of the next meeting: Tuesday 09 May 2017. | Signed: Parish Clerk 19/04/2017
<urn:uuid:6cb8c861-deca-49c5-888f-49b77dd9fb21>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,784
Installation Instructions The All-On-One-Board Pre-Amplifier covers a range from 1.8 to 30 MHz and provides a selectable gain of 0db, ~6dB and ~12dB. Installation of the Pre-Amplifier 1. Install the pre-amplifier with the component side down on the chassis wall above the loudspeaker. 2. Unsolder coax cable from soldering terminal of the HP-filter. 3. Solder the coax cable to the soldering terminal 'from LPF' of the pre-amplifier. 4. Solder a short coax cable from the terminal 'to HPF' of the pre-amplifier to terminal of the HPfilter. 5. Connect the 13,5 Volt soldering terminal to a 13,5 Volt source on the main board. Modification of STORE push button to act as Touch-Contact-Switch. 1. Unsolder wire '8' and '9' from 'STORE' push button switch. 2. Solder an 'L' shaped limiting stop '10', made out of a 1.5mm copper wire, to the centre connection of the push button switch. Wire 'A' is leading to the touch contact terminal on the pre-amplifier board. 3. Remove notch lever '6' and keep safe for later use. 4. Solder wire 'A' to the Touch Contact terminal on the pre-amplifier board. Installation of Gain Indication LED 1. Drill a hole at a suitable location on the front panel to accommodate the LED-holder. See picture above. 2. Solder 4-core cable to the LED and to the terminal on the pre-amplifier board marked as red, black, blue and green. 3. To improve light dispersion of the LED, remove 2mm from the lens part. A little disc of approx. Ø 5mm made from a 2mm Teflon sheet has been fitted and glued into the LED holder to soften the light emission. Re-labelling upper panel - Unplug and unscrew the UP, DOWN, STORE push button switch on the inside of the Radio. - Slide acryl glass cover and upper panel to the open side. - Unscrew one of the black PVC side panels. - Pull off the protection film from the supplied self-adhesive -PRE-AMP- label. - Reassemble upper panel, acryl glass cover, UP, DOWN, PRE-AMP push button switch and side panel. - Use tweezers to place label centred over the -STORE- imprint and press gently onto the upper panel. Alternative solution from PA1HFO/DK4DDS To avoid drilling holes into the front panel, and to keep the original condition of the TR7 install a sub-panel on the bottom to accommodate the touch contact switch and multicolour LED. Willi Rass – DF4NW Richard-Strauß-Str. 56 91315 Höchstadt Germany URL: http://www.df4nw.de NWT 4 Linux & Windows 15 Oktober 2008, 10:26 Schrittweite: 29.060 kHz; Messpunkte: 999 Startfrequenz: 1.000000 MHz; Endfrequenz: 30.001880 MHz The –40dB line represents 0dB gain Low Gain (~6dB) 1.842798 MHz Kursor 1: Kanal1: -34.86dB – -40dB = 5.14dB Kursor 2: --------------------- 7.044896 MHz --------------------- Kanal1: -33.91dB – -40dB = 6.08dB Kursor 3: Kanal1: -33.71dB – -40dB = 6.29dB 14.165086 MHz --------------------- 21.081842 MHz Kursor 4: Kanal1: -33.52dB – -40dB = 6.48dB Kursor 5: --------------------- 28.376404 MHz --------------------- Kanal1: -33.71dB – -40dB = 6.29dB Kanal 1 min:-36.20dB 1.058124 MHz max:-33.33dB 22.476818 MHz ------------------------------------- High Gain (~12dB) 1.842798 MHz Kursor 1: Kanal2: -27.20dB – -40dB = 12.80dB Kursor 2: --------------------- 7.044896 MHz --------------------- Kanal2: -26.63dB – -40dB = 13.37dB Kursor 3: Kanal2: -26.63dB – -40dB= 13.37 dB 14.165086 MHz --------------------- 21.081842 MHz Kursor 4: Kanal2: -26.63dB – -40dB = 13.37dB Kursor 5: --------------------- 28.376404 MHz --------------------- Kanal2: -26.63dB – -40dB = 13.37dB Kanal 2 min:-28.16dB 1.029062 MHz max:-26.24dB 12.421366 MHz ---------------------------------------
<urn:uuid:a6b8414f-1a93-4e00-8849-8056e4243459>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
3,658
COMPENDIO DE PROCEDIMIENTOS EN LA UNIDAD DE CUIDADO INTENSIVO NEONATAL (UCIN) Elaborado por: Grupo de especialistas en Neonatología del IGSS Guías de Práctica Clínica Basadas en Evidencia “COMPENDIO DE PROCEDIMIENTOS EN LA UNIDAD DE CUIDADO INTENSIVO NEONATAL (UCIN)” INSTITUTO GUATEMALTECO DE SEGURIDAD SOCIAL SUBGERENCIA DE PRESTACIONES EN SALUD COMISIÓN CENTRAL DE ELABORACIÓN GPC-BE Este documento debe citarse como: Instituto Guatemalteco de Seguridad Social (IGSS) Subgerencia de Prestaciones en Salud Comisión de Elaboración de Guías de Práctica Clínica Basadas en Evidencia (GPC-BE) “Compendio de procedimientos en la Unidad de Cuidado Intensivo Neonatal (UCIN)” Edición 2017; págs. 216 IGSS, Guatemala. Elaboración revisada por: Subgerencia de Prestaciones en Salud - IGSS Providencia No. 13190 de fecha 04 de Diciembre 2017 Revisión, diseño y diagramación: Comisión Central de Elaboración de Guías de Práctica Clínica Basadas en Evidencia; Subgerencia de Prestaciones en Salud. IGSS-Guatemala 2017 Derechos reservados-IGSS-2017 Se autoriza la reproducción parcial o total de este documento por cualquier medio, siempre que su propósito sea para fines docentes y sin finalidad de lucro, a todas las instituciones del sector salud, públicas o privadas. Instituto Guatemalteco de Seguridad Social GERENCIA Dr. Vidal Heriberto Herrera Herrera Gerente Dr. Arturo Ernesto García Aquino Subgerente de Prestaciones en Salud AGRADECIMIENTOS Grupo de desarrollo Dra. Ana Lorena Álvarez Castañeda (Coordinadora) Médico Neonatólogo Hospital de Gineco Obstetricia Dr. José Venancio Bran González Médico Neonatólogo Subgerencia de Prestaciones en Salud Dr. Víctor Manuel Calderón Rivera Médico Neonatólogo Hospital de Gineco Obstetricia Dr. Oscar Walter Donis Osorio Médico Epidemiólogo Subgerencia de Prestaciones en Salud Dr. Emanuel Isaí Cuc Velásquez Médico Residente de Neonatología Hospital de Gineco Obstetricia Dra. Heidy Yolanda Pérez Chun Médico Residente de Neonatología Hospital de Gineco Obstetricia Dra. Norma Judith Díaz Pineda Médico Residente de Neonatología Hospital de Gineco Obstetricia Dra. Andrea García Acevedo Médico Residente de Neonatología Hospital de Gineco Obstetricia Revisor Dr. Gustavo Adolfo Herrera Gamarro Jefe de servicio de neonatología Hospital Juan José Arévalo Bermejo. COMISIÓN DE GUÍAS DE PRÁCTICA CLÍNICA BASADAS EN LA EVIDENCIA Msc. Dr. Edwin Leslie Cambranes Morales Jefe del Departamento de Medicina Preventiva Subgerencia de Medicina Preventiva Msc. Dr. Jorge David Alvarado Andrade Coordinador Comisión Central de Desarrollo de GPC-BE Subgerencia de Prestaciones en Salud Dr. Edgar Campos Reyes Médico Supervisor Comisión Central de Desarrollo de GPC-BE Subgerencia de Prestaciones en Salud Msc. Leiser Marco Tulio Mazariegos Contreras Comisión Central de Desarrollo de GPC-BE Subgerencia de Prestaciones en Salud Msc. María Eugenia Cabrera Escobar Comisión Central de Desarrollo de GPC-BE Subgerencia de Prestaciones en Salud Msc. Valeria Rodríguez Cárcamo Comisión Central de Desarrollo de GPC-BE Subgerencia de Prestaciones en Salud 4 DECLARACIÓN DE CONFLICTO DE INTERESES: Se declara que ninguno de los participantes en el desarrollo de esta Guía, tiene intereses particulares, es decir: económicos, políticos, filosóficos o religiosos que influyan en los conceptos vertidos en la misma. 6 ¿En qué consiste la Medicina Basada en Evidencia? Podría resumirse, como la integración de la experiencia clínica individual de los profesionales de la salud con la mejor evidencia proveniente de la investigación científica, una vez asegurada la revisión crítica y exhaustiva de esta. Sin la experiencia clínica individual, la práctica clínica rápidamente se convertiría en una tiranía, pero sin la investigación científica quedaría inmediatamente caduca. En esencia, pretende aportar más ciencia al arte de la medicina, y su objetivo consiste en contar con la mejor información científica disponible -la evidencia-, para aplicarla a la práctica clínica. El Nivel de Evidencia Clínica es un sistema jerarquizado que valora la fortaleza o solidez de la evidencia asociada con resultados obtenidos de una intervención en salud y se aplica a las pruebas o estudios de investigación. (Tabla No. 1) | Grado de Recomendación | Nivel de Evidencia | Fuente | |------------------------|--------------------|-------| | A | 1a | Revisión sistemática de ensayos clínicos aleatorios. | | | 1b | Ensayo clínico aleatorio individual. | | | 1c | Eficacia demostrada por los estudios de práctica clínica y no por la experimentación. (All or none**) | | B | 2a | Revisión sistemática de estudios de cohortes. | | | 2b | Estudio de cohorte individual y ensayos clínicos aleatorios de baja calidad. | | | 2c | Investigación de resultados en salud, estudios ecológicos. | | | 3a | Revisión sistémica de estudios caso-control, con homogeneidad. | | | 3b | Estudios de caso control individuales. | | C | 4 | Series de casos, estudios de cohortes y caso-control de baja Calidad. | | D | 5 | Opinión de expertos sin valoración crítica explícita. | * Centro de Medicina Basada en la Evidencia de Oxford. **All or none (Todos o ninguno): Se cumple cuando todos los pacientes mueren antes de que el medicamento esté disponible, pero algunos ahora sobreviven; o cuando algunos pacientes mueren antes de que el medicamento esté disponible, pero ahora ninguno muere con el medicamento. Los Grados de Recomendación son criterios que surgen de la experiencia de expertos en conjunto con el Nivel de Evidencia; y determinan la calidad de una intervención y el beneficio neto en las condiciones locales. (Tabla No. 2) Tabla No.2 Significado de los Grados de Recomendación | Grado de Recomendación | Significado | |------------------------|-------------| | A | Extremadamente recomendable. | | B | Recomendable favorable | | C | Recomendación favorable, pero no concluyente. | | D | Corresponde a consenso de expertos, sin evidencia adecuada de investigación. | | √ | Indica un consejo de Buena Práctica clínica sobre el cual el Grupo de Desarrollo acuerda. | Las GUÍAS DE PRÁCTICA CLÍNICA BASADAS EN LA EVIDENCIA, son los documentos en los cuales se plasman las evidencias para ponerlas al alcance de todos los usuarios (médicos, paramédicos, pacientes, etc.). En ellas, el lector encontrará al margen izquierdo de los contenidos, el Nivel de Evidencia\(^1\)a (en números y letras minúsculas, sobre la base de la tabla del Centro de Medicina Basada en la Evidencia de Oxford) de los resultados de los estudios los cuales sustentan el Grado de Recomendación de buena práctica clínica, que se anota en el lado derecho del texto \(^A\) (siempre en letras mayúsculas sobre la base de la mismá tabla del Centro de Medicina Basada en la Evidencia de Oxford) sobre los aspectos evaluados. Las Guías, desarrollan cada temática seleccionada, con el contenido de las mejores evidencias documentadas luego de revisiones sistemáticas exhaustivas en lo que concierne a estudios sanitarios, de diagnósticos y terapéuticas farmacológicas y otras. La GUÍA DE BOLSILLO es una parte de la guía, que resume lo más relevante de la entidad con relación a 4 aspectos: 1. La definición de la entidad, 2. Cómo se hace el diagnóstico, 3. Terapéutica y 4. Recomendaciones de buenas prácticas clínicas fundamentales, originadas de la mejor evidencia. En el formato de Guías de Bolsillo desarrolladas en el IGSS, los diversos temas se editan, imprimen y socializan en un ejemplar de pequeño tamaño, con la idea de tenerlo a mano y revisar los temas incluidos en poco tiempo de lectura, para ayudar en la resolución rápida de los problemas que se presentan durante la práctica diaria. Las Guías de Práctica Clínica no pretenden describir un protocolo de atención donde todos los puntos deban estar incorporados sino mostrar un ideal para referencia y flexibilidad, establecido de acuerdo con la mejor evidencia existente. Las Guías de Práctica Clínica Basada en Evidencia que se revisaron para la elaboración de esta guía, fueron analizadas mediante el instrumento AGREE (por las siglas en inglés de Appraisal of Guidelines, Research and Evaluation for Europe), el cual evalúa tanto la calidad de la información aportada en el documento como la propiedad de algunos aspectos de las recomendaciones, lo que permite ofrecer una valoración de los criterios de validez aceptados en lo que hoy es conocido como “los elementos esenciales de las buenas guías”, incluyendo credibilidad, aplicabilidad clínica, flexibilidad clínica, claridad, multidisciplinariedad del proceso, actualización programada y documentación. En el IGSS, el Programa de Elaboración de Guías de Práctica Clínica es creado con el propósito de ser una herramienta de ayuda a la hora de tomar decisiones clínicas. En una Guía de Práctica Clínica (GPC) no existen respuestas para todas las cuestiones que se plantean en la práctica diaria. La decisión final acerca de un particular procedimiento clínico, diagnóstico o de tratamiento dependerá de cada paciente en concreto y de las circunstancias y valores que estén en juego. De ahí, la importancia del propio juicio clínico. Sin embargo, este programa también pretende disminuir la variabilidad de la práctica clínica y ofrecer, tanto a los profesionales de los equipos de atención primaria, como a los del nivel especializado, un referente en su práctica clínica con el que poder compararse. Para el desarrollo de cada tema se ha contado con el esfuerzo de los profesionales -especialistas y médicos residentes- que a diario realizan una labor tesonera en las diversas unidades de atención médica de esta institución, bajo la coordinación de la Comisión Central Para la Elaboración de Guías de Práctica Clínica que pertenece a los proyectos educativos de la Subgerencia de Prestaciones en Salud, con el invaluable apoyo de las autoridades del Instituto. La inversión de tiempo y recursos es considerable, pues involucra muchas horas de investigación y de trabajo, con el fin de plasmar con sencillez y claridad los diversos conceptos, evidencias y recomendaciones que se dejan disponibles en cada uno de los ejemplares editados. Este esfuerzo demuestra la filosofía de servicio de esta institución, que se fortalece al poner al alcance de los lectores un producto elaborado con esmero y alta calidad científica, siendo así mismo aplicable, práctica y de fácil estudio. El IGSS tiene el alto privilegio de poner al alcance de sus profesionales, personal paramédico y de todos los servicios de apoyo esta Guía, con el propósito de colaborar en los procesos de atención a nuestros pacientes, en la formación académica de nuevas generaciones y de contribuir a la investigación científica y docente que se desarrolla en el diario vivir de esta noble Institución. Comisión Central para la Elaboración de Guías de Práctica Clínica, IGSS, Guatemala, 2017 ÍNDICE DE CONTENIDOS 1. INTRODUCCIÓN 2. OBJETIVOS 3. METODOLOGÍA Definición de preguntas Estrategias de búsqueda Población diana Usuarios 4. CONTENIDO I. Definiciones 1. Período neonatal 2. Epidemiología II. Medidas generales de cuidados en UCIN 3. Consentimiento informado 4. Precauciones estándar 5. Pausa de seguridad 6. Lavado de manos 7. Soluciones antisépticas III. Procedimientos A. Obtención de muestras sanguíneas 8. Punción arterial 9. Punción venosa 10. Punción de talón B. Acceso vascular periférico 11. Venoclisis 12. Cateterismo percutáneo de la arteria radial C. Acceso vascular central 13. Cateterismo de la arteria umbilical y extracción del catéter 14. Cateterismo de la vena umbilical y extracción del catéter 15. Cateterismo venoso central percutáneo de inserción periférica 16. Cateterismo venoso central percutáneo subclavio 17. Cateterismo venoso central por venodisección D. Acceso intraóseo E. Otros procedimientos 18. Medición de la presión venosa central 19. Intubación endotraqueal 20. Extubación endotraqueal 21. Fisioterapia pulmonar y manejo de secreciones 22. Colocación de sonda oro gástrica 23. Colocación de sonda transpilórica 24. Colocación de tubo torácico 25. Pericardiocentesis 26. Paracentesis 27. Punción lumbar 28. Punción intraventricular 29. Cateterización vesical 30. Punción vesical supra púbica 31. Cuidado de las ostomías 32. Extravasación e infiltración periférica intravenosa 33. Exanguinotransfusión 33.1 Exanguinotransfusión total por hiperbilirrubinemia 33.2 Exanguinotransfusión parcial por poliglobulía 33.3 Exanguinotransfusión parcial por anemia 34. Desfibrilación y cardioversión 35. Diálisis peritoneal 36. Hipotermia terapéutica 6. BIBLIOGRAFÍA 16 1. INTRODUCCIÓN El período neonatal, el cual comprende desde el nacimiento hasta los 28 días de vida, es una etapa corta de tiempo, pero en ella ocurren cambios que pueden desencadenar consecuencias que duren el resto de la vida, de tal cuenta que se estima que el 71% de las muertes infantiles ocurren en este período. La adecuada atención del control prenatal y del parto permite que las condiciones al momento del nacimiento favorezcan un buen estado del neonato y en la mayoría de los casos el producto final es un recién nacido sano. Solo en el Hospital de Gineco Obstetricia se atiende un promedio mensual de 1250 nacimientos. Aproximadamente el 15% de los bebés que nacen requieren algún cuidado en las salas de cuidados intensivos por diferentes patologías entre las que podemos mencionar, prematuez, síndrome de dificultad respiratoria de diferentes etiologías, sepsis, anomalías congénitas, entre otras. Este 15% de casos genera un impacto importante desde el punto de vista de salud y económico ya que las repercusiones en cuanto al tema sanitario son severas y crónicas si no se atienden de forma correcta, así mismo el impacto económico de la atención es elevado, pues cada vez se invierten grandes cantidades del presupuesto de las unidades para satisfacer las terapias y tratamientos necesarios para este grupo tan vulnerable de la población. Es por esto que se desarrolla el compendio de procedimientos en la unidad de cuidados intensivos neonatales, con la finalidad de poder aportar a los profesionales neonatólogos, pediatras, médicos y personal de salud que estén involucrados en la atención de recién nacidos, herramientas académicas para estandarizar procedimientos, optimizar recursos y brindar una atención de calidad a los neonatos que son ingresados a las diferentes unidades de cuidados intensivos neonatales del Instituto Guatemalteco de Seguridad Social- IGSS. 2. OBJETIVO DE LA GUÍA GENERAL 1. Estandarizar los procedimientos médicos que se realizan en las salas de cuidados intensivos neonatales (UCIN) de las unidades del Instituto Guatemalteco de Seguridad Social. ESPECÍFICOS 1. Describir las técnicas de los procedimientos médicos que se realizan en UCIN. 2. Optimizar la realización de los procedimientos médicos tanto en calidad, técnica e indicación. 20 3. METODOLOGÍA Definición de preguntas 1. ¿Cuál es la definición de período neonatal? 2. ¿Qué datos estadísticos de morbi-mortalidad existen actualmente en UCIN? 3. ¿Cuáles son los procedimientos realizados en las salas de UCIN? 4. ¿Cuáles son las indicaciones para realizar los diferentes procedimientos? 5. ¿Cuál es la técnica correcta para cada uno de los procedimientos realizados en las salas de UCIN? 6. ¿Cuáles son las complicaciones que se pueden presentar en cada procedimiento realizados en las salas de UCIN? Estrategia de Búsqueda (realizar al final de la recopilación de materiales bibliográficos) Se procedió a localizar la información deseada mediante la revisión de manuales de neonatología, artículos y revisiones sistemáticas como base de cada procedimiento y consultas electrónicas. Se utilizó palabras clave como: intensivos neonatales, cuidados intensivos neonatales, procedimientos neonatales, atención neonatal intensiva. Población diana: Neonatos beneficiarios que asisten al Instituto Guatemalteco de Seguridad Social (IGSS), que son atendidos o referidos de cualquiera de las unidades del Seguro Social o de otras instituciones de salud. **Usuarios:** Personal médico y paramédico que prestan sus servicios en las unidades de cuidados de intensivo neonatal del Instituto Guatemalteco de Seguridad Social y en otras instituciones de salud del país. **Fecha de elaboración y revisión** Elaboración 2016 Publicación año 2017 4. CONTENIDO I. DEFINICIONES (Organización Panamericana de la Salud, 2011) 1. **Período neonatal**: período comprendido entre el día 0 a 28 de vida, este se puede subdividir en: Neonatal precoz: primeros 7 días de vida Neonatal tardía: a partir del día 8 hasta los 28 días 2. **Epidemiología** (Instituto Guatemalteco de Seguridad Social, 2015) Los datos estadísticos del IGSS, estiman que anualmente se atienden 5,000 neonatos en diferentes unidades, para recibir servicios de cuidados intermedios e intensivos. Las principales patologías reportadas son: síndromes de aspiración neonatal (15%), sepsis bacteriana (14%), ictericia neonatal (12%), recién nacidos pre término (10%), problemas respiratorios como neumonías y dificultad respiratoria (8%). En una estimación modesta de los costos para la atención de un neonato con una estancia promedio de 21 días, se calcula un costo aproximado de Q. 60,000.00 a nivel institucional, esto considerando la cantidad promedio de neonatos atendidos en un año implica una erogación de más de Q.130.000.000,00 por año. II. MEDIDAS GENERALES DE CUIDADOS EN UCIN 3. CONSENTIMIENTO INFORMADO. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Al momento del ingreso a UCIN, la mayoría de unidades deben proveer a los padres una hoja de consentimiento informado para procedimientos de rutina realizados en los neonatos (por ejemplo, extracción de muestras de sangre, canalización, entre otros) además de procedimientos de emergencia para situaciones que ponen en riesgo la vida del bebé (por ejemplo, tubos de toracotomía). Para procedimientos invasivos no urgentes que impliquen algún riesgo significativo, el permiso de los padres o encargados tiene que obtenerse. Riesgos, beneficios y procedimientos alternativos, si es apropiado, deben discutirse. Procedimientos quirúrgicos mayores y transfusiones requieren también consentimiento informado. 4. PRECAUCIONES ESTÁNDAR. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Las precauciones estándar integran y expanden los elementos que anteriormente se habían adoptado con las precauciones universales y están diseñadas para proteger tanto al personal de salud como a los pacientes. Estas precauciones estándar se aplican al contacto con sangre, todos los líquidos corporales, secreciones y excreciones excepto sudor, piel lesionada y membranas mucosas. Deben ser utilizadas en el cuidado de todos los pacientes, sin importar su estado infeccioso. En el caso de existir una infección transmisible, precauciones adicionales conocidas como precauciones basadas en la transmisión o expandidas están recomendadas. Se utilizan para interrumpir la diseminación de las enfermedades transmitidas por aire, gotas de fluidos o por contacto. La mayoría de los procedimientos que se realizan al lado del paciente incorporan los principios de precauciones estándar. Componentes claves de las precauciones estándar: - **Lavado de manos** antes y después del contacto con el paciente - **Guantes** para el contacto con sangre, líquidos corporales, secreciones, equipo contaminado, membranas mucosas y piel no intacta - **Equipo de protección personal** (mascarilla, gorros, mascarillas faciales) cuando se esté en riesgo de contacto con sangre y líquidos corporales. - **Batas** para el contacto con sangre o líquidos corporales y prevenir el manchado de la ropa - **Precauciones con objetos corto punzantes** evite re-enfundar agujas usadas; evite quebrar o manipular agujas con la mano; colocar objetos cortantes (bisturís, agujas) en los recipientes indicados que sean resistentes a estos materiales 5. PAUSA DE SEGURIDAD (Ringer Steven & Gray James, 2009) Antes de comenzar cualquier procedimiento, todo el equipo debe efectuar una “pausa de seguridad” para cerciorarse de que no hay errores en la identidad del paciente o en la clase de procedimiento que se va a realizar y, si es apropiado, que el sitio sea el correcto (por ejemplo, tubo de toracotomía, colocación de un catéter venoso central, entre otros) 6. LAVADO DE MANOS (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) EL LAVADO DE MANOS ES EL METODO MÁS EFECTIVO PARA DISMINUIR LAS INFECCIONES RELACIONADAS AL CUIDADO DE LA SALUD. Lo mejor es seguir los protocolos de prevención de infecciones asociadas al cuidado de la salud de su hospital. Previo al lavado de manos, el personal debe tomar en cuenta lo siguiente: (Organización Panamericana de la Salud, 2011) - Manos con uñas cortas, no acrílicas, sin barniz - No lacerar la piel al momento de lavárselas - Manos libres de relojes, anillos, pulseras - Idealmente se debe contar con jabón líquido en dispensadores específicos que no sean reutilizables y que sean estériles - Contar con toallas de papel para el secado de manos - Mangas de la ropa deben estar a la altura del codo - Recordar que el uso de guantes no sustituye el lavado de manos - El primer lavado común del día deberá durar por lo menos 1 minuto - El lavado clínico debe durar por lo menos un minuto - El lavado es antes y después de estar en contacto con cada neonato - Lavado de 3-5 minutos frotándose con o sin cepillo quirúrgico, lavándose hasta los codos, es necesario antes de entrar a UCIN. Este es también necesario para algunos procedimientos mayores (por ejemplo, punción lumbar, tubos intercostales, colocación de accesos vasculares centrales, entre otros) - Lavado de 2-3 minutos frotándose hasta los codos, es recomendado previo a procedimientos menores (extracciones sanguíneas, canalización, colocación de sondas vesicales, entre otros) - Lavado de 30 segundos o frotarse las manos con solución o gel de lavado en seco está indicado antes y después del contacto con cada paciente TÉCNICAS DE LAVADO DE MANOS EN NEONATOLOGÍA MEDIDAS SENCILLAS QUE SALVAN VIDAS 1. Mójese las manos. 2. Aplique suficiente jabón para cubrir todas las superficies de las manos. 3. Frótese las palmas de las manos entre sí. 4. Frótese la palma de la mano derecha contra el dorso de la mano izquierda entrelazando los dedos y viceversa. 5. Frótese las palmas de las manos entre sí, con los dedos entrelazados. 6. Frótese el dorso de los dedos de una mano contra la palma de la mano opuesta, manteniendo unidos los dedos. 7. Rodeando el pulgar izquierdo de la palma de la mano derecha, fróteselo con un movimiento de rotación y viceversa. 8. Frótese la punta de los dedos de la mano derecha contra la palma de la mano izquierda, haciendo un movimiento de rotación y viceversa. 9. Enjuáguese las manos. 10. Séquese con una toalla descartable. 11. Utilice una toalla para cerrar la carilla. 12. Sus manos son seguras. UNICEF “Recomendaciones para la Prevención de Infecciones Intrahospitalaria: Higiene de Manos en Servicios de Neonatología” octubre 2010 TÉCNICAS DE LAVADO SECO DE MANOS CON ANTISÉPTICO DE BASE ALCOHÓLICA 1. Depositar en la palma de la mano una dosis de producto suficiente para cubrir toda la superficie a tratar. 2. Extender solución en manos y antebrazos hasta el codo. 3. Frotar la palma de la mano derecha con el dorso de la izquierda entrelazando los dedos. 4. Frotar las palmas de las manos entre sí, con los dedos entrelazados. 5. Frotar el dorso de los dedos de una mano con la palma de la mano opuesta, agarrando los dedos. 6. Frotar rotando el pulgar, atrapándolo con la palma de la mano derecha y viceversa. 7. Frotar con los dedos la palma de la otra mano con un movimiento circular y viceversa. 8. Duración del lavado: entre 20 y 30 segundos. UNICEF “Recomendaciones para la Prevención de Infecciones Intrahospitalaria: Higiene de Manos en Servicios de Neonatología” octubre 2010 7. SOLUCIONES ANTISÉPTICAS. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) - **Reglas Generales** - Siempre deje secar las soluciones antisépticas en el sitio. Se recomienda por lo menos 30 segundos. - Retire las soluciones con yodo de toda el área donde se aplicaron al finalizar el procedimiento excepto en el punto de inserción utilizado. - **Antisépticos utilizados comúnmente** - Alcohol Isopropílico o etílico (60-90%) es comúnmente usado para la preparación de la piel para procedimientos menores (ejemplo flebotomía), no para uso en membranas mucosas. Aplicar 3 veces en forma circular empezando el centro en el sitio de punción hacia afuera. No se debe utilizar para procedimientos mayores y puede causar quemaduras en los bebés prematuros. - Preparaciones yodadas. Tienen una actividad antimicrobiana de amplio espectro (bacterias, virus, hongos y esporas). - Solución de Yodo tópico al 1% **NO ESTA RECOMENDADO DEBIDO A QUE CAUSA HIPERSENSIBILIDAD DE LA PIEL, SOBRECARGA DE YODO E HIPOTIROIDISMO TRANSITORIO**. - Soluciones yodadas (yodo junto con un agente soluble como surfactante o povidona). Un ejemplo es la yodo-povidona que libera el yodo lentamente. No está recomendada para bebés prematuros, pero puede ser usada en bebés a término. Soluciones al 10% de yodopovidona están recomendadas para procedimientos mayores. - **Soluciones de Clorhexidina** - Solución de gluconato de clorhexidina al 4%. Es adecuada para el lavado de manos y utilizado en los siguientes procedimientos para su preparación y mantenimiento: Inserción de catéteres venosos centrales, preparación de catéter venoso umbilical entre otros. Utilizar con precaución en prematuros y bebés menores de 2 meses. Puede causar irritación o quemaduras químicas. - **Solución de gluconato de clorhexidina al 0.075% (fórmula No 2) es adecuada para piel y la utilizada en nuestra institución.** III. PROCEDIMIENTOS A. OBTENCIÓN DE MUESTRAS SANGUÍNEAS 8. PUNCIÓN ARTERIAL (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Indicaciones - Obtener sangre arterial para las mediciones de gases sanguíneos - Obtener muestras sanguíneas en caso NO se puedan obtener muestras venosas o capilares Equipo - Jeringa heparinizada de 1 ml o jeringa para gases arteriales pediátrica con aguja de venopunción de calibre 23G a 25G, algodones con alcohol, guantes Procedimiento - Para una muestra de gases sanguíneos, la arteria radial es el sitio de punción utilizado con mayor frecuencia - Los sitios alternos son la arteria tibial posterior o la dorsal del pie - Las arterias femorales deben reservarse solo para situaciones de emergencia - Las arterias braquiales no deben utilizarse debido a que hay una circulación colateral mínima y riesgo de daño al nervio mediano; no se utilizan las arterias temporales debido al alto riesgo de complicaciones neurológicas - Debe revisarse la circulación colateral y la permeabilidad de la arteria cubital por medio de **la prueba de Allen, que consiste en elevar el brazo y ocluir simultáneamente la arteria radial y cubital en la muñeca, frotar la palma para producir palidez, liberar la presión sobre la arteria cubital, si regresa el color normal en la palma en menos de 10 segundos, hay una circulación colateral adecuada. Si el color normal no regresa por más de 15 segundos o no regresa en ningún momento, hay mala circulación colateral y es mejor no usar la arteria radial en este brazo.** Deberá probar la circulación colateral de la arteria radial en el otro brazo. - Para obtener la muestra, debe de tomar la mano del paciente con la mano izquierda (para diestros) y extender la muñeca. La hiperextensión ocluye el vaso, después se palpa la arteria radial con el dedo índice de la mano izquierda. - Se limpia el sitio de punción con algodón con alcohol o gluconato de clorhexidina al 0.075% (fórmula No 2) si se realizarán cultivos de sangre. - Realizar la punción en la piel a un ángulo de casi 30 grados y desplazar lentamente la aguja con el bisel hacia arriba hasta que aparezca sangre en el tubo, suele necesitarse poca aspiración para llenar la jeringa, si no hay regreso de sangre, retirar la aguja lentamente porque es posible que se haya atravesado la arteria, puede ser útil el uso del bisel en arterias superficiales o en el neonato con peso demasiado bajo al nacer. - Extraer la menor cantidad de sangre posible. El volumen de sangre no debe exceder 3 a 5 % de volumen total de sangre (en neonatos 80 ml /kg). Ejemplo: si tiene un paciente de 1 kg el 3% del volumen total de sangre es 2.4 ml. y el 5% es de 4ml. No exceder de 1 ml. de sangre extraída - Retirar la aguja y aplicar presión de manera FIRME pero no de forma oclusiva, en el sitio por 5 minutos con una gasa o algodón para asegurar una hemostasia adecuada, tapar y desechar la aguja en un contenedor apropiado - Antes de entregar una muestra de gases sanguíneos arteriales, se deben expulsar las burbujas de aire de la muestra y tapar firmemente la jeringa, si no se realiza esto de forma correcta puede producir errores en la prueba - Colocar la jeringa con hielo y llevar de inmediato al laboratorio, anotar el tiempo de recolección, la temperatura, hemoglobina y FiO2 del paciente en el formulario de laboratorio Técnica de punción arterial en el neonato (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Equipo para punción arterial Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016. Técnica para punción arterial Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016. Complicaciones - Hematomas. Para minimizar el riesgo, utilizar el calibre más pequeño posible de aguja. Inmediatamente después de retirarla, aplicar presión por aproximadamente 1-3 minutos. Suelen resolverse de manera espontánea. - Espasmo arterial, trombosis y embolismo. Se minimizan utilizando el calibre más pequeño posible de aguja. - Infección • Imprecisión en los resultados de gases sanguíneos. La heparina excesiva en la jeringa puede generar un pH y PaCO2 falsamente bajos. Las burbujas de aire provocadas por no tapar la jeringa, puede elevar de forma falsa la PaO2 y dar una PaCO2 baja falsa. El llanto durante la punción arterial disminuye la PaCO2, el bicarbonato y la saturación de oxígeno. • Fístula arteriovenosa. Ocurre después de múltiples Punciones y requiere tratamiento quirúrgico. • Daño nervioso. Después de la punción de la arteria braquial. 9. PUNCIÓN VENOSA (flebotomía) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones Nota: La revisión Cochrane indica que la venopunción, realizada por personal capacitado, es el método de elección para la extracción de muestras sanguíneas en bebés de término. Se encontró que es menos dolorosa que la punción del talón y más efectiva para extraer muestras. • Para obtener muestras de sangre para análisis de rutina o cultivos sanguíneos. La venopunción permite obtener volúmenes grandes de sangre (recomendado si se necesita más de 1 ml de sangre) y es el método de elección para obtener hemocultivos. Se prefiere sobre la punción capilar de talón para algunos exámenes (niveles de medicamentos, hemograma, cariotipo, estudios de coagulación, pruebas de compatibilidad, entre otros). Muestras de sangre arterial se prefieren para medición de lactato, amonio y piruvato. • Para obtener hematocrito central • Gases sanguíneos venosos Equipo • Guantes • Agujas 23G-24G (para disminuir el riesgo que se tape o hemólisis de la muestra), agujas tipo mariposa 23G-25G • Algodón con alcohol • Tubos colectores apropiados para los diferentes tipos de muestras (por ejemplo, tubos para hematología, tiempos de coagulación, química, medios de hemocultivo, entre otros) • Banda de látex como torniquete • Jeringas de 1 ml • Transiluminador de venas (opcional) Procedimiento • Usar los sitios venosos distales primero para preservar los accesos centrales. Decidir cuál vena usar: dorso de la mano o pie, muñeca, fosa anti cubital, vena safena en el tobillo, venas del cuero cabelludo. Evite punicionar cerca de vías intravenosas ya colocadas Sitios anatómicos para punción venosa (INPer, 2015) - En caso de tener dificultad para visualizar las venas, la transiluminación puede ayudar a identificarlas. En opinión del grupo de desarrollo de la guía esta técnica es aplicable para pacientes con manos finas y delgadas. - Tenga un asistente para sostener al bebé. Si no hay personal disponible, sujete el área seleccionada para la punción en una superficie dura. - Use un torniquete en la extremidad para ocluir la vena. Utilice una banda de goma, guante o la mano del asistente para circular el área proximal a la vena. Remover y reaplicar la presión del torniquete optimiza la distensión de la vena. - Prepare el sitio con solución antiséptica. Para hemocultivos, limpie al menos 3 veces en forma circular concéntrica, empezando por el sitio de punción. - Con el bisel de la aguja hacia arriba (para lograr un flujo óptimo de sangre y menos chance de oclusión por la pared de la vena), puncione la piel y luego dirija la aguja dentro de la vena a 45 grados de inclinación. Use la bifurcación del vaso si es posible. - Cuando la sangre llene la aguja, coloque los frascos para la toma de muestras necesarias. Para hemocultivos coloque la jeringa y aspire la cantidad de sangre necesaria (mínimo 1 ml). Gentilmente mezcle los tubos con los aditivos. - Retire el torniquete, y remueva la aguja presionando con algodón seco la punta de la misma hasta extraerla. Aplique una presión gentil en el área hasta que deje de sangrar (2-3min). **Complicaciones** - La infección es una complicación rara que se puede minimizar usando una técnica estéril. - Trombosis venosa o émbolos son frecuentemente inevitables, especialmente cuando múltiples punciones se realizan en la misma vena y esta es grande. - Hematoma o hemorragia se puede evitar aplicando presión en el sitio luego de que se retire la aguja para asegurar la hemostasia. Si hay un defecto de coagulación, puede presentarse hemorragia. - Laceración del dorso de la mano debido a múltiples punciones en bebés con muy bajo peso al nacer. - Laceración de la arteria cercana a la vena. 10. PUNCIÓN DE TALÓN (muestras sanguíneas capilares) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Indicaciones - Obtención de muestras sanguíneas cuando se necesita una cantidad pequeña de sangre (dos a cinco gotas de sangre). Los estudios que más comúnmente se hacen son hemoglobina-hematocrito, monitoreo de glucosa y tamizaje metabólico neonatal. - Determinación de gases sanguíneos capilares que dan resultados confiables de pH y pCO₂, pero no de pO₂. Equipo - En neonatos se prefiere utilizar lancetas automáticas, porque se asocian con menos complicaciones y dolor. Causan menos hemólisis y menos errores en los valores de laboratorio y proveen con exactitud el diámetro y la profundidad de la punción. Los tamaños recomendados son de 2 mm para menores de 1500g y 4 mm para mayores de 1500g. Si no dispone de lancetas, utilizar aguja de calibre 22G-24G. - Tubo capilar y plastilina para cerrar uno de los extremos del tubo capilar, tira reactiva para glucómetro o papel filtro para tamizaje neonatal. - Compresa caliente. - Solución antiséptica. - Guantes. Procedimiento - La muestra se obtiene puncionando la dermis para accesar a los capilares que están a nivel subcutáneo. Se obtiene una mezcla de sangre venosa y arterial. La proporción de sangre arterial es mayor por el incremento de la presión en las arteriolas que llegan a los capilares. El calentar el sitio de punción arterializa la sangre. Las áreas en la parte de abajo del talón contienen el mejor lecho capilar. - Se debe evitar el área final del talón (la curvatura posterior donde el hueso calcáneo está más cerca de la piel), debido a que esta área está asociada a una incidencia elevada de osteomielitis del calcáneo. - La punta de los dedos no se recomienda en bebés menores de 1 año. - Para evitar osteomielitis se debe puncionar las porciones medias y laterales de la superficie plantar del talón, a una profundidad no mayor de 2.4 mm; **NUNCA UTILIZAR LA CURVATURA POSTERIOR O A TRAVÉS DE UN SITIO PREVIAMENTE PUNCIONADO** **Sitios para punción de talón** http://enfermerapediatrica.com/wp-content/uploads/2014/01/images-1.jpeg - La punción del talón está contraindicada si hay una infección local, pobre perfusión, edema importante, lesión del pie o cualquier anomalía congénita del pie. - El bebé debe estar en posición supina (boca arriba). - Se debe calentar el pie por lo menos un minuto para mejorar el flujo sanguíneo en el área de punción. • Se debe limpiar el área con alcohol y dejar secar • Sostener el talón con la palma de la mano y el dedo índice. Realice una punción rápida y profunda (menor de 2 mm) • Se debe descartar la primera gota porque puede estar contaminada con líquido tisular y no ser exacta. Aplique presión gentil al talón y coloque el tubo colector en el sitio de punción. Los tubos capilares se llenan automáticamente por la presión capilar. Disminuya la presión y dé tiempo para que se re perfunda el lecho capilar del talón y luego reaplique la presión para que la incisión se abra con cada maniobra de bombeo • Selle uno de los extremos del tubo capilar con plastilina • Procesar las muestras lo más pronto posible • Mantener la presión en el sitio de punción con un algodón seco hasta que pare de sangrar y eleve el pie. Vendajes adhesivos no se recomiendan Complicaciones • Celulitis. • Osteomielitis. Usualmente ocurre en el hueso calcáneo. Evite el área central del talón y no realice la punción muy profunda • Laceración del talón. Sucede cuando hay múltiples punciones en la misma área. Si hay un área extensa, debe de utilizarse otro lugar para extraer la muestra • Nódulos calcificados. Desaparecen a los 30 meses de edad B. ACCESO VASCULAR PERIFÉRICO 11. VENOCLISIS (CATÉTER INTRAVENOSO) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) El acceso vascular más seguro y eficaz se obtiene al compatibilizar el tamaño del neonato, las necesidades terapéuticas y la duración del tratamiento requerido con el dispositivo y la técnica más apropiados. Indicaciones - Proporcionar de manera parcial o total los requerimientos nutricionales o de líquidos cuando no es posible la administración a través del tracto gastrointestinal. (Ramasethu, Mhairi, G, & Martin, 2002) - Administración de medicamentos intravenosos - Administración de sangre y productos sanguíneos - Acceso vascular de urgencia - Administración de nutrición parenteral parcial Equipo - Algodón con alcohol al 70% - Aguja mariposa diámetro 21G a 27G - Dispositivo de cánula sobre aguja, diámetro 22G a 24G - Sistema de venoclisis o sello de heparina - Solución fisiológica en una jeringa de 1 ml - Lazo de goma - Foco de iluminación para el procedimiento - Materiales para inmovilización - Transiluminador (opcional) - Torundas de algodón - Tijeras • Un rollo de cinta adhesiva porosa de 1.25 a 2.25 cm, cinta transparente o vendajes transparentes semi-permeables • Cuando se usa cinta sobre la piel frágil de los recién nacidos pre término se debe emplear la cantidad mínima necesaria y es preciso considerar el uso de una barrera de pectina • La cinta o el vendaje transparente facilitarán la observación del sitio intravenoso • Pacificador (pepe) si fuera apropiado. La succión libera endorfinas, que disminuyen el dolor. Considérese envolver al paciente con firmeza y dejar expuesta la extremidad necesaria para la colocación IV. La envoltura también es una medida de comodidad. Algunos neonatos en estado crítico, como un paciente con hipertensión pulmonar persistente, puede requerir analgesia, sedación o ambas antes de cualquier procedimiento invasivo, incluida la colocación de una vía intravenosa (Ramasethu, Mhairi, G, & Martin, 2002) • La Academia Americana de Pediatría recomienda anestésicos tópicos (por ejemplo, mezcla de lidocaína y prilocaina 30 minutos antes del procedimiento). Sacarosa / glucosa oral, chupetes, pañales, y otros métodos no farmacológicos pueden usarse para la reducción del dolor (Ramasethu, Mhairi, G, & Martin, 2002) Equipo para colocación de vía periférica Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 Precauciones - Evitar las áreas adyacentes a la pérdida de piel o áreas de infección cutánea superficial - Evitar los vasos que atraviesan articulaciones, porque la inmovilización es más difícil - Si la extremidad necesita calentamiento antes del procedimiento, utilice un calentador del talón, las compresas caseras como un pañal embebido en agua caliente pueden producir una lesión por agentes térmicos - Tomar precauciones para diferenciar venas de arterias - Palpar el pulso arterial - Observar el efecto de la oclusión venosa: (Vaso de una extremidad: las arterias se colapsan, las venas se llenan. Vaso de cuero cabelludo: las arterias se llenan desde abajo, las venas desde arriba) - Observar el color de la sangre obtenida • Si la piel se torna pálida sobre el vaso cuando se infunde el líquido, indica espasmo arterial • Rasurar el área adecuada de la cabeza como para permitir la estabilización de la vía intravenosa • Aplicar en forma correcta el lazo de goma • Minimizar el tiempo de aplicación • Evitar las áreas con compromiso de la circulación • Evitar su empleo para vasos del cuero cabelludo porque tiende a aumentar la fragilidad vascular • Cuando se usa en venas periféricas del cuero cabelludo, evítese el uso más allá de la línea del cabello • La contaminación bacteriana, la flebitis y la septicemia son más frecuentes con el uso de cánulas plásticas • Las agujas tipo mariposa no son apropiadas para las extremidades y está contraindicada su colocación cerca de una superficie de flexión • No se recomienda la colocación de una vía intravenosa periférica para uso prolongado, si se emplean soluciones irritantes o hipertónicas • Los catéteres periféricos no son apropiados para el monitoreo o la extracción de muestras venosas • No se recomienda el uso de catéteres largos de plástico en los neonatos porque su rigidez relativa aumenta el riesgo de daño en el endotelio vascular, lo que incrementa así la posibilidad de una trombosis venosa • Esté alerta para detectar signos de flebitis o infiltración • Inspeccione el sitio cada hora • Suspenda la vía intravenosa de inmediato ante cualquier signo de inflamación local o disfunción de la cánula • Disponga el vendaje con cinta en el sitio intravenoso de modo de permitir una inspección adecuada o use un vendaje estéril transparente sobre el sitio de la entrada cutánea • Considere el uso de un preparado protector en la piel en los recién nacidos pre término pequeños para impedir el traumatismo cutáneo al retirar la cinta o vendaje. Forma un revestimiento protector resistente que se une a la piel • No es necesario cambiar el vendaje • Se debe limitar el uso de tintura de benzoína y otros productos para aumentar la adherencia de la cinta, sobre todo en recién nacidos pre término. Estos productos crean una unión más apretada entre la cinta y la epidermis que la unión entre la epidermis y la dermis subyacente. Entonces produce denudación de la epidermis al retirar la cinta. El uso de preparado protector cutáneo, por ejemplo, tintura de benjuí, antes de la aplicación de estos productos puede disminuir el daño de la piel cuando se retira la cinta • Escriba la fecha, la hora y el tamaño de la aguja o cánula sobre la pieza de cinta asegurada en el sitio • Enrolle la tubuladura de la solución intravenosa y fíjela con cinta en la extremidad para eliminar la tensión del dispositivo. (Ramasethu, Mhairi, G, & Martin, 2002) • Limite a dos o tres intentos de colocación por persona. Controle con cuidado la descompensación clínica, sobre todo del neonato muy prematuro y en los pacientes con afectación cardíaca o respiratoria. (Ramasethu, Mhairi, G, & Martin, 2002) - El dorso de la mano es la mejor opción para preservar los sitios útiles para catéteres centrales (cefálica, braquial, vena safena mayor, entre otros) **Técnica** Prepárese como para un procedimiento menor. Asegúrese de mantener el ambiente térmicamente neutral. A menudo es necesario trasladar a los bebés a un calentador radiante al colocarles una vía IV periférica para evitar el estrés por frío. Si el neonato recibió una alimentación enteral reciente considere diferir el procedimiento hasta antes de la próxima alimentación o colocar un tubo gástrico nasal u oral para vaciar el estómago y evitar la aspiración. Use transluminación para visualizar el vaso si fuera necesario. - Seleccione el vaso para la canulación. El siguiente es el orden de preferencia sugerido - Dorso de la mano: plexo venoso dorsal - Antebrazo: venas ante braquial mediana, cefálica accesoria - Venas del cuero cabelludo: supra troclear, temporal superficial, auricular posterior. - Pie plexo venoso dorsal - Fosa ante cubital: venas basílica o cubital - Tobillo: vena safena menor, safena mayor Sitios anatómicos para colocación de vía periférica (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de GPC-BE 2016. Servicio de Neonatología. Hospital de Gineco Obstetricia 2016. - Rasure el área cuando use una vena del cuero cabelludo - Aplique un lazo de goma cuando el sitio anatómico lo indique - Colóquelo tan cerca de la venopunción como sea posible - Ajuste hasta detener la pulsación periférica. - Libere en parte hasta que el pulso arterial sea palpable por completo - Prepare el área de la piel con antiséptico, deje secar - Fije la jeringa a la aguja o cánula, y pruebe la permeabilidad inyectando una pequeña cantidad de solución fisiológica - Desconecte la jeringa - Seleccione un segmento recto de vena o la confluencia de dos tributarias - Tome la aguja entre el pulgar y el índice. Para la aguja mariposa tome las aletas de plástico - Asegure la vena con el dedo índice de la mano libre y estire la piel que la cubre. Esta maniobra se puede usar también para producir la distensión de las venas del cuero cabelludo - Mantenga la aguja paralela al vaso. En dirección del flujo sanguíneo - Introduzca la aguja a través de la piel, algunos milímetros distales al punto de entrada en el vaso - Introduzca la aguja con suavidad en el vaso hasta que la sangre aparezca en la tubuladura de la aguja en la vena del cuero cabelludo o en la cánula al retirar el estilete Dos técnicas para canalizar la vena para acceso venoso en neonatos (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de GPC-BE 2016. Servicio de Neonatología. Hospital de Gineco Obstetricia 2016 Procedimiento para colocación de vía periférica Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 • Retire el estilete. No haga avanzar más la aguja, porque puede perforar la pared dorsal del vaso • Haga avanzar la cánula tanto como sea posible. Puede ayudar a la canulación, la inyección de una pequeña cantidad de solución de irrigación en la vena antes de hacer avanzar la cánula • Retire el lazo de goma • Conecte la jeringa, e infunda con suavidad una pequeña cantidad de solución fisiológica para confirmar la posición intra vascular • Asegure la aguja o la cánula • Fije la tubuladura del sistema de venoclisis y asegúrela a la piel. La tubuladura de la aguja mariposa debe asegurarse a la piel por fuera de la aguja • Cuando se necesite una tablilla a modo de férula para asegurar el sitio, coloque la extremidad afectada en una posición anatómicamente correcta antes de colocar la cinta Complicaciones • Hematoma • Venoespasmo • Flebitis. Es la complicación más importante La heparina no se recomienda para las líneas IV periféricas. Revisión Cochrane, indican que la heparina podría tener graves efectos adversos. Se necesitan más estudios antes de poder hacer recomendaciones para el uso de heparina en recién nacidos con una vía periférica. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) El material del catéter, el tamaño del catéter y la toxicidad de la solución infundida también influyen en la incidencia de flebitis. Cuando las vías periféricas se usan para la nutrición parenteral, la infusión simultánea de una solución lipídica con la solución de nutrición parenteral total hiperosmolar prolonga la vida de la vena. - Infiltración del tejido subcutáneo con la solución intravenosa - Formación de ampollas superficiales - Esfacelo profundo que puede requerir injerto cutáneo - Calcificación del tejido subcutáneo debido a infiltración de una solución que contiene calcio. Obsérvese que puede haber cierta extravasación en los tejidos adyacentes aun cuando se pueda aspirar sangre de la aguja o cánula - Infección. Aumento en la incidencia cuando una aguja permanece colocada más de 72 horas y se manipula constantemente y con los vendajes tipo película - Embolia de coágulo con la irrigación forzada. Nunca se debe dejar abierto al aire el extremo del catéter y debe asegurarse que está libre de burbujas de aire antes de infundir la solución intravenosa - Inyección o infusión accidental en la arteria con arterioespasmo y posible necrosis tisular - Quemadura por - Transiluminador - Compresa para calentar la extremidad antes del procedimiento • Aplicación prolongada de yodo povidona o alcohol Isopropílico en la piel de un recién nacido muy prematuro • Embolia gaseosa • Isquemia o gangrena de la extremidad inferior que complica la infusión en la vena safena. (Ramasethu, Mhairi, G, & Martin, 2002) • Síndrome compartamental • Necrosis con la necesidad de injerto de piel. **Nota: precaución con el uso de dopamina, dobutamina y epinefrina puede causar vasoconstricción por lo que no debe utilizarse por esta vía.** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, 2013) 12. CATETERISMO PERCUTÁNEO DE LA ARTERIA RADIAL (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) La colocación de un catéter permanente en la arteria radial es una alternativa útil al cateterismo de la arteria umbilical para monitorizar los gases sanguíneos y la presión arterial Ventajas • Accesibilidad (cuando la arteria umbilical es inaccesible o se ha utilizado durante un largo período) • Refleja el flujo pre ductal (si se utiliza la arteria radial derecha) • Evita la trombosis de vasos importantes que a veces se asocia con el cateterismo de la arteria umbilical Riesgos Suelen ser pequeños si se realiza el procedimiento cuidadosamente. Sin embargo, pueden ocurrir infecciones, embolia gaseosa, inyección inadvertida de una solución inadecuada u oclusión arterial. Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Cánula intravenosa de calibre 22G o 24G con fijador (Dispositivo de cánula sobre aguja de los que se utilizan para catéter intravenoso) - Solución salina heparinizada de lavado (0,5 – 1,0 unidades de heparina/ml) y una bomba de infusión (Ringer Steven & Gray James, 2009) - Se recomienda calibre 24G para neonatos con peso <1,500g. - Cinta adhesiva porosa - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) La arteria radial es el sitio más común. La arteria cubital y dorsal del pie son sitios alternos, pero no se recomiendan de forma rutinaria. No se recomiendan la arteria temporal y las arterias femorales. La canalización de la arteria axilar es muy difícil y tampoco se recomienda. La transiluminación lateral o posterior de la muñeca puede ser útil para localizar la arteria en neonatos prematuros. La canalización arterial requiere mucha paciencia. **Técnica** Hay que investigar si el flujo cubital colateral es suficiente. Para ello se comprimen simultáneamente las arterias radial y cubital y luego se libera la cubital. Se observará el grado de enrojecimiento de la mano pálida. Si toda la mano enrojece mientras la arteria radial sigue ocluida, la circulación cubital es suficiente. - Se puede fijar la mano sobre una férula, con la muñeca extendida, dejando todos los dedos expuestos para observar los cambios de color. - Se preparará la muñeca con una solución antiséptica y se palpa el punto en el que la pulsación arterial es máxima. - Se inserta la cánula intravenosa a través de la piel, en un ángulo <30° con la horizontal, y se introduce lentamente hacia el interior de la arteria. La transiluminación sirve de ayuda para delinear el vaso y su trayecto. Si se penetra en la arteria mientras se avanza el catéter, se retira el estilete y se hace avanzar el catéter en el interior de la arteria. Si no sale sangre, tal vez se haya traspasado la arteria. Se retira el estilete y se retira lentamente el catéter hasta que salga sangre y luego se avanza en el interior de la arteria. - Debe asegurarse con cinta adhesiva porosa. Técnica para colocación de línea arterial percutánea (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por GPC-BE, Servicio de Neonatología, Hospital de Gineco Obstetricia 2016 Precauciones En el catéter solo se perfunde solución salina (0,45% - 0,9%) heparinizada. La tasa mínima de perfusión es 0.5 ml/h y el máximo es 1 ml/h. Complicaciones - Arterioespasmo. El riesgo se minimiza utilizando el calibre más pequeño posible de catéter y realizando la menor cantidad posible de punciones. Si ocurre un espasmo prolongado, se debe retirar el catéter hasta que resuelva. - Embolia o trombosis. Para prevenirlas, hay que asegurarse de que no se haya introducido aire en el catéter. y de que este se haya limpiado con solución salina heparinizada - Isquemia/necrosis o gangrena en la piel. La circulación colateral adecuada disminuye el riesgo de esta complicación - Hematoma - Pérdida de sangre. Puede ocurrir la pérdida accidental de la posición del catéter, lo que produce hemorragia - Infección - Infiltración de la solución - Pseudo aneurisma - Úlceras en la piel - Daño a nervios. Se ha reportado daño a nervios medianos, cubitales, tibial posterior y peroneo con base en el sitio del catéter C. ACCESO VASCULAR CENTRAL 13. CATETERISMO DE LA ARTERIA UMBILICAL Y EXTRACCIÓN DEL CATÉTER. (Ringer Steven & Gray James, 2009) Indicaciones - Para la monitorización frecuente de los gases en la sangre arterial - Para la monitorización continua de la presión arterial. - Para proporcionar acceso para la exanguinotransfusión (específicamente en exanguinotransfusión total iso-volumétrica). (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Normas: en general solo se debe colocar un catéter arterial umbilical en las situaciones graves. Si solo se realizaran unas pocas gasometrías, se recurrirá a la punición arterial periférica Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Cinta métrica - Porta agujas - Tijeras de sutura - Pinza Halstead hemostática ("mosquito") - Pinza iris - Pinza de disección fina (Allis) - Porta aguja sin punta - Llave de tres vías - Catéter para arteria umbilical (3.5Fr bebés <1,200g y 5Fr bebés > 1,200g) - Cinta adhesiva porosa - Suturas de seda 3-0 - Soluciones antisépticas (Gluconato de clorhexidina al 0.075%, fórmula 2) - Jeringa de 10 ml con solución salina (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) (INPer, 2015) Equipo para colocación de catéter Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Procedimiento Coloque al paciente en posición supina, enrolle un pañal alrededor de ambas piernas y fíjelo en la cama. Esto estabiliza al paciente para el procedimiento y permite la observación de los pies para descartar el vaso espasmo. (INPer, 2015) Posición anatómica de los vasos umbilicales (Academia Americana de Pediatría y Asociación Americana del Corazón, 2011). Modificada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Posición del paciente para la colocación de catéteres umbilicales Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Técnica - Se usa una técnica estéril - Antes de preparar el cordón y la piel se realizarán mediciones externas para determinar la longitud del catéter que se debe introducir. Se traza una línea desde la mitad de la clavícula hasta el ombligo y esta medida se coloca en la tabla para determinar la longitud que debe introducirse el catéter - El catéter puede ser colocado de dos maneras distintas. En la llamada cateterización baja, la punta del catéter se ubica por debajo del nivel L3. En la llamada cateterización alta, la punta del catéter se ubica por encima del diafragma, a nivel T6 a T9 - La posición está por lo general determinada por el uso que se le piense dar. La longitud puede obtenerse de la figura de mediciones del catéter umbilical - Otro método para determinar la longitud necesaria para una cateterización baja es medir dos tercios de la distancia entre el cordón umbilical y el punto medio de la clavícula. Una vez que el catéter esté colocado realice una aspiración para verificar el retorno de sangre (Ringer Steven & Gray James, 2009) (Laura J. Sigman, 2012) Grafica de longitud de inserción catéter umbilical arterial (Laura J. Sigman, 2012) Modificado por: grupo de Trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 - Se levanta el muñón del cordón con una pinza y se lava cuidadosamente el muñón y la piel circundante con una solución antiséptica. No está claro cuál es el preparado de elección. Es importante evitar las quemaduras químicas producidas por las soluciones yodadas, para ello, después que se haya secado la solución, se limpiará cuidadosamente la piel (sin olvidar la espalda) con agua estéril. A continuación, se colocan toallas estériles en el abdomen (Ringer Steven & Gray James, 2009) Preparación del paciente con campos estériles Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Se colocará cinta de castilla en torno a la base del cordón, la cual en algunas ocasiones estará sobre la piel, en cuyo caso se afloja después del procedimiento. La cinta de castilla se utiliza para comprimir suavemente el cordón y evitar hemorragia. A continuación, se corta el cordón limpiamente con bisturí para que tenga una longitud de 1 a 1.5 cms (Ringer Steven & Gray James, 2009) - Se estabiliza el cordón con una pinza y se identifican las dos arterias - Se introduce una de las puntas de la pinza iris en la luz de la arteria, la que se utiliza suavemente para dilatar el vaso. A continuación, se introduce la pinza cerrada en la luz hasta una profundidad de 0.5 cms, se libera la presión sobre las pinzas y se deja en su lugar para que se dilate el vaso durante 1 minuto aproximadamente. Esta pausa es la fase más útil de la colocación del catéter (Ringer Steven & Gray James, 2009) - Se retira la pinza y se introduce en la arteria un catéter arterial umbilical de calibres 3.5Fr o 5 Fr con un orificio final lleno de solución salina estéril. El tamaño más pequeño se suele utilizar para los neonatos con un peso < 1.500 g. Se nota un ligero aumento de la resistencia cuando el catéter atraviesa la base del cordón y cuando llega a la unión entre la arteria umbilical y la arteria ilíaca. - Aproximadamente en el 5% - 10% de los intentos de cateterismo de la arteria umbilical pueden ocurrir los siguientes problemas: - El catéter no puede pasar a la aorta abdominal. A veces con la técnica de un doble catéter se logra el cateterismo en estas circunstancias (Ringer Steven & Gray James, 2009) - El catéter pasa a la aorta, pero luego forma un asa y se introduce en la arteria ilíaca contralateral o en una arteria glútea. Puede haber dificultades para avanzar el catéter, con cianosis o palidez de la pierna o las nalgas. Esto sucede con más frecuencia cuando se utiliza un catéter de pequeño calibre (3.5Fr) en un bebé grande. A veces, el empleo de un catéter de mayor calibre y más rígido (5Fr) permite que avance hasta la aorta. Alternativamente, si se retira el catéter hasta la arteria umbilical, se le imprime un giro y se vuelve a introducir, puede lograrse que llegue a la aorta. Si todo ello fracasa, hay que retirar el catéter e intentarlo en la otra arteria umbilical. - A veces, el catéter alcanza la aorta, pero luego se dobla sobre sí mismo. Esto también sucede al utilizar catéteres delgados en bebés grandes. El catéter se puede introducir además en cualquiera de las ramas aórticas. Si no es posible avanzar hasta la posición deseada, hay que retraer la punta hasta una posición baja o retirar el catéter (Ringer Steven & Gray James, 2009). Hay cianosis persistente, palidez o mala perfusión distal de la extremidad. Esto puede mejorar si se calienta la pierna opuesta, pero, si no hay mejora, se retirara el catéter. La hematuria es una indicación para retirarlo (Ringer Steven & Gray James, 2009) Técnica para la inserción de catéteres arteriales (TRICIA GOMELLA, M. DOUGLAS CUNNINGHAM, & FABIEN G. EYAL, 2013) LACY Modificado por: Grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 Técnica para la inserción de catéteres Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Técnica para la inserción de catéteres arteriales Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Después de introducir el catéter hasta la distancia deseada, hay que comprobar su posición radiológicamente - Se fija el catéter con una sutura en bolsa de tabaco con hilo de seda Fijación de catéteres umbilicales Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Extracción del catéter: (Ringer Steven & Gray James, 2009) Se extrae el catéter arterial umbilical cuando se cumpla cualquiera de estos criterios: - Si el neonato mejora y ya no es necesaria la monitorización continua ni las extracciones frecuentes de sangre, se debe retirar lo antes posible. - Se recomienda un tiempo máximo de 7 días de permanencia del catéter con el fin de reducir las complicaciones infecciosas y trombóticas. - Si aparecen complicaciones se debe retirar inmediatamente. Métodos para retirar el catéter. Se retirará lentamente en un período de 30 a 60 segundos para permitir que se contraiga el extremo proximal de la arteria umbilical mientras el catéter ocluye aún el extremo distal. Con ello se suele evitar la aparición de una hemorragia abundante. Se retira también la sutura. Se deja una pinza ocluyendo el extremo distal por un período de 5 a 10 minutos hasta que la contracción de la arteria sea completa. **Complicaciones** - Se pueden asociar con morbilidad significativa. Estas son debidas sobre todo a accidentes vasculares, incluidos fenómenos trombo embólico en el riñón, intestino, piernas o en raras ocasiones la médula espinal. - Se manifiestan en forma de hematuria, hipertensión, signos de enterocolitis necrosante o infarto intestinal, cianosis o palidez cutánea en la espalda, las nalgas o las piernas. - Infección - Coagulación intra vascular diseminada - Perforación vascular Todas estas complicaciones son indicaciones para retirar el catéter. La estrecha observación de la piel, la monitorización de la orina en busca de hematuria, la medición de la presión arterial y el control evolutivo de la cifra de plaquetas pueden dar la clave de la presencia de complicaciones. Cuando hay signos de embolia o pérdida de pulsos o coagulopatía y no hay hemorragia intracraneal, consideramos heparinización con el objetivo de mantener el tiempo de tromboplastina parcial (TPT) en un valor doble del control. No hay muchos datos que sirvan de guía en la práctica. Si hay un coágulo grande con trastorno de la perfusión, consideramos el uso de agentes fibrinolíticos. • La aparición de palidez en una pierna tras colocar el catéter es la complicación clínica más frecuente. Aunque a menudo tiene carácter transitorio, merece una cuidadosa atención. Una técnica que puede resolver este problema es el calentamiento de la pierna opuesta. Si se resuelve el vaso espasmo, puede dejarse el catéter. Si no hay mejoría, debe retirarse. Otras consideraciones • Uso de heparina para prevenir la coagulación. Se desconoce si el uso de heparina en la perfusión disminuye la incidencia de complicaciones trombóticas. Diluímos 0.5 unidades de heparina/ml de perfusión. • Posición de la punta del catéter. Hay escasa información útil que apoye de modo convincente la elección entre la posición alta o baja del CAU. Se ha descrito un mayor porcentaje de complicaciones con la punta del catéter en L3-L4, en comparación con D7–D8, debido a que aparecen más episodios de palidez y cianosis en una o ambas piernas. Las complicaciones renales y los émbolos intestinales pueden ser más frecuentes cuando el extremo del catéter se sitúa en D7–D8, mientras que los catéteres en posición baja L3–L4 se asocian con las complicaciones de cianosis y palidez de la pierna, más fáciles de observar. • Tiempo de permanencia. La incidencia de complicaciones asociadas con el cateterismo de la arteria parece estar directamente relacionado con el tiempo en que permanece colocado el catéter. Infección y utilización de antibióticos No se recomienda antibióticos sistémicos o locales profilácticos al colocar un CAU. Cuando se ha colocado un catéter, se deberá administrar antibióticos si se sospecha de una infección, después de haber recogido muestras para cultivo. 14. CATETERISMO DE LA VENA UMBILICAL Y EXTRACCIÓN DEL CATÉTER (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) (INPer, 2015) (Ringer Steven & Gray James, 2009) Indicaciones - Exanguinotransfusión total y parcial - Monitoreo de presión venosa central - Perfusion de líquidos, medicamentos y nutrición parenteral - Acceso vascular de urgencia para infundir líquidos, sangre o medicamentos Equipo Se utiliza el mismo equipo que para la cateterización de la arteria umbilical - El catéter umbilical siempre debe ser 5Fr, preferiblemente de dos lúmenes, para poder infundir diferentes tipos de soluciones, así como aminas vaso activas y alimentación parenteral Procedimiento Se utiliza el mismo que para la cateterización de la arteria umbilical Técnica - La preparación del campo es igual que en el cateterismo de la arteria umbilical, después de determinar la longitud apropiada del catéter que se va a introducir. Gráfica de longitud de inserción de catéter umbilical venoso (Laura J. Sigman, 2012) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 - Hay que eliminar cualquier coágulo que exista con unas pinzas. Después se dilata con cuidado la vena umbilical, al igual como se hace con la arteria (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, 2013) - Preparación del catéter (5Fr) con una jeringa adosada se llena la luz con solución salina. El catéter no se debe dejar nunca abierto a la atmósfera ya que la presión negativa intra torácica podría dar lugar a una embolia gaseosa - Se introduce el catéter mientras se ejerce una suave tracción del cordón. Una vez colocado el catéter en la vena hay que impulsarlo en dirección craneal, inmediatamente por debajo de la piel, donde la vena cursa muy superficialmente. Si el objetivo del cateterismo es una exanguinotransfusión, se debe introducir solo lo necesario para establecer un buen flujo sanguíneo (generalmente 2-5 cms). Si el catéter se utiliza para una perfusión continua o para monitorizar la presión venosa central, se debe avanzar a través del conducto venoso hasta la vena cava inferior y comprobar su posición radiológicamente. - Solo hay que perfundir soluciones isotónicas hasta comprobar radiológicamente la posición del catéter. Si la punta se halla en la vena cava inferior, se pueden perfundir soluciones hipertónicas. - Si no hay otra vía disponible, se pueden dejar colocados los catéteres hasta 14 días, transcurridos los cuales aumenta el riesgo de infecciones u otras complicaciones. En los neonatos de muy bajo peso se sugiere cambiar el catéter umbilical venoso a un catéter venoso central colocado periféricamente a los 7-8 días, si es posible (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, 2013) Procedimiento para colocación de catéter umbilical venoso (1) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, 2013) modificado por: grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 (2) Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 (3) Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 - Después de introducir el catéter hasta la distancia deseada, hay que comprobar su posición radiológicamente - Se fija el catéter con una sutura en bolsa de tabaco con hilo de seda Extracción del catéter Son las mismas indicaciones y método utilizado para retirar el catéter arterial umbilical 15. CATETERISMO VENOSO CENTRAL PERCUTÁNEO DE INSERCIÓN PERIFÉRICA (INPer, 2015) El recién nacido que ingresa a UCIN por sus diversas condiciones clínicas requieren terapia de infusión intravenosa para el mantenimiento y sostén de su estado de salud, por lo que requiere la instalación de un catéter venoso central, el cual se puede instalar por técnica percutánea en venas superficiales de las extremidades; ocupando después de la cateterización de los vasos umbilicales la opción más segura y confiable para dicha instalación. Entre las principales ventajas de este abordaje tenemos: - No se utilizan grandes vasos - Son de fácil acceso - Los vasos utilizados no son ocluídos permanentemente - Disminuyen el potencial de infección - Es un procedimiento rápido y relativamente simple. - La cicatriz residual es pequeña Sin embargo, entre sus principales desventajas se encuentran: - Son catéteres de calibre pequeño - Son de una sola vía (actualmente ya contamos en nuestra institución con catéteres percutáneos de dos lúmenes) - No se pueden utilizar para la toma de presión venosa central, muestras sanguíneas y la administración de componentes sanguíneos - No son útiles para exanguinotransfusión Material y equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Pinzas de disección finas (Adson o Iris) sin dientes - Catéter para inserción percutáneo calibre 1.1Fr o 1.9Fr Equipo para colocación de catéter percutáneo de inserción periférica Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Jeringas estériles de 5 ml - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Apósito transparente semipermeable Técnica Seleccionar la vena deseada de acuerdo con el siguiente orden - Vena axilar derecha o izquierda - Safena interna derecha o izquierda En general se puede instalar en cualquier vena superficial de la extremidad superior o inferior Sitios de inserción para catéter percutáneo (INPer, 2015) Modificado por: grupo de trabajo GPC-BE. Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Una vez seleccionada la vena a utilizar, medir la distancia desde el punto de inserción hasta la entrada de la aurícula derecha (3º y 4º espacio intercostal). Inmovilizar la extremidad seleccionada. Medición de catéter percutáneo de inserción periférica Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 Medición de catéter percutáneo de inserción periférica Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Con la medición obtenida, medir catéter y cortar hasta la distancia que se necesite según el sitio de inserción Medición y corte del catéter percutáneo de inserción periférica Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Asepsia de toda la extremidad - Colocar campos estériles - Venopunción con el introductor tipo Excalibur Técnica para la inserción de la aguja introductora en la vena. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por GPC-BE Servicio de Neonatología. Hospital de Gineco Obstetricia 2016. 2. Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Una vez puncionada la vena y al observar sangre en la cámara del Excalibur, se retira el estilete metálico dejando la cánula de plástico - Introducir el catéter a través de la cánula, hasta la distancia calculada Introducción de catéter a través de la aguja introductora plástica con pinza Iris (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia 2016. 2. Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 Introducción de catéter a través de la aguja introductora plástica con pinza Iris (INPer, 2015) 2. Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 - Retirar la cánula plástica de la vena sosteniendo el catéter para que no se salga de la vena El catéter es estabilizado haciendo ligera presión en la extremidad mientras se retira la aguja (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia 2016. El catéter es estabilizado haciendo ligera presión en la extremidad mientras se retira la aguja (INPer, 2015) Técnica para remover la aguja rompiendo hacia afuera y quedando únicamente el catéter dentro de la vena (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodcedures: Principles of Neonatal Procedures, 2013) Modificado por GPC-BE, Servicio de Neonatología, Hospital de Gineco Obstetricia 2016 Retiro de cánula plástica (INPer, 2015) 2. Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Fijar el catéter con apósito transparente semipermeable Fijación de catéter percutáneo Fuente: fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología Hospital de Gineco Obstetricia IGSS 2016 Control radiológico para observar la situación de la punta del catéter, esta debe estar a nivel del tercero o cuarto espacio intercostal para asegurar que se encuentre en la vena cava superior. Posición anatómica radiológica de catéter percutáneo Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Complicaciones - Sangrado - Extravasación - Infección local 16. CATETERISMO VENOSO CENTRAL PERCUTÁNEO SUBCLAVIO (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) (INPer, 2015) (Ringer Steven & Gray James, 2009) Los recién nacidos críticamente enfermos requieren durante su manejo en las unidades de UCIN la presencia de una línea venosa central, ésta podrá instalarse por diferentes vías, percutánea en grandes vasos como son los vasos subclavios que permiten la instalación de un catéter de mayor calibre aún en pacientes pequeños. Indicaciones - Administración de soluciones hiper osmolares - Monitoreo hemodinámico y medición de presión venosa central - Administración de componentes sanguíneos - Utilización de fármacos - Toma de muestras sanguíneas Ventajas - Se puede utilizar catéter de calibre mayor - Pueden ser de una o más vías - Facilitan la toma de presión venosa central - Mayor facilidad para la administración de componentes sanguíneos - Facilidad para la toma de muestras sanguíneas - No se ocluyen en forma definitiva los vasos utilizados Sin embargo, para la realización de este procedimiento se debe contar con capacitación y así poder disminuir los riesgos potenciales que son - Neumotórax - Hemotórax - Hematomas Material y equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Pinzas de disección fina (Adson) con dientes y sin dientes - Conjunto de cateterización venosa central de luz múltiple para uso pediátrico neonatal con los siguientes componentes: catéter múltiple lumen (puede ser de 2 o 3 lúmenes) de 3Fr o 4Fr x 8 centímetros de largo, de poliuretano, radio opaco con punta flexible, guía metálica, catéter de punción 22G sobre aguja para punción 25G, radio opaco con jeringa de 5 ml y cánula dilatadora - Jeringas estériles de 1 ml y 5 ml - Lidocaína al 2% sin epinefrina - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Sutura seda calibre 4-0 con aguja - Apósito semipermeable transparente Técnica Para la instalación se utiliza la técnica de Seldinger: Se recomienda la colocación del catéter con monitoreo, así como aplicación de sedación durante todo el procedimiento. - Paciente en decúbito dorsal con los brazos en posición paralela y fija al tronco. - Se coloca rollo de tela por abajo de los hombros para abatirlos y que se exponga el espacio infra clavicular, manteniendo fija la cabeza al lado opuesto del sitio elegido para la punción. - Se realiza asepsia de la cara anterior del hemitórax elegido abarcando el cuello del mismo lado. - Se colocan campos estériles. **Posición y sitios de inserción de catéter subclavio por punción** Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 **Posición y técnica para la colocación de catéter subclavio por punción** (INPer, 2015) modificado por: grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 • En la unión de los dos tercios internos con el externo de la clavícula se infiltra con lidocaína 0.5 ml • Se coloca en una jeringa de 5 ml solución fisiológica y se adapta con la cánula venosa corta • Se puncia en la unión del tercio externo con los dos internos de la clavícula por debajo de la misma en un ángulo de 45 grados • Corregir el ángulo hasta aproximadamente 10 grados, se dirige cánula corta hacia el manubrio del esternón, introduciéndolo lentamente con presión negativa en el émbolo de la jeringa • Al obtener sangre en la cámara de la cánula y en la jeringa se retira el estilete metálico y la jeringa • Se introduce a través de la cánula la guía metálica, ésta debe pasar sin resistencia y existe una alteración en el trazo electrocardiográfico lo que indica que la guía se encuentra en cámaras cardíacas Técnica de colocación de catéter subclavio por punción Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 • A través de la guía metálica introduce sobre la guía el dilatador de tejidos para la realización de un túnel subcutáneo y posteriormente se retira el dilatador de tejidos Sobre la guía se introduce el catéter, hasta la distancia previamente seleccionada, que se debe medir desde el punto de inserción hasta la entrada de la aurícula derecha (3º o 4º espacio intercostal) y se retira la guía metálica. Fijación y protección de catéter subclavio por punción Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Fijar el catéter a piel con seda 4-0 - Cubrir con apósito transparente semipermeable - Control radiológico, para verificar la situación de la punta del catéter, que debe situarse en la unión de la cava superior con la aurícula derecha Complicaciones - Neumotórax - Sangrado - Extravasación - Infección local 17. CATETERISMO VENOSO CENTRAL POR VENO DI-SECCIÓN (INPer, 2015) Ventajas - Es un procedimiento quirúrgico y facilita la visualización de la vena elegida. Se utiliza en pacientes en los que está contraindicada la colocación percutánea. - Disminuye el trauma a vasos. - Disminuye el riesgo de daño a tejidos subyacentes. Desventajas - La oclusión del vaso utilizado es permanente. - Existe una incisión quirúrgica. - Favorece el riesgo de infección. - Puede provocar obstrucción importante del retorno venoso. - La cicatriz es mayor. Requiere de personal capacitado Material y equipo - Equipo de venodisección. - Gorro, mascarilla. - Guantes y bata estéril. - Gasas y campos estériles. - Catéter venoso (El mismo que se utiliza para el catéter subclavio). - Jeringas de 1 y 5 ml. • Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) • Sutura seda 4-0 • Apósito semipermeable transparente Técnica de instalación • Seleccionar el vaso a utilizar en el siguiente orden: | a) Venas yugulares externas | | b) Venas yugulares internas | | c) Venas safenas | | d) Venas basílicas | ![fig. 1 abordaje yugular](image) ![fig. 2 abordaje safena](image) **Abordaje para la colocación de catéter central por disección** (INPer, 2015) modificado por: grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Una vez seleccionada la vena se procede a inmovilizar al paciente de acuerdo con la región anatómica a utilizar • Realizar asepsia de la región • Colocar campos estériles • Infiltrar con lidocaína 0.5 ml en el sitio a realizar el procedimiento • Incisión con bisturí seccionando únicamente piel • Disección roma con pinza de Halstead (“mosquito”) curva hasta localizar la vena seleccionada • Disecar en todo su diámetro la vena para separarla de los tejidos adyacentes • Colocar rienda con seda en el extremo distal de la vena • Realizar contra abertura a una distancia no menor de 1 cm de la incisión • Instalar el catéter por la contra abertura • Realizar venosección transversal • Introducir el catéter a través de la venosección, a la distancia previamente medida • Fijar el catéter a la vena con ligadura simple de seda 4-0 • Ligar el extremo distal de la vena • Cierre de la herida con seda 4-0 puntos simples • Colocar un punto simple a la piel a nivel de la salida del catéter en la contra abertura y con este fijar el catéter con ligaduras simples • Cubrir la herida quirúrgica y el sitio de salida del catéter con apósito transparente semipermeable • Confirmar posición radiológicamente Complicaciones • Infección • Extravasación • Obstrucción del retorno venoso D. ACCESO INTRAÓSEO (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Indicaciones Se utiliza como un acceso vascular de urgencia (para la administración de líquidos y medicamentos) cuando se han intentado otros métodos de acceso vascular y han fallado. Muchos agentes se han infundido por medio de esta técnica en la literatura, incluídas soluciones intravenosas (por ejemplo, lactato de Ringer o solución salina normal), sangre o productos sanguíneos y una amplia variedad de medicamentos. AGENTES ADMINISTRADOS POR VÍA INTRAÓSEA REPORTADOS EN LA LITERATURA | LÍQUIDOS: | Cristaloides (salino normal, lactato de Ringer, otros) | |-----------|--------------------------------------------------------| | | Glucosa (diluir si es posible, al utilizar D50%) | | SANGRE Y PRODUCTOS SANGUÍNEOS | |-------------------------------| | MEDICAMENTOS: | Efedrina | |---------------|----------| | Agentes anestésicos | Epinefrina | | Antibióticos | Heparina | | Atropina | Insulina | | Gluconato de calcio | Isoproterenol | | Dexametasona | Lidocaína | | Diazepam | Morfina | | Diazóxido | Fenitoína | | Dobutamina | Bicarbonato de sodio (si es posible, diluir) | | Dopamina | | MATERIAL DE CONTRASTE De MacDonald MG, Ramasethu J (eds). Procedures in Neonatology. 4ª ed. Baltimore, MD: Lippincott Williams & Wilkins, 2007 Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Jeringa 5ml - Aguja de aspiración desechable calibre 18G para la médula del hueso ilíaco (de preferencia), una aguja intraósea o aguja raquídea corta de calibre 18G ó 20G con un estilete, aguja hipodérmica corta (calibre 18G a 20G), aguja de mariposa (calibre de 16G a 19G) o dispositivo de cánula sobre aguja 20G ó 22G - Existen dispositivos específicos para introducir las agujas intraóseas, pero la falta de estudios no respalda su uso en neonatos prematuros Técnica de infusión intraósea: (A) vista anterior de los sitios en la tibia y el peroné. (B) vista sagital. (C) Corte transversal de la tibia (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) modificado por: grupo de trabajo GPC-BE, Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 Procedimiento El sitio preferido es la tibia proximal. Otros sitios son la tibia distal y el fémur distal. - Restringir la parte inferior de la pierna del paciente - Colocar un rollo de tela atrás de la rodilla para dar soporte - Seleccionar el área en la línea media de la superficie plana de la tibia anterior a 3 cm debajo de la tuberosidad tibial - Limpiar el área con solución antiséptica y colocar coberturas estériles alrededor del área - Se puede utilizar lidocaína al 2% sin epinefrina para el tratamiento del dolor. Inyectar en la piel y el tejido blando - Insertar la aguja a un ángulo de 10° a 15° hacia el pie para evitar la placa de crecimiento - Desplazar la aguja hasta que se sienta ausencia de resistencia (por lo general no se necesita más de 1 cm), que es el momento en que debió darse ya entrada al espacio medular - Retirar el estilete. *(Nota: en este punto se puede realizar la aspiración de la médula ósea para estudios de laboratorio, si se necesita. Estos aspirados se envían para obtener valores de química sanguínea, PCO2, pH, nivel de hemoglobina, cultivo, tipo de sangre y pruebas de compatibilidad cruzada.)* - Asegurar la aguja a la piel con cinta para evitar que se desprenda - Colocar la aguja a los líquidos IV. Las soluciones hipertónicas y alcalinas deben diluirse 1:2 con solución salina normal - Retirar la aguja y aplicar presión sobre el sitio de punción Para evitar el riesgo de complicaciones infecciosas, se debe usar este método de acceso vascular de forma óptima por menos de 2 horas. **Complicaciones** - Infiltración de líquido en el tejido subcutáneo - Infiltración subperióstica de líquido - Celulitis o absceso localizado - Formación de abscesos subcutáneos - Coagulación de la médula espinal, que produce pérdida del acceso vascular - Osteomielitis (poco común) - Fractura del hueso. Se debe realizar una radiografía para descartar fracturas - Síndrome compartamental - Blastocitos en la sangre periférica. Los blastocitos se han observado después de infusiones intraóseas en pacientes que no tienen enfermedades malignas, infecciosas o infiltrativas de la médula ósea - Septicemia - Embolia grasa - El crecimiento óseo no se afecta por este procedimiento E. OTROS PROCEDIMIENTOS 18. MEDICIÓN DE LA PRESIÓN VENOSA CENTRAL (PVC) (sld.cu/galerias/anestesiologia., 2016) Definición Es la medición de la presión de llenado de la aurícula derecha en centímetros de agua, que indica cómo se encuentra el volumen sanguíneo circulante. Objetivo - Conseguir una medición correcta de la P.V.C., que nos informe de las presiones en cavidades cardíacas derechas - Valorar volemia del paciente Indicaciones - Hipovolemia - Hipervolemia Material - Catéter previamente colocado - Solución salina 0.9% y sistema de venoclisis - Sistema de presión venosa central - Escala graduada - Llave de tres vías Paciente - Situar al paciente en decúbito supino, con la cama horizontal • Si no fuese posible, siempre realizar la medición en el mismo plano • Previamente debe tener insertado un catéter central Técnica • Lavado de manos, preparar el equipo de presión venosa central, comprobar la permeabilidad de la vía central, cerrar las vías de medicación • Conectar el sistema de presión venosa central al suero salino y purgar cuidadosamente el sistema, evitando la presencia de burbujas • Localizar y marcar el punto 0 del paciente a nivel de aurícula derecha en la línea media axilar, aproximadamente en el 4º espacio intercostal derecho • Girar la llave de tres vías, de modo que se llene la columna graduada de suero fisiológico hasta 15-20 cm • Girar la llave de tres vías, de modo que la columna quede comunicada con el catéter del paciente, aislando el suero • Esperar que la columna de líquido en la escala graduada descienda hasta el momento en que oscile ligeramente y detenga su descenso. Este valor es el que se registra como PVC. La lectura debe hacerse durante la espiración, porque la presión intra torácica es menor en este momento • Realizada la lectura, cerrar la comunicación con la columna y conectar al catéter con el sistema de goteo • Registrar la medición y resultados obtenidos en la gráfica Observaciones - Reanudar el ritmo de goteo, según prescripción - Utilizar una técnica estéril durante toda la manipulación - Si el suero descendiera con rapidez, sospechar de fugas en el sistema - El paciente no debe moverse, ya que se altera la medición en unos 2–3 cm - En pacientes con respirador, tener en cuenta la presión positiva del respirador, porque produce una lectura elevada falsa, por lo que se debe restar a la PVC este valor - Verificar la correcta colocación de la punta del catéter central por radiografía - Medidas normales: PVC en el recién nacido de pre término puede oscilar normalmente entre 5 a 10 cm de agua y en el de término entre 8 a 10 cm de agua, por lo tanto, toda PVC mayor de 10 cm de agua es anormal (INPer, 2015) Complicaciones - Desconexión del sistema e infección por técnica poco aséptica 19. INTUBACIÓN ENDOTRAQUEAL (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones - Proporcionar soporte respiratorio mecánico - Obtener aspirados para cultivo - Ayudar a la higiene pulmonar - Aliviar la obstrucción de las vías respiratorias superiores - Despejar la tráquea de meconio • Ventilación bronquial selectiva • Hernia diafragmática • Administrar medicamentos en un contexto de urgencia antes de establecer el acceso intravenoso. La adrenalina administrada en el tubo endotraqueal puede ser absorbida por los pulmones e ingresar a la sangre que fluye directamente al corazón, sin embargo, el proceso de absorción por los pulmones hace que el tiempo de respuesta sea más lento. Dosis 0.5 a 1 ml/Kg en concentración 1: 10,000 (Academia Americana de Pediatría y Asociación Americana del Corazón, 2011) Equipo • Tubo endotraqueal No 2.5-4.5 Tubos para intubación endotraqueal, No 4.5, 4, 3.5, 3, 2.5 Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Guías para el tamaño de tubo endotraqueal y la profundidad de inserción con base en el peso y edad de gestación | Peso (g) | Edad de gestación (semanas) | tubo endotraqueal, diámetro interno (mm) | Profundidad de Inserción (cm desde el labio superior) | |---------|-----------------------------|------------------------------------------|---------------------------------------------------| | < 1000 | < 28 | 2.5 | 6 (si < 750 g) a 7 | | 1000 a 2000 | 28 a 34 | 3 | 7 a 8 | | 2000 a 3000 | 34 a 38 | 3.5 | 8 a 9 | | >3000 | > 38 | 3.5 a 4 | 9 a 10 | Basado en las guías de Kattwinkel J. *Textbook of Neonatal Resuscitation*. 6th ed. Elk Grove, IL: American Heart Association/American Academy of Pediatrics; 2011 - Mango de laringoscopio - Guantes estériles - Hoja Miller (hojas rectas) 00 para neonatos pre término extremo, hoja 0 para neonatos pre término, hoja 1 para neonatos a término **Laringoscopio y hojas de Miller** Fotografía tomada por grupo de trabajo GPC-BE, Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2016 - Dispositivo de bolsa auto inflable neonatal y mascarilla acolchada de diferentes tamaños - Fuente de oxígeno • Aspirador de secreciones • Fijador de tubo endotraqueal • Cinta • Tijeras • Equipo de protección personal y tintura de benjuí • Oxímetro de pulso Procedimiento • Asegurar que esté funcionando la fuente de luz del laringoscopio, antes de empezar el PROCEDIMIENTO • Colocar al neonato con el cuello ligeramente extendido, un rodillo pequeño enrollado detrás del cuello puede ayudar en la colocación. La hiperextensión del cuello en neonatos puede hacer que se colapse la tráquea. La cabeza del neonato debe estar al mismo nivel que la del operador • Aspirar con cuidado la oro faringe, hasta donde sea necesario, para que los puntos de referencia sean visibles y claros • Ventilar previamente al neonato con un dispositivo de bolsa y mascarilla y monitorizar la saturación de oxígeno con el oxímetro de pulso. Si administra oxígeno, utilizarlo con mezclador. Se debe evitar el uso de oxígeno al 100% Para evitar la hipoxia debe reducirse cada intento de intubación a menos de 30 segundos • Sostener el laringoscopio con la mano izquierda, e insertarlo en el lado derecho de la boca y desplazar la lengua al lado izquierdo. Algunos clínicos desplazan la lengua a la izquierda utilizando el dedo índice de la mano derecha colocada en el costado de la cabeza y mantener la boca abierta - Desplazar la hoja un par de milímetros, pasándola por debajo de la epiglotis - Levantar la hoja verticalmente para elevar la epiglotis, y visualizar la glotis - Pasar el tubo endotraqueal a lo largo del lado derecho de la boca hacia abajo, hasta pasar las cuerdas vocales durante la inspiración Intubación endotraqueal en el neonato. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) - La profundidad sugerida en neonatos es sumar 6 al peso del paciente en kilogramos (esta regla no es funcional en neonatos con anomalías congénitas, por ejemplo, Síndrome de Pierre Robin) - Confirmar la posición del tubo. La bolsa auto inflable se conecta al tubo oro traqueal, un asistente proporciona respiraciones manuales, mientras el operador escucha ruidos respiratorios iguales en ambos lados del pecho. Se debe auscultar el estómago para asegurarse de que no se intubó el esófago - Fijar el tubo oro traqueal - Obtener una radiografía torácica para confirmar la colocación apropiada del tubo Complicaciones - Perforación y traumatismo traqueal. Es una complicación poco común que requiere intervención quirúrgica. - Perforación esofágica, suele ser provocada por la intubación traumática, el tratamiento depende del grado de perforación. - Edema laríngeo, suele observarse después de la extubación. - Colocación inapropiada del tubo. Intubación esofágica o en la ramificación principal derecha de los bronquios. - Obstrucción o doblamiento del tubo. - Infección. - Surcos palatinos, suelen observarse en casos de intubación a largo plazo, por lo general resuelven con el tiempo. - Estenosis sub glótica, relacionada a intubación endotraqueal a largo plazo mayor de 3 a 4 semanas, suele ser necesario la corrección quirúrgica. 20. **EXTUBACIÓN ENDOTRAQUEAL** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) **Indicación** La decisión de retirar un tubo endotraqueal es una decisión clínica compleja. EL USO DE MEDICAMENTOS ANTES DE LA EXTUBACIÓN - El uso de dexametasona es controvertido - El estridor. Algunos abogan dexametasona sistémica dado antes y después de la extubación para reducir la incidencia de estridor - Riesgo de re intubación. La dexametasona IV dada antes de la extubación reduce la necesidad de re intubación. Se utiliza en intubaciones prolongadas y múltiples, que producen edema u obstrucción de las vías respiratorias altas - Las metilxantinas utilizadas como profilaxis (por ejemplo, la cafeína) aumenta las posibilidades de éxito en la extubación de recién nacidos prematuros dentro de la primera semana de vida Procedimiento - Realizar fisioterapia respiratoria y succión - Retire la cinta y todos los dispositivos que sujetan el tubo endotraqueal - Retire el tubo Las recomendaciones varían - Dar inspiración con presión positiva mientras lentamente retira el tubo - Succión, dar respiraciones con presión positiva y retirar el tubo endotraqueal Complicaciones Dentro de las principales alteraciones después de la extubación están: (INPer, 2015) - Voz o llanto ronco. Remite en 2-3 días, se maneja con la administración de aire humidificado caliente • Edema de glotis. Es el evento más frecuente y el signo principal es el estridor inspiratorio. • Edema subglótico. cuando los signos de edema aparecidos después de extraer la cánula no mejoran con las maniobras habituales • Atelectasia pulmonar 21. FISIOTERAPIA PULMONAR Y MANEJO DE SECRECIONES (INPer, 2015) La fisioterapia pulmonar es un método que se utiliza para mantener permeables las vías aéreas, mediante la eliminación de las secreciones producidas por el árbol traqueo bronquial. Puede ser utilizada profiláctica o terapéuticamente, formando parte integral en el manejo agudo y crónico de problemas respiratorios en los bebés. Comprende una serie de maniobras como la humidificación, drenaje postural, percusión, vibración, aspiración de secreciones. Indicaciones • Neumonía • Atelectasia aguda • Síndromes aspirativos • Displasia broncopulmonar, entre otras Humidificación y calentamiento de vías aéreas La humidificación del aire inspirado es fundamental para evitar la resequedad de la mucosa. El paciente intubado no puede humedecer y calentar el aire inspirado. Si no se humedece éste se incrementará la frecuencia de obstrucción por desecación de secreciones. **Drenaje postural** El drenaje postural es fundamental para la limpieza del árbol traqueo bronquial, cuando un bronquio segmentario específico se coloca en posición vertical, de tal forma que esta zona quede más elevada que el nivel del resto del cuerpo, la fuerza de gravedad ayudará a que las secreciones fluyan hacia abajo y abandonen este segmento dirigiéndose a vías respiratorias de mayor calibre, en donde podrán ser aspiradas. **DRENAJE POSTURAL** LÓBULOS SUPERIORES, SEGMENTO BASAL POSTERIOR. COLOQUE AL NIÑO SOBRE EL LADO IZQUIERDO, CON LA CADERA 20 CM ARRIBA DE LA CABEZA. RUDELO HACIA ADELANTE O ARRIBA 1/4 CIRCULO. DE PALMOPERCUSIÓN Y VIBRACIONES SOBRE LA PARTE INFERIOR DE LAS COSTILLAS. ESTA POSICIÓN ES PARA DRENAR EL LADO DERECHO; PARA EL LADO IZQUIERDO COLOQUE AL NIÑO SOBRE EL LADO DERECHO. **DRENAJE POSTURAL** LÓBULO SUPERIOR, SEGMENTOS POSTERIORES. COLOQUE AL NIÑO BOCA ABAJO, SOBRE EL LADO IZQUIERDO CON LA CADERA 20 CM. ARRIBA DE LA CABEZA. DE PALMOPERCUSIÓN Y VIBRACIONES EN EL HUECO AUXILIAR PARA DRENAR EL LADO OPUESTO, VOLTEE, AL NIÑO SOBRE EL LADO DERECHO. **DRENAJE POSTURAL** LÓBULO SUPERIOR, SEGMENTOS POSTERIORES. SE COLOCA AL NIÑO EN DECUBITO VENTRAL CON LA CADERA 20 CM ARRIBA DE LA CABEZA. DE PUNGERCUSIÓN O VIBRACIONES ABajo DE LAS COSTILLAS, CERCA DE LA COLUMNA EN AMBOS LADOS. Consideraciones especiales Los cambios de posición implican cierto estrés para el sistema cardiovascular, sobre todo si el paciente está grave. La posición con la cabeza baja, ocasionan dificultad para el retorno venoso e incrementan la presión intracraneal. Percusión del tórax Puede ser utilizada después del drenaje postural para desprender las secreciones bronquiales adheridas. Es fundamental el utilizar las manos en forma de copa que aplauden sobre la caja torácica, quedando cierta cantidad de aire entre la mano y la caja torácica, que al ser comprimido produce una onda de presión, transmitiéndose a través de la caja torácica al tejido pulmonar, con lo que se desprenden los tapones mucosos facilitándose la salida de secreciones tanto por gravedad como por ayuda de la tos. **Consideraciones especiales** - Es conveniente evitar golpear eminencias óseas, clavículas, omóplatos, columna vertebral, abdomen y esternón. - En neonatos de muy bajo peso, se utilizan objetos más pequeños que semejan el hueco de una mano como la mascarilla de la bolsa auto inflable con el reborde de esponja suave que crean la misma fuerza que una mano ahuecada. - La pared torácica del recién nacido, debido a que sus costillas son cartilaginosas, requiere de un tratamiento suave. Hay que tener cuidado ya que el bebé puede fatigarse, por lo que es conveniente mantener un flujo constante de oxígeno durante el procedimiento. - Se recomienda máxima precaución en recién nacidos menores de 1,500g y menores de 2 semanas de vida, por el riesgo de hemorragia intra ventricular. **Vibración del tórax** Es un movimiento fino de agitación, aplicado durante la exhalación, la cual se puede realizar posterior al drenaje postural y a la percusión. Se puede realizar aplicando ambas manos o los dedos, dependiendo del tamaño del paciente sobre la caja torácica originando un movimiento vibratorio con los brazos en forma rápida al mismo tiempo que se realiza cierta compresión sobre el tórax. Se lleva a cabo cada 2 o 3 respiraciones, siendo más eficaz cuando hay llanto. Consideraciones especiales - Se pueden utilizar los vibradores eléctricos manuales sobre todo en prematuros - Las fracturas desplazadas de clavículas y la hemoptisis la contraindican Aspiración de vías respiratorias La aspiración de secreciones forma parte del manejo de fisioterapia respiratoria y debe de utilizarse en pacientes con incapacidad para movilizar secreciones en el árbol traqueo bronquial, en intubados o con traqueotomía, con incapacidad para toser con efectividad y en obstrucción de vías aéreas por secreciones o por edema. Técnica de aspiración - Es necesario contar con un equipo de aspiración que conste de manómetro para determinar la intensidad del vacío que, debe ser en recién nacidos de 60 a 80 mmHg - Es necesaria la participación de 2 personas, a menos que se utilice el sistema “cerrado”, en el que una persona puede realizar el procedimiento - Debe realizarse bajo asepsia estricta, utilizando un guante estéril para la mano que maneja la sonda, la otra mano maneja la fuente de aspiración o vacío - Se utiliza una sonda de aspiración estéril, la cual debe ser flexible para evitar traumatismos, no colapsable y lo suficientemente larga para sobrepasar la cánula endotraqueal como máximo 1 cm. Tener extremo suave y orificios laterales. Es necesario que su diámetro externo sea menor al diámetro interno de la cánula endotraqueal. - Son necesarias soluciones y recipientes estériles para limpiar la sonda después de cada aspiración. Nunca deberá guardarse la sonda para volverse a utilizar. - Oxigenar al paciente, con lo que se mantiene una reserva adecuada de oxígeno en el alvéolo. Se realiza incrementando la Fio2 en el ventilador 10%. La ventilación manual debe reservarse a casos especiales. - Se introduce la sonda sin succión negativa, 0.5 a 1 cm más de la distancia de la cánula endotraqueal, cuando se note una discreta obstrucción, se retira un poco, y se aplica aspiración al mismo tiempo que se gira la sonda entre el pulgar y el índice, en tanto se extrae hacia arriba. - El tiempo de permanencia de la sonda en la vía aérea no debe ser mayor de 5 segundos. El tiempo que transcurre entre el inicio de la maniobra y la reanudación de la ventilación, no debe pasar de 10 segundos. Es necesario que durante el procedimiento se esté cuantificando la frecuencia cardíaca ya sea con estetoscopio o mediante el monitor vigilando la presencia de bradicardias o arritmias, y ante la aparición de cualquiera de estas se suspende la maniobra y se ventila al paciente. - Se conecta el paciente al ventilador y se espera hasta que la saturación de oxígeno y la coloración se normalicen, antes de repetir la maniobra de aspiración. - En caso de secreciones espesas, puede aplicarse solución salina (0.1 a 0.2 ml) en cánula endotraqueal, permitir la ventilación por 3 a 10 ocasiones y se procede a aspirar. • Se repite el procedimiento hasta que las vías aéreas queden libres de secreciones. Se rota la posición de la cabeza hacia derecha e izquierda. Posterior a la aspiración traqueal se puede utilizar la misma sonda para aspirar las secreciones de cavidad oral y nasal, pero no podrá ser introducida nuevamente a la tráquea • Durante la aspiración es necesario observar el color, consistencia, olor y cantidad de las secreciones • Al terminar el procedimiento se debe disminuir la FiO2 al valor inicial Complicaciones Extubación, hipoxia, bradicardia, hemorragia intra craneal, apnea, atelectasias, perforación o hemorragia traqueal y/o bronquial, síndrome de fuga aérea e infección 22. COLOCACIÓN DE SONDA OROGÁSTRICA (INTUBACIÓN OROGÁSTRICA) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) La intubación gástrica es una técnica consistente en la introducción de un tubo flexible en el estómago del paciente a través de la boca (sonda oro gástrica). Indicaciones • Administración de alimentación enteral • Frecuencia respiratoria > 60 rpm para disminuir el riesgo de aspiración • Enfermedades neurológicas que imposibilitan el succionar y deglutir alimentos • Prematuros • Neonatos en ventilación mecánica invasiva o no invasiva (por ejemplo, CPAP) • Descomprensión gástrica • Neonatos con enterocolitis necrosante, obstrucción intestinal o íleo • Neonatos en ventilación mecánica invasiva o no invasiva (por ejemplo, CPAP) • Administración de medicamentos • Realizar lavados gástricos Consideraciones • En bebés menores de 2 kg, no debe utilizarse la sonda nasogástrica porque aumenta el compromiso respiratorio • En bebés sometidos a cirugía esofágica o gástrica se debe tener precaución de no utilizar o retirar la sonda sin previa evaluación por el médico cirujano Equipo • Sonda de alimentación según peso • Peso <1000g, usar 5Fr • Peso >1000g, usar 5Fr u 8Fr • Si es para descomprimir, utilizar sonda 8Fr • Estetoscopio • Guantes no estériles • Agua estéril para lubricar • Jeringa de 5 o 10 ml • Cinta adhesiva porosa de ½ pulgada • Tintura de Benjuí • Bolsa de drenaje Procedimiento - Elegir el diámetro de la sonda adecuado al paciente - Determinar la longitud de la sonda que hay que introducir. Puede utilizarse alguno de los siguientes métodos - Medición de la longitud de inserción de la sonda oro gástrica en neonatos de muy bajo peso al nacer, de acuerdo con el peso Guía para medición de la longitud de inserción de la sonda oro gástrica en niños de muy bajo peso al nacer | Peso (g) | Longitud de inserción (cm) | |----------------|----------------------------| | < 750 | 13 | | 750-999 | 15 | | 1000-1249 | 16 | | 1250-1500 | 17 | (Gallaher, Cashwell S., & Lowe W., 1993) Modificado por grupo de trabajo GPC-BE, Servicio de Neonatología. Hospital de Ginecoobstetricia IGSS 2016 - Método Nariz/Oreja/Punto medio umbilical - Distancia desde la punta de la nariz al lóbulo de la oreja y de ahí hasta el punto medio entre la apófisis xifoides y el ombligo. Esta proporciona una medición más precisa - Método Nariz/Oreja/Xifoides - Distancia desde la punta de la nariz al lóbulo de la oreja y de ahí a la apófisis xifoides Medición de la SOG (Dlma, 2012) - Marcar la longitud obtenida con cinta adhesiva porosa o rotulador, para evitar errores de medidas - Lubricar la sonda con agua estéril, para disminuir el roce de la sonda con la mucosa Desarrollo de la técnica - Colocarse en el lado derecho si es diestro o en el izquierdo si es zurdo, para facilitar la manipulación de la sonda - Introducir la sonda por boca, aplicando una ligera presión hacia abajo para hacer avanzar la sonda - Dejar que el paciente se relaje un momento, esto facilita el paso hacia la faringe posterior pues cierra la glotis, reduciendo la posibilidad de que la sonda penetre en la tráquea - Si aparece tos, disnea o cianosis; retire la sonda, porque la sonda puede estar en la tráquea Comprobar la colocación de la sonda - Insuflar aire por la sonda, colocando el estetoscopio en epigastrio. La cantidad de aire insuflado variará con la edad del neonato. Se oirá un ruido sibilante o gorgoteante. Si no es así podrá estar en esófago, tráquea o bronquio - Aspirar el contenido gástrico, valorando el color - Verificación radiológica no suele ser necesaria Limpiar y secar la piel alrededor de la boca, para que la fijación no se afloje, utilizando tintura de benjuí. Fijar la sonda con una tira de cinta adhesiva porosa o apósito apropiado. Si el neonato presenta lesiones en la piel, sujete la sonda utilizando una cinta o venda. Si el paciente está agitado, fije también la sonda detrás de la oreja con cinta adhesiva. La sonda también se puede fijar al tubo endotraqueal Mantener al bebé con el tórax elevado de 30 a 45°, para prevenir la neumonía por aspiración Conectar el extremo de la sonda a drenaje, aspiración, nutrición o cerrarla Complicaciones - Apnea y bradicardia por estimulación de los reflejos vagales - Hipoxia - Neumonía por aspiración - Erosión de la mucosa gástrica que provoque hemorragia gástrica - Obstrucción de la sonda - Erosión esofágica - Esofagitis por reflujo - Úlceras por presión - Náuseas en exceso - Perforación gástrica 23. COLOCACIÓN DE SONDA OROGÁSTRICA TRANSPLÓRICA (INTUBACIÓN TRANSPLÓRICA) (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) La intubación transplórica es la introducción de un tubo a través de la boca dirigida hacia el píloro, duodeno o yeyuno. Sin embargo, **en una revisión de Cochrane no está recomendada en neonatos prematuros, al no existir evidencia de beneficios de la alimentación transplórica en relación con el aumento de sus efectos adversos**. Excepto en pacientes de quien se sospeche reflujo gastroesofágico, en el cual la alimentación con leche materna vía transplórica puede reducir la presencia de apnea y bradicardia en neonatos pre término. Indicaciones - Administración de alimentación entérica en las siguientes condiciones - Reflujo gastroesofágico - Neonatos con riesgo de aspiración - Retraso del vaciamiento gástrico - Trastornos de la motilidad - Distensión gástrica severa - Intolerancia alimenticia gástrica (residuo gástrico persistente) - Test del contenido duodenal y yeyunal - Postoperatorio de atresia yeyunal Equipo - Sonda trans pilórica de preferencia de silicona con o sin guía, en su elección considerar - Peso <1500g, usar 6Fr - Peso >1500g, usar 8Fr Tipos de sonda transpilórica (Relaño García, Moyano Tost, & De Frutos Arribas, 2014) • Estetoscopio • Guantes no estériles • Agua estéril para lubricar • Jeringa de 5 o 10 ml. • Cinta adhesiva porosa de \( \frac{1}{2} \) pulgada • Tintura de Benjuí • Bolsa de drenaje • Monitor Procedimiento Preparar al paciente • Colocar el monitor cardíaco y evaluar la función respiratoria durante el procedimiento • Colocar al paciente en posición de Fowler elevado con almohadas detrás de cabeza y hombros, porque facilita la capacidad de tragar y la fuerza de la gravedad ayuda a pasar la sonda Preparar el equipo • Elegir el diámetro de la sonda adecuado al paciente • Marcar la longitud obtenida con un cinta adhesiva porosa o rotulador, para evitar errores de medidas • Lubricar la sonda con agua estéril, para disminuir el roce de la sonda con la mucosa Desarrollo de la técnica • Colocarse en el lado derecho si es diestro o en el izquierdo si es zurdo, para facilitar la manipulación de la sonda • Introducir la sonda por la boca, aplique una ligera presión hacia abajo para hacer avanzar la sonda; si no avanza rotar la SOG y si aún así persiste la resistencia, no forzar y retirar la sonda. - Flexionar la cabeza del paciente hacia el pecho y dejar que el paciente se relaje un momento, esto facilita el paso hacia la faringe posterior pues cierra la glotis, reduciendo la posibilidad de que la sonda penetre en tráquea. - Compruebe que la sonda esté a nivel gástrico, conectando la jeringa al extremo del tubo e instilando 10 cm de aire para distender la cámara gástrica y cierre el tubo. Gire al paciente en decúbito lateral derecho y manténgalo en esta posición de 1 a 2 horas, para permitir que la sonda migre hacia el duodeno. - Comprobar la colocación de la sonda - Insuflar aire por la sonda 2-3 ml, colocando el estetoscopio en epigastrio. No debe escuchar ningún ruido, lo que sugiere que se encuentra en el duodeno. No se considera un método fiable de comprobación. - Aspirar el contenido que debe ser de color amarillo o verde que sugiere contenido biliar. - **Verificación radiológica, es el estándar de oro y debe realizarse antes de iniciar alimentación o administrar medicamentos. El tubo debe observarse por debajo de la segunda porción del duodeno.** - Limpiar y secar la piel alrededor de la boca del paciente, para que la fijación no se afloje, utilizando tintura de benjuí. Fijar la sonda con una tira de cinta adhesiva porosa o apósito apropiado dependiendo de la edad del neonato. Si presenta lesiones en la piel, sujete la sonda utilizando una cinta o venda. Si el paciente está agitado, fije también la sonda detrás de la oreja con cinta adhesiva. La sonda también se puede fijar al tubo endotraqueal - Conectar el extremo de la sonda a drenaje, aspiración, nutrición o cerrarla - Después de administrar medicamentos o alimentación, debe instilar 3 ml de agua a través de la sonda, para evitar obstrucciones - Considere cambiar la sonda cada 2 a 4 semanas después de colocada **Complicaciones** - Neumonía por aspiración - Infecciones - Raramente, intususcepción, estenosis del píloro, fístulas entero-cutáneas, metahemoglobinemia en prematuros extremos por obstrucción intestinal e inflamación inducida por la sonda trans pilórica, fístula bronco pleural y neumotórax **24. COLOCACIÓN DE TUBO TORÁCICO.** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) **Indicaciones** - Neumotórax a tensión - Drenaje de una cantidad significativa de líquido pleural (derrame pleural, empiema, quilotórax, hemotórax) - Drenaje quirúrgico tras la reparación de una fístula traqueo esofágico o atresia esofágica Colocación de mini sello (INPer, 2015) En los casos que el neumotórax complique la función ventilatoria y circulatoria en forma extrema, antes de la colocación del tubo intercostal es útil el drenaje temporal de la cavidad torácica por medio de una toracentesis con aguja pericraneal 21G o 22G. Este se colocará de la siguiente manera - Paciente en decúbito dorsal - Asepsia de la región anterior del tórax - El punto de punción es en la unión del segundo o tercer espacio intercostal y la línea medio clavicular - Se introduce perpendicularmente a la piel introduciendo la totalidad de la aguja y se conecta a un sistema de drenaje introducido en un recipiente con agua estéril, esto permitirá el drenaje parcial de la cavidad para mejorar las condiciones ventilatorias y circulatorias del paciente, en espera de colocar el drenaje definitivo (INPer, 2015) COLOCACIÓN DE TUBO INTERCOSTAL Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Equipo de tubo pleural (sutura de seda 3-0, pinzas hemostáticas curvas, bisturí, tijeras, porta agujas, solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2), lidocaína al 2% sin epinefrina, jeringa de 3 ml y aguja calibre 25G) - Tubo pleural 8Fr o 10Fr para neonatos de <2000g y 12Fr para >2000g. - Tubos de toracotomía de polivinilo números 8Fr, 10Fr o 12Fr o tubos para intubación endotraqueal tamaño 3.5 o 4. - Tubo intercostal percutáneo con punzón y guía incorporado. No requiere incisión en piel. Se utilizan los tamaños 10Fr y 12Fr Equipo para colocación de tubo intercostal (tubo 10Fr y 12Fr) Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Sistema de succión-drenaje Sistema de drenaje torácico pediátrico (sello de agua) Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Procedimiento - Se coloca el paciente de forma que el sitio de inserción sea accesible, la posición más común es la supina, con el brazo en ángulo de 90 grados en el lado afectado - Seleccionar el sitio apropiado - Para la colocación anterior, el sitio debe ser el segundo o tercer espacio intercostal en la línea clavicular media - Para drenaje de líquido o aire. El lugar es el mismo variando la dirección a donde se dirige el tubo. Para la colocación posterior, se utiliza el cuarto o quinto espacio intercostal entre la línea axilar anterior y la línea medio axilar. Esta posición es la más segura para ambos lados del tórax, tanto para neonatos a término como prematuros, debido a que se encuentra únicamente parénquima pulmonar. El pezón es el punto de referencia para el cuarto espacio intercostal. No se debe insertar el tubo intercostal en el área del pezón en niñas, debido a que puede causar en el futuro un desarrollo asimétrico de la mama. - PARA DRENAJE DE AIRE DE LA CAVIDAD PLEURAL. La incisión en piel se realiza en la quinta o sexta costilla. Si la incisión en piel se realiza en la quinta costilla, la pleura se punciona encima de la costilla en el cuarto espacio intercostal. Si la incisión es en la sexta costilla, la pleura se punciona sobre la sexta costilla en el quinto espacio intercostal. **Se inserta el tubo en posición anterior y dirigido al ápice del pulmón** - PARA DRENAJE DE LIQUIDO DE LA CAVIDAD PLEURAL. La incisión en piel se realiza en la quinta o sexta costilla. Si la incisión en piel se realiza en la quinta costilla, la pleura se punciona encima de la costilla en el cuarto espacio intercostal. Si la incisión es en la sexta costilla, la pleura se punciona sobre la sexta costilla en el quinto espacio intercostal. **Se inserta el tubo en posición posteroinferior** Sitio de inserción de tubo intercostal (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Sitio recomendado para incisión en la piel y la inserción del tubo torácico en el recién nacido: Tubo anterior y lateral. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) • Vestir una bata quirúrgica, mascarilla, gorro y guantes estériles. Limpiar el área de inserción con solución de gluconato de clorhexidina al 0.075% (fórmula 2) • Infiltrar la superficie del área con lidocaína al 2% sin epinefrina y después hacia abajo hacia la costilla. Se infiltra en los músculos intercostales y a lo largo de la pleura parietal. Realizar una pequeña incisión en la piel sobre la costilla, justo debajo del espacio intercostal, donde se desea insertar el tubo • Insertar la pinza hemostática curva cerrada en la incisión, y separar los tejidos hacia la costilla, empleando la punta de la pinza, realizar una punción en la pleura, justo por arriba de la costilla y separar gentilmente El paquete vasculonervioso intercostal se encuentra en el borde inferior de las costillas • Cuando se ha penetrado la pleura, suele escucharse un soplo de aire o aparece líquido • Insertar el tubo pleural a través de la pinza de hemostasis abierta • Si es un tubo con trocar guía, este se introduce directamente haciendo presión y “atornillándolo” hasta la cavidad de ser posible en un solo tiempo. Y retirar trocar después de insertar el tubo • Asegurarse que los orificios del tubo se encuentran dentro de la cavidad pleural • El tubo pleural debe insertarse 2 a 3 cms para un neonato pre término y 3 a 4 cms para un neonato a término • Sostener el tubo de forma firme en un principio y después permitir que un asistente lo conecte a un sistema de drenaje de sello de agua al vacío. Suelen utilizarse 5 a 10 cm de succión. Iniciar en el nivel más bajo de succión e incremente a medida que se vaya haciendo necesario, si no se resuelve el neumotórax. Los sismas de drenaje al vacío proporcionan una succión continua y un sello de agua. Este último evita que el aire regrese al espacio pleural. - Asegurar el tubo pleural con suturas de seda 3-0. Cerrar la herida quirúrgica de la piel con suturas, si es necesario. - Obtener una radiografía torácica inmediata para verificar la colocación y revisar si hay líquido residual o neumotórax. Colocación de tubo intercostal con pinzas. (INPer, 2015) Retiro del tubo intercostal - En neumotórax, si no hay burbujeo del sello de agua o la presencia de aire por 24 a 48 horas, descontinúe la succión y el nivel del sello de agua por 4 a 12 horas. Realice una radiografía de tórax. Si no hay neumotórax, se puede remover el tubo. **NUNCA SE DEBE CLAMPEAR EL TUBO INTERCOSTAL ANTES DE RETIRARLO. (RIESGO DE CAUSAR UN NEUMOTÓRAX A TENSIÓN)** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) - Limpiar el área de piel alrededor del tubo con solución antiséptica. Quite cinta adhesiva y deje la sutura de la piel. Cubra el orificio de entrada con una gasa y la punta de los dedos para prevenir que entre aire al tórax mientras lo retira, y luego se puede cubrir con gasa vaselinada. Mantenga presión y cubra con una gasa y cinta adhesiva. Retire las suturas cuando haya cicatrizado - Signos y síntomas de dificultad respiratoria identifica a la mayoría de pacientes con neumotórax significativo luego del retiro del tubo intercostal. Se debe monitorizar por taquipnea, incremento de la necesidad de oxígeno, hipotensión o alteración en los gases arteriales. Transiluminación y una radiografía de tórax pueden ser necesarios Complicaciones - Infección. La celulitis es común - Hemorragia. Puede presentarse hemorragia si se perfora uno de los vasos principales (intercostal, axilar, pulmonar o mamario interno) o se daña el pulmón durante el procedimiento • Daño a nervios. Se ha reportado síndrome de Horner y parálisis diafragmática o eventración por lesión al nervio frénico • Traumatismo. El traumatismo pulmonar (perforación o laceración) se minimiza si no se fuerza el tubo hacia la posición • Enfisema subcutáneo secundario a fuga a través de la abertura pleural • Quilotórax • Taponamiento cardíaco 25. PERICARDIOCENTESIS (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Drenaje de emergencia de aire o líquido en el tratamiento de taponamiento cardíaco (Incapacidad del corazón para expandir con una disminución del volumen sistólico y el gasto cardíaco), causado por el derrame pericárdico (acumulación excesiva de líquido) o neumopericardio (acumulación de aire) en el espacio pericárdico. El reconocimiento y la intervención temprana son de suma importancia. • Taponamiento cardíaco secundario a un derrame pericárdico. Una rara pero potencialmente mortal complicación de catéteres venosos centrales, incluyendo el catéter percutáneo y los catéteres venosos umbilicales. La etiología no es clara, pero entre las propuestas se incluyen una punción directa de un vaso o del miocardio por la punta del catéter durante la inserción o perforación retardada secundaria a erosión de la pared cardíaca o vascular. Mantener un alto índice de sospecha clínica en un recién nacido que tiene una línea central y de repente tiene colapso cardiovascular que no responde a la reanimación y no tiene ninguna fuga de aire por transiluminación torácica. Es más común con las líneas de la aurícula derecha, y la mediana del tiempo hasta la incidencia es de 3 días después de la inserción de un catéter venoso central. Una radiografía de tórax puede no ser diagnóstica, un ecocardiograma puede retrasar el tratamiento, la mortalidad es elevada. El derrame pericárdico es poco frecuente en los recién nacidos y más comúnmente se produce en un paciente hidrópico o séptico. Otras causas incluyen la disfunción de la tiroides, tumores del corazón o pericardio, anomalías congénitas (hernia diafragmática o eventración, ruptura ventricular, divertículo), infecciones relacionada con la cirugía (postoperatoria), autoinmune, idiopática, y otras causas. - Taponamiento cardíaco secundario a un neumopericardio. Raramente es peligroso y por lo general ocurre con otros síndromes de pérdida de aire, con patología pulmonar grave, con una historia de reanimación vigorosa, y/o una historia de ventilación asistida. **Indicaciones** - Neumopericardio con taponamiento - Ruidos cardíacos disminuídos o distantes, bradicardia - Disminución de la presión arterial - Pulso paradójico - Menor voltaje electrocardiográfico - Halo cardíaco en la transiluminación o la radiografía - Incapacidad de tomar imágenes del corazón con ecografía desde la vista subxifoidea - Derrame pericárdico con taponamiento - Ruidos cardíacos disminuídos o distantes, bradicardia • Disminución de la presión arterial • Pulso paradójico • Menor voltaje electrocardiográfico • Demostración por ecocardiograma de derrame • Aspiración de líquido pericárdico para diagnóstico Contraindicaciones Colecciones pericárdicas asintomáticas. Equipamiento • Gorro, mascarilla • Guantes y bata estéril • Gasas y campos estériles • Equipo de ultrasonido para realización del ecocardiograma transtorácico (opcional) • Solución antiséptica (gluconato de clorhexidina al 0.075% (fórmula 2) • Dispositivo de cánula sobre aguja 22G o 24G • Llave de tres vías • Jeringa de 10 ml Precauciones y complicaciones Las complicaciones más preocupantes son la perforación del ventrículo derecho y la laceración de una arteria coronaria. Son estructuras musculares y una perforación con una aguja simple por lo general sella de forma espontánea, sin una hemorragia importante. Otros riesgos son la creación de un neumotórax o un neumomediastino, punción hepática, infección y arritmias. El taponamiento del catéter de drenaje por un coágulo sanguíneo o material fibrinoso puede impedir la evacuación del líquido del pericardio. Técnica En condiciones ideales, el procedimiento se realiza con control eco cardiográfico. Se pueden usar las imágenes ecocardiográficas para determinar el ángulo óptimo para la inserción de la aguja y la profundidad necesaria para alcanzar el pericardio. La transluminación puede ser útil en los casos de neuromopericardio. Sin embargo, el taponamiento puede causar compromiso hemodinámico agudo y fatal que exige la aspiración “a ciegas” de emergencia del aire o el líquido pericárdico, aun cuando no se encuentra inmediatamente disponible un equipamiento de diagnóstico por imágenes. - Limpie con antiséptico la piel que cubre la apófisis xifoides, el precordio y el abdomen superior - Cubra la punta del transductor ecográfico o el dispositivo de transluminación con un guante estéril si se usará dentro del campo estéril - Aplique los campos, y deje expuestos el precordio y la apófisis xifoides - Cuando el tiempo lo permite se puede administrar anestesia local 0.25 a 1.0 ml de lidocaína al 2% sin epinefrina, instilada 1 a 2 cm por debajo del esternón - Coloque una llave de tres vías en la jeringa y fíjela abierta a la cánula o use un dispositivo pre ensamblado - El conjunto de aguja y cánula debe entrar en la piel 0.5 a 1.0 cm por debajo de la apófisis xifoides, en la línea media o ligeramente (0.5 cm) hacia la izquierda de la línea media, la aguja debe elevarse 30° a 40° en la piel, y la punta debe dirigirse hacia el hombro izquierdo (línea medio clavicular izquierda). **LUGAR RECOMENDADO PARA PERICARDIOCENTESIS** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016. **Lugar Recomendado Para Pericardiocentesis** Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 • Mientras hace avanzar la cánula, aplique una aspiración suave y constante sobre la jeringa. Haga avanzar la cánula hasta obtener aire o líquido. Cuando se aspira líquido sanguinolento, puede haber un derrame pericárdico hemorrágico, o la punta de la aguja puede haber entrado en el ventrículo derecho. La ecografía puede mostrar un derrame más pequeño o se puede visualizar la punta de la aguja. Cuando hay mejoría hemodinámica después de la aspiración de 10 a 20 ml de líquido, la aguja se encuentra en el espacio pericárdico. A menudo se percibe el tironeo rítmico de la aguja con cada latido cuando ingreso en el corazón; sin embargo, también pueden presentarse pulsaciones similares dentro del espacio pericárdico, cuando la punta de la aguja se encuentra en el espacio pericárdico, se puede hacer avanzar el catéter sobre la aguja y retirarla. • Al terminar de drenar el líquido o aire y percibir presión negativa retirar el sistema NOTA: Si el paciente tiene un catéter venoso central y se sospecha un derrame pericárdico, detener la infusión de fluidos en el catéter inmediatamente. La Pericardiocentesis de emergencia no debe retrasarse, ya que salva vidas. El objetivo es aliviar los síntomas u obtener el suficiente líquido para estudios de laboratorio. 26. PARACENTESIS (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones Para obtener líquido peritoneal para pruebas diagnósticas y terapéuticas • Causas gastrointestinales. Cualquier perforación del tracto gastrointestinal incluyendo perforación gástrica, enterocolitis necrosante con perforación o peritonitis, perforación del divertículo de Meckel, atresia intestinal, mal rotación, vólvulo, gastrosquisis, post cirugía abdominal, onfalocele, o intususcepción, entre otros • Infecciones. Citomegalovirus, toxoplasmosis, sífilis, parvovirus, enterovirus o infecciones bacterianas • Anomalías cardíacas. insuficiencia cardíaca congestiva y la obstrucción de cámaras derechas • Iatrogénica. Pueden producirse a partir de fluido de catéteres venosos centrales por extravasación intraperitoneal de la nutrición parenteral, perforación de una vena umbilical por cateterización • Hemoperitoneo. No traumática (Hepatoblastoma) o secundaria a un traumatismo al nacer (hepática, esplénica, o suprarrenal) • Errores innatos del metabolismo • Ascitis urinaria. Perforación del uréter, sistema colector o vejiga a menudo causada por una obstrucción distal. Lo más común es por causa de válvulas de uretra posterior • Ascitis biliar. Perforación del conducto biliar (más común), lesión de conductos biliares, o un quiste del colédoco • Ascitis quilosa. Anormalidad congénita linfática (más común), o la interrupción de los conductos linfáticos por trauma o cirugía • Ascitis hepatocelular. Hepatitis neonatal, hepatitis viral, fibrosis hepática congénita, síndrome de Budd-Chiari, o trombosis hepática o de vena porta • Ascitis pancreática. Traumatismo o pseudoquiste Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Tubos estériles para fluido - Jeringa de 10 a 20 ml - Llave de tres vías - Dispositivo de cánula sobre aguja de calibre 22G a 24G (24G para neonatos que pesan menos de 2000g, 22G a 24G para los que pesan más de 2000g) - Considere el uso de ecografía para guiar la colocación de la aguja Procedimiento Contraindicaciones y precauciones: La paracentesis se puede realizar con trombocitopenia o coagulopatía si se corrige antes del procedimiento. Con la distensión intestinal masiva, intentar reducir la distensión con una sonda oro gástrica. Evitar sitios de cicatrices quirúrgicas. - Colocar al bebé en posición supina con ambas piernas sujetadas, para restringir todo movimiento, puede ser envuelto en un pañal. Elevar ligeramente el flanco lateral que no está utilizando para que los intestinos floten - Elegir el sitio de la paracentesis. No utilizar el área entre el ombligo y el hueso púbico en neonatos debido al peligro de perforar la vejiga o la pared intestinal. Los sitios que se utilizan son los flancos derecho e izquierdo. Trazar una línea desde el ombligo a la espina ilíaca anterosuperior, utilizar la zona que se encuentra en la distancia de los dos tercios entre el ombligo y la espina ilíaca anterosuperior. La guía ecográfica se puede utilizar y se recomienda. **Sitios del abdomen recomendados para realizar paracentesis** (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Preparar el área con gluconato de clorhexidina al 0.075% (fórmula 2) de manera circular, empezando en el sitio de punción - Colocar guantes estériles y cubrir el área con un campo estéril - Insertar el dispositivo de cánula sobre aguja en el sitio elegido. Por lo general se utiliza una técnica de rastreo en Z para evitar la fuga persistente del líquido después de la punción. Insertar la aguja de forma perpendicular a la piel, cuando la aguja está justo debajo de la piel, se mueve 0.5 cm antes de realizar la punción de la pared abdominal - Desplazar la aguja, aspirando hasta que aparezca líquido en el cuerpo de la jeringa. Después retirar la aguja, conectar la llave de tres vías con la jeringa y aspirar el contenido lentamente. Puede ser necesario reubicar la cánula para obtener una cantidad adecuada de líquido. Una vez que se toma la cantidad necesaria (por lo general de 3 a 5 ml para pruebas específicas o lo suficiente para ayudar en la ventilación), se retira la cánula. Si se obtiene mucho líquido o si se extrae muy rápido, puede ocasionar hipotensión - Cubrir el sitio con una gasa estéril hasta que se detenga la fuga **Complicaciones** - **Hipotensión.** Es provocada por la extracción de líquido en exceso, o la salida rápida del mismo. Para minimizar esta posibilidad, solo se debe tomar la cantidad necesaria para los estudios, o lo que se necesite para mejorar la ventilación. Siempre se debe extraer el líquido de forma lenta - **Infección.** El riesgo de peritonitis se minimiza al usar una técnica estéril estricta - **Perforación del intestino.** Para ayudar a prevenir la perforación se utiliza la aguja más corta posible y se observan con cuidado los puntos de referencia - **Perforación de la vejiga.** Suele ser auto limitante y no requiere tratamiento específico - **Fuga persistente de líquido.** La técnica de rastreo en Z suele prevenir el problema de fuga persistente de líquido - **Neumoperitoneo.** Requiere observación • Hemorragia. La hemorragia del hígado o los vasos puede ser grave y requerir tratamiento quirúrgico 27. PUNCIÓN LUMBAR (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones • Diagnóstico de infecciones del sistema nervioso central (meningitis y encefalitis) Contraindicaciones • Hipertensión intracraneal por riesgo de herniación, discrasias sanguíneas sin corrección, infección cerca del sitio de punción y anormalidades lumbosacras que pueden interferir con la identificación de la estructura y trombocitopenia (menor de 50,000) Equipo • Gorro, mascarilla • Guantes y bata estéril • Gasas y campos estériles • Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) • Tubos estériles para recolección de muestras • Aguja de calibre 22G a 24G Equipo para punción lumbar Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Técnica - Se coloca al neonato en decúbito lateral derecho si el operador es zurdo, si es diestro debe colocarse en decúbito lateral izquierdo. El ayudante ha de sujetar firmemente al bebé por los hombros y nalgas, de modo que la columna quede curvada. Hay que evitar la flexión del cuello para no comprometer la vía aérea y se recomienda colocar un oxímetro de pulso. - Una vez el neonato este en posición, palpar la cresta ilíaca y deslizar el dedo hacia el cuerpo vertebral L4. Luego utilizar el espacio intercostal L4-L5 como sitio de punción lumbar. Colocación y puntos de referencia utilizados para la punción lumbar. Cresta ilíaca (línea punteada) marca el nivel aproximado de L-4 (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Colocación y puntos de referencia para punción lumbar. Cresta ilíaca (línea). Marca a nivel aproximado de L4 Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Ponerse guantes estériles y limpiar el área lumbar con solución antiséptica, en forma circular empezando en el sitio de punción - Cubrir el área con campos estériles. Mantener al neonato con la cara expuesta - Palpar una vez más el espacio seleccionado - Insertar la aguja en la línea media con una presión estable dirigida hacia el ombligo. Desplazar lentamente la aguja y después revisar la apariencia del líquido, rotar la aguja si no se observa líquido - Recolectar 1ml de líquido cefalorraquídeo en cada uno de los tubos estériles, permitiendo que el líquido gotee - Si se obtiene una muestra sanguinolenta en el primer tubo, se debe observar si hay un aclaramiento - Si se aclara la sangre la punción fue traumática - Si la sangre no se aclara, pero forma coágulos, probablemente se perforó un vaso sanguíneo - Si no se aclara la sangre y no se coagula en el contenedor, es probable que el neonato tenga una hemorragia intraventricular - Retirar la aguja, mantener presión sobre el sitio y limpiar con solución antiséptica **Complicaciones** - Infección. Utilizar técnica estéril para disminuir el riesgo - La herniación del tejido cerebral a través del agujero occipital no es un problema común en las unidades de cuidado intensivo neonatal debido a la fontanela abierta en neonatos - Daño a la médula espinal y nervios - Apnea y bradicardia por la alteración respiratoria provocada por sostener de forma muy apretada al neonato durante el procedimiento - Fuga de líquido cefalorraquídeo - Hemorragia intramedular 28. PUNCIÓN INTRAVENTRICULAR (INPer, 2015) Indicaciones - Diagnóstico de infecciones del sistema nervioso central (meningitis y encefalitis) - Drenaje intraventricular, cuando hay aumento de la presión intracraneal o compresión importante de la estructura intracerebral Contraindicaciones - Discrasias sanguíneas de cualquier origen - Sitio de punción con infección local Material y equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Dispositivos de cánula sobre aguja 20G o 22G - Tubos estériles - Gasas estériles - Campos estériles - Llave de tres vías - Jeringa de 10 ml Procedimiento - Colocar al paciente en posición de decúbito dorsal y fijar la cabeza adecuadamente - Localizar la unión de la sutura coronal con el ángulo lateral (izquierdo o derecho) de la fontanela anterior, siendo este el sitio de punción - Insertar la aguja en dirección al ángulo interno del ojo contralateral y aspirar el contenido lentamente - Es importante aplicar presión suficiente sobre el sitio de punción para prevenir colecciones en el espacio subgaleal Complicaciones - Hemorragia subdural secundario a la laceración del seno sagital o vasos contiguos - Infección secundaria - Fístulas por procedimientos repetitivos - Colección subgaleal por acumulación 29. CATETERIZACIÓN VESICAL (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones - Obtención de una muestra de orina estéril - Vaciado de la vejiga en caso de retención de orina - Determinación de la cantidad de orina residual después de una micción - Control de diuresis Equipo y material - Gorro y mascarilla facial • Guantes estériles • Solución antiséptica (gluconato de clorhexidina al 0.075% (fórmula No 2)) • Gasas estériles • Campo estéril • Cinta adhesiva porosa para fijación • Sonda urinaria. En el neonato se puede utilizar un catéter umbilical 3.5Fr o 5Fr o una sonda de alimentación calibre 5Fr, porque el calibre menor de la sonda Foley es 6Fr y suele ser demasiado gruesa para los neonatos. Las guías generales son • Catéter vesical 3.5Fr para peso <1000g • Catéter vesical 5Fr para peso 1000g-1800g • Catéter vesical 6.5Fr para peso 1800g-4000g • Catéter vesical 8Fr para peso >4000g • The National Association of Neonatal Nurses – NANN (Asociación Nacional de Enfermeras Neonatales) recomiendan • Catéter vesical 3.5Fr para peso <1000g • Catéter vesical 5Fr para peso 1000g-1800g • Catéter vesical 8Fr para peso >1800g • Sondas de alimentación 5Fr para peso 1000g-3000g y 8Fr para peso >3000g • Lubricante • Bolsa colectora neonatal. Como la cantidad de orina que emiten los neonatos es muy pequeña y es imposible medirla con precisión con un sistema colector convencional pediátrico, se puede fabricar uno especial conectando la sonda a un sistema que obtenemos de la siguiente manera: la parte distal de la sonda urinaria se introduce en una bolsita colectora pediátrica junto con una sonda de alimentación para poder medir la orina y vaciar la bolsa. Se sella el orificio de entrada de las sondas en la bolsa, y se puede cubrir con un pañal por riesgo de fuga. Material para colocación de sonda vesical Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Sistema colector para neonatos (Mallafré, Molina Pacheco, & Belmonte, 2014) Procedimiento - Colocar al paciente en decúbito supino - Lavado quirúrgico de manos - Con los guantes estériles, desinfectar con una gasa estéril - Colocar todo el material sobre un campo estéril (gasas, sonda, lubricante y sistema de bolsa colectora) y proce­da a su preparación: • Montar el sistema de la bolsa colectora • Aplicar el lubricante a la sonda • Tapar las piernas del paciente con el campo estéril, la abertura debe procurar acceso a la zona genital Realizar el sondaje Procedimiento en la niña • Colocar a la paciente en decúbito supino con las rodillas flexionadas y separadas (posición de rana). Realizar la desinfección de la zona genital: separando la vulva con el pulgar y el índice de la mano no dominante, identificar el meato urinario y limpiar con una gasa impregnada de solución antiséptica, siempre con un movimiento descendente para evitar contaminación fecal. Introducir la sonda, previamente lubricada, lentamente y sin forzar hasta que comience a fluir la orina. Introducir si pesa <750 g, <2.5 cm; si pesa >750 g introducir hasta 5 cm. Fijar con cinta adhesiva porosa, en la cara interna del muslo. Comprobar que queda fijada. Puntos anatómicos de referencia para la cateterización de niñas en posición supina (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Procedimiento en el varón - Colocar al paciente en decúbito supino con las piernas en posición de rana. Sujetar el pene en posición vertical con la mano no dominante, retraer el prepucio y desinfectar el meato urinario, ejecutando un movimiento circular de dentro hacia afuera con una gasa impregnada de solución antiséptica. Introducir la sonda, previamente lubricada, lentamente y sin forzar hasta que encontramos un tope, inclinamos el pene 45° aproximadamente (esta posición favorece el paso por la uretra prostática) y continuar entrando la sonda hasta que comience a fluir la orina. Introducir la sonda si pesa <750g, >5cm; si pesa >750g introducir 6 cm. Fijar con cinta adhesiva porosa en la cara interna del muslo. Comprobar que queda fijada. Cateterización vesical en recién nacido masculino (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Conectar la sonda a la bolsa colectora y sellar el orificio de entrada de las sondas. Se puede cubrir con un pañal por riesgo de fuga - Colocar la parte externa de la sonda de forma que se mantenga sin angulaciones, fijándola con cinta adhesiva porosa en la cara interna del muslo de manera que impida tracciones de la uretra y a la vez permita la movilidad del paciente - Desechar los residuos y material sobrante en los contenedores indicados - Anotar en el registro de enfermería la fecha y hora del sondaje, tipo y N° de sonda, características de la orina y las observaciones que se crean necesarias Retirada de la sonda - La maniobra se realiza con guantes no estériles. - Se retira la sonda con suavidad y se limpia la zona genital con agua y jabón - Anotar en el registro de enfermería la fecha y hora de la retirada y las observaciones que se crean necesarias Sistema colector en el neonato Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Complicaciones - Infección urinaria ascendente por migración de bacterias a través de la luz de la sonda. Mientras mayor sea el tiempo de cateterización, mayor el riesgo de infección, especialmente en las áreas de cuidados críticos - Creación de una falsa vía por traumatismo en la mucosa uretral. No hay que forzar la introducción de la sonda, la cual debe entrar con suavidad. Si no se consigue el sondaje, se debe esperar antes de realizar de nuevo la técnica - Cuando utilice una sonda de alimentación, debe recordar que esta puede aumentar el riesgo de trauma por la rigidez de la sonda, por lo que debe introducirla hasta donde observe que empieza a obtener orina para evitar el trauma - Presencia de hematuria posterior al sondaje a causa de alguna pequeña herida provocada al realizar la técnica - Retención urinaria por obstrucción de la sonda. Esta obstrucción puede estar causada por acodamiento de la sonda, por coágulos, moco o sedimentos de la orina y por edema uretral - Raramente, hidrouréter o nefrosis obstructiva bilateral **Observaciones** - Ante el roce de la sonda con cualquier superficie no estéril, debemos cambiarla por una sonda nueva - Si se introduce erróneamente la sonda en vagina, debe desecharse, desinfectar de nuevo la zona y usar una sonda nueva, repitiendo el procedimiento - Mantener la bolsa colectora siempre por debajo del nivel de la vejiga para evitar reflujos. Si hay que trasladar al paciente se coloca la bolsa sobre la cama y se debe pinzar la sonda - Una sonda permanente tipo Foley debe cambiarse cada 15-20 días - La higiene de genitales y sonda debe hacerse una vez por turno como mínimo 30. PUNCIÓN VESICAL SUPRAPÚBICA (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones Para obtener orina para cultivo cuando una técnica menos invasiva no es posible. Es el método más exacto. Cualquier bacteria o crecimiento en un cultivo se consideran anormales y requieren tratamiento. Otros términos comunes son aspiración vesical supra púbica, aspiración supra púbica. Contraindicaciones Vejiga vacía, trombocitopenia, presencia de distensión abdominal, desórdenes hemorrágicos, anomalías genitourinarias, celulitis en el sitio de punción, cirugía urológica o abdominal reciente. Equipo - Gorro, mascarilla - Guantes y bata estéril - Gasas y campos estériles - Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) - Dispositivo de cánula sobre aguja tamaño 23G-25G con aguja de 1 pulgada de largo o 21G-22G con aguja de 1.5 pulgadas (bebé grande) o mariposa 23G (para prematuros) ajustada a una jeringa de 3 ml. - Frasco estéril Fuente de luz para transluminar y un ultrasonido portátil se recomiendan Consideraciones especiales - Verifique que no haya ocurrido la micción la hora previa al procedimiento para que haya suficiente orina en la vejiga. Revise si el pañal está mojado o estuvo mojado la hora previa - Palpe o percuta la vejiga. Un sonido sordo percutiendo 2 dedos sobre la sínfisis del pubis sugiere la presencia de orina en la vejiga. La vejiga neonatal se extiende sobre la sínfisis del pubis cuando se llena - La transluminación puede determinar la altura de la vejiga y verificar la presencia de orina. Con la punta de la luz, la fuente de la transluminación se dirige a la vejiga. El área se pinta roja si hay orina presente - El ultrasonido vesical nos ayuda a determinar el tamaño y la localización de la vejiga y el volumen de orina en la misma. Un ultrasonido portátil puede mejorar los resultados - Manejo del dolor. Este procedimiento es más doloroso. Medidas no farmacológicas para el manejo del dolor se pueden administrar - Si está disponible un ultrasonido se usa para guiar la inserción de la aguja y la punción de la pared vesical Procedimiento - Un asistente debe sujetar al infante en posición supina con las piernas en posición de rana - Localizar el sitio de la punción vesical, el cual está 1-2 cms. encima de la sínfisis del pubis en la línea media del abdomen inferior • Para evitar que la vejiga se vacíe por reflejo al puncionar, pida al asistente que le haga presión en la base del pene al varón o que aplique presión rectal anterior en las mujeres después de insertar la punta del dedo en el ano. • Colóquese guantes estériles y limpie toda la piel del área supra púbica (desde la sínfisis del pubis hasta el ombligo) con solución antiséptica 3 veces. Coloque sus campos estériles alrededor del sitio de inserción. Puntos de referencia y sitio recomendado para aspiración vesical supra púbico (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 • Palpe la sínfisis del pubis. Inserte la aguja con la jeringa ajustada 1-2 cms encima de la sínfisis del pubis (en el pliegue transverso abdominal inferior en el centro) en un ángulo de 90 grados Técnica de aspiración vesical supra púbica (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Avance la jeringa mientras aspira más o menos 2-3 cms. No avance más la jeringa una vez que observa orina en la misma para reducir el riesgo de perforar la pared posterior de la vejiga - Si no hay orina, no avance ni re direccione la aguja. Retire la misma y repita el procedimiento en una hora; considere un ultrasonido para evaluar que la vejiga este llena - Colecte la muestra, retire la aguja, mantenga la presión sobre el sitio de punción y coloque un apósito oclusivo (opcional). Tape su aguja y transfiera la muestra a un frasco estéril y envíe la muestra al laboratorio Complicaciones Complicaciones serias son muy raras - Sangrado y hematomas. Hematuria es la complicación más común. Hemorragia rutilante se puede presentar cuando hay trastornos hemorrágicos, siendo transitória. Hematomas (de la pared abdominal, pélvica, supra vesical y de la vejiga), hemoperitoneo masivo o sangrado vaginal - Infección. Sepsis, bacteriemia, absceso de la pared abdominal, absceso supra púbico y osteomielitis del hueso del pubis - Perforación del intestino u otros órganos pélvicos. Con la identificación cuidadosa de los puntos de referencia y no avanzando la aguja muy profunda, estas complicaciones son raras - Quiebre de la aguja 31. CUIDADO DE LAS OSTOMÍAS (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) CLASIFICACIÓN - Ileostomía. Exteriorización del último tramo del íleon a la piel. - Colostomía. Exteriorización de un tramo del colon a la piel - Gastrostomía. Colocación de una sonda, vía quirúrgica a través de la pared abdominal en el estómago para soporte nutricional, medicamentos y descompresión gástrica - Yeyunostomía. Exteriorización a nivel del intestino delgado - Exteriorización con sonda, para alimentación - Salida directamente a la piel, en situaciones debidas a dehiscencias de anastomosis A. Ileostomía y colostomía Ileostomía con fístula distal Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Equipo y materiales - Bolsa de Ostomía colectora de una pieza - Plantilla medidora de la estoma - Protector cutáneo con membrana hidrocoloide - Guantes y gasas estériles - Solución antiséptica, gluconato de clorhexidina al 0.075% (fórmula 2) y solución salina - Tijera Bolsa colectora. (Pimstein, 2009) Procedimiento - En el postoperatorio - No se cambia la bolsa colectora durante las primeras 24-48 horas debido a la escasa producción fecal - Aplicar gasa con solución salina a la estoma hasta que la primera defecación aparezca - Medir el contenido fecal de salida y reemplazar hasta que el volumen sea mayor a 2ml/kg/h - Para el cambio de bolsa de ostomía, a pesar de que no es un procedimiento estéril, debe realizarse lavado de manos y uso de guantes. El objetivo es contener la materia fecal y proteger la piel alrededor del estoma - Con los guantes estériles, limpiar la bolsa y remover de la piel - Limpiar la piel y la estoma con agua tibia y secar. Revisar la estoma y la piel alrededor. Un pequeño sangrado puede ser normal al momento de limpiar la estoma - Medir la estoma y la base usando la plantilla medidora de la estoma. Cortar la base de silicona de la bolsa al tamaño de la estoma para cubrir completamente la piel - Preparar la piel para la aplicación. Si no hay compromiso de la superficie aplicar la barrera protectora - Posicionar y colocar la bolsa de ostomía de abajo hacia arriba para un mejor drenaje - Vaciar regularmente la bolsa cuando 1/3 de la bolsa este llena Complicaciones - Lesión de la piel alrededor de la estoma - Deshidratación por exceso de salida de material fecal. El contenido normal de excreta es de 10-15ml/kg/día. La excreta por la ileostomía usualmente es mayor que en la colostomía - Dermatitis, en la cual debe cambiar la bolsa y la barrera protectora cada 24-48 horas para evitar la producción de pápulas o pústulas - Sangrado de la estoma - Hernia periestomal, un defecto en la fascia abdominal - Estenosis estomal - Retracción de la estoma, amerita revisión quirúrgica - Necrosis de la estoma - Prolapso del intestino a través de la piel de la estoma Colostomía (León López, 2012) B. Gastrostomía Equipo y materiales - Tubo de gastrostomía 12Fr-14Fr con balón, o sonda urinaria Foley - Guantes y gasas estériles - Solución antiséptica de gluconato de clorhexidina al 0.075% (fórmula No 2) Sondas de gastrostomía (Pimstein, 2009) Procedimiento - Limpie el tubo de gastrostomía cada 4 horas durante alimentación en infusión continua; o antes y después de la alimentación intermitente con al menos 3 ml de solución salina o agua tibia - Administre solamente un medicamento por vez y limpie entre cada medicamento - Limpie el sitio de colocación del tubo de gastrostomía con agua tibia, limpie y seque la piel - No utilice peróxido de hidrógeno (agua oxigenada) Gastrostomía (Revista electrónica de enfermería Guayaquil-ecuador, 2013) Complicaciones - Irritación de la piel, puede utilizar óxido de zinc como barrera protectora - Infección durante las primeras 2 semanas después de reemplazar el tubo - Formación de tejido de granulación - Oclusión del tubo, usualmente por una inadecuada irrigación - Remoción accidental, el sitio de entrada puede cerrarse en 1-4 horas. Por lo que debe colocar inmediatamente el tubo de gastrostomía o sonda Foley en la estoma 32. EXTRAVASACIÓN E INFILTRACIÓN PERIFÉRICA INTRAVENOSA. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Manejo inicial La infiltración es la fuga de líquido no irritante que se perfunde desde la vena a los tejidos circundantes. Usualmente se considera benigna, sin embargo, si la cantidad es abundante puede provocar un síndrome compartamental. La extravasación es la fuga de agentes químicos que pueden provocar necrosis tisular. Esto sucede cuando la cánula atraviesa la pared venosa o se desliza fuera de ella. Es probable que causen una extravasación las cánulas rígidas de acero que las de plástico flexible. El riesgo puede aumentar hasta un 70% con las cánulas de acero dependiendo de la habilidad de la persona que realiza la técnica. Si se usa una cánula de plástico es más probable que se produzca uno o más días después de la inserción, generalmente porque la punta de la cánula flexible penetra en la pared de la vena. Con ambos tipos de cánula el riesgo de extravasación aumenta siempre que la zona de inserción esté cerca de una articulación. Si la punta de la cánula no está suficientemente insertada, parte de esta quedará fuera de la vena. Cuando esto sucede, por lo general la extravasación se pone de manifiesto muy rápidamente a medida que el líquido perfundido se desliza fuera de la vena hacia los tejidos circundantes. **Efectos de la extravasación** - Inflamación en la zona de venopunción. El grado de esta inflamación depende de varios factores - Rapidez en la que los líquidos intravenosos son perfundidos - Los tejidos blandos o compactos del paciente o lo mucho o poco que haya penetrado la punta de la aguja - Molestias, dolor, sensación de quemazón local, tirantez en la zona de punción. La piel puede tener un aspecto tenso y tirante si pasa a los tejidos subcutáneos una gran cantidad de líquido • Los espacios intersticiales se distienden especialmente si los tejidos subcutáneos son flácidos • Los líquidos isotónicos no causan excesivas molestias al extravasarse • Los líquidos con un pH ácido o alcalino son más irritantes (por ejemplo, calcio) Efectos de la extravasación Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología, Hospital de Gineco Obstetricia IGSS 2017 • No se puede depender de que el paciente se queje de molestias para detectar la extravasación. Grandes cantidades de líquido pueden pasar de la vena al tejido circundante sin que el paciente presente síntomas Fármacos que lesionan los tejidos Los medicamentos más lesivos son los fármacos antineoplásicos llamados vesicantes. Al primer signo de quemazón, dolor o inflamación durante la perfusión de uno de estos fármacos: - Interrumpir inmediatamente la perfusión del medicamento - Aplicar inmediatamente hielo. - Mantener elevada la extremidad durante 48 horas - Avisar al médico si continúa el dolor Definición de términos - Agentes Vesicantes. Compuestos químicos que causan destrucción del tejido circundante donde son administrados - Agentes Irritantes. Compuestos químicos capaces de causar flebitis, dolor, reacciones inflamatorias debido al pH al que son manejados - Agentes alquilantes. Compuestos químicos capaces de interferir en la división celular y las interacciones de sus grupos con el ADN de las células Procedimiento - El manejo inicial dependerá del grado de infiltración, el tipo de solución perfundida y de la disponibilidad del antídoto específico - Si se extravasan soluciones o medicamentos irritantes, pueden causar una lesión hística y grave. Por lo que el manejo inicial dependerá del - Grado de infiltración - Tipo, dosis, frecuencia y cantidad de solución perfundida - Disponibilidad del antídoto específico **Grados de Infiltración intravenosa (IV)** | Grado | Descripción | Opción de tratamiento | |-------|------------------------------------------------------------------------------|----------------------------------------------------------------------------------------| | I | Dolor del sitio IV. No rubor, no hinchazón. | 1. Remover cánula IV. 2. Elevar la extremidad afectada. | | II | Dolor del sitio IV. Hinchazón (0-20%). | 1. Remover cánula IV. 2. Elevar la extremidad afectada. | | III | Dolor del sitio IV. Hinchazón marcada (30-50%). Palidez. Piel fría al tacto, pero pulsos presentes y llenado capilar presente por debajo del sitio de la infiltración. | 1. Dejar cánula IV en su lugar, y con una jeringa de 1ml aspirar la mayor cantidad de líquido posible 2. Remover cánula IV a menos que necesite administrar un antídoto. 3. Elevar la extremidad afectada 4. Considerar antídoto. | | IV | Dolor del sitio IV. Hinchazón muy marcada (>50%). Palidez. Piel fría al tacto. Disminución o ausencia de pulsos. Llenado capilar lento <4 segundos. Necrosis tisular. | |---|---| | 1. Dejar cánula IV en su lugar, y con una jeringa de 1ml aspirar la mayor cantidad de líquido posible 2. Remover cánula IV a menos que necesite administrar un antídoto. 3. Elevar la extremidad afectada 4. Considerar antídoto. 5. Si el sitio afectado está tenso, hinchado y la piel pálida, use técnica de punción con aguja múltiple. | (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 **Antídotos** **Hialuronidasa** - Apropiada en extravasación a partir del grado III para líquidos, excepto vasoconstrictores - Administrar de ser posible durante la primera hora después del insulto y por un período no mayor a 3 horas - Limpie el área con Solución antiséptica (gluconato de clorhexidina al 0.075% (fórmula No 2)) - Con técnica aséptica, inyecte 1 ml. (150 U) en 5 dosis de 0.2 ml. por vía subcutánea, en la periferia del sitio extravasado. Cambiando la aguja con cada inyección - Cubra el sitio con apósito de hidrogel o membrana hidrocoloide Fentolamina - Apropiada en extravasación por dopamina y otros vasoconstrictores - Limpie el área con Solución antiséptica (gluconato de clorhexidina al 0.075% (fórmula No 2)) - Inyecte de 1-5 ml dependiendo del tamaño del sitio extravasado. Repita de ser necesario Técnica de punción con aguja múltiple - Utilizada para minimizar el daño tisular, cuando el sitio extravasado ha creado múltiples vías de escape - Limpie el área con solución antiséptica (gluconato de clorhexidina al 0.075% (fórmula No 2)) - Utilice una aguja calibre 20G y puncione por vía subcutánea en múltiples ocasiones el tejido edematizado. Cambiando la aguja con cada punción - Cubra el sitio con apósito estéril con solución salina para que se absorba el líquido, y eleve la extremidad - Evalúe cada 1-2 horas por 48 horas Complicaciones - Infecciones. Utilice técnica aséptica durante el procedimiento - Trauma del sitio extravasado. Maneje la piel gentilmente. Remueva la piel desinfectada con gasa y solución salina - Hipotensión. Con el uso de grandes dosis de Fentolamina o por absorción tópica de nitroglicerina extravasada 33. EXANGUINOTRANSFUSIÓN (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) La exanguinotransfusión es una técnica utilizada con mayor frecuencia para mantener la bilirrubina sérica a niveles por debajo de la neurotoxicidad. Sin embargo, la exanguinotransfusión también se puede utilizar para policitemia o anemia. Por lo general, se utilizan tres tipos de exanguinotransfusión: - Intercambio de dos volúmenes, a través de vena umbilical (Total) - Intercambio isovolumétrico de dos volúmenes, a través de vena y arteria umbilical (Total) - Intercambio parcial (<2 volúmenes) con solución salina 0.9% o paquete globular 33.1 EXANGUINOTRANSFUSIÓN TOTAL POR HIPER BILIRRUBINEMIA (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicaciones - Hiperbilirrubinemia - Enfermedad hemolítica del RN Equipo - Módulo térmico - Monitor de signos vitales y oxímetro de pulso - Equipo para cateterización de arteria y vena umbilical - Sonda oro gástrica para evacuar contenido gástrico previo a iniciar procedimiento - Sangre total reconstituida a temperatura de 37°C - Asistente para monitoreo y valoración del neonato y registrar los volúmenes intercambiados • Tipo de sangre y compatibilidad cruzada • Neonato con incompatibilidad Rh. La sangre debe ser tipo O, Rh negativo. Se debe realizar una prueba de compatibilidad cruzada con el plasma y el conteo de glóbulos rojos de la madre • Neonato con incompatibilidad ABO. La sangre debe ser tipo O, Rh compatible con la madre y el neonato, o puede ser Rh negativo. Se debe realizar una prueba de compatibilidad cruzada con la sangre del neonato y la madre • Frescura y conservación de la sangre • En neonatos se prefiere utilizar sangre de <72 horas de extraída del donante, para asegurar un pH>7 • En neonatos con eritroblastosis fetal o asfixia fetal se prefiere sangre de <24 horas de extraída del donante • Hematocrito (Hto) • La mayor parte de bancos de sangre reconstituyen una unidad de sangre a un Hto deseado de 50-70%. Se debe agitar periódicamente la sangre durante la transfusión para mantener un Hto constante • Niveles de potasio en sangre donada • Se deben determinar los niveles de potasio en la sangre donada, si el neonato tiene asfixia o está en choque o se sospecha una alteración renal. Si los niveles de potasio son >7mEq/L, considere utilizar una unidad de sangre que se haya recolectado más recientemente • Temperatura de la sangre • Es importante conservar la sangre a una temperatura de 37°C en recién nacidos con bajo peso al nacer o enfermos Procedimiento para exanguinotransfusión simple de dos volúmenes (Utilizando solo catéter umbilical venoso) - Se utiliza una exanguinotransfusión simple de dos volúmenes para la hiperbilirrubinemia sin complicaciones - Formula: volemia (80-100 ml) x peso(Kg) x 2. La volemia depende de la edad gestacional - El volumen normal de sangre en un recién nacido a término es de 80ml/kg. Por ejemplo, un neonato de 2 kg, el volumen será de 160ml. Se intercambia el doble de este volumen de sangre en una transfusión de dos volúmenes. Por lo tanto, la cantidad de sangre que necesita será de 320 ml. El volumen de sangre de neonatos con muy bajo peso al nacer puede ser de 95ml/kg y debe tomarse en cuenta para calcular los volúmenes de intercambio - Permitir un tiempo adecuado para obtener el tipo de sangre y la prueba de compatibilidad cruzada en el banco de sangre - Realizar la transfusión en la unidad de cuidados intensivos, colocando al neonato en un módulo térmico, en posición supina. Las cintas para restringir los movimientos del neonato deben estar firmes, pero no apretadas. Se debe pasar una sonda oro gástrica para evacuar el contenido gástrico y dejar colocada para mantener la descomprensión gástrica y prevenir regurgitación y aspiración de jugos gástricos - Lavado de manos, uso de bata, gorro, mascarilla facial y guantes estériles - Realizar la **cateterización de la vena umbilical** y confirmar la posición por radiografía. • Tener preparada la unidad de sangre ▪ Revisar los tipos de sangre del donador y del neonato ▪ Revisar la temperatura de la sangre y los procedimientos de calentamiento ▪ Revisar el Hto agitando regularmente la sangre para mantener un Hto constante • Conectar la bolsa de sangre al equipo de transfusión dado por el banco de sangre (no utilizar equipo de venoclisis para cristaloides) y una llave de tres vías al **catéter venoso umbilical** • Se conecta una segunda llave de tres vías a un equipo de venoclisis convencional y este a una bolsa colectora apropiada para desechar la sangre intercambiada • Establezca el volumen de la alícuota para cada recambio **Alícuotas utilizadas en la exanguinotransfusión de neonatos** | Peso del neonato | Alícuota (ml) | |-----------------|---------------| | >3 kg | 20 | | 2 a 3 kg | 15 | | 1 a 2 kg | 10 | | 850 g a 1 kg | 5 | | <850 g | 1 a 3 | (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 **Procedimiento para exanguinotransfusión isovolumétrica de intercambio de dos volúmenes (utilizando catéter umbilical arterial y venoso)** • Se utiliza una exanguinotransfusión isovolumétrica de intercambio de dos volúmenes cuando el volumen de intercambio puede agravar la insuficiencia del miocardio - Formula: volemia (80-100 ml) x peso(Kg) x 2. La volemia depende de la edad gestacional. - NOTA. Aplicar las mismas pautas descritas en la sección correspondiente a Procedimiento para exanguinotransfusión simple de dos volúmenes (Utilizando solo catéter umbilical venoso) - Realizar la cateterización de la vena y arteria umbilical y confirmar la posición por radiografía - Tener preparada la unidad de sangre - Revisar los tipos de sangre del donador y del neonato - Revisar la temperatura de la sangre y los procedimientos de calentamiento - Revisar el Hto, agitando regularmente la sangre para mantener un Hto constante - Conectar la bolsa de sangre al equipo de transfusión dado por el banco de sangre (no utilizar equipo de venoclisis para cristaloides) y una llave de tres vías al catéter venoso umbilical - Se conecta al catéter arterial umbilical la llave de tres vías y el equipo de venoclisis convencional a una bolsa colectora apropiada para desechar la sangre intercambiada Procedimientos auxiliares - Estudios de laboratorio. Se debe obtener sangre para estudios de laboratorio antes y después de la exanguinotransfusión • Los estudios de química sanguínea incluyen calcio, sodio, potasio, cloro, pH, PaCO2, estado ácido-base, bicarbonato y glucosa sérica • Realizar una hematología completa • Administración de gluconato de calcio. Se administra 1ml a 2 ml de gluconato de calcio al 10%, por medio de una infusión lenta después de 100-200 ml de sangre donada de intercambio • Fototerapia debe iniciarse y continuarse después del procedimiento, debido a que se espera un rebote en los niveles de bilirrubina a las 4 horas después de la exanguinotransfusión • Monitoreo de los niveles séricos de bilirrubina 6 horas después de la exanguinotransfusión y cada 12 horas Complicaciones • Infecciones • Complicaciones vasculares. Embolia, arterioespasmo de las extremidades inferiores, trombosis e infarto • Coagulopatías • Anormalidades electrolíticas. Hiperpotasemia o hipocalcemia • Hipoglucemia • Acidosis o alcalosis metabólica • Enterocolitis necrosante 33.2 EXANGUINOTRANSFUSIÓN PARCIAL POR POLIGLOBULIA. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Indicación - Poliglobulía Equipo - Módulo térmico - Monitor de signos vitales y oxímetro de pulso - Equipo para cateterización de arteria umbilical y vena umbilical - Sonda oro gástrica para evacuar contenido gástrico previo a iniciar procedimiento - Solución salina 0.9% Procedimiento - Se utiliza una exanguinotransfusión simple de dos volúmenes - Se utiliza solución salina 0.9%. Aplicar la siguiente fórmula para determinar el volumen de intercambio Fórmula para exanguinotransfusión parcial por poliglobulía Volumen de intercambio (ml) = \[ \text{Volemia (80-100 ml)} \times \text{Peso (Kg)} \times \frac{\text{(Hto observado – Hto deseado (55%))}}{\text{Hto observado}} \] - Colocando al neonato en un módulo térmico, en posición supina. Las cintas para restringir los movimientos del neonato deben estar firmes, pero no apretadas. Se debe pasar una sonda oro gástrica para evacuar el contenido gástrico y dejar colocada para mantener la descompresión gástrica y prevenir regurgitación y aspiración de jugos gástricos - Lavado de manos, uso de bata, gorro, mascarilla facial y guantes estériles - Realizar la cateterización de la vena umbilical y confirmar la posición por radiografía - Tener preparada la solución salina 0.9% - Conectar la bolsa de solución salina 0.9% al equipo de venoclisis y ésta a una llave de tres vías, para la infusión y extracción respectivamente - Establezca el volumen de la alícuota para cada recambio Alícuotas utilizadas en la exanguinotransfusión de neonatos | Peso del neonato | Alícuota (ml) | |------------------|---------------| | >3 kg | 20 | | 2 a 3 kg | 15 | | 1 a 2 kg | 10 | | 850 g a 1 kg | 5 | | <850 g | 1 a 3 | (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Monitoreo de los niveles séricos de hematocrito en las primeras 6 horas después de la exanguinotransfusión Complicaciones - Las mismas que para exanguinotransfusión total 33.3 EXANGUINOTRANSFUSIÓN PARCIAL POR ANEMIA. (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Indicación - Anemia severa - Anemia severa con insuficiencia cardíaca Equipo - Módulo térmico - Monitor de signos vitales y oxímetro de pulso - Equipo para cateterización de arteria y vena umbilical - Sonda oro gástrica para evacuar contenido gástrico previo a iniciar procedimiento - Paquete globular a temperatura de 37°C - Tipo de sangre y compatibilidad cruzada - Frescura y conservación de la sangre - Mismas indicaciones que para exanguinotransfusión total - Hematocrito (Hto) - Mismas indicaciones que para exanguinotransfusión total - Temperatura de la sangre - Mismas indicaciones que para exanguinotransfusión total Procedimiento - Se utiliza una exanguinotransfusión simple de dos volúmenes. En los casos de eritroblastosis fetal se utiliza la exanguinotransfusión isovolumétrica parcial con paquete globular como la mejor opción - Si el intercambio parcial es para anemia se utiliza paquete globular. Debe utilizar la siguiente fórmula para determinar el volumen de la transfusión **Fórmula para exanguinotransfusión parcial por anemia** \[ \text{Volumen de intercambio (ml)} = \frac{\text{Volemia del paciente (80-100ml) x Peso (Kg) x (Hto deseado – Hto observado)}}{\text{Hto del paquete globular - Hto observado}} \] - Permitir un tiempo adecuado para obtener el tipo de sangre y la prueba de compatibilidad cruzada en el banco de sangre - Realizar la transfusión en la unidad de cuidados intensivos, colocando al neonato en un módulo térmico, en posición supina. Las cintas para restringir los movimientos del neonato deben estar firmes, pero no apretadas. Se debe pasar una sonda oro gástrica para evacuar el contenido gástrico y dejar colocada para mantener la descomprensión gástrica y prevenir regurgitación y aspiración de jugos gástricos. - Lavado de manos, uso de bata, gorro, mascarilla facial y guantes estériles - Realizar la **cateterización de la vena umbilical** y confirmar la posición por radiografía. - Tener preparada la unidad de sangre - Revisar los tipos de sangre del donador y del neonato - Revisar la temperatura de la sangre y los procedimientos de calentamiento - Revisar el Hto, agitando regularmente la sangre para mantener un Hto constante - Conectar la bolsa de sangre al equipo de transfusión dado por el banco de sangre (no utilizar equipo de venoclisis para cristaloides) y una llave de tres vías al **catéter venoso umbilical** - Se conecta una segunda llave de tres vías a un equipo de venoclisis convencional y este a una bolsa colectora apropiada para desechar la sangre intercambiada - Establezca el volumen de la alícuota para cada recambio **Alícuotas utilizadas en la exanguinotransfusión de neonatos** | Peso del neonato | Alícuota (mL) | |-----------------|---------------| | >3 kg | 20 | | 2 a 3 kg | 15 | | 1 a 2 kg | 10 | | 850 g a 1 kg | 5 | | <850 g | 1 a 3 | (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Monitoreo de los niveles séricos de Hto 6 horas después del procedimiento **Complicaciones** - Las mismas que para exanguinotransfusión total 34. DESFIBRILACIÓN Y CARDIOVERSIÓN (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) La desfibrilación y cardioversión son utilizadas en el tratamiento de taquiarritmias, que no responden al tratamiento inicial con medicamentos o maniobras vagales. Sin embargo, pese a que son raras en neonatología y al presentarse usualmente responden con medidas iniciales, es importante que sean de su conocimiento. Desfibrilación Consiste en una descarga eléctrica de alto voltaje (dosis de 2-4 J/Kg) brusca o asincrónica, que causa una despolarización simultánea y momentánea de la mayoría de células cardíacas, rompiendo así el mecanismo de reentrada de la vía anó-mala de conducción de la mayoría de taquiarritmias, permitiendo al nodo sinusal auricular asumir de nuevo la actividad normal como marcapasos cardíaco (recuperar el ritmo sinusal). Indicaciones - Fibrilación ventricular –FV Trazo de fibrilación ventricular (FV) (Sánchez Pérez, 2014) - Taquicardia ventricular sin pulso –TVSP Taquicardia ventricular (TV) (Sánchez Pérez, 2014) Observaciones - Se debe realizar de forma urgente, incluso en una situación de paro cardiorrespiratorio previo a intubación. - En el neonato, la principal causa que desencadena una arritmia ventricular son los trastornos electrolíticos, por lo que debe considerar esto para resolver este problema inicial, debido a que la desfibrilación no parará la arritmia en estos pacientes. Equipo y material - Personal de salud que tenga conocimiento y entrenamiento en ejecutar la técnica. Se necesita un mínimo de 2 personas. - Disponer de todo el material necesario para dar soporte a la vía aérea y circulatoria (sala de reanimación de urgencias o en las unidades de cuidados críticos). - Desfibrilador. - Palas. Deben ser proporcionales al tamaño del tórax. En neonatos usar las pequeñas, usualmente de 4.5 cm. - Gel o pasta conductora o gasas empapadas en suero salino. - Además, se debe contar con: - Acceso venoso periférico. - Material para asegurar una vía aérea permeable y oxigenoterapia. - Fármacos para una reanimación cardiopulmonar avanzada (adrenalina, amiodarona). - Monitorización del paciente, además de pulsoximetría. Desfibrilador Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Palas neonatales/pediátricas Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Procedimiento - Como el paciente se encuentra en situación de paro cardiorespiratorio, no se debe perder tiempo en conseguir un acceso venoso, sino que lo primero es realizar la descarga eléctrica y a partir de aquí seguir el algoritmo de reanimación cardiopulmonar en caso de FV o TVSP (ver algoritmo) - Lo primero a realizar es monitorizar al paciente, siendo lo más práctico utilizar el desfibrilador, ya sea con las palas o con electrodos, y aún más importante seleccionar en el desfibrilador el tipo de monitorización (palas, DI, DII). Las palas son muy rápidas y útiles de entrada, pero impiden realizar simultáneamente masaje cardíaco (en el caso de la FV) por lo que se recomienda monitorizar con electrodos en cuanto sea posible - La descarga se realiza en modo asincrónico - Escoger las palas pequeñas en neonatos - Aplicar gel conductor en las palas o colocar gasas empapadas con suero fisiológico evitando que contacten entre ellas - Escoger la primera carga a administrar a 2 J/kg - Colocar las palas en el tórax del paciente. La forma habitual es colocar una pala en 4º-5º espacio intercostal de la línea medio axilar izquierda (ápex) y la segunda pala en 2º-3º espacio intercostal para esternal derecho (infra clavicular) Colocación de palas antero lateral. Colocación de palas anteroposterior (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Procedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Posición de las palas para des fibrilar Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - Cargar el desfibrilador, ya sea accionando el botón de las palas o del desfibrilador - Avisar a todo el personal de que se separen del paciente y confirmarlo visualmente, utilizando la frase “Despejado, todos despejados, oxígeno despejado”. Importante retirar el oxígeno, así como asegurarse de que persiste el ritmo a revertir - Accionar simultáneamente los 2 botones de descarga de ambas palas • Confirmar si la descarga ha sido o no efectiva. Si esta ha sido efectiva debe producirse una línea isoelectrica en el trazado ECG y/o movimiento músculo esquelético torácico. En caso de no modificarse el trazado de base se debe sospechar que no ha habido descarga y hay que revisar la técnica. • Observar el ritmo resultante tras la descarga eléctrica • Si el ritmo de base se ha modificado, pero sin llegar a la asistolia (línea isoelectrica) debemos pensar en que la dosis ha sido insuficiente y repetir la técnica doblando la dosis (4 J/Kg) • Si se consigue la asistolia, pero reaparece la FV hay que seguir el algoritmo de reanimación cardiopulmonar en caso de FV / TVSP (ver algoritmo) • Si hay asistolia y aparece un nuevo ritmo cardíaco, hay que comprobar si este es eficaz buscando pulsos y si es así continuar con el soporte hemodinámico preciso (volumen, drogas inotrópicas, corrección acidosis). Si el nuevo ritmo no se acompaña de latido eficaz y no hay pulso nos encontramos ante una disociación electromecánica y hay que seguir el algoritmo de reanimación cardiopulmonar Desfibrilador Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Inicie la RCP • Administre oxígeno • Conecte el monitor/ desfibrilador El ritmo es FV/ TVSP • Primera descarga para desfibrilación 2 J/kg RCP 2 minutos • Segunda descarga de 4 J/kg RCP 2 minutos • Adrenalina cada 3-5 min. • Descargas posteriores de 4J/kg RCP 2 minutos • Amiodarona • Trate las causas reversibles Algoritmo para FV y TVSP Grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Esquema visual de la técnica de desfibrilación (Sánchez Pérez, 2014) Cardioversión Consiste en una descarga eléctrica (dosis de 0.5-1 J/Kg) que debe ser sincronizada con el inicio del complejo QRS, lo que causa una despolarización simultánea y momentánea de la mayoría de células cardíacas, rompiendo así el mecanismo de reentrada de la vía anómala de conducción de la mayoría de taquiarritmias, permitiendo al nodo sinusal auricular asumir de nuevo la actividad normal como marcapasos cardíaco (recuperar el ritmo sinusal) Indicaciones - Cardioversión urgente. Para el tratamiento de taquiarritmias inestables (taquicardia, edema pulmonar, hipotensión) - Cardioversión electiva. Para las taquiarritmias estables en las que ha fallado el tratamiento farmacológico (fibrilación auricular, flutter auricular, taquicardia supraventricular o taquicardia ventricular estable) Debe realizarse bajo efectos de sedación, con monitoreo de signos vitales y electrocardiograma, previo al procedimiento. Equipo y material - Personal de salud que tenga conocimiento y entrenamiento en ejecutar la técnica. Se necesita un mínimo de 2 personas - Disponer de todo el material necesario para dar soporte a la vía aérea y circulatoria (sala de reanimación de urgencias o en las unidades de cuidados críticos) - Desfibrilador - Palas. Deben ser proporcionales al tamaño del tórax. En neonatos usar las pequeñas, usualmente de 4.5 cm - Gel o pasta conductora o gasas empapadas en suero salino - Además, se debe contar con - Acceso venoso periférico - Material para asegurar una vía aérea permeable y oxigenoterapia - Fármacos para reanimación cardiopulmonar avanzada (adrenalina, amiodarona) - Monitorización del paciente, además de pulsioximetría Procedimiento - Se debe conseguir un acceso venoso periférico previo a la cardioversión y sedar al paciente con agentes de acción corta como midazolam (0.1-0.2 mg/Kg.), tras asegurar la vía aérea, pudiendo administrarse al finalizar la técnica si se considera necesario fármaco antagonista (flumazenilo) - Lo primero a realizar es monitorizar al paciente, siendo lo más práctico utilizar el desfibrilador, ya sea con las palas o con electrodos, y aún más importante seleccionar en el desfibrilador el tipo de monitorización (palas, DI, DII). Las palas son muy rápidas y útiles de entrada, pero se recomienda monitorizar con electrodos en cuanto sea posible - Se debe escoger la descarga en modo sincrónico - Escoger las palas pequeñas - Aplicar gel conductor en las palas o colocar gasas empapadas con suero salino evitando que contacten entre ellas - Escoger la primera carga a administrar (0.5 J/Kg) - Colocar las palas en el tórax del paciente. La forma habitual es colocar una pala en 4º-5º espacio intercostal de la línea medio axilar izquierda (ápex) y la segunda pala en 2º-3º espacio intercostal para esternal derecho (infra clavicular) - Cargar el desfibrilador, ya sea accionando el botón de las palas o del desfibrilador - Avisar a todo el personal de que se separen del paciente y confirmarlo visualmente, utilizando la frase “Despejado, todos despejados, oxígeno despejado”. Importante retirar el oxígeno, así como asegurarse de que persiste el ritmo a revertir • Accionar simultáneamente los 2 botones de descarga de ambas palas • Confirmar si la descarga ha sido o no efectiva. Si esta ha sido efectiva debe producirse una línea isoelectrica en el trazado ECG y/o movimiento músculo esquelético torácico. En caso de no modificarse el trazado de base se debe sospechar que no ha habido descarga y hay que revisar la técnica • Observar el ritmo resultante tras la descarga eléctrica • Si el ritmo de base se ha modificado, pero sin llegar a la asistolia (línea isoelectrica) debemos pensar en que la dosis ha sido insuficiente y repetir la técnica doblando la dosis (1-2 J/Kg) • Si hay asistolia y aparece un nuevo ritmo cardíaco, hay que comprobar si este es eficaz buscando pulsos y si es así continuar con el soporte hemodinámico preciso (volumen, drogas inotrópicas, corrección acidosis). Si el nuevo ritmo no se acompaña de latido eficaz y no hay pulso nos encontramos ante una disociación electromecánica y hay que seguir el algoritmo de reanimación cardiopulmonar Complicaciones Pueden darse en el paciente o en el personal sanitario encargado de ejecutarla • En el paciente podemos encontrar • Hipo ventilación o hipoxia secundaria a la sedación • Quemaduras superficiales, si no se aplica gel conductor o si se aplica de forma no apropiada • Daño miocárdico en forma de arritmias cardíacas como bradicardia, bloqueo AV, asistolia, TV o FV. En este caso la FV responde bien habitualmente a una descarga asincrónica. - Fuego, secundario al contacto con oxígeno. En un paciente con tubo endotraqueal, al momento de hacer la desfibrilación, debe retirar la bolsa auto inflable conectado al oxígeno, y luego de realizar la desfibrilación, conectar nuevamente la bolsa auto inflable y reiniciar la ventilación con presión positiva. - En el personal sanitario el riesgo de descarga accidental se produce si se contacta directamente con el paciente o con superficies conductoras cercanas a éste como la cama, electrodos, monitor y otras piezas metálicas conectadas al enfermo, y tendremos quemaduras y arritmias cardíacas inducidas. Glosario y siglas utilizadas PCR: Paro cardiorrespiratorio FV: Fibrilación Ventricular TVSP: Taquicardia ventricular sin pulso TPSV: Taquicardia paroxística supra ventricular RCP: Reanimación cardiopulmonar BAV: Bloqueo aurículoventricular 35. DIÁLISIS PERITONEAL (Ramasethu, Mhairi, G, & Martin, 2002) (Nefrologia, 2005) La diálisis peritoneal es una técnica de sustitución renal, que utiliza para ello, las características y el comportamiento de la membrana peritoneal como membrana semipermeable. La infusión de un líquido adecuado en la cavidad peritoneal da como resultado el aclaramiento de la sangre, de sustancias no deseadas, por mecanismo de difusión a favor de gradiente. de concentración y la eliminación de volumen por mecanismo de ultrafiltración a favor de gradiente osmótico. (Nefrología, 2005) En los neonatos, la diálisis peritoneal aguda se prefiere a menudo más que la hemodiálisis, porque sus requerimientos técnicos son más sencillos. Como el área de superficie peritoneal por kilogramo de peso corporal es relativamente más grande en los neonatos que en los adultos, por lo general permite una depuración suficiente y la eliminación del exceso de líquido. (Ramasethu, Mhairi, G, & Martin, 2002) La forma más común es la utilización del catéter rígido con estilete de metal que sobresale en su extremo y se utiliza para la penetración abdominal (http://sisbib.unmsm.edu.pe/bvrevis-tas/rpp/v61n3/pdf/a05v61n3.pdf, s.f.) **Indicaciones** - Insuficiencia renal, cuando falló el manejo conservador para controlar en forma adecuada los siguientes trastornos - Hipervolemia - Hiperpotasemia - Hiponatremia - Acidosis - Hiperfosfatemia - Uremia - Trastornos hereditarios del metabolismo de los ácidos orgánicos y aminoácidos cuando no se dispone de hemodiálisis **Contraindicaciones** - Abdomen agudo - Adherencias (bridas) peritoneales • Inmediatamente después de cirugía abdominal • Debilidad diafragmática o de la pared abdominal (Ramasethu, Mhairi, G, & Martin, 2002) Técnicas de colocación Existen tres técnicas básicas de colocación de catéter peritoneal: Técnicas de colocación ciega (Seldinger), laparoscópicas y quirúrgicas abiertas. Cada una de ellas tiene sus ventajas e inconvenientes. Equipo • Gorro, mascarilla • Guantes y bata estéril • Gasas y campos estériles • Solución antiséptica (gluconato de clorhexidina al 0.075%, fórmula 2) • Jeringa de 3 ml. • Agujas para infiltrar • Lidocaína al 2 % sin epinefrina • Solución para diálisis peritoneal (dextrosa al 1.5%, 2.5% y 4.25% en solución electrolítica estable con heparina, 1,000 unidades/litro) • Catéter para diálisis peritoneal percutáneo con fijador Hoja de bisturí Jeringa de 10 ml Suero salino al 0.9% Seda quirúrgica 2-0 con aguja curva cortante triangular (cuando es necesario) Posición del paciente - Decúbito supino Cuidados preventivos al procedimiento - Obtenga el consentimiento informado - Controle el peso corporal y el perímetro abdominal - Controle la presencia de infección en el sitio de inserción - Descomprima el abdomen - Cateterice la vejiga para vaciarla - Coloque un pañal (pesado con anterioridad) debajo del paciente para cuantificar pérdidas Antes de ensamblar el sistema, lávese las manos y use una mascarilla. Todas las conexiones deben realizarse con una técnica estéril. Se deben realizar precauciones universales. Mantenga toda la tubuladura pinzada. Procedimiento para colocación del catéter para diálisis - La vejiga se vacía de forma espontánea o mediante catederización si es necesario - Preparar la piel del abdomen con solución antiséptica y cubrir con campos estériles la zona elegida Técnica de asepsia para colocación de catéter. Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016. • La zona para la punción se instila con lidocaína al 2% sin epinefrina • Los puntos de referencia que se utilizan con mayor frecuencia para la punción son el tercio proximal de la línea que une el ombligo con la sínfisis del pubis o lateralmente en el tercio proximal de la línea imaginaria que une la última costilla y la cresta ilíaca izquierda • Antes de insertar el catéter se procede a infundir la cavidad peritoneal por medio de una aguja de grueso calibre 10 a 20 ml/Kg de solución salina al 0.9%. Se usa para distender el abdomen y disminuir el riesgo de perforación intestinal Punción con aguja para introducir catéter peritoneal Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Introducción de solución salina para distender abdomen. Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Introducción de guía metálica para colocación de catéter peritoneal Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 - El catéter se inserta a través de la guía metálica en dirección perpendicular y se introduce hasta colocar su extremo en el espacio parietocólico izquierdo retirando de forma simultánea la guía metálica. Debe comprobarse que todos los orificios del catéter estén dentro de la cavidad peritoneal y se conecte con el equipo de transferencia de solución de diálisis. Introducción de catéter a través de guía. Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Técnica para fijación de catéter peritoneal Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 198 Técnica para fijación de catéter peritoneal Fotografía tomada por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2016 Se puede visualizar el siguiente video del procedimiento para la colocación de catéter de diálisis realizado en el servicio de neonatología, del Hospital de Gineco Obstetricia IGSS. https://youtu.be/NjHU4Y4qC3w (2013) Procedimiento para realización de la diálisis - Establezca un tiempo para el ciclo. Por lo general es de 60 minutos e implica llenado por gravedad, tiempo de permanencia de 45 minutos y drenaje por gravedad - Establezca un volumen de diálisis por paso. El volumen de inicio suele ser de 10 a 20 ml/ Kg - Coloque una llave de tres vías y cierre la vía de salida del flujo - Deje que la solución para diálisis fluya dentro tan rápido como sea posible mientras observa con cuidado los signos vitales - Cierre la vía de entrada del flujo - Deje el líquido estacionario • Abra la vía de salida del flujo cuando se complete el tiempo de permanencia • Deje pasar 5 a 10 minutos para el drenaje • Cierre la vía de salida del flujo • Repita el ciclo • Aumente el volumen en 5 ml/ Kg/ ciclo con lentitud. El volumen máximo es de 40 ml/ Kg si se tolera, y se alcanza en 12 a 24 horas Monitorización • Mantenga la hoja de flujo de diálisis peritoneal cada hora • Volumen que entra • Volumen que sale • Neto/ hora (+/-) • Neto en el curso de la diálisis (+/-) • Ingresos (enterales/ parenterales) • Egresos (orina, gástricos, pérdida insensible de agua, entre otros) • Establezca un equilibrio deseado de líquidos. Prosiga con suavidad si se necesita un equilibrio negativo. Vuelva a evaluar el estado de hidratación con frecuencia • Mida la concentración de glucosa y potasio cada 4 horas durante las primeras 24 horas o hasta que se encuentren estables, luego dos veces al día. Obtenga las concentraciones de los otros electrolitos dos veces al día. Controle el nitrógeno ureico sanguíneo, la creatinina en suero, la calcemia, la fosfatemia y el magnesio en suero una vez al día • Obtenga recuento celular, coloración de Gram y cultivo de líquido peritoneal extraído cada 12 horas • Las dosis de algunos fármacos pueden requerir ajustes Complicaciones • Perforación de la vejiga, intestinos o vasos mayores • Hemorragia del sitio de punción • Líquido de diálisis persistentemente teñido con sangre después de varios ciclos • Escape desde el sitio de salida • Extravasación de la solución para diálisis en la pared abdominal anterior • Más del 10% de la solución retenida en cada uno de varios ciclos consecutivos • Obstrucción de dos vías • Descolocación del catéter • Hidrotórax • Hiperglicemia • Acidosis láctica • Hiponatremia • Hipernatremia • Infección del sitio de salida • Peritonitis • Eliminación de fármacos terapéuticos (http://sisbib.unmsm.edu.pe/bvrevistas/rpp/v61n3/pdf/a05v61n3.pdf, s.f.) 36. HIPOTERMIA TERAPÉUTICA (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Este procedimiento reduce la mortalidad en recién nacidos con encefalopatía hipóxico-isquémica moderada a severa cuando se inicia antes de las 6 horas de vida. - Tratamiento de recién nacidos (A partir de la 36 semanas y 7 días de gestación y menos de 6 horas de vida) que llenen los criterios diagnósticos de encefalopatía hipóxico-isquémica de moderada a severa - La hipotermia se puede realizar mediante casco cefálico o por enfriamiento corporal Criterios de selección para inicio de hipotermia Los recién nacidos deben ser evaluados bajo criterios clínicos, fisiológicos y un examen neurológico completo. Todos deben llenar los criterios fisiológicos y neurológicos. Estos se utilizan para iniciar tanto hipotermia corporal como casco cefálico. Para utilizar casco enfriador cefálico se requiere un electroencefalograma de amplitud integrada, de por lo menos 20 minutos de duración, que demuestre actividad anormal moderada a severa o convulsiones. • Criterios fisiológicos y clínicos. Todos los neonatos deben ser evaluados bajo estos parámetros • Gases sanguíneos. pH < 7 o un déficit de base > -16 • Gasometría con pH 7-7.15 o déficit de base de -10 a -15.9 con un evento perinatal agudo (prolapso de cordón, placenta previa, bradicardia fetal, desaceleraciones tardías o variables, trauma materno, hemorragia o paro cardíaco) • Apgar < 5 por 10 minutos y necesidad de ventilación asistida desde el nacimiento hasta los 10 minutos de vida • Examen neurológico completo. Realice un examen estandarizado completo. La encefalopatía moderada a severa se define por convulsiones o la presencia de uno o más signos en 3 de las 6 categorías de estadificación de encefalopatía hipóxico-isquémica (nivel de conciencia, actividad espontánea, postura, tono, reflejos primitivos y sistema autonómico). El número de signos moderados a severos determinará la extensión de la encefalopatía; si los signos tienen la misma puntuación, la designación se basa en el estado de conciencia. | Categoría | Encefalopatía moderada | Encefalopatía severa | |---------------------------------|------------------------|----------------------| | 1. Nivel de conciencia | Letargia | Estupor o coma | | 2. Actividad espontánea | Actividad disminuida | No actividad | | • Postura | Flexión distal o extensión completa | Postura de desce-rebración | | • Tono | Hipotonía (focal y general) | Flácido | | • Reflejos primitivos | | | | Succión | Débil | Ausente | | Moro | Incompleto | Ausente | | • Sistema autónomo | | | | Pupilas | Constricción | Dilatadas, no reactivas | | Frecuencia cardíaca | Bradicardia | Frecuencia variable | | Respiración | Respiración periódica | Apnea | (Gomella Tricia Lacy, Cunningham M. Douglas, Eyal Fabien G., & Et, Section IV: Prodedures: Principles of Neonatal Procedures, 2013) Modificado por grupo de trabajo GPC-BE. Servicio de Neonatología. Hospital de Gineco Obstetricia IGSS 2017 • Si se documentan convulsiones por electroencefalograma o está el recién nacido convulsionando, es automáticamente candidato para hipotermia Si no hay convulsiones, el recién nacido tiene que cumplir por lo menos 3 de los 6 signos neurológicos de encefalopatía moderada a severa para ser candidato a hipotermia. **Equipo** - Mantilla o sábana de tamaño neonatal para hipotermia, de uso único, que provea calefacción y enfriamiento para mantener la temperatura deseada. - Sonda esofágica infantil para monitoreo continuo de la temperatura corporal. - 2-3 galones de agua destilada para la calibración inicial. - Sistema de drenaje. - Cuna radiante con calefacción al terminar la hipotermia terapéutica. **Procedimiento** - Confirme que el paciente es candidato para hipotermia. - Prepare el equipo para enfriamiento según las indicaciones del fabricante. - Manejo del dolor. No se recomiendan analgésicos o anestésicos. Si necesita sedación, lo más utilizado es morfina. - Pre enfríe la manta a 5°C para el enfriamiento corporal total y mantener una temperatura esofágica entre 33.5°C ± 0.05°C para neuro protección. Acueste al bebé en decúbito supino sobre la manta fría con el occipucio descansando sobre la misma. Una manta delgada de tela debe colocarse entre el recién nacido y el dispositivo de enfriamiento para evitar que se manche la sabana de enfriamiento - Introduzca la sonda para temperatura esofágica a través de la narina. Debe ser suavizada colocándola en agua caliente por unos minutos. Esta debe ser posicionada en el tercio inferior del esófago (longitud deseada = distancia de la nariz al oído hasta tercio medio del esternón menos 2 centímetros). Asegure la sonda con cinta porosa. Conecte la sonda a la unidad de enfriamiento e inicie el monitoreo de la temperatura. Se debe confirmar la posición de la sonda con radiografía, pero no se debe retrasar el inicio de la terapia. - Colocar al recién nacido en una cuna radiante. La temperatura de la piel debe ser monitorizada con un sensor pegado a la piel en la parte inferior del abdomen. La cuna debe programarse en el modo manual con el calificador apagado. No utilice ninguna fuente de calor externa. - Utilice la unidad enfriadora en modo automático con un objetivo de temperatura de 33.5°C ± 0.5°C. - La temperatura esofágica del recién nacido empezará a disminuir rápidamente luego del inicio del enfriamiento. La manta de hipotermia se ajusta automáticamente para alcanzar la temperatura de 33.5°C en 90-120 minutos. Una vez alcanzada ésta, se dan pocas fluctuaciones en la misma. Se deben monitorizar los signos vitales durante el enfriamiento cada 15 minutos. El período de enfriamiento dura 72 horas. • Al concluir este período, el recalentamiento se realiza en 6 horas. La temperatura de la manta de enfriamiento se gradúa para incrementar 0.5°C por hora hasta llegar a 36.5°C. El objetivo es incrementar la temperatura 0.5°C por hora hasta alcanzar la normotermia al finalizar las 6 horas. Se deben monitorizar los signos vitales, en especial la temperatura, durante el período de recalentamiento. La hipertermia debe evitarse a toda costa. • Al finalizar el período de 6 horas de recalentamiento, apague la unidad de hipotermia, retire la manta y la sonda esofágica. • Durante el proceso de enfriamiento y recalentamiento, el recién nacido debe recibir sus cuidados de rutina según su condición clínica de base, incluyendo estudios de laboratorio, soporte cardiorrespiratorio, hematológico y renal. Los gases sanguíneos deben ser corregidos por la temperatura durante la hipotermia. Para una interpretación más certera, las muestras deben ser analizadas a la temperatura del paciente. Si esto no es posible, Polderman sugiere que los valores de gases arteriales a 37°C pueden ser estimados de la siguiente manera. • Restar 5 mmHg PO2 por cada 1°C de temperatura <37°C • Restar 2 mmHg PCO2 por cada 1°C de temperatura <37°C • Añadir 0.012 unidades al pH por cada 1°C de temperatura <37°C Complicaciones - Cardiovascular y respiratorio. Arritmia, hipotensión - Dermatológicas. Abrasión de la piel y necrosis de la grasa subcutánea - Hematológicas. Trombocitopenia y coagulopatía - Metabólicas. Acidosis metabólica, alteración del metabolismo de la glucosa, alteración del metabolismo de medicamentos. Niveles tóxicos de medicamentos pueden acumularse potencialmente si no hay un adecuado metabolismo y excreción de los mismos - Infecciones 6. BIBLIOGRAFÍA Academia Americana de Pediatría y Asociacion Americana del Corazón. (2011). *Libro de Texto de Reanimación Neonatal, 6ta edición*. Estados Unidos: APP. Carmen Casal Angulo, J. C. (2007). *Vía Intraósea. Últimas recomendaciones del Comité Europeo de Resucitación (ERC)*. Dlma, I. (13 de Abril de 2012). *cuidadostiernos.blogspot.com*. Recuperado el abril de 7 de 2016, de cuidadostiernos.blogspot.com/2012_04_01_archive.html Gallaher, K., Cashwell S, H. V., & Lowe W, C. T. (1993). Orogastric tube insertion length in very low birth weight infants. *J. Perinatol*, 128. Gomella Tricia Lacy, M., Cunningham M. Douglas, M., Eyal Fabien G., M., & Et, a. (2013). Section IV: Prodedures: Principles of Neonatal Procedures. En M. Gomella Tricia Lacy, M. Cunningham M. Douglas, M. Eyal Fabien G., & a. Et, *Neonatology, Seventh Edition* (págs. 227-324). Estados Unidos: Mc Graw Hill Education. Gomella Tricia Lacy, M., Cunningham M. Douglas, M., Eyal Fabien G., M., & Et, a. (2013). Section IV: Prodedures: Principles of Neonatal Procedures. En M. Gomella Tricia Lacy, M. Cunningham M. Douglas, M. Eyal Fabien G., & a. Et, *Neonatology, Seventh Edition* (págs. 227-324). Estados Unidos: Mc Graw Hill Education. http://sisbib.unmsm.edu.pe/bvrevistas/rpp/v61n3/pdf/a05v61n3.pdf. (s.f.). http://sisbib.unmsm.edu.pe/bvrevistas/rpp/v61n3/pdf/a05v61n3.pdf. Recuperado el 25 de julio de 2016, de http://sisbib.unmsm.edu.pe/bvrevistas/rpp/v61n3/pdf/a05v61n3.pdf: http://www.oc.lm.ehu.es/Fundamentos/fundamentos/TecnicasCM/Dialisis%20Peritoneal.PDF. (sin datos de sin datos de sin datos). http://www.oc.lm.ehu.es/Fundamentos/fundamentos/TecnicasCM/Dialisis%20Peritoneal.PDF. Recuperado el 04 de julio de 2016, de http://www.oc.lm.ehu.es/Fundamentos/fundamentos/TecnicasCM/Dialisis%20Peritoneal.PDF: http://www.oc.lm.ehu.es/Fundamentos/fundamentos/TecnicasCM/Dialisis%20Peritoneal.PDF https://www.bing.com/images/search?q=fontanelas&FORM=HDRSC2. (s.f.). https://www.bing.com/images/search?q=fontanelas&FORM=HDRSC2. Recuperado el 12 de Julio de 2016, de https://www.bing.com/images/search?q=fontanelas&FORM=HDRSC2. INPer. (2015). Procedimientos. En INPer, Normas y Procedimientos de Neonatologia 2015 INPer (págs. 612-651). Mexico, D.F. Instituto Guatemalteco de Seguridad Social. (25 de septiembre de 2015). Datos estadisticos, Cubo SIIGSS. Guatemala, Guatemala, Guatemala. Laura J. Sigman, M. J. (2012). Procedures. En M. Megan M. Tschudy, & M. Kristin M. Arcara, The Harriet Lane Handbook nineteenth edition (págs. 57-88). Philadelphia: ELSEVIER MOSBY. León López, A. (13 de Septiembre de 2012). Recuperado el 3 de Septiembre de 2016, de Enfermería Ciudad Real: http://www.enfermeriade-ciudadreal.com/administracion-de-enemas-por-colostomia-84.htm Mallafré, C. A., Molina Pacheco, F., & Belmonte, L. R. (24 de Febrero de 2014). eccp.aibarra.org. Recuperado el 6 de Marzo de 2016, de www.eccpn.aibarra.org/temario/seccion9/capitulo141/capitulo141.htm Nefrologia, S. E. (23 de 10 de 2005). Guia de Practica Clinica en Dialisis Peritoneal. Madrid, España . Organización Panamericana de la Salud. (2011). *Manual de Atención Neonatal*. Paraguay: OPS/OMS. Orrego, J. A. (24 de Febrero de 2013). *pdtjaoa.blogspot.com*. Recuperado el 5 de Abril de 2016, de pdtjaoa.blogspot.com/2014/02/presentacion.html Pimstein, M. (9 de Diciembre de 2009). Care of children and adolescents with special health care needs: gastrostomy. *MedWave*. Recuperado el 2 de Julio de 2016, de Care of children and adolescents with special health care needs: gastrostomy: http://www.medwave.cl/link.cgi/Medwave/PuestaDia/Congresos/4311 Ramasethu, M., Mhairi, L., G, M., & Martin, E. (2002). *Atlas de Procedimientos en Neonatologia* (3ra ed., Vol. 1). (M. Mhairi, Ed., & K. Diana, Trad.) Baltimore Philadelphia, USA: Editorial Medica Panamericana. Relaño García, C., Moyano Tost, M. J., & De Frutos Arribas, M. d. (26 de Abril de 2014). *eccpn.aibarra.org*. Recuperado el 15 de Marzo de 2016, de www.eccpn.aibarra.org/temario/seccion6/capitulo108/capitulo108.htm *Revista electrónica de enfermeria guayaquil-ecuador*. (23 de Febrero de 2013). Recuperado el 10 de Octubre de 2016, de http://revistaenfermeriaug.blogspot.com/2011/08/alimentacion-enteral-atraves-de-sonda-y.html Ringer Steven, M., & Gray James, M. (2009). Procedimientos Neonatales Habituales. En M. Cloherty John, M. Eichenwald Eric, & M. Stark Ann, *Manual de Neonatologia, 6a edición* (págs. 639-654). España: Wolters Kluwer Health España. Sánchez Pérez, S. M. (26 de Febrero de 2014). *eccpn.aibarra.org*. Recuperado el 5 de Marzo de 2016, de www.eccpn.aibarra.org/temario/seccion4/capitulo63/capitulo63.htm sld.cu/galerias/anestesiologia. (02 de noviembre de 2016). Obtenido de http://www.sld.cu/galerias/pdf/sitios anestesiologia/presion_ve_nosa_central.pdf UNICEF. (Octubre de 2010). Recomendaciones para la Prevención de Infecciones Intrahospitalarias: Higiene de Manos en Servicios de Neonatología. Córdoba, Argentina: UNICEF-oficina de Argentina. Instituto Guatemalteco de Seguridad Social 7a. Avenida 22-72 Zona 1 Centro Cívico, Ciudad de Guatemala Guatemala, Centroamérica PBX: 2412-1224 www.igssgt.org
7e538993-0a21-43af-bee9-25d8284c1811
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
213,512
El Instituto Nacional de Ciencias Médicas y Nutrición “Salvador Zubirán” La Asociación Mexicana de Gastroenterología, A.C. La Universidad Nacional Autónoma de México y La Academia Nacional de Medicina Otorgan la presente CONSTANCIA GABRIEL ROSALES PEREZ Por su asistencia al Curso de Postgrado Controversias Actuales en Gastroenterología y Hepatología, realizado en el Auditorio de este Instituto del 13 al 15 de Julio de 2006. Dr. Aldo Torre Delgadillo Director del Curso Dr. Antonio de la Torre Bravo Presidente Asociación Mexicana de Gastroenterología, A.C. Dr. Misael Uribe Esquivel Presidente Academia Nacional de Medicina
<urn:uuid:22233870-1a45-49e2-8593-8ecd5bf57a99>
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
636
Übung zu HTML 5 1. Bauen Sie für Ihren zukünftigen Buchshop ein allgemeines Kontaktformular mit möglichst vielen HTML5-Funktionalitäten (vgl. 2.), mit dem später eine Registrierung erfolgen soll. 2. Minimale Anforderungen sind folgende HTML5-Funktionen und Tags a. Input-Felder Nachname und Vorname mit mind. 2 Buchstaben, b. Input-Feld vom Typ Email für die Kunden-Emailadresse mit HTML5-Prüfung auf Emailadr., c. Input-Feld vom Typ URL für die Kunden-URL, d. Input-Feld vom Number für das Alter des Kunden (Min=5 Max=100) e. Input-Feld vom Range für das Interesse des Kunden an weiteren, ähnlichen Produkten ( von 0 (Kein Interesse) bis 10 (alles) f. grafisch ansprechend gestaltetes Textfeld zur Eingabe einer Anfrage mit ca. 5 Zeilen incl. integrierter Rechtschreibprüfung. 3. Testen Sie mindestens ein weiteres Element aus dem HTML 5 – Funktionsumfang nach eigenem Ermessen (z.B. Canvas oder Einbau eines externen Video oder Multimedia-Files) und testen Sie dieses mit mindestens 2 verschiedenen Browsern und vermerken Sie die Ergebnisse (bzw. Warnungen vor Nicht-Benutzbarkeit) auf der Seite! Datei: U04_HTML5Forms_vzz 1
<urn:uuid:13322caa-ff4f-484a-a1c7-36eae5fcace9>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
1,150
Informace o zpracování osobních údajů Magistrát hlavního města Prahy Odbor: Odbor služeb (SLU) Název úkonu/agendy: ALL/PP005-SLU - vyřizují, v rozsahu své působnosti, žádosti o poskytnutí informace podle zákona č. 106/1999 Sb., o svobodném přístupu k informacím, ve znění pozdějších předpisů (dále jen „zákon o svobodném přístupu k informacím"), a spolupracují s odborem „Kancelář ředitele Magistrátu" Magistrátu; Účel zpracování: Poskytnutí informace dle zákona č.106/1999 Sb., o svobodném přístupu k informacím, ve znění pozdějších předpisů, nebo příslušný zákonný postup Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Poštovní adresa ; Smlouvy (o nájmu bytu, udělení plné moci, apod.) Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Ministerstvo vnitra, soud Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP025 - zadává a vyhodnocuje veřejné zakázky v rámci Magistrátu; Účel zpracování: Zadání a vyhodnocení veřejných zakázek za odbor SLU MHMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; CV, motivační dopis ; Certifikáty ; Diplomy o stupni vzdělání apod.; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Pohlaví; Absolvované školy a vzdělání; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Pracovní zařazení; Údaje o odsouzení za trestný čin Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Nejsou, v případě odvolání může dojít k Úřadu pro ochranu hospodářské soutěže Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 1 z 36 SLU/SP030 - uzavírá smlouvy o krátkodobém pronájmu a výpůjčce prostor v objektech ve své správě, Účel zpracování: Uzavření příslušných smluv Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Pohlaví; Smlouvy (o nájmu bytu, udělení plné moci, apod.) Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Smlouvy jsou uveřejněny v CESu Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP031 - připravuje návrhy a podklady k uzavírání nájemních a podnájemních smluv v objektech ve své správě i v dalších objektech Magistrátu užívaných orgány hlavního města Prahy; Účel zpracování: Uzavření a plnění příslušných smluv Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Bankovní účet fyzické osoby; Pohlaví; Smlouvy (o nájmu bytu, udělení plné moci, apod.) Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Smlouvy jsou uveřejňovány v CESu Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 2 z 36 ALL/SP001-SLU - iniciují, v rámci zákonodárné iniciativy hlavního města Prahy, tvorbu a změny právních předpisů a vnitřních předpisů hlavního města Prahy a zpracovávají své návrhy a podklady k projednání v Radě hlavního města Prahy (dále jen „Rada") a v Zastupitelstvu hlavního města Prahy (dále jen „Zastupitelstvo"); Účel zpracování: Vznik právního nebo vnitřního předpisu HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty v systémech a aplikacích zaměstnavatelů; Certifikáty ; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Tituly; Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; Digitální podpis (podpisový certifikát) Zpracovatelé: 3 - Obis; 4 - Gordic; 5 - Wolters Kluwer Doba zpracování osobních údajů, skartační/archivační znak: Právní předpisy HMP A/10, Vnitřní předpisy MHMP A/5, Věci ZHMP a RHMP A/5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Věcně příslušná ministerstva v rámci kontrol Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP005-SLU - spolupracují s ostatními odbory Magistrátu, městskými částmi hlavního města Prahy (dále jen „městská část") a dalšími právnickými a fyzickými osobami ve věcech týkajících se své působnosti; Účel zpracování: V působnosti odborů MHMP může dojít k předávání OÚ s MČ při spolupráci Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty na sociálních sítích ; Účty v systémech a aplikacích zaměstnavatelů; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Certifikáty ; Diplomy o stupni vzdělání apod.; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Vzhledem k šíři dokumentů vznikajících při tomto úkolu nelze přesně určit, může jít o všechny skartační znaky dle Spisového řádu MHMP Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Úřadům městských částí, jakékoliv kontrolní orgány, orgány činné v trestním řízení a věcně příslušná ministerstva, žadatelé o poskytnutí informace Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 3 z 36 ALL/SP007-SLU - předkládají prostřednictvím věcně příslušného člena Rady nebo prostřednictvím ředitele Magistrátu návrhy k projednání v Radě nebo v Zastupitelstvu ve věcech své působnosti v souladu s Pravidly pro přípravu a vyhotovování materiálů pro jednání Rady HMP, schválenými jako příloha č. 1 k usnesení Rady hlavního města Prahy č. 472 ze dne 10. 3. 2015; Účel zpracování: Vznik právního nebo vnitřního předpisu HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty v systémech a aplikacích zaměstnavatelů; Certifikáty ; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Tituly; Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa Zpracovatelé: 3 - Obis; 4 - Gordic; 5 - Wolters Kluwer Doba zpracování osobních údajů, skartační/archivační znak: Právní předpisy HMP A/10, Vnitřní předpisy MHMP A/5, Věci ZHMP a RHMP A/5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Věcně příslušná ministerstva v rámci kontrol Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP009-SLU - vypracovávají stanoviska, vyjádření a návrhy na řešení úkolů, které jim ukládají orgány hlavního města Prahy; Účel zpracování: Vznik právního nebo vnitřního předpisu HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty v systémech a aplikacích zaměstnavatelů; Certifikáty ; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Tituly; Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; Digitální podpis (podpisový certifikát) Zpracovatelé: 3 - Obis; 4 - Gordic; 5 - Wolters Kluwer Doba zpracování osobních údajů, skartační/archivační znak: Právní předpisy HMP A/10, Vnitřní předpisy MHMP A/5, Věci ZHMP a RHMP A/5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Věcně příslušná ministerstva v rámci kontrol Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 4 z 36 ALL/SP010-SLU - provádějí řídící kontrolu podle zákona č. 320/2001 Sb., o finanční kontrole ve veřejné správě a o změně některých zákonů (zákon o finanční kontrole), ve znění pozdějších předpisů, a nařízení ředitele Magistrátu hlavního města Prahy č. 10/2008 k zajištění fungovánívnitřního kontrolního systému Magistrátu hlavního města Prahy podle zákona č. 320/2001 Sb., o finanční kontrole ve veřejné správě a o změně některých zákonů (zákon o finanční kontrole), ve znění pozdějších předpisů, vydaného dne 15. října 2008, pod č. j. S-MHMP 629026/ 2008 RED, ve znění pozdějších předpisů; Účel zpracování: Provádění řídící kontroly podle zákona č. 320/2001 Sb., o finanční kontrole ve veřejné správě a o změně některých zákonů (zákon o finanční kontrole Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Účty na sociálních sítích ; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Zaměstnanecké smlouvy; Diplomy o stupni vzdělání apod.; Hodnocení zaměstnance; Scan (např. uzavření manželství apod.); Tituly; Absolvované školy a vzdělání; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); SPZ; Pracovní zařazení; Digitální podpis (podpisový certifikát) Zpracovatelé: 4 - Gordic; 6 - Marbes Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Příslušné odvolací a kontrolní orgány (v samostatné působnosti Ministerstvo vnitra), ÚOOÚ, soudy Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP012-SLU - vyřizují stížnosti, oznámení, podněty a petice občanů hlavního města Prahy nebo spolupracují s odborem kontrolních činností Magistrátu hlavního města Prahy při vyřizování stížností, peticí, oznámení a podnětů občanů hlavního města Prahy podle Pravidel pro přijímání a vyřizování petic a stížností podaných orgánům hlavního města Prahy, schválených jako příloha č. 1 k usnesení Rady hlavního města Prahy č. 313 ze dne 5. 3. 2013, a těch, které mu byly postoupeny Radou nebo ředitelem Magistrátu hlavního města Prahy; Účel zpracování: Vyřizování stížností a petic Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Poštovní adresa ; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: A/5 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 5 z 36 ALL/SP014-SLU - spolupracují s odborem kontrolních činností Magistrátu hlavního města Prahy při vypracovávání trestních oznámení; při realizaci dodržují postup daný nařízením ředitele Magistrátu hlavního města Prahy č. 22/2005 k zajištění jednotného postupu přioběhu soudních písemností, při podávání trestních oznámení a vyřizování žádostí orgánů činných v trestním řízení na Magistrátu hlavního města Prahy, vydaným dne 27. prosince 2005 pod č. j. MHMP 275435/05 RED; Účel zpracování: V působnosti odborů MHMP může dojít k předávání OÚ s MČ při spolupráci Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty na sociálních sítích ; Účty v systémech a aplikacích zaměstnavatelů; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Certifikáty ; Diplomy o stupni vzdělání apod.; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu; Digitální podpis (podpisový certifikát) Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Vzhledem k šíři dokumentů vznikajících při tomto úkolu nelze přesně určit, může jít o všechny skartační znaky dle Spisového řádu MHMP Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Úřadům městských částí, jakékoliv kontrolní orgány, orgány činné v trestním řízení a věcně příslušná ministerstva, žadatelé o poskytnutí informace Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 6 z 36 ALL/SP016-SLU - sestavujínávrh rozpočtu ve své působnosti, provádějí se souhlasem a prostřednictvím odboru rozpočtu Magistrátu hlavního města Prahy přesuny finančních prostředků mezi jednotlivými položkami v rámci rozpisu schváleného, popř. upraveného, rozpočtu hlavního města Prahy, který provedl odbor rozpočtu Magistrátu hlavního města Prahy, na jednotlivé odbory Magistrátu hlavního města Prahy (dále jen „Magistrát"), kontrolují čerpání, účelnost a využívání finančních prostředků podle stanovených záměrů; Účel zpracování: Sestavení rozpočtu a jeho čerpání, včetně změn Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Funkční zařazení; Smlouvy (o nájmu bytu, udělení plné moci, apod.); Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: A/10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: žádný Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP018-SLU - pečují o objekty ve vlastnictví hlavního města Prahy ve správě Magistrátu (dále jen „objekt Magistrátu"); Účel zpracování: Zajištění péče o objekty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Pracovní zařazení Zpracovatelé: 3 - Obis Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: veřejnost (registr smluv), kontrolní orgány Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 7 z 36 ALL/SP019-SLU - zajišťují přejímku, správu, odprodeja případnou likvidaci movitého majetku ve své správě; Účel zpracování: Zajištění péče o objekty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Pracovní zařazení Zpracovatelé: 3 - Obis Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: veřejnost (registr smluv), kontrolní orgány Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP021-SLU - realizují projekty spolufinancované ze strukturálních fondů Evropské unie ve své působnosti; Účel zpracování: Zajištění péče o objekty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Pracovní zařazení Zpracovatelé: 3 - Obis Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: veřejnost (registr smluv), kontrolní orgány Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 8 z 36 ALL/SP024-SLU - informují odbor daní, poplatků a cen Magistrátu o průběhu a závěrech řízení, ve kterých jim byla uložena povinnost finančního plnění vůči finančním úřadům; Účel zpracování: Plnění povinnosti finančního plnění vůči finančnímu úřadu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Funkční zařazení Zpracovatelé: 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány, finanční úřad, ministerstvo financí Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP025-SLU - zajišťují právnízastupováníhlavního města Prahy při soudních jednáních souvisejících s jejich působností prostřednictvím Radou schválených advokátů a advokátních kanceláří v souladu s Pravidly pro zajišťování externích právních služeb pro potřeby hlavníh o města Prahy schválenými jako příloha č. 2 k usnesení Rady hlavního města Prahy č. 1844 ze dne 2. 11. 2004, ve znění pozdějších změn (dále jen „Pravidla pro zajišťování externích právních služeb"), nebo prostřednictvím primátorem hlavního města Prahy či ředitelem Magistrátu pověřených zaměstnanců hlavního města Prahy zařazených do Magistrátu (dále jen „zaměstnanec"); Účel zpracování: V působnosti odborů MHMP může dojít k předávání OÚ s MČ při spolupráci Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty na sociálních sítích ; Účty v systémech a aplikacích zaměstnavatelů; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Certifikáty ; Diplomy o stupni vzdělání apod.; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu; Digitální podpis (podpisový certifikát) Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Vzhledem k šíři dokumentů vznikajících při tomto úkolu nelze přesně určit, může jít o všechny skartační znaky dle Spisového řádu MHMP Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Úřadům městských částí, jakékoliv kontrolní orgány, orgány činné v trestním řízení a věcně příslušná ministerstva, žadatelé o poskytnutí informace Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Stránka 9 z 36 ALL/SP027-SLU - realizují zadávání veřejných zakázek podle zákona č. 134/2016 Sb., o zadávání veřejných zakázkách, ve znění pozdějších předpisů (dále jen „zákon o veřejných zakázkách"), a v souladu s Pravidly pro zadávání veřejných zakázek v podmínkách hlavního města Prahy podle zákona č. 134/2016 Sb., o zadávání veřejných zakázek, schválenými jako příloha č. 1 k usnesení Rady hlavního města Prahy č. 2469 ze dne 11. 10. 2016 (dále jen „Pravidla pro zadávání veřejných zakázek"), či s Pravidly pro zadávání veřejných zakázek škol a školských zařízení - příspěvkových organizací zřízených hlavním městem Prahou, schválenými jako příloha č. 1 k usnesení Rady hlavního města Prahy č. 927 ze dne 4. 6. 2013; Účel zpracování: Zadávání veřejných zakázek Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Pracovní zařazení Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: veřejnost (profil zadavatele), ÚOHS, orgány činné v TŘ Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP028-SLU - uzavírají smlouvy v souladu s Pravidly pro uzavírání smluv v podmínkách hlavního města Prahy, schválenými jako příloha č. 1 k usnesení Rady hlavního města Prahy č. 1274 ze dne 17. 8. 2010; Účel zpracování: Zadávání veřejných zakázek Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Pracovní zařazení Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: veřejnost (profil zadavatele), ÚOHS, orgány činné v TŘ Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP029-SLU - provádějí kontrolu plnění smluvních vztahů ve své působnosti; Účel zpracování: Kontrola smluvních vztahů Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Tituly; Funkční zařazení; Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: A/5, V/5, S/5 - dle druhu smlouvy Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP030-SLU - provádějí evidenci veřejných zakázek v kompetenci ve své působnosti v elektronickém programu eTender (vyjma smluv týkajících se nemovitého majetku hlavního města Prahy, které jsou evidovány v informačním systému pro správu a evidenci nemovitého majetku hlavního města Prahy (SEM)); Účel zpracování: Evidence veřejných zakázek Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Certifikáty ; Diplomy o stupni vzdělání apod.; Tituly; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby; Digitální podpis (podpisový certifikát) Zpracovatelé: 3 - Obis; 4 - Gordic; 7 - Gordion Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: ÚOHS, finanční úřad, veřejnost (registr smluv) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP031-SLU - provádějí evidenci nemovitého majetku hlavního města Prahy (pozemky, budovy, stavby - včetně rozestavěných) a procesů týkajících se nakládání s tímto nemovitým majetkem (záměry, smlouvy, rozhodnutí, protokoly atd.) v informačním systému pro správu a evidenci nemovitého majetku hlavního města Prahy (SEM); Účel zpracování: Zajištění péče o objekty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Pracovní zařazení Zpracovatelé: 3 - Obis Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: veřejnost (registr smluv), kontrolní orgány Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP032-SLU - provádějí evidenci smluv a dodatků ve své působnosti v centrální evidenci v informačním systému CES; Účel zpracování: Zadávání veřejných zakázek Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo ; Tituly; Funkční zařazení; Pracovní zařazení Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: veřejnost (profil zadavatele), ÚOHS, orgány činné v TŘ Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP033-SLU - provádějí evidenci pohledávek ve své působnosti a spolupracují při jejich koordinaci v informačním systému EPZ; Účel zpracování: Kontrola smluvních vztahů Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Tituly; Funkční zařazení; Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 3 - Obis; 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: A/5, V/5, S/5 - dle druhu smlouvy Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP034-SLU - zajišťují evidenci dokumentů v informačním systému spisové služby (informační systém SSL) a samostatně připravují a provádějí skartaci a archivaci veškeré dokumentace podle nařízení ředitele Magistrátu hlavního města Prahy č. 2/2017 Spisový řád Magistrátu hlavního města Prahy, vydaného dne 30. prosince 2017, pod č. j. MHMP 2282276/2016; Účel zpracování: Provádění archivačního řízení a výkon spisové služby Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; CV, motivační dopis ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Certifikáty ; Diplomy o stupni vzdělání apod.; Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Tituly; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Členství v organizacích (sportovních, výzkumných apod.); Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Národnost; Členství v odborech; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu Zpracovatelé: 4 - Gordic Doba zpracování osobních údajů, skartační/archivační znak: Podle druhu dokumentu je určena dle NŘ MHMP č. 2/2018 (spisový řád) Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Najatá skartační společnost (v případě objemné skartace) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP035-SLU - předkládají odboru personálnímu Magistrátu podklady pro vedení personální agendy zaměstnanců; Účel zpracování: předání podkladů pro vedení personální agendy Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; CV, motivační dopis ; Mzdový výměr; Diplomy o stupni vzdělání apod.; Potvrzení (např. neuplatňování slevy na děti apod.); Tituly; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V/50 či S/50 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány (úřad práce) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP036-SLU - spolupracují s odborem personálním Magistrátu při obsazování míst úředníků zařazených ve své působnosti a dodržují postup daný zejména zákonem č. 312/2002 Sb., o úřednících územních samosprávných celků a o změně některých zákonů, ve znění pozdějších předpisů (dále jen „zákon o úřednících"), a nařízením ředitele Magistrátu hlavního města Prahy č. 9/2014 k postupu při realizaci výběrových řízení na místa úředníků zařazených do Magistrátu hlavního města Prahy, vydaným dne 26. května 2014, pod č. j. S-MHMP 688153/2014; Účel zpracování: předání podkladů pro vedení personální agendy Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; CV, motivační dopis ; Mzdový výměr; Diplomy o stupni vzdělání apod.; Potvrzení (např. neuplatňování slevy na děti apod.); Tituly; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V/50 či S/50 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány (úřad práce) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP037-SLU - vedou evidenci pracovní doby, práce přesčas, pracovní pohotovosti a noční práce u jednotlivých zaměstnanců v souladu s právními předpisy a na žádost zaměstnance umožní mu nahlédnout do evidence jeho pracovní doby; Účel zpracování: předání podkladů pro vedení personální agendy Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; CV, motivační dopis ; Mzdový výměr; Diplomy o stupni vzdělání apod.; Potvrzení (např. neuplatňování slevy na děti apod.); Tituly; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V/50 či S/50 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány (úřad práce) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP038-SLU - informují zaměstnance o tom, do jaké kategorie práce byla zařazena pracovní činnost, kterou vykonávají podle vyhlášky č. 432/2003 Sb., kterou se stanoví podmínky pro zařazování prací do kategorií, limitní hodnoty ukazatelů biologických expozičních testů, podmínky odběru biologického materiálu pro provádění biologických expozičních testů a náležitosti hlášení prací s azbestem a biologickými činiteli, ve znění pozdějších předpisů; Účel zpracování: zařazení pracovní činnosti dle vyhlášky Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Zaměstnanecké smlouvy; Tituly; Funkční zařazení; Nadřízená osoba; Pracovní zařazení; Údaje o zdravotním fyzickém stavu Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V/5 či S/10 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 2 - Souhlas pro uvedený Účel Příjemci osobních údajů: kontrolní orgány (ÚJB, MŽP, úřad práce) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP039-SLU - zajišťují, ve spolupráci s odborem personálním Magistrátu, plnění povinnostízaměstnavatele (hlavního města Prahy) podle zákona č. 435/2004 Sb., o zaměstnanosti, ve znění pozdějších předpisů, zejména v oblasti odebírání výrobků nebo služeb od zaměstnavatelů zaměstnávajících více než 50 % zaměstnanců, kteří jsou osobami se zdravotním postižením; Účel zpracování: předání podkladů pro vedení personální agendy Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; CV, motivační dopis ; Mzdový výměr; Diplomy o stupni vzdělání apod.; Potvrzení (např. neuplatňování slevy na děti apod.); Tituly; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V/50 či S/50 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány (úřad práce) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP040-SLU - provádějí ověřování shody opisu nebo kopie s listinou ověřování pravosti podpisu podle zákona č. 21/2006 Sb., ověřování shody opisu nebo kopie s listinou a ověřování pravosti podpisu a o změně některých zákonů (zákon o ověřování), ve znění pozdějších předpisů (dále jen „agenda ověřování listin a podpisů"), ve své působnostinebo pro členy Rady v souvislosti s výkonem jejich funkce; Účel zpracování: ověřování shody opisu nebo kopie Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Číslo osobního dokladu; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: S/50, S10 či V/5 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP041-SLU - provádějí podle pokynů odboru informatiky Magistrátu zpracovávání osobních údajů a plní další úkoly, vyplývající ze zákona č. 101/2000 Sb., o ochraně osobních údajů a o změně některých zákonů, ve znění pozdějších předpisů, evidují údaje o tomto nakládání a jeho oprávněnosti; ve své působnosti provádějí kontrolu zpracovávání osobních údajů podle nařízení ředitele Magistrátu hlavního města Prahy č. 3/2017 k ochraně osobních údajů v prostředí Magistrátu hlavního města Prahy, vydaného dne 30. prosince 2016, pod č. j. MHMP 2284128/2016; Účel zpracování: zpracování osobních údajů Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty na sociálních sítích ; Účty v systémech a aplikacích zaměstnavatelů; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; Odposlech; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Kmenový list zaměstnance; Rodný list (zaměstnanec, děti apod.); Zápočtový list; Řidičský průkaz; Zaměstnanecké smlouvy; Mzdový výměr; Certifikáty ; Diplomy o stupni vzdělání apod.; Hodnocení zaměstnance; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Přezdívka; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Databáze spotřebitelů; Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Politické postoje; Členství v odborech; Náboženské vyznání či filozofické přesvědčení; Sexuální orientace; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu; Genetické údaje; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby; Digitální podpis (podpisový certifikát) Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: individuální dle druhu dokumentu Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: kontrolní orgány, veřejnost (např. úřední deska) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP045-SLU - vyřizují, v rámci své působnosti, žádostio poskytnutíinformace podle zákona č. 106/1999 Sb., o svobodném přístupu k informacím, ve znění pozdějších předpisů (dále jen „zákon o svobodnémpřístupu k informacím"); Účel zpracování: Vyřizování žádostí o poskytnutí informace - svobodný přístup k informacím Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Účty na sociálních sítích ; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Zaměstnanecké smlouvy; Diplomy o stupni vzdělání apod.; Hodnocení zaměstnance; Scan (např. uzavření manželství apod.); Tituly; Absolvované školy a vzdělání; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); SPZ; Pracovní zařazení; Digitální podpis (podpisový certifikát) Zpracovatelé: 4 - Gordic; 6 - Marbes Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Příslušné odvolací a kontrolní orgány (v samostatné působnosti Ministerstvo vnitra), ÚOOÚ, soudy Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP046-SLU - připravují, v rámci své působnosti, ve smyslu čl. 10 odst. 4 Nařízení ředitele Magistrátu č. 6/2017, pro Radu rozhodnutí o odvoláních proti rozhodnutím příspěvkových organizací zřízených hlavním městem Prahou o odmítnutí žádostí o poskytnutí informace podle zákona o svobodném přístupu k informacím a o stížnostech na postup příspěvkových organizací zřízených hlavním městem Prahou při vyřizování žádostí o poskytnutíinformace podle zákona o svobodnémpřístupu k informacím; Účel zpracování: Příprava rozhodnutí o odvoláních proti rozhodnutí o odmítnutí žádosti o poskytnutí informace či rozhodnutí o stížnosti na způsob vyířzení žádosti o poskytnutí informace pro RHMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Účty na sociálních sítích ; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Zaměstnanecké smlouvy; Diplomy o stupni vzdělání apod.; Hodnocení zaměstnance; Scan (např. uzavření manželství apod.); Tituly; Absolvované školy a vzdělání; Funkční zařazení; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); SPZ; Pracovní zařazení; Digitální podpis (podpisový certifikát) Zpracovatelé: 3 - Obis; 4 - Gordic; 6 - Marbes Doba zpracování osobních údajů, skartační/archivační znak: V/10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Příslušné odvolací a kontrolní orgány (v samostatné působnosti Ministerstvo vnitra), ÚOOÚ, soudy Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/SP049-SLU - opatřují si prostřednictvím odboru informatiky Magistrátu programové vybavení a výpočetní techniku (technologické nástroje v oblasti informatiky); Účel zpracování: programové vybavení zaměstnanců Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Tituly; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: S/5, V5 či S/10 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/SP050-SLU - zabezpečují ve své působnosti agendy a činnosti, včetně posuzování vazeb těchto agend k úřadům městských částí, v návaznosti na zákon č. 111/2009 Sb., o základních registrech, ve znění pozdějších předpisů (dále jen „zákon o základních registrech"), zákon č. 365/2000 Sb., o informačních systémech veřejné správy a o změně některých dalších zákonů, ve znění pozdějších předpisů, obecně závaznou vyhlášku č. 55/2000 Sb. hl. m. Prahy, kterou se vydává Statut hlavního města Prahy, ve znění pozdějších předpisů (dále jen „Statut hlavního města Prahy"), a další právní předpisy; Účel zpracování: programové vybavení zaměstnanců Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Tituly; Pracovní zařazení; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: S/5, V5 či S/10 (dle druhu dokumentu) Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: žádné Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/PP001 - zajišťuje činnosti hlavní podatelny a výpravny Magistrátu a činnosti kontaktního místa veřejné správy Czech POINT a další činnosti; Účel zpracování: příjem dokumentů od veřejnosti, vytváření prvotní evidence ve spisové službě, fyzické odesílání dokumentů mimo MHMP, vydávání rejstříků a výpisů na požádání. Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; CV, motivační dopis ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Tituly; Pohlaví; Přezdívka; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Databáze spotřebitelů; Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Politické postoje; Členství v odborech; Náboženské vyznání či filozofické přesvědčení; Sexuální orientace; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: Dokumentům přijímaným na podatelně (i fortmou datové zprávy) nejsou přidělovány skartační znaky. Tyto přidělují až příslušní zaměnstnanci na odborech, kam jsou dokumenty odesílány. Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Ministerstvo vnitra Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/PP002 - ověřuje podle zákona o ověřování listiny a podpisy pro věřejnost; Účel zpracování: evidence žadatelů o ověřování dokumentů (ověřování podpisů nebo listin) Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Poštovní adresa ; Fotografie s jasně rozlišitelným obličejem; Pohlaví; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.) Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: A10. S10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Ministerstvo vnitra Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/PP003 - stanovuje a vyjímá evidenční čísla vozidel taxislužby pro území hlavního města Prahy a provádí jejich změny v dohodě s odborem dopravních agend Magistrátu (pouze evidenční úkon); Účel zpracování: identifikace žadatele o zařazení vozidla do evidence taxislužby Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Fotografie s jasně rozlišitelným obličejem; Řidičský průkaz; Tituly; Pohlaví; VIN; SPZ; Národnost Zpracovatelé: Externí rejstříky Doba zpracování osobních údajů, skartační/archivační znak: S5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Ministerstvo dopravy ČR, Městská policie, Policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/PP004 - provádí identifikaci klienta ve smyslu zákona č. 253/2008 Sb. o některých opatřeních proti legalizaci výnosů z trestné činnosti a financování terorismu, ve znění pozdějších předpisů; Účel zpracování: založení uživatelského konta u provozovatele hazardních her; bankovní instituce za účelem ověření totožnosti žadatele Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Poštovní adresa ; Rodný list (zaměstnanec, děti apod.); Řidičský průkaz; Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Národnost Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: S10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Ministerstvo vnitra Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/PP006-SLU - spolupracují, v oblastech konzultační, informační a propagační činnosti a při poskytování informací veřejnosti, hromadným sdělovacím prostředkům a prostřednictvím internetových stránek hlavního města Prahy, s odborem komunikace a marketingu Magistrátu; Účel zpracování: poskytování informací veřejnosti Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: Osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Všichni příjemci Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: ALL/PP008-SLU - ověřují, podle zákona č. 21/2006 Sb., o ověřování shody opisu nebo kopie s listinou a o ověřování pravosti podpisu a o změně některých zákonů (zákon o ověřování), listiny a podpisy pro svou potřebu nebo pro potřebu členů Rady hlavního města Prahy (dále jen „Rada") v souvislosti s výkonem jejich funkce, a to bez poplatku; Účel zpracování: žádost o výše popsaný doklad pro účely MHMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Poštovní adresa ; Fotografie s jasně rozlišitelným obličejem; Tituly; Pohlaví; Nadřízená osoba; Oddělení, kde je osoba zaměstnána; Národnost Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: A10 S10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: Ministerstvo vnitra Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE ALL/PP009-SLU - odpovídají v rozsahu své působnosti za dodržování zásad systémového řízení bezpečnosti informací a pravidel pro práci s daty podle jiných předpisů; Účel zpracování: systémového řízení bezpečnosti informací a pravidel pro práci s daty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: digitální archivace po dobu 10 let Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Soudy, Policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP001 - zajišťuje správu nemovitého a movitého majetku ve vlastnictví hlavního města Prahy užívaného orgány hlavního města Prahy; Účel zpracování: přehled konktaktů na kontaktatní osoby dodavatelských společností Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: není Stanovený právní titul pro zpracování osobních údajů: 3 - Splnění smlouvy nebo uzavřením smlouvy Příjemci osobních údajů: Není Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP002 - zajišťuje rozmístění zaměstnanců v nemovitostech ve vlastnictví hlavního města Prahy ve své správě a v jiných objektech Magistrátu na základě smluv o nájmu a o poskytování facility managementu, včetně vedení evidence rozmístění zaměstnanců a jejich telekomunikačního spojení; Účel zpracování: rozmístění zaměstnanců v nemovitostech ve vlastnictví hlavního města Prahy ve své správě a v jiných objektech Magistrátu na základě smluv o nájmu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo ; Fotografie s jasně rozlišitelným obličejem Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: ne Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP003 - vede dokumentaci bezpečnostní ochrany nemovitostí ve vlastnictví hlavního města Prahy ve své správě, užívaných orgány hlavního města Prahy; Účel zpracování: bezpečnostní ochrany nemovitostí ve vlastnictví hlavního města Prahy Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Rodné číslo; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: soudy, NBÚ, Policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP004 - zabezpečuje drobné, údržbové a opravné práce v nemovitostech ve vlastnictví hlavního města Prahy ve své správě, včetně zajišťování údržby a servisu majetku, pořízeného z fondu zaměstnavatele; Účel zpracování: vedení přehledu kontaktů pro různé druhy činností Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Telefonní číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: nemáme Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: není Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP006 - podílí se na racionalizaci a mechanizaci kancelářských a jiných prací, zajišťuje kopírovací práce a telekomunikační služby včetně zajišťování rutinní údržby telefonních ústředen a pevných linek, zlepšuje pracovní prostředí a v tomto směru organizuje a koordinuje práce odborů Magistrátu; Účel zpracování: Přehled kontaktů pro případ operativního řešení např. havarijních situací atd. Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: Není Stanovený právní titul pro zpracování osobních údajů: 3 - Splnění smlouvy nebo uzavřením smlouvy Příjemci osobních údajů: Není Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP008 - provádí výkon pokladní služby pro orgány hlavního města Prahy; Účel zpracování: pokladní služby Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Bankovní účet fyzické osoby; Zaměstnanecké smlouvy; Mzdový výměr; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: ne Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP009 - zabezpečuje na základě podkladů předložených odborem Magistrátu proplácení náhrad zaměstnancům; Účel zpracování: v souladu s nařízením ředitele č. 14/2007 je odbor SLU prvotní zpracovatel žádostí o proplácení cestovních náhrad. Po vyčíslení náhrady je předáno odboru UCT. Následně odbror SLU zajišťuje proplácení cestovních příkazů. Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Oddělení, kde je osoba zaměstnána Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: s10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: NE Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP010 - zabezpečuje v rámci Magistrátu agendu v řízení o náhradě škody včetně odpisů hmotného majetku ve vlastnictví hlavního města Prahy; Účel zpracování: řízení o náhradě škody včetně odpisů hmotného majetku Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Bankovní účet fyzické osoby; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: soudy, policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP011 - zabezpečuje instalaci a provoz snímačů pro docházkový systémv rámci Magistrátu ; Účel zpracování: instalace a provoz snímačů pro docházkový systémv rámci Magistrátu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Telefonní číslo Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: po dobu pracovního poměru Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: soudy, policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP012 - zajišťuje po technické stránce provoz jednotného bezpečnostního systému Magistrátu ; Účel zpracování: provoz jednotného bezpečnostního systému Magistrátu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: Policie ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP016 - zabezpečuje agendu související s využitím prostor a zařízení určených pro potřeby orgánů hlavního města Prahy ve správě Magistrátu; Účel zpracování: využití prostor a zařízení určených pro potřeby orgánů hlavního města Prahy ve správě Magistrátu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Bankovní účet fyzické osoby Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: digitální archivace po dobu 10 let Stanovený právní titul pro zpracování osobních údajů: 3 - Splnění smlouvy nebo uzavřením smlouvy Příjemci osobních údajů: ne Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP017 - zabezpečuje úkoly Magistrátu související s agendami bezpečnosti a ochrany zdraví při práci a požární ochrany (dále jen „BOZP a PO"), včetně agendy odškodňování pracovních úrazů; Účel zpracování: evidence úrazů, hlášení a zasílání záznamů o úrazu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Poštovní adresa ; Pohlaví; Nadřízená osoba Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: V10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Příslušná zdravotní pojišťovna, ČSSZ, Česká pojišťovna a.s. (uzavřená smlouva o pojistce zaměstnavatele) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP018 - zabezpečuje úkoly související se zajištěním závodní preventivní péče zaměstnanců ; Účel zpracování: zajištění závodní preventivní péče zaměstnanců Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Funkční zařazení; Oddělení, kde je osoba zaměstnána; Pracovní zařazení; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: po dobu pracovního poměru Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: soudy ČR Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP020 - zajišťuje plnění povinností zaměstnavatele, zejména v oblasti odebírání výrobků od zaměstnavatelů zaměstnávajících více než 50 % zaměstnanců se změněnou pracovní schopností; Účel zpracování: plnění povinností zaměstnavatele, zejména v oblasti odebírání výrobků od zaměstnavatelů zaměstnávajících více než 50 % zaměstnanců se změněnou pracovní schopností; Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; IČ / DIČ; Emailová adresa fyzické osoby; Telefonní číslo ; Bankovní účet fyzické osoby Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: digitální archivace po dobu 10 let Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: nevím Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP021 - zabezpečuje provoz silničních motorových vozidel ve vlastnictví hlavního města Prahy ve správě Magistrátu, vydává a eviduje parkovací karty Magistrátu; Účel zpracování: zabezpečuní provozu silničních motorových vozidel ve vlastnictví hlavního města Prahy ve správě Magistrátu, vydává a eviduje parkovací karty Magistrátu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Nadřízená osoba; Oddělení, kde je osoba zaměstnána; Pracovní zařazení Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: po dobu trvání řízení (max. 5 let) Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: ne Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP022 - zajišťuje pojištění osob při zahraničních pracovních cestách schválených Radou; Účel zpracování: pojištění osob při zahraničních cestách schválených Radou Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Rodné číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: nepoužíváme, jen pouze na dobu trvání služební cesty Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: ERV, Evropská pojišťovna a.s., na základě uzavřené smlouvy Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP023 - zajišťuje pojištění zaměstnanců při zahraničních pracovních cestách schválených ředitelem Magistrátu; Účel zpracování: pojištění zaměstnanců na služební zahraniční cesty Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Rodné číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: nepoužíváme, jen pouze na dobu trvání služební cesty Stanovený právní titul pro zpracování osobních údajů: 7 - Oprávněné zájmy správce či třetí strany Příjemci osobních údajů: ERV, evropská pojišťovna, a.s. (na základě uzavřené smlouvy) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP024 - zabezpečuje vyvěšování dokumentů příslušejících odboru SLU hlavního města Prahy na úřední desce hlavního města Prahy ve spolupráci s odborem informatiky Magistrátu; Účel zpracování: vyvěšování dokumentů organizací HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Tituly; VIN; SPZ; Národnost Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: S10 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: ÚD je veřejně přístupná (v době vyvěšení dokumentu) Dochází k předávání zpracovávaných osobních údajů mimo státy EU: ANO Název úkonu/agendy: SLU/SP027 - zajišťuje program a realizaci tematických výstav v prostorách přízemí objektu Škodův palác v Praze 1, Jungmannova 29/35; Účel zpracování: komunikace se žadateli o výstavu Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Emailová adresa fyzické osoby; Telefonní číslo Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: nepodléhá Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: není Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP029 - vykonává úkoly přímého investora za hlavní město Prahu u akcí hrazených z kapitoly vnitřní správy rozpočtu hlavního města Prahy; Účel zpracování: splnění úkolů zadání akcí jednotlivým dodavatelům, hrazených z kapitoly vnitřní správy rozpočtu HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Diplomy o stupni vzdělání apod.; Čestná prohlášení (např. kvůli úvěru apod.); Absolvované školy a vzdělání; Specifické znalosti (technické, jazykové, vedení lidí apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Údaje o odsouzení za trestný čin Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: digitální archivace po dobu 10 let Stanovený právní titul pro zpracování osobních údajů: 3 - Splnění smlouvy nebo uzavřením smlouvy Příjemci osobních údajů: Soud, ÚOHS Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP032 - zabezpečuje provoz Pražského kontaktního centra Magistrátu (informační telefonní linky, informační kanceláře, firstname.lastname@example.org a další komunikační kanály užívané žadateli o informaci); Účel zpracování: poskytování informací veřejnosti prostřednictvím telefonu, e-mailu a Livechatu. Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; CV, motivační dopis ; Řidičský průkaz; Scan (např. uzavření manželství apod.); Tituly; VIN; SPZ; Národnost Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: S5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: věcně příslušným subjektům Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP035 - přijímá podání(žádosti, stížnosti a podněty) občanů hlavního města Prahy, kontroluje vyplnění příslušného tiskopisu; případně vyřizuje stížnosti podané ústně, včetně provedení písemného záznamu o stížnosti, její evidence a předání věcně příslušnému odboru Magistrátu či organizacím, jejichž zřizovatelem je HMP, dalšímu řízení; Účel zpracování: příjem stížností a jejich předání věcně příslušnému odboru či organizaci Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Fotografie s jasně rozlišitelným obličejem; Řidičský průkaz; Pohlaví; Národnost Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: 60.3 V/5 Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: není Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP036 - přijímá žádosti o poskytnutí informací, předává je věcně příslušným odborům Magistrátu k dalšímu řízení a současně odboru „Kancelář ředitele Magistrátu" k evidenci; Účel zpracování: příjem a prvotní evidence žádostí o poskytnutí informací dle z. č. 106/1999 Sb. do eSSL. Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Emailová adresa fyzické osoby; Poštovní adresa Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: V/5 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: NE Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP040 - poskytuje pomoc invalidním občanům hlavního města Prahy při vyřizování jejich záležitostí; Účel zpracování: evidence žadatelů o ověřování dokumentů (ověřování podpisů nebo listin) Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Poštovní adresa ; Fotografie s jasně rozlišitelným obličejem; Pohlaví; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.) Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: A10. S10 Stanovený právní titul pro zpracování osobních údajů: 4 - Splnění právní povinnosti Příjemci osobních údajů: Ministerstvo vnitra Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: SLU/SP048 - provádí příjem dokumentů v rámci Magistrátu (převzetí, prvotní třídění, označování a předávání věcně příslušnému odboru Magistrátu či věcně příslušné zvláštní organizační jednotce Magistrátu); Účel zpracování: příjem dokumentů od veřejnosti Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Scan osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Bankovní účet fyzické osoby; Účty na sociálních sítích ; Účty v systémech a aplikacích zaměstnavatelů; Fotografie s jasně rozlišitelným obličejem; Video záznam s jasně rozlišitelným obličejem; Odposlech; Odkaz na osobní web; Číslo zbrojního pasu; CV, motivační dopis ; Kmenový list zaměstnance; Rodný list (zaměstnanec, děti apod.); Zápočtový list; Řidičský průkaz; Zaměstnanecké smlouvy; Mzdový výměr; Certifikáty ; Diplomy o stupni vzdělání apod.; Hodnocení zaměstnance; Konkurenční doložka; Čestná prohlášení (např. kvůli úvěru apod.); Potvrzení (např. neuplatňování slevy na děti apod.); Scan (např. uzavření manželství apod.); Karta pojišťovny zaměstnance (scan); Tituly; Pohlaví; Přezdívka; Absolvované školy a vzdělání; Osobní stav (svobodný, vdaná, rozvedený, ovdovělý apod.); Ostatní web stránky s odkazy nebo informacemi na fyzickou osobu; Funkční zařazení; Nadřízená osoba; Odvětví, kde je osoba zaměstnána ; Oddělení, kde je osoba zaměstnána; Specifické znalosti (technické, jazykové, vedení lidí apod.); Vlastnictví majetku v dostupných DB (katastr apod.); Pojištění (Zdravotní, životní, domácnost, automobil, apod.); Smlouvy (o nájmu bytu, udělení plné moci, apod.); Databáze spotřebitelů; Členství v organizacích (sportovních, výzkumných apod.); Den vložení dat o fyzické osobě do souboru; Web cookies nebo IP adresa; VIN; SPZ; Pracovní zařazení; Rasový či etnický původ; Národnost; Politické postoje; Členství v odborech; Náboženské vyznání či filozofické přesvědčení; Sexuální orientace; Údaje o odsouzení za trestný čin; Údaje o zdravotním fyzickém stavu; Údaje o zdravotním psychickém stavu; Genetické údaje; Biometrické údaje za účelem jednoznačné identifikace fyzické osoby Zpracovatelé: 2 - Není zpracovatel Doba zpracování osobních údajů, skartační/archivační znak: dle konkrétních dokumentů - podatelna nepřiděluje skartační znaky, toto je věc věcně příslušného odboru Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: - Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE SLU/SP049 - zajišťuje správu datové schránky hlavního města Prahy (vyzvedávání a odesílání datových zpráv); Účel zpracování: vyzvedávání a odesílání datových zpráv); Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; IČ / DIČ; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa Zpracovatelé: 3 - Ministerstvo vnitra Doba zpracování osobních údajů, skartační/archivační znak: osobní údaje se uchovávají na dobu neurčitou Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: nevím Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Název úkonu/agendy: přijímá podání(žádosti, stížnosti a podněty) občanů hlavního města Prahy, kontroluje vyplnění příslušného tiskopisu; případně vyřizuje stížnosti podané ústně, včetně provedení písemného záznamu o stížnosti, její evidence a předání věcně příslušnému odboru Magistrátu - dokumenty, které věcně nepřísluší MHMP ani příspěvkovým organizacím zřizovaným HMP Účel zpracování: přijem podání(žádosti, stížnosti a podněty) občanů hlavního města Prahy, kontrola vyplnění příslušného tiskopisu; případně vyřizuje stížnosti podané ústně, včetně provedení písemného záznamu o stížnosti, její evidence a předání věcně příslušnému odboru Magistrátu - dokumenty, které věcně nepřísluší MHMP ani příspěvkovým organizacím zřizovaným HMP Rozsah zpracování osobních údajů (výčet zpracovávaných OÚ) Jméno a příjmení; Datum a místo narození; Rodné číslo; Číslo osobního dokladu; Emailová adresa fyzické osoby; Telefonní číslo ; Poštovní adresa ; Řidičský průkaz; Pohlaví; Národnost Zpracovatelé: 1 - Nevím Doba zpracování osobních údajů, skartační/archivační znak: po dobu trvání řízení (max. 5 let) Stanovený právní titul pro zpracování osobních údajů: 6 - Veřejný zájem nebo výkon veřejné moci Příjemci osobních údajů: dle charakteru stížnosti - např. krajský úřad, ministerstva, Dochází k předávání zpracovávaných osobních údajů mimo státy EU: NE Doba zpracování osobních údajů je vedena v souladu se Spisovým řádem Magistrátu hlavního města Prahy. Skartační znak („A", „S" nebo „V") vyjadřuje, jak má být po uplynutí skartačních lhůt s dokumenty a se spisy (razítky) naloženo, přičemž platí, že: - znak „A" označuje dokumenty a spisy trvalé dokumentární, historické nebo kulturní hodnoty, - znak „S" označuje dokumenty a spisy, které nemají trvalou hodnotu a po uplynutí skartační lhůty mohou být skartovány, tj. zničeny, avšak teprve poté, co Archiv hlavního města Prahy vydá příslušné skartační povolení; - znak „V" označuje dokumenty a spisy, u nichž nelze v době vzniku určit, zda mají trvalou hodnotu, po uplynutí skartační lhůty je správce příruční spisovny posoudí a navrhne k výběru za archiválie nebo ke zničení.
<urn:uuid:742c11a8-1d09-46c1-a90f-404333113bf3>
HuggingFaceFW/finepdfs/tree/main/data/ces_Latn/train
finepdfs
ces_Latn
80,408
Magatzem Dimmers DMX Circuits 13 - 18 Tercera barra Circuits 7 - 12 Segona barra Circuits 1 - 6 Primera barra Accés | ALTURA BARRAS | 4,59 mts | |--------------|-----------| | ALTURA CORTINAS | 3,75 mts | MEDIDAS DE PROYECCIÓN 3,80 x 2,28 mts
<urn:uuid:15b92756-6e38-4ebc-86d4-d82cd119ab2b>
HuggingFaceFW/finepdfs/tree/main/data/cat_Latn/train
finepdfs
cat_Latn
249
Kurztitel IAKW – Finanzierungsgesetz Kundmachungsorgan BGBl. Nr. 150/1972 zuletzt geändert durch BGBl. Nr. 223/1985 Typ BG §/Artikel/Anlage § 6 Inkrafttretensdatum 01.07.1985 Index 12/05 Sonstiges Internationale Angelegenheiten Text B. Österreichisches Konferenzzentrum § 6. (1) Der Bund hat mit 1. Juli 1985 die Planung, Errichtung, Erhaltung, Verwaltung, den Betrieb sowie unter Bedachtnahme auf § 1 Abs. 2 die Finanzierung des Österreichischen Konferenzzentrums an eine gesonderte Aktiengesellschaft mit dem Firmenwortlaut Österreichisches Konferenzzentrum Wien, Aktiengesellschaft zu übertragen. (2) Die Aktiengesellschaft ist berechtigt, sich zur Erfüllung ihrer Aufgaben nach Abs. 1 der Aktiengesellschaft gemäß § 1 zu bedienen. Schlagworte Bau Zuletzt aktualisiert am 11.05.2017 Gesetzesnummer 10000512 Dokumentnummer NOR12007538 alte Dokumentnummer N1197212910P
<urn:uuid:07280d5c-b1a7-4250-9e1a-6b1582972ad7>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
894
Orrore sull’Orient Express DOCUMENTAZIONE DEGLI INVESTIGATORI (SOLO TESTO) Gillan, Morrison, Willis, Hagger, Love, Caleo, Waters, Rios, M. Anderson, P. Anderson, Watts, Mason, Conyers, Lay, McAlea e Amici Cosa Sai del Tuo Amico, il Professor Smith Il professor Julius Arthur Smith, Dottore in Lettere, Dottorato di Ricerca, ha 59 anni, un inglese dalla corporatura robusta, uno studioso che ora si dedica unicamente alla ricerca. È famoso per le sue basette e per i folti baffi arricciati che gli danno l’aria di un simpatico tricheco. Le sue disgustose preferenze in fatto di tabacchi (in particolare il suo preferito, un pessimo Balkan Sobranie color ossidiana), le sue storie erudite dopo cena e la sua risata cordiale sono i suoi marchi di fabbrica. Il professor Smith ha vissuto e viaggiato a lungo nel continente. Le sue specialità sono le lingue europee e l’archeologia: ha conseguito il Litt.D. presso l’Università di Vienna. In passato, ti ha aiutato con delle traduzioni complesse. Ora la sua attenzione si è spostata su questioni parapsicologiche, con eccellenti risultati. Il professore possiede una casa in St. John’s Wood, dove vive quando si trova a Londra. Attualmente è in fase di ristrutturazione, per ampliare la biblioteca, per cui gli investigatori devono alloggiare in albergo. Quando è a Londra, Smith trascorre la maggior parte del tempo tenendo lezioni all’Università di Londra o leggendo nella biblioteca del British Museum. È membro dell’Oriental Club, ma non vi si reca tanto quanto vorrebbe. La sua casa di campagna è una tenuta non lontana da Cambridge. Margaret, sua moglie, è morta nel 1919. Al momento il suo domestico Beddows, che è allo stesso tempo amico, assistente e confidente, è la sua unica compagnia. UOMO MUORE TRE VOLTE IN UNA NOTTE Tre corpi in hotel. Ogni uomo ha la stessa identità. Tre uomini assassinati, ognuno dei quali è stato identificato come il signor Mehmet Makryat di Islington, sono stati rinvenuti ieri sera in un hotel di Londra. Sono stati tutti pugnalati al cuore. I corpi sono stati trovati dalla cameriera del Chelsea Arms Hotel. Anche la stanza era registrata a nome del signor Makryat. Documenti attendibili identificano il trio come un unico uomo, il signor Makryat, un commerciante turco di oggetti d’arte e d’antiquariato che opera in città. Le vittime si assomigliano e ognuna di loro si è spacciata per il signor Makryat dopo essere giunta a Londra separatamente dalle altre tre giorni fa. Cosa ambigua, del vero signor Makryat, o almeno l’uomo descritto dai negozianti limitrofi come il signor Makryat, non ci sono tracce. La polizia chiede che si faccia vivo. I passaporti di questi cittadini turchi attestano i viaggi indipendenti compiuti da ciascuno di loro in tutto il mondo negli ultimi tre anni. L’ispettore Fleming di Scotland Yard non è in grado di spiegare il senso di questo bizzarro mistero, ma desidera parlare con qualsiasi altro Mehmet Makryat ancora in vita. Documentazione: Londra 3 CASA DEL PROFESSORE IN FIAMME Si teme per la sua incolumità. Il professor Julius Arthur Smith, figura nota nel mondo accademico, è oggi ricercato in seguito all'incendio della sua casa di St. John's Woods, avvenuto in circostanze misteriose. È scomparso anche il domestico del professore, il signor James Beddows. Alcuni testimoni hanno visto un uomo che assomigliava a Beddows fuggire dalla casa poco prima che divampasse l'incendio. Chiunque sia a conoscenza di dove si trovino il professor Smith o il signor Beddows è pregato di contattare il sergente Rigby della Divisione Incendi Dolosi di Scotland Yard. Documentazione: Londra 4 Venite subito. Non mi resta molto tempo. Per l'amor di Dio, che nessuno vi segua. J.A. Smith. Documentazione: Londra 6 Al Senza Pelle non vi sarà diniego Documentazione: Londra 5 Il Simulacro di Sedefkar è un manufatto occulto dal potere malefico. Fu smembrato e disperso in tutta Europa alla fine del XVIII secolo. Recuperate i frammenti e distruggetelo. La statua fu smembrata a Parigi poco prima della Rivoluzione. Una parte di essa potrebbe trovarsi ancora in Francia. Il proprietario era un nobile, il conte Fenalik. I soldati di Napoleone ne portarono uno frammento a Venezia quando la invasero. Un altro frammento giunse a Trieste nello stesso periodo. Il suo destino ci sfugge. Cercate Johann Winckelmann una volta arrivati in città. Un frammento potrebbe trovarsi nel Regno dei Serbi, Croati e Sloveni. Iniziate dal Museo Nazionale di Belgrado. Il curatore si chiama Milovan Todorovic. Un frammento venne smarrito nei pressi di Sofia durante la guerra bulgara del 1875. All'epoca, le cose di valore venivano nascoste agli invasori, quindi potrebbe essere sepolto nei dintorni. Un frammento era in circolazione a Parigi subito dopo la Grande Guerra e fu venduto a una persona di Milano nel 1919. L'unico modo sicuro per distruggere la statua è nella sua dimora originaria, un luogo di Costantinopoli noto come la Moschea Evitata. Un rituale per distruggerla completamente è incluso in un insieme di documenti noti come le Pergamene di Sedefkar. Documentazione: Londra 7 PROFESSORE IN BUONE MANI STOP BUONA FORTUNA STOP Documentazione: Londra 9 SALISBURGO STOP ARCHIVI DEL CONTE COLLEREDO STOP NESSUNA INFORMAZIONE STOP Documentazione: Londra 8 ESAMINATI DOCUMENTI DEL DEUTSCHEN ORDEN STOP CONFERMATO CHE LA STATUA PUÒ ESSERE DISTRUTTA SOLO QUANDO ASSEMBLATA STOP SERVONO PERGAMENE SEDEFKAR STOP Documentazione: Londra 10 OGGETTI ALLA SOCIETE GENERALE DI COSTANTINOPOLI STOP NOME DEL PROFESSORE STOP UOMO SCOMPARE IN UNA NUVOLA DI FUMO Combustione Umana Spontanea? Legame con il Triplice Omicidio? La polizia sta indagando sulla scomparsa del signor Henry Stanley, 41 anni, di Stoke Newington, la cui scomparsa è stata denunciata ieri sera dalla sua padrona di casa, la signora Constance Atkins. La signora sostiene di aver sentito un grido provenire dalla stanza del signor Stanley al piano superiore alle otto di sera. L'uomo non ha risposto quando la padrona ha bussato alla sua porta e, quando l'ha aperta, la stanza era piena di fumo e di lui non c'era traccia. Il signor Stanley non è sposato, ed è un noto appassionato di treni ed è membro della London Train Spotter's Association. La sua scomparsa potrebbe essere un caso di combustione umana spontanea. La polizia si è rifiutata di commentare quest'ipotesi. Casi simili sono stati segnalati in Inghilterra all'inizio di questo secolo. Il caso noto più recente è quello del signor J. Temple Thurston, morto carbonizzato nella propria casa a Dartford, nel Kent, nel 1919. È stato rivelato che un trenino rinvenuto sulla scena della scomparsa era stato acquistato la settimana scorsa nel negozio di Mehmet Makryat. Questo giocattolo per bambini potrebbe aver scatenato l'incendio. I lettori ricorderanno che, a inizio settimana, sono stati ritrovati tre corpi, tutti identificati come Mehmet Makryat, in una stanza d'albergo di Chelsea. La polizia non ha escluso la possibilità di un collegamento tra i due casi. Il Diario del 1893 del Professor Smith Il diario del 1893 del professor Smith racconta il suo primo anno come professore al City and Guilds College dell'Università di Londra. Include descrizioni di lezioni, aneddoti ascoltati all'Oriental Club e appunti dei suoi studi di storia e letteratura antropologica e dell'occulto. La maggior parte del diario riguarda una strana vicenda che coinvolge un suo amico, il professor Demir di Costantinopoli, e un viaggio intrapreso da alcuni amici londinesi sull'Orient Express per risolvere la faccenda. La scrittura di Smith si fa difficile da leggere in questa parte del diario, come se gli eventi lo avessero turbato. Nella rilegatura del volume sono infilati telegrammi e lettere del professor Demir. Documentazione: Fez 2 Mio Caro Smith, Fin dall'inizio, il timore che circondava il Fez Rosso Sangue era palpabile. Il crudele omicidio del collezionista di fez di Rotherhithe che possedeva il fondamentale testo Il Fez Sussurrante, il terribile destino di Pook, il mio sventurato studente, tutto faceva pensare a un manufatto di notevole potere e a una setta spietata votata al suo utilizzo. Tuttavia, anche sapendo quanto sopra, non dovresti rimproverarti per l'orrore che il nostro tentativo di distruggere il Fez Rosso Sangue ha suscitato in tutti noi. Certo, non avrei mai dovuto lasciare che i tuoi amici andassero incontro a un pericolo tanto spaventoso, ma tutto quello che avevo in mente era che quell'orribile oggetto, il Fez Rosso Sangue, doveva essere portato in fretta da me per distruggerlo. Se avessi saputo che il Fez poteva duplicarsi o che la stessa setta che lo venerava sarebbe salita sul treno assieme ai tuoi strenui alleati, avrei naturalmente agito in modo diverso. A quel punto, tuttavia, mio figlio era stato rapito dai cosiddetti Figli del Fez Rosso Sangue e dai loro turpi capi, la folle concubina dell'harem Nisra, la Figlia del Fato, e quel mostruoso impostore di Menkaph, in passato alleato del malvagio Selim Makryat. I poteri del Fez (le ombre assassine, il risucchio della vita e dell'anima, la creazione a partire dalle sue vittime di orribili parodie non morte) non erano nulla in confronto al terrore e all'orrore del suo orribile creatore soprannaturale. I sacrifici che tutti noi abbiamo fatto sono stati tremendi e il mio cuore giace in frammenti; ma, per avere l'occasione di annientare il temibile manufatto e, di conseguenza, impedire l'avvento nel nostro mondo di quell'essere spaventoso di cui non oso fare il nome, non avevamo altra scelta. Documentazione: Fez 3 MI TROVO AL N. 5 DI DURWARD STREET, A WHITECHAPEL. PER L'AMOR DI DIO, VENITE. PORTATE UNA PISTOLA. J.A. Da: Demir A: Smith TENUTO D'OCCHIO ATTIVITÀ DELLA SETTA STOP UN UOMO DI NOME MENKAPH VENUTO IN POSSESSO DI TERribILE OGGETTO CONosciuto COME FEZ ROSSO SANGUE STOP DIRETTO IN INGHILTErrA PER MISTERIOSO SCOPO STOP UNO DEI MIEI STUDENTI A LONDRA SI È OFFERTO DI SEGUIRLO E TENERMI INFORMATO FINE MESSAGGIO Da: Demir A: Smith MIO STUDENTE POOK HA DECISO DI PROVARE A RUBARE FEZ STOP HO AVVERTITO CHE MENKAPH È PERICOLOSO, MA NON MI ASCOLTA STOP TEMO PER SUA SICUREZZA STOP HA TUO INDIRIZZO DI LONDRA STOP PER FAVORE AIUTALO SE PUOI FINE MESSAGGIO Da: Demir A: Smith FEZ MOLTO PERICOLOSO STOP IMPOSSIBILE DISTRUGGERLO STOP NON INDOSRARLO PER ALCUN MOTIVO STOP CHIEDI AD ALLEATI FIDATI DI PORTARLO A COSTANTINOPOLI PRIMA POSSIBILE STOP USERÒ MIE CONOSCENZE PER DISTRUGGERLO STOP AVVERTILI IN MODO CHIARO CHE LORO VITE POTREBBERO ESSERE IN PERICOLO STOP LI INCONTRERÒ ALLA STAZIONE SIRKECI FINE MESSAGGIO Storia del Fez Rosso Sangue "Il Fez Rosso Sangue è sempre stato un oggetto malvagio, creato in nome di poteri indicibili, poteri così terribili che nessun uomo sano di mente oserebbe mai pronunciare il loro nome. Il Fez è stato menzionato per la prima volta nelle corti ottomane intorno al 1550, ma alcuni suggeriscono che sia più antico e risalga all'antica Grecia. Si narra che abbia il potere di condannare le menti e i destini degli uomini alla mercé di un antico male, più antico del tempo stesso." Ricompense "Secondo alcuni, bere, fare il bagno, o semplicemente versare il sangue di un principe mentre indossa il Fez, garantirebbe i favori principeschi degli Dei Oscuri, secondo altri è la chiave dell'immortalità. Ma queste entità oscure potrebbero considerare i loro principi in modo del tutto diverso dal nostro." Un Monito Prestate attenzione a questo avvertimento: indossare questo abominio chiamato Fez Rosso Sangue porterà una calamitosa rovina su di voi, perché offrirete la vostra anima e la vostra mente alla volontà ultraterrena del Fez e dei suoi terribili padroni. Solo i più abili nelle arti oscure possono sperare di sopravvivere a una cosa del genere e forse, per loro, il prezzo è perfino più terribile. È possibile controllare il Fez e addirittura fermare il suo terribile scopo. Chi è alla ricerca di conoscenze oscure dovrebbe consultare il volume Il Fez Sussurrante." L'OMICIDIO DEL FEZ A ROTHERHITE Vile Omicidio di un Anziano Collezionista di Fez. Banda Criminale Ancora in Libertà. La notte di giovedì scorso, l'anziano collezionista di fez Joshua Devore, settantenne, che abitava al 3 di Blithering Lane, a Rotherhithe, è stato assassinato durante quello che la polizia sostiene essere un furto con scasso avvenuto nella sua residenza. Descritto come eccentrico ma sostanzialmente innocuo, il signor Devore è stato brutalmente ucciso con un corpo contundente e la sua casa è stata messa a soqquadro. Il signor Devore era noto per la sua collezione di fez provenienti da tutto il mondo, oltre che per la letteratura e i cimeli relativi ai fez. Sembra che nessun fez sia stato rubato dalla vasta collezione del signor Devore di questi particolari copricapi. Una teca di vetro contenente esempi di letteratura dedicata ai fez costituita da libri e manoscritti rari è stata rovesciata e frantumata. La polizia sospetta che il danno sia stato commesso in seguito a una disperata ricerca di denaro da parte dei colpevoli. L'ispettore Kendall di Scotland Yard ritiene che sia opera di una banda di ladri locali che terrorizza i dintorni: "Queste canaglie si fanno sempre più audaci. Era solo questione di tempo prima che qualcuno ci lasciasse le penne". L'ispettore ha assicurato al giornalista del Times che la banda verrà arrestata e subirà la piena applicazione della legge. I residenti di Rotherhithe sono invitati a mettere in sicurezza le proprie abitazioni durante la notte e a prendere le dovute precauzioni nei confronti della propria persona. Menkaph ha una potente influenza sui creduloni. Porta con sé il Fez Rosso Sangue descritto dal professor Demir in una comune cappelliera di colore marrone sporco. Né lui né i suoi scagnozzi sembrano intenzionati a toccarlo. ... Le mie ricerche alla biblioteca del British Museum mi hanno impegnato di tanto in tanto, ma i miei frequenti controlli su Menkaph e i suoi scagnozzi rivelano che le cose non sono cambiate. Stanno sorvegliando una casa al numero 3 di Blithering Lane a Rotherhithe. Ho chiesto in giro e ho saputo che ci vive un collezionista di fez! Il professor Demir dice che dovrei essere cauto, ma ho evitato con facilità gli idioti che Menkaph ha messo a guardia del posto. Sono sicuro che nessuno mi ha notato. ... Menkaph ha intenzione di partire presto con l'Orient Express alla volta di Costantinopoli. L'ho visto acquistare i biglietti per lui e per i suoi sgherri, ma non sono riuscito a stabilire quando intendono partire. Sembra che voglia ottenere qualcos'altro prima di lasciare Londra. Non può essere il Fez, visto che è arrivato a Londra con quello. ... Ho deciso di rubare il Fez da sotto il naso di Menkaph. Mentre lui è impegnato a Rotherhithe, mi introducirò nella sua stanza e ruberò il Fez Rosso Sangue! Con questo bottino potrò recarmi in fretta a Costantinopoli e consegnarlo al professor Demir. Mi immagino la sua espressione! Tutti i piaceri di tutti gli harem di tutti i mondi saranno tuoi Come Diventare un Vero Padrone del Fez Dovete abbandonarvi al Fez Rosso Sangue prima che esso vi ricompensi. Solo indossando il Fez, rischiando che la vostra volontà sia debole e che non siate degni e che verrrete quindi consumati da esso, potrete emergere provati e trionfanti e in grado di incanalare i suoi grandiosi e temibili poteri. La Creazione di Altri Fez Una volta dominato il Fez, è possibile generarne altri che hanno lo stesso potere del primo. Ciò richiede che il primo portatore sacrifichi una piccola parte dell’anima, propria o altrui. In tal modo, ogni giorno può essere generato un altro Fez, all’infinito. A ogni nuovo portatore, il Padrone può ottenere un potere più vasto di quanto si possa credere. Sfidare il Padrone Attenzione! Altri individui che acquisiscono un Fez possono cercare di affermarsi come suoi Padroni. Seguite il mio consiglio e tenete un piccolo gruppo di accoliti con indosso un Fez, che potrete sfruttare al momento della sfida. Il Controllo dei Dannati Se non controllato, il Fez distruggerà chi lo indossa. Una volta accaduto, la cosa in cui il portatore del Fez si trasforma può essere controllata da altri Padroni del Fez più potenti. Saranno schiavi senza cervello, piegati unicamente ai desideri del Padrone. Il Portale e la Chiave Il Fez Rosso Sangue è il Portale e la Chiave. Se il sangue di un principe viene versato, il Fez può richiamare ciò che attende all’Esterno. Il Conte era come un sole tra di noi, diffondeva la sua luce e faceva gioire tutti dei suoi piaceri. Si dice che le sue feste fossero le più sontuose e lascive mai viste nella nostra città... Fu allora che ci si rese conto che stava accadendo qualcosa di molto malvagio, e la Regina si infuriò. Gli uomini del Re fecero irruzione nella casa, che venne distrutta, e il Conte fu arrestato... Rapporto investigativo del capitano Louis Malon Giugno 1789 Quando siamo arrivati, il festino era ancora in corso, e uomini e donne si agitavano come cani rabbiosi. Li abbiamo cacciati via, arrestando quelli che non erano in grado di garantire per se stessi. Ho mandato sei uomini a catturare il Conte, mentre io mi sono addentrato nelle stanze sotterranee. Non posso descrivere ciò che ho visto, se non che eravamo entrati in una fogna ed era l’Inferno. Dio ci protegga. In diverse stanze abbiamo trovato molti strumenti di tortura. Uno dei miei uomini ha scoperto una strana Vergine di Norimberga, chiusa. Temendo di trovarla occupata, l’abbiamo aperta, ma era vuota. Fu un giorno funesto quando nobili parassiti come Pfenalik piombarono su Poissy, e se Dio non lo punirà per i suoi peccati, lo farà di sicuro il Re. È con la giustizia nel cuore che ho dato l’ordine di bruciare la casa e coloro che erano rimasti di sotto, sebbene il Conte ululasse e gridasse come se la sua stessa anima stesse bruciando. Poi lo abbiamo condotto nel luogo che sarebbe stato la sua nuova casa. Che possa marcire lì. GIUGNO 1789 Due notti dopo, i soldati del Re si sono recati numerosi alla villa del Conte, per porre fine ai suoi eccessi. Dopo aver bruciato la villa, hanno condotto il Conte davanti al viceré, il quale ha ordinato a me presente, di esprimere un parere. Il conte Fenalik urlava e si contorceva: era facile constatare che era impazzito. Essendo un nobile e un folle, non poteva essere giustiziato, così ho suggerito che un sovrano misericordioso avrebbe trasferito Fenalik a Charenton. Il viceré ha deciso evidentemente di seguire il mio consiglio e ha disposto che Fenalik venisse condotto lì. In seguito, il Re ha espresso la sua approvazione e la disposizione è stata resa definitiva. L’ultima notizia che ho avuto di lui è che era stato rinchiuso nel seminterrato, perché aveva aggredito altri pazienti. DOTT. ETIENNE DELPLACE Siamo in lutto per la perdita del nostro stimato direttore, il dottor Etienne Delplace, un uomo di altissima caratura professionale e un vero pioniere nel campo della neurologia. La sua perdita per un tragico incidente è un duro colpo. Noi dell’ospedale porgiamo le nostre più sentite condoglianze alla sua famiglia, sperando che, col tempo, possa superare il dolore. Il dottor Delplace mancherà alla comunità di Charenton, a Parigi in generale, alla gloriosa nazione francese e agli uomini civili di tutto il mondo. - Dottor François Leroux, direttore ad interim. A chi di dovere, mi rendo conto di essere un perfetto sconosciuto e che questa lettera potrebbe non avere alcun significato per voi. Mi chiamo Edgar Wellington e sto conducendo delle ricerche sulla storia di una statua nota più comunemente come Simulacro di Sedefkar. Sono di recente entrato in possesso di una vecchia pergamena che contiene un’intrigante descrizione dell’oggetto. Ciò ha suscitato il mio interesse e ora sto cercando di rintracciare il Simulacro. La mia ricerca mi ha condotto al vostro indirizzo. Il nome probabilmente non ha alcun significato per voi ma, grazie alle mie ricerche, ho appreso che l’ultima collocazione nota dell’opera d’arte era la casa che sorgeva sul vostro terreno alla fine del XVIII secolo. La statua era un manufatto arabo unico, andato perduto durante gli eventi del 1789. Il suo ultimo proprietario fu un nobile tedesco che viveva dove oggi abitate voi. Per favore, vi chiedo se, nel caso abbiate sentito qualche racconto locale su questo oggetto, o magari abbiate trovato qualche traccia della vecchia casa e dei suoi beni nella vostra proprietà che potrebbe fornire un indizio sul destino dell’oggetto, sareste così gentili da inviarmi una sintesi delle informazioni. Mi scuso per la natura piuttosto singolare della mia richiesta, ma sento di dover seguire qualsiasi pista mi sia rimasta. Spero non vogliate indugiare più di tanto su questo particolare. I miei più cordiali saluti, Edgar Wellington Rue St. Etienne 50 Losanna, Svizzera Ieri sera si è verificato un evento sconcertante. Un infermiere, un certo Guimart del quarto reparto, è sceso nelle cantine senza autorizzazione e lì, dopo aver subito una dolorosa ferita al braccio destro, ha perso i sensi. Un altro infermiere, P. Mandrin, ha iniziato a cercare Guimart e, dopo un po', lo ha trovato riverso sul pavimento in grave stato di shock. Le cure sono state tempestive ed efficaci, ma, dopo aver ripreso conoscenza questa mattina, Guimart ha iniziato a farneticare di essere stato aggredito da un cadavere. Per il momento l'ho fatto sistemare nella stanza 13 e ho avvisato la sua padrona di casa circa la sua indisposizione. Ahime, con Guimart c'era un altro uomo, sconosciuto a questo istituto psichiatrico e in condizioni fisiche tragiche. Molti seri interrogativi devono trovare risposta. ... Ho iniziato a interrogare Guimart sullo straniero. È un paziente? Come si chiama? Da quanto tempo Guimart lo teneva lì sotto? Aveva tenuto prigioniero lo sconosciuto nelle cantine per molto tempo? Abbastanza a lungo da far sì che la malta che sigillava la stanza si fosse indurita così tanto? Gli aveva dato da mangiare? Come era sopravvissuto? Ho intenzione di trasferire lo sconosciuto nella mia ala privata, trattandolo per ora come un derelitto insignificante fino a quando non emergeranno altre prove. ... Perfino in un letto pulito l'aspetto dello straniero è spaventoso. Se gli viene somministrata una piccola quantità di brodo, si limita a rigurgitarlo. Non si nutre, ma sopravvive in uno stato catatonico. L'elettroshock potrebbe rianimarlo? ... Dopo diverse applicazioni, lo sconosciuto si è risvegliato, ma è tanto debilitato da non potersi muovere. Si lamentava e implorava in forme diverse e molto antiche di greco e latino... storie di città che andavano in rovina e altre cose ancora più oscure. Che uomo misterioso! È quasi più facile pensare di aver attinto a qualche forma di mente collettiva o memoria razziale. Dopo alcune annotazioni irrilevanti, il diario si conclude. Tutte le annotazioni citate sono datate poco prima della morte di Delplace. --- **Documentazione: Reami del Sogno 1** **Regolamento** 1) I sognatori umani, o i sognatori un tempo umani il cui io della veglia è ormai defunto, possono viaggiare gratuitamente sull'Express dei Reami del Sogno. 2) Per viaggiare sull'Express dei Reami del Sogno, è necessario salirvi mentre si dorme sull'Orient Express. Dopo aver dormito sull'Orient Express, si può far ritorno all'Express dei Reami del Sogno in qualsiasi momento, da qualsiasi letto del Mondo della Veglia. 3) Una volta saliti a bordo dell'Express dei Reami del Sogno, si ritorna sullo stesso Express anche se sono passati giorni, settimane, mesi, o anni. 4) Il biglietto può essere utilizzato per viaggiare tra le città servite dal treno: Ulthar, Dylath-Leen, Zar, Aphorat, Thalarion, Xura, Aira, Sona-Nyl e Serannian. 5) Se si rimane sul treno oltre Serannian, si presume che si voglia gettare le proprie paure nel Gorgo di Nodens. Oltre Serannian non c'è ritorno. Alla fine del viaggio si torna al Mondo della Veglia. 6) Dopo aver visitato il Gorgo di Nodens, non è possibile salire di nuovo a bordo del treno, nemmeno come cliente pagante, perché ciò annullerebbe il sacrificio compiuto. È un patto suggellato con Nodens. Non è negoziabile. IL CUORE DEGLI INNAMORATI Un'orribile leggenda minore che si racconta in città è quella dello Stregone e della Megera. Lo Stregone si sposò tardi e incautamente. Come ricompensa per la sua stupidità, un giorno sorprese la giovane moglie in compagnia del proprio amante. Furioso, invocò i poteri oscuri e fece a pezzi l'infortunata coppia. Strappò i cuori dai loro corpi e li ridusse in cenere, giurando che non avrebbero trovato pace nemmeno nella morte. I loro corpi martoriati vennero gettati in pasto ai cani. Non aveva fatto i conti con la madre della ragazza morta, una Megera incredibilmente malvagia, che pregava ogni giorno davanti alla chiesa per ottenere vendetta. Le sue lacrime furono ascoltate, sebbene non si sappia con certezza se la fonte della risposta alle sue preghiere fu davvero divina. Si sussurrò che la chiesa fosse stata edificata su fondamenta più antiche e più oscure, innalzate dagli antichi Romani per venerare le loro divinità pagane. Un giorno, la Megera si presentò davanti alla chiesa con in mano un rubino scintillante, grande come un pugno chiuso e dalla forma particolare, che sembrava formato da due cuori di innamorati intrecciati. Lo Stregone, alla vista della pietra, fu divorato dalla brama di impossessarsene. Ordinò ai suoi uomini di recuperarla, ma la Megera la nascose nel proprio petto. Lo Stregone la fece perquisire, ma la pietra era svanita e, perfino sotto tortura, la donna non rivelò il suo nascondiglio. Fu condannata per stregoneria e bruciata sul rogo nella piazza antistante la chiesa. Mentre veniva avvolta dalle fiamme, lo Stregone le chiese ancora dove si trovasse la pietra. Consumata dal fuoco, alla fine dischiuse le labbra: "Lodio è più forte dell'amore", gridò. "E la morte è più forte della vita. La troverai solo nei tuoi sogni", disse allo Stregone. E così, morì. Lo Stregone impazzì a causa della brama per quella pietra perduta. Nei suoi ultimi giorni di vita, furibondo, si chiuse nella sua torre. Credendo di aver trovato la risposta alla sfida lanciatagli della donna, si arse vivo nella sua stessa cripta. Alcuni affermano che i due non trovino pace e che è ancora possibile vederli nelle notti buie, mentre si inseguono a vicenda tra le nubi temporalesche. La Megera tiene ancora in alto tra le mani il suo tesoro scintillante e grida di gioia per la vano ricerca dello Stregone: "Lodio è più forte dell'amore", grida. "E la morte è più forte della vita!" Di certo, nessuna Provvidenza misericordiosa consentirebbe l'esistenza di tali orrori. QUI UN TEMPO SORGEVA AIRA DALLE CUPOLE DORATE, IL SOGNO DEL GIOVANE PASTORE IRANON. Fintanto che Iranon cercò Aira, rimase eternamente giovane e, per tutto quel tempo, Aira prosperò. Quando Iranon perse la speranza, invecchiò in una notte e si addentrò nelle sabbie mobili di Bnazi. Quella notte, Aira e tutta la sua gente scomparvero. Oh, sognatori, tenetevi stretti i vostri sogni, o anche loro periranno. MORTE DI UN TRAFFICANTE DI ARMI Impressionante lascito in beneficenza. Enigmatiche Ultime Parole di Un Milionario. È triste dovere di questo giornale riferire che il milionario M. Karakov è deceduto l'altro ieri nella sua villa di Montecarlo. I medici hanno riferito che il suo cuore dava da tempo segni di cedimento e, alla fine, si è fermato. M. Karakov si era arricchito con la vendita di munizioni. Si dice che controllasse in segreto una vasta rete di società affiliate, tanto che molte nazioni, pensando di scegliere tra venditori rivali, sceglievano in realtà tra due società controllate dallo stesso Karakov. La sua ricchezza era tale che si pensa abbia guadagnato una sterlina per ogni soldato ucciso durante la Grande Guerra. Sul letto di morte, M. Karakov ha modificato il suo testamento, lasciando in eredità i suoi milioni in beneficenza. Quando gli è stato chiesto perché avesse cambiato idea, il moribondo ha risposto: "È tutto merito dei miei amici sul treno". Gli eredi intendono impugnare il nuovo testamento per infermità mentale. 3 novembre 1920—Sarebbe stato meglio per la nostra famiglia se fossimo morti in guerra. Gli eroi morti sono più utili dei vivi spezzati. 5 marzo 1921—Ora siamo in Svizzera. Qui possiamo vivere in pace. 17 settembre 1921—L'eloquio del Duca non ha eguali. Quando Io ascolto, dimentico i miei pensieri. 10 novembre 1921—I libri che mi ha prestato il Duca mi hanno aperto gli occhi. Forse quella mia vecchia pergamenaraba racchiude misteri ancora sconosciuti. 2 febbraio 1922—Ho ricevuto la traduzione della pergamenadi Malon. Mi chiedo se questo "Simulacro di Sedefkar" esista ancora. 25 giugno 1922—La pista si interrompe nel 1789. Ho scritto ai proprietari della casa del Conte. Vorrei visitarla, ma non posso lasciare William da solo. 3 ottobre 1922—Il Duca mi ha dato qualcosa per l'insonnia. Ho dormito benissimo e ho fatto un sogno molto vivido della Losanna del passato. 12 novembre 1922—Due notti fa, mentre dormivo, ho tenuto in mano un bottone di ottone e l'ho lasciato nella Losanna del Sogno. Quando mi sono svegliato era sparito. La notte successiva l'ho ripreso nel sogno e mi sono svegliato con il bottone in mano. 1 gennaio 1923—Non nutro alcuna speranza per il nuovo anno. Le mie ricerche non portano da nessuna parte e presto la mia ossessione ci costerà il negozio. Dove vivrà William? 5 gennaio 1923—Temo di dover vendere la pergamenai. Il Duca potrebbe essere interessato, ma ho bisogno di un altro offerente per far lievitare il prezzo. L'ho nascosta nella Losanna del Sogno per metterla al sicuro. Data odierna—Un successo! Domani sono sicuro di concludere la vendita e la nostra vita ricomincerà. RIASSUNTO DELLA PERGAMENA Questa pergamenae è stata scritta da Sedefkar l'Osmalni. Tratta di un oggetto in suo possesso, il Simulacro di Sedefkar. In questa pergamenae, Sedefkar profetizza che presto perderà il simulacro, quindi lo loda e ne fa un resoconto in una serie di cinque pergamenee. Questa pergamenae è la prima delle cinque ed è chiamata Pergamena della Testa, in quanto contiene i pensieri e la storia di Sedefkar. Le quattro pergamenee mancanti sono la Pergamena del Ventre, che riguarda il culto di un essere conosciuto come il Senza Pelle; la Pergamena delle Gambe, una serie di incantesimi che influenzano il corpo, le fondamenta su cui è stato sviluppato il potere di Sedefkar; la Pergamena della Mano Destra, un rituale che ha risvegliato la statua ed è la forza motrice del potere di Sedefkar; e la Pergamena della Mano Sinistra, contenente un rituale che bilancia questo potere, un sacrificio indispensabile e continuo. La pergamenae è un documento folle e sconclusionato. L'autore non ha definito gli eventi in una forma o in un ordine preciso, rendendo difficile la lettura. La descrizione più dettagliata contenuta nel documento si sofferma sulla tortura e sullo scuoiamento degli esseri umani. Documentazione: Losanna 3 Ho visto le potenze che si aggirano nella notte e che incutono timore nei cuori di tutti coloro che adorano il falso dio. Io Lo conosco e Lo adoro. Il Senza Pelle mi ha parlato. Mi ha sussurrato parole segrete nel profondo del cuore e ora so cosa devo fare. L'ho visto nelle visioni ed è tutto ciò che il mio Signore ha detto che era. Nei miei sogni ho visto la Sua perfezione avanzare a grandi passi sulle macerie di intere città. Re e nazioni sono caduti dinanzi a Esso. Perfino gli dèi devono cadere dinanzi a Esso. L'ho riconosciuto come un oggetto di potere la prima volta che l'ho osservato. Un potere tale da mettere il mondo intero in ginocchio. Luccicava come la più bella delle perle. Si è risvegliato quando ho scorticato vivo il miserabile che aveva cercato di sottrarre il mio tesoro. Quella notte, è venuto da me per la prima volta e mi ha detto cosa fare. Ho meditato dinanzi alla Sua gloria. Lodiamo Colui che non ha Pelle. Ho eseguito le diciassette devozioni e l'ho aperto per la prima volta. Al suo interno, il manufatto era morbido e liscio. Quando ho fatto scorrere la mia mano sulla sua superficie interna, mi è sembrata la pelle di un neonato. Ho offerto quattro bambini in sacrificio al mio Signore. Quindi l'ho utilizzato per la prima volta. Nella Sua saggezza, il Signore della Carne Nuda l'aveva creato della mia altezza. In tutta modestia, credo che sia stato fatto a mia immagine e somiglianza. Benedetto sia il prescelto del Senza Pelle. Sono stato attento a mantenerlo immacolato. La sostanza è il colore della purezza e non dovrebbe essere contaminata da ciò che è impuro. STELLA DELL'OPERA SPARITA! Si teme un rapimento. La polizia teme che il soprano Caterina Cavallaro sia stata rapita dalla Stazione di Milano Centrale. La cantante è scomparsa dopo essere scesa dal treno proveniente da Parigi ieri alle 13:00. Da allora non ha fatto ritorno al suo appartamento né si è recata alle prove al Teatro alla Scala, dove dovrebbe cantare nel ruolo di Aida, la cui opera debutta domani sera. Arturo Toscanini, direttore musicale del Teatro alla Scala, ha confermato di non aver avuto alcun contatto con la cantante da quando ha lasciato Parigi. La polizia chiede a tutti i cittadini di contattarla qualora avessero informazioni sul luogo in cui si trova la signorina Cavallaro. Si esortano tutti i milanesi a partecipare alla ricerca della nostra stella più amata. LA SCOMPARSA DELLA CAVALLARO Un'altra tragedia? Arturo Toscanini, direttore musicale del Teatro alla Scala, oggi ha annunciato che l'Aida verrà inaugurata stasera con la sostituta Maria Di Mattina nel ruolo principale. Toscanini, in risposta ai commenti sulla "voce fantasma" di ieri sera e su altri presunti eventi soprannaturali, ha dichiarato: "Queste storie non hanno alcun fondamento. Sono solo pettigolezzi e vecchie leggende". Paolo Risconti, responsabile degli oggetti di scena dell'opera, ha raccontato una storia diversa. "Pensavamo che i nostri problemi fossero finiti", ha detto, "quando la maledizione dei costumisti è terminata con la preparazione dell'Aida, ma ora la sfortuna è sul set stesso. Le persone si feriscono o si ammalano e gli oggetti di scena scompaiono. Come fine faremo?" Lo spettacolo di stasera ha fatto il tutto esaurito, ma l'opera è in programma per le prossime quattro settimane. OPERAIO ASSASSINATO Il corpo dell'operaio automobilistico Ennio Spinola è stato ritrovato oggi in un vicolo di via Tavazzano al Portello, non lontano dalla fabbrica dell'Alfa Romeo dove lavorava. Spinola è morto accoltellato. La polizia sta svolgendo indagini tra i lavoratori della zona. Spinola era un sindacalista attivo e si dice che negli ultimi giorni abbia discusso di questioni sindacali con altri lavoratori. UN GRADITO RITORNO Flavio Conti è stato un volto gradito al ricevimento di ieri sera riservato ai mecenati e ai sostenitori del Teatro alla Scala. Negli ultimi mesi, il signor Conti non è stato bene e alcune voci inesatte hanno parlato di tubercolosi. Si trattava senza dubbio di un disturbo molto meno grave. Il signor Conti si è ripreso del tutto ed è stato l'anima della festa. Erano presenti anche i colleghi mecenati d'opera Nunzio Tocci, Matteo Sorrenti, Angela Susco, Arturo Faccia e Serena Spagnolo. Il gruppo è stato intrattenuto da brani tratti dall'opera Aida in programma questa settimana, interpretati dai membri del cast. Rosario Sorbello ha accompagnato al pianoforte. È stata un'occasione davvero straordinaria. IMPRENDITORE MILANES ASSASSINATO Questa mattina, la polizia ha rivelato che Arturo Faccia, importante imprenditore milanese, è stato vittima due notti fa di un brutale omicidio, in un episodio a quanto pare isolato. Si trovava alla Scala con alcuni amici per la prima dell'Aida e si era recato dietro le quinte per congratularsi con gli artisti, quando si è separato dai compagni. Il suo corpo mutilato è stato rinvenuto ieri in tarda serata da alcuni operai sul tetto del nostra cattedrale. Un funzionario della diocesi ha dichiarato: "È impossibile per chiunque salire lassù di notte. Questa è opera del diavolo". La polizia di Milano non ha voluto fornire indicazioni sulle ferite riportate, limitandosi a dire che sembrano opera di un folle squilibrato. Gli abitanti della città sono avvertiti di prestare attenzione durante la notte. Il signor Faccia era vedovo e senza figli. Era tornato da poco da un viaggio di lavoro in Turchia. Dio mi perdoni, Dio mi aiuti, ne avevo un gran bisogno, quindi la presi con grande tremore e senso di sacrilegio. Possibile che io, un vero veneziano, abbia violato il nostro luogo più sacro? Tuttavia, alcuni bisogni sono al di sopra di ogni altro. Piangeva e implorava aiuto. La sua statua era rotta e non disponevo dei materiali per ripararla, in quanto questa dannata guerra fa mancare tutto. Alla fine, mi ricordai di quella vecchia storia. Che altro potevo fare? Suo nipote, morto sul Grappa al fianco del mio caro Marco, e le sue figure erano le uniche cose a dargli conforto. Dio mi perdoni, possa Dio confidare che sto solo cercando di fare del mio meglio. 17 settembre 1917—È terribile che i materiali siano così scarsi e che quelli esistenti siano destinati all'industria bellica. Di sicuro un po' di argilla e di cera possono essere donate alle bambine di Venezia. Dal 23 novembre al 23 dicembre 1917—Nessuna voce. In una delle pagine è inflato un telegramma ingiallito che annuncia che, il 22 novembre, il nipote Marco è stato considerato ufficialmente disperso in azione sulle pendici del monte Grappa. 29 dicembre 1917—Una terribile bufera di neve imperversa su Venezia. Possiamo essere grati che tali tempeste abbiano arrestato l'avanzata austriaca e tedesca, almeno fino alla primavera. Durante la tempesta, mi dicono gli amici, uno strano fulmine ha colpito il campanile di Palazzo Rezzoniani. Devo andare a trovare i miei vecchi amici della torre dell'orologio per vedere se sono ancora tutti sani e salvi. 15 gennaio 1918—Ho una brutta artrite alla gamba sinistra. Non ho mai sofferto di una simile afflizione prima d'ora. Sono sicuro che guarirà presto, perché ho pregato il mio omonimo, san Marco. 15 marzo 1918—Ho appena saputo che il signor Rezzoniani è morto. Il corpo di questa povera anima è stato trovato solo alcuni giorni dopo, perché era un vero recluso. Dio voglia che io abbia fatto bene. Spero di avergli dato la pace. 9 aprile 1918—Nonno Marco è morto oggi di vecchiaia, dolore e lutto. Pace all'anima sua. Rapporto ufficiale del capitano Dubois 16 novembre 1797 Signore, in merito ai disordini degli ultimi tre giorni, devo riferire che il 13 novembre una folla turbolenta di veneziani si è radunata di fronte ai cancelli della caserma San Marco. Hanno ignorato le mie richieste di disperdersi. La motivazione che hanno fornito è che volevano che consegnassi uno dei miei soldati, Jean Boucher, nelle loro mani. Sostenevano che era stato lui, con le sue arti oscure, a causare la grave pestilenza che affligge Venezia. Sembravano davvero credere a queste assurdità superstiziose. Sfidando il mio ordine diretto di allontanarsi, hanno tentato di assaltare la caserma e di catturare Boucher. Ho ordinato agli uomini sotto il mio comando di aprire il fuoco. La prima raffica è stata diretta sopra le teste della folla. Non si è resa necessaria una seconda raffica, perché la folla si è dispersa. A quel punto, ho imposto il coprifuoco nel distretto. Ho interrogato Boucher e l'ho trovato un animo docile, di scarsa intelligenza e poco coraggioso. L'unico bottino che è riuscito a racimolare durante la nostra gloriosa marcia attraverso l'Europa è una strana gamba di porcellana! Boucher sembra considerarla un trofeo, ma dubito che qualsiasi altro uomo sotto il mio comando la pensi allo stesso modo. Il giorno dopo, una delegazione di eminenti veneziani del sestiere mi ha fatto visita, chiedendo ancora una volta che Boucher fosse processato per stregoneria. Li ho incarcerati tutti in quanto agitatori della folla. La questione è chiusa. Sotto il mio comando non si verificheranno più disordini di questo tipo nel sestiere. Il 15 novembre è accaduto ciò che vi ho riferito in privato. Ne parlo in dettaglio nei documenti personali, non essendo opportuno farne oggetto di un rapporto ufficiale. --- C'è una nota del suo ufficiale superiore, il maggiore Hautemont, il quale elogia la sua prontezza nel disperdere la folla senza spargimenti di sangue. 15 novembre, 1797 Sono tornato a casa la scorsa notte, il 14 novembre, molto soddisfatto delle mie azioni per sedare la sommossa. Come ha detto Voltaire, “Ho rivolto una sola preghiera a Dio, una molto breve: ‘Oh Signore, rendi ridicoli i miei nemici’. E Dio mi ha esaudito”. È stata una vera soddisfazione vedere le facce di quegli sciocchi veneziani mentre venivano sbattuti in prigione. Spero che questo soggiorno insegni loro la differenza tra ragione e superstizione. A casa, ho trovato la mia Cherie afflitta dall’epidemia. La povera piccola è coraggiosa come uno dei miei soldati, ma la sua gamba si è stortiata e deformata da un giorno all’altro. Ha solo due anni. Non dovrebbe soffrire così tanto. Sono tornato alla prigione e ho interrogato i capi della delegazione. Mi hanno detto di parlare con Boucher. Perciò l’ho interrogato di nuovo ieri in tarda serata. Ho anche esaminato quello strano arto artificiale a cui tiene tanto. Mentre lo maneggiavo mi faceva male la gamba, e mi fa male anche adesso. Forse la mera vista di questo arto mozzato di porcellana ha risvegliato qualche ricordo vestigiale nella mia mente turbata, tanto da farmi provare la sensazione che la mia gamba sinistra sia stata amputata? Ho preso la gamba da Boucher e ho cercato di romperla. Non si è rotta. Ho provato a bruciarla. Non si è bruciata. Non è porcellana, ma una strana sostanza indistruttibile che nemmeno il diamante può scalfare. Quella maledetta delegazione aveva ragione. È qualcosa di malvagio, nonostante io difenda Boucher. L’ha semplicemente portata con sé fino a Venezia. Non ho intenzione di ammettere la mia follia a quegli sciocchi italiani. Alla fine ho capito cosa fare. L’idea era così azzeccata che sono esploso in una frigorosa risata! Ieri sera ho seppellito quella maledetta gamba di nascosto nella Basilica di San Marco, sotto la pietra scura del pavimento nella cappella di Sant’Isidoro. Con mia grande gioia, stamattina la mia cara piccola Cherie si è ripresa. È vispa come sempre. Inoltre, oggi ho appreso dal personale medico che la virulenza della peste sta diminuendo poco alla volta. Ho ordinato che la delegazione venga rilasciata senza clamore. Questo pomeriggio, quel disgraziato di Boucher non mi ha dato pace. Vuole un risarcimento per il suo “trofeo”. Questa richiesta potrebbe rimanere a lungo insoddisfatta. SIMULACRUM DIABOLI (IN LATINO) Si tratta di un manoscritto miniato in latino scritto da un monaco cistercense anonimo presumibilmente attorno al 1260 e basato su materiale precedente di monaci che si trovavano a Costantinopoli dopo il 1204. Tali testi furono portati a Venezia quando i crociati veneziani vi fecero ritorno. Fu rilegato in un unico volume nel 1505 da un artigiano italiano il cui timbro e data sono ancora presenti sul risguardo. Il volume riporta una narrazione continua della quarta crociata e del Sacco di Costantinopoli, con digressioni che pongono l’accento su nozioni morali e teologiche. L’opera è accompagnata da splendide miniature, tra cui le raffigurazioni medievali di una scimitarra ricurva con il pomolo a foggia di testa di serpente e di un’armatura che sembra avere due facce, una rivolta in avanti e una indietro. SIMULACRUM DIABOLI, O, LE VERE CRONACHE DEI MALI DELLA QUARTA CROCIATA (IN LATINO) Si evince dunque che alla base del Sacco di Costantinopoli del 1204 non vi fu l’umana malvagità, bensì un’oscura e mostruosa diavoleria. Quell’eccellente cavaliere, presto imperatore dell’Impero Latino, il conte Baldovino, ne prese atto e mandò i suoi migliori cavalieri e servitori. Svelarono un turpe complottò per far ricadere sui crociati e greci le nefandezze di Satana, al centro del quale si trovava un turco degenerato, Sedefkar, e i suoi satanici manufatti: una statua che permetteva di assumere le sembianze di qualsiasi uomo, confezionata in pelle umana e chiamata Simulacrum Diaboli, e un orribile coltello, l’Artiglio del Serpente, capace di infliggere tremende ferite e di sedurre chi lo impugna con la sua malvagità. La statua venne sottratta dal monaco lebbroso Merovac, conosciuto in oriente come Fenalik, e rivelatosi egli stesso una creatura di Satana. Ma il turco fu ucciso e il conte Baldovino, grazie all’aiuto di impavidi alleati, mise al sicuro il coltello nella città di Zara. Si sarebbe detto che il bene avesse trionfato. Ma nella sua malvagità, il turco aveva scagliato una maledizione sui comandanti europei della crociata e, nel giro di pochi anni, essa si realizzò e l’imperatore Baldovino fu presto catturato, torturato e ucciso dai Bulgari, i quali uccisero anche Bonifacio I del Monferrato, l’altro capo della crociata. Poco tempo dopo, morì anche il doge veneziano, il cui corpo rimase a Costantinopoli. Nel giro di pochi anni, perfino il Papa era morto. Lo stesso Impero latino cadde in mano ai greci nel 1261. JOHANN JOACHIM WINCKELMANN Nato il 9 dicembre 1717 a Stendal nel Margraviato di Brandeburgo, morì l’8 giugno 1768 a Trieste. Figlio di un maestro calzolaio, gli anni della formazione di Winckelmann furono fortemente influenzati dallo studio del greco, in particolare delle opere di Omero. Dal 1738, studiò teologia presso l’università di Halle e, tra il 1741 e il 1742, medicina e matematica presso l’università di Jena. Il suo interesse per l’arte greca può essere fatto risalire a dopo il 1754, quando iniziò a lavorare come bibliotecario del conte Heinrich von Bünau a Nöthnitz, nei pressi di Dresda. La sua prima opera letteraria dedicata a tale materia, *Pensieri sull’imitazione delle opere greche in pittura e scultura*, fu pubblicata nel 1755 e tradotta in diverse lingue. Divenne bibliotecario al Vaticano e si trasferì dalla nativa Germania a Roma. Nel 1768, Winckelmann si recò a nord oltre le Alpi, ma il Tirolo lo deprimeva e decise pertanto di tornare in Italia. Scrisse agli amici: “Non sono quello che vorrei essere”, accennando a una forma di malinconia che l’aveva colpito. Il suo compagno di viaggio, lo scultore e restauratore Cavaceppi, lo convinse a recarsi a Monaco e a Vienna, dove venne ricevuto dall’imperatrice Maria Teresa. Sulla via del ritorno, Winckelmann sostò presso la Locanda Grande di Trieste, in attesa di una nave per Ancona da dove avrebbe poi raggiunto Roma. Questa sosta gli fu fatale: il suo vicino di camera, Francesco Arcangeli, un cuoco pregiudicato, cercò di strangolare e quindi accoltellò brutalmente Winckelmann con l’intenzione di derubarlo di alcune medaglie ricevute in regalo alla corte viennese. Arcangeli fu arrestato e in seguito giustiziato mediante il supplizio della ruota nella piazza antistante la locanda stessa. Prima di morire, Winckelmann ebbe il tempo di redigere un testamento in cui lasciò la maggior parte dei suoi beni a un cameriere della Locanda Grande, l’albergo in cui soggiornava. Le medaglie vennero infine portate al Civico Museo di Storia ed Arte, mentre tutti i documenti di Winckelmann, compreso un diario personale, furono venduti all’asta a Giovanni Tremona, uno storico locale. Winckelmann fu seppellito nel camposanto della cattedrale di San Giusto, che in seguito fu rimosso e sostituito dall’Orto Lapidario. Il cenotafio eretto in onore di Winckelmann nell’Orto risale a diversi anni dopo la sua scomparsa. È presente anche un ritratto di Winckelmann, una riproduzione di un dipinto a olio realizzato dall’amico pittore Anton Raphael Mengs nel 1777. Riassunto delle conclusioni della Corte Marziale 13 settembre 1797 Presiede lo Chef de Bataillon Gaston Feusil Nel corso delle indagini sulla morte del sergente André Legrand e del soldato Jules Héron, il Tribunale ha accertato i seguenti fatti: Il 9 settembre, il sergente André Legrand, il caporale Marcel Lasnière e i soldati Jules Héron e Louis Cochefer dell’unità di Legrand stavano bevendo in una taverna, La Capra Ubriaca, dove si sono imbattuti in Marchetti. I testimoni presenti hanno dichiarato che Legrand era molto ubriaco. Il caporale Lasnière e i due soldati sono saliti al piano superiore, dove il proprietario della taverna gestiva anche un bordello. Al loro ritorno, Legrand e Marchetti erano scomparsi. Il corpo di Legrand è stato ritrovato poco dopo in un vicolo nei paraggi. I testimoni hanno dichiarato che all’interno dell’unità era risaputo che il sergente Legrand aveva recuperato un tesoro di valore a Parigi. L’oggetto era conservato nella sua borsa. Legrand l’aveva con sé alla taverna, ma della borsa non c’era traccia quando è stato trovato il cadavere. Lasnière, Héron e Cochefer si sono messi alla ricerca di Marchetti, in parte per vendicare il sergente, ma anche per recuperare il suo tesoro. Il 10 settembre, i tre uomini hanno sorpreso Marchetti mentre beveva nella taverna La Caverna dei Rettili. Hanno aspettato che uscisse, poi gli hanno teso un’imboscata, stordendolo e trascinandolo in un vicolo cieco dove hanno cercato di farsi dire dove si trovava la borsa. I testimoni hanno dichiarato che, in un primo momento, Marchetti ha negato di esserne in possesso, ma, dopo essere stato malmenato, ha confessato di aver consegnato la borsa e il suo contenuto al proprio padrone. Marchetti si è rifiutato di rivelare il nome del proprio padrone ed è stato picchiato di nuovo. Durante questo secondo pestaggio, la camicia di Marchetti è stata strappata. Da questo momento in avanti, i fatti non sono chiari. I testimoni riferiscono di aver udito delle grida, seguite da colpi ripetuti. Sono state chiamate le autorità civili e, in seguito alle indagini, Lasnière e Cochefer sono stati ritrovati, storditi e sanguinanti, accanto a due corpi. Uno era il cadavere di Héron, che, a giudicare dai segni sulla gola, sembrava essere stato strangolato. L’altro corpo era stato malmenato al punto da essere irriconoscibile, ma potrebbe trattarsi di Marchetti. Lasnière sostiene che il cadavere sarebbe quello di un “mostro” che ha strangolato Héron prima di essere ucciso. Ha affermato che le ferite successive inferte al corpo sono state causate da Cochefer, che lo ha colpito più volte con una billetta di legno. Sulla scena del crimine è stata rinvenuta una billetta insanguinata. Cochefer non è stato in grado di testimoniare: i medici che lo hanno visitato concordano sul fatto che è improbabile che riacquisti la sanità mentale. Il Tribunale ha accertato che Legrand è stato ucciso dal civile Marchetti nel corso di una rapina. Héron è stato ucciso da uno o più sconosciuti. La morte di Marchetti non può essere confermata. Documentazione: Trieste 4 ... risalente alla Tergeste romana, sebbene Von Junzt suggerisca che il culto potrebbe essere un residuo di epoche ben più remote ... ... sembra che preferiscano vivere (abitare?) in caverne sotto la superficie terrestre. Le abbondanti formazioni di grotte carsiche presenti nelle vicinanze (il toponimo “Carso” deriva dalla radice “kar”, di origine paleoindoeuropea e con significato di roccia o pietra) fornirebbero un ambiente ideale ... ... da qualche altro luogo (la Nebulosa di Andromeda? De Vermis Mysteriis). Possono manifestarsi come ... ... “pesci umanoidi”... visibili attraverso la pelle... organi interni... pulsanti e luccicanti ... ... Ghatanothoa. Si ritiene che altri ancora venerino colui che cammina nel vento, Itha... ... li ho uditi discutere di una missione che i loro padroni avevano affidato alla setta molti anni prima e che non era ancora stata portata a termine. Punizioni sconosciute sono state ... ... dita delle mani e dei piedi, occhi, arti... innestati sul corpo... possono muoversi di propria volontà o per volere di ... ... ordinato di stare all’erta e procurarsi qualsiasi manufatto che possieda qualche potere magico da offrire agli invisibili... 3 MAGGIO La Tavoletta di (indecifrabile) è corretta, mi sono recato a Ratisbona e ho parlato con le Cose che vi vivono. Mi hanno obbligato a portare un amuleto in un'altra enclave vicino a Tergeste, in Austria. Mi hanno avvertito di non avvicinarmi senza l'amuleto, per non essere annientato. Hanno bisogno di questo amuleto per un qualche loro oscuro piano: temo che li aiuterà a liberare la cosa che servono dalla sua gelida prigione artica. 15 MAGGIO Maledico quelle Bestie e maledico me stesso per averle cercate! Ogni notte i sogni si ripresentano e io non ho pace. Non so come continuare: l'arte che è stata la mia vita è spazzatura e i miei compagni non sono che maschere dipinte su teschi sorridenti. Anch'io indosso la mia maschera e parlo di "Arte", ma la bellezza è scomparsa dal mondo e le mie parole sono cenere al vento. 1 GIUGNO Sono arrivato sano e salvo a Tergeste. I sogni che mi perseguitano fin da Ratisbona continuano. La mia sola speranza è che, dopo aver consegnato l'amuleto, i sogni cessino. 2 GIUGNO Ho incontrato un abitante del posto, Arcangeli, un tipo che promette un po' di svago. Ma, soprattutto, grazie ad alcuni gesti e parole mi dà ragione di credere che conosca tali Entità e che possa condurmi alla loro tana. 3 GIUGNO Non posso fidarmi di Arcangeli. Ha chiesto di vedere l'amuleto come prova del mio incarico di corriere, ma i suoi modi sono subdoli e sospetto che preferirebbe consegnare lui stesso l'amuleto. L'ho messo da parte, ma senza di lui non posso arrivare a Loro. 5 GIUGNO Nella mia disperazione ho ceduto, ho compiuto il rituale e ho parlato con la Cosa che è venuta e ho appreso da dove è giunta. Le Bestie sanno che sono qui con il loro amuleto e mi ordinano di portarlo con me nella loro tana o incorrerò nella loro ira. Ho il cuore in pena. 6 GIUGNO Sono riuscito a sfuggire a quel mascalzone di Arcangeli e ho nascosto l'amuleto. Ora sono sicuro che ha intenzione di rubarlo, visto che l'ho sorpreso a rovistare nella mia stanza. Dovrò attendere di non essere più osservato e dirigermi da solo alle caverne di Adelsberg per consegnare l'amuleto. Non osò andarci senza. 7 GIUGNO Arcangeli continua a perseguitarmi e non posso recuperare l'amuleto senza che se ne accorga. Ho scoperto che lui, assieme ad altri abitanti del posto al servizio di quelle Bestie, cerca di rubare ogni oggetto occulto che passa di qui e di farne offerte per compiacerle. Temo che trovino l'amuleto, negandomi l'opportunità di compiere il mio dovere, e che questi sogni non cessino mai! Documentazione: Trieste 5 Il quinto giorno della Luna Cadavere, nel 1593° Anno dello Scorticamento Salleh, Fratello mio, Parte del Simulacro così benedetto dal nostro Signore è stata ritrovata! Abbiamo appreso che un Frammento è stato portato a Trieste dalle armate degli infedeli. Trieste è la patria di una banda di patetici sciocchi che adorano una specie degenerata che vive nella regione. I loro seguaci hanno l'abitudine di offrire ai propri padroni qualsiasi oggetto di potere trovato, al fine di placare la loro ira per qualche errore commesso in passato. La storia del Frammento si interrompe a Tergeste, per cui è stato senza dubbio offerto a tali creature. Devi recarti a Trieste con tutti i Fratelli di cui hai bisogno. Sorveglia questi seguaci e cerca di scoprire l'ubicazione del loro tempio, giacché il Frammento è di certo conservato in uno di essi. Se qualcuno dovesse cercare di ostacolare la nostra gloriosa missione, assicurati di scoprire cosa sa prima di sottrarre al suo corpo blasfemo il sacrificio più appropriato e opportuno. Lode al Senza Pelle! S.M. Manoscritto Miniato Scritto con Tessuto Cicatriziale su Pelle Umana Siamo sempre stati destinati a stare assieme. Dal momento in cui ti ho visto, ti ho amato: tanto bello e crudele, tanto spietato e perfetto. Io, il tuo vile servitore, non ero degno di prostrarmi ai tuoi piedi. Eppure, ho accarezzato le tue membra di alabastro. Ho baciato i tuoi occhi scintillanti. Ti ho tenuto vicino, più vicino del cranio alla pelle. Fin da quel primo momento di estasi ho saputo che eravamo destinati a separarci, che mi avresti usato e scartato come un serpente sfugge alla sua vecchia pelle. Ho cercato di annotare tutto ciò che eri. Pensavo che, in tal modo, mi sarei ricordato di te. Pensavo di poter fissare la tua essenza come un lembo di pelle scorticato e ti terrò per sempre nel mio cuore. Avrei dovuto sapere che qualsiasi tentativo di descrivere la tua magnificenza era condannato fin dall'inizio. Eppure, ho scritto in preda al desiderio febbrile e ti ho disegnato su pergamine di pelle. Ho sperato e sognato che rimanessi per sempre con me. Ma ora non ci sei più. Tutto ciò che mi resta sono una pelle vuota e parole... Vuote e inutili parole piene di tormento. Lettera Ricamata su un Tappeto Turco Il mio amore è l'amore puro di un devoto che adora l'idolo che non ha mai visto. Finché non ci incontreremo, sarò in preda al tormento. Non posso fare altro che cercarti, tramare e pianificare e desiderare quel momento in cui ti stringerò tra le mie braccia. Il mio cuore, il mio corpo, bruciano per te. La mia vita è tua. La stringi tra le tue bianche, candide mani. Per dimostrare il mio amore ho ucciso un uomo per te. L'ho colto di sorpresa. Pensava che fossi suo amico. Si fidava me e io l'ho massacrato nella notte. Ma una volta non era abbastanza. L'ho ucciso una seconda volta, le mie braccia rosse di sangue fino ai gomiti. I suoi occhi scioccati hanno compreso il tradimento finale. Mentre brandivo il coltello da scuoialitura, piangevo. Ma tu eri ancora caparbio. Così, l'ho ucciso di nuovo. E l'uomo che ho ucciso per provare il mio amore era me stesso. Tatuaggi su un Arazzo di Pelle Umana La vita fa a pezzi i deboli con denti e artigli da leone. Io ero forte. Ti ho intravisto da lontano e sapevo di volerti, sapevo che ti saresti concessa solo alle anime più solide. Ho strappato la carne d'altri dalle loro ossa per ricostruire me stesso. Mi sono fatto strada tra i sogni per trovare la via che conduceva alla tua porta. So che quando ci incontreremo ti unirai a me per sempre. Non sono come tutti gli altri sciocchi che si lamentano di amarti. Io sono forte. Eppure mi eviti ancora, voltì il viso dall'altra parte. Vedo solo una spalla candida e liscia. Vorrei addentare la pelle di quella spalla. La strapperei e la divorerei. Spartito con Testo Ero un uomo debole, eppure ho osato sollevare lo sguardo verso la tua divinità. Ho affermato di averti cercato per qualcun altro. Ho mentito, perfino a me stesso. Se ti avessi avuto tra le mani ti avrei accarezzato, stretto, non ti avrei mai lasciato andare. Ero un uomo debole. Non avrei mai potuto afferrarti con la mia misera forza. Eppure, ti desideravo così tanto che ho espresso un desiderio e il mio desiderio si è avverato. Ti ho visto sul proscenio dorato, così bello e perfetto. Avrei dovuto capire che ero troppo insignificante per riuscirci, io l’indegno, un semplice sacco di carne e sangue zampillante, che cantava con polmoni rubati. Eppure, ho osato sognare. Oh, mio ascoltatore, ricorda: ero un uomo debole. Scritta con Sangue Rappreso su di una Camicia di Forza Sono bramoso. Affamato. Assetato. Furioso. Non posso vivere senza di te. Sei sotto la mia pelle. Sei me. Ti ho posseduto una volta. Allora ero la perfezione, uccidevo, mi divertivo e ridevo di gusto. Ti ho perso e sono diventato una bestia. Folle di desiderio per ciò che ho perduto, vorrei uccidermi, ma non posso. La mia pelle raggrinzita resiste ai fendenti del coltello, il mio cuore morto non può essere arrestarsi di nuovo. Ucciderò tutti quei patetici aspiranti amanti che si metteranno tra noi. Quando infine ti afferrerò, ti spoglierò, ti prenderò, ti consumerò. Tu sarai me. Sarò la perfezione, e riderò, ucciderò e mi divertirò di nuovo. Parole di Sangue, che si Librano a Mezz’Aria Carne della mia carne, pelle della mia pelle. Ti amo dell’amore che divora tutte le cose, le vite, le anime, i mondi, il tempo stesso. Quando ritornerai con le tue migliaia di anni di odio, potere e follia, donerai un breve accordo nella cacofonia che circonda il Trono. Pagina da un Diario, Portata dal Vento Ho amato la tua forma mutevole, il mio sogno danzante e dorato. Ho cercato di conquistarti. Ho fallito e sono caduto nell'abisso. Ora ti prendi gioco di me nel vento incessante che non mi lascia mai riposare. Assapori il mio destino, mio crudele e dorato, eppure ti adoro. Non posso pregare, perché le mie labbra sono sigillate. Non posso parlare, perché la mia mascella è serrata. Oh, offrimi riparo da coloro che non hanno cuore e che farfugliano nelle lande ghiacciate. Sono colui che urla alla tua finestra. Sono il morto guidato dalla bufera di neve. Frasi Turbinanti nell'Aria Gelida SEI NOSTRO. NON CI INTERESSA DI TE. CERCHIAMO SOLO IL TESORO. LO BRAMIAMO E LO ARTIGLIAMO IN UN GELIDO ULULATO. EPPURE ABBIAMO TE. GOCCIA DOPO GOCCIA, SU DI TE SI FORMA UNA PELLE CALCAREA. I MILLENNI PASSANO MENTRE NOI ATTENDIAMO NEL BUIO. LE STALATTITI VANNO FORMANDOSI SOPRA DI TE COME GHIACCIOLO. SEI UNICA COSA CON LA ROCCIA. LA TUA BELLEZZA QUI NON TI SERVE A NULLA. ORA RIMARRAI CON NOI. Parole Incise su uno Specchio Tutti voi che dite di amarmi non sapete cosa sia l'amore. Siete affamati di potere. Amate il riflesso di voi stessi che vedete in me. Solo il mio padrone comprende cosa sia davvero l'amore. È una debolezza da sfruttare, un potere da prosciugare, una malattia da estirpare. Solo i mortali possono amare, perché solo la mortalità cerca di strappare un breve istante di significato alla brutale indifferenza della vita. Vi dico che nessuno di voi mi ama davvero, perché, se lo faceste, la mia bellezza vi consumerebbe. Tutti coloro che mi amano davvero muoiono. Appunti Sostenuti da una Scena di Animali Impagliati Ti ho amato una volta, ma ora non più. Vivere fa troppo male. Ho cercato un modo per uccidere il dolore. Ho trovato una strada per i sogni. Il mio amore per te è stato ucciso. Ho amato di più l'ago. Il sognatore mi ha aperto la strada verso l'altro mondo. Ho cercato di venderti, di vendere ciò che non può essere comprato, venduto, cresciuto, ma sono stato ingannato, truffato, raggirato. Ora sono intrappolato nei sogni che un tempo cercavo e che sono diventati il mio incubo. SCOPERTA LA TOMBA DEL CROCIATO! Tre mesi fa, i lavori di costruzione della scuola Nikola P. Pašić sono stati interrotti dopo che gli operai hanno scoperto una struttura sotterranea mentre stavano eseguendo degli scavi per realizzare delle fondamenta. Il professor Dragomir Moric, archeologo dell’Università di Zagabria, ha identificato il sito come una tomba di un crociato risalente al XII o al XIII secolo. La squadra del professor Moric ha iniziato a scavare e, da allora, nessuna informazione è stata resa pubblica. Ma questa reporter ha appreso da una fonte esclusiva che la tomba del crociato è più una biblioteca che un luogo di ultimo riposo. Il sito è disseminato di documenti e tesori saccheggiati a Costantinopoli dai crociati di ritorno dalla quarta crociata. Perché il professor Moric avrebbe tenuto segrete tali scoperte? La mia fonte mi ha informato che un insigne crociato croato, Sir Miho da Dubrovnik, è legato a questo sito. Il professor Moric, anch’egli croato, sta forse cercando di nascondere il fatto che Sir Miho costruì questa tomba per nascondere i tesori saccheggiati durante il sacco di Costantinopoli? Il professor Moric sta proteggendo un vecchio segreto di famiglia tramandato nei secoli? Questa scoperta appartiene agli abitanti di Vinkovci e ci auguriamo che il professor Moric di Zagabria fornisca presto un resoconto esaurente delle sue scoperte. Carissima Jazmina, Questo sito è molto insolito. Sono sicuro che la struttura non è una tomba. Ho imparato alcune cose sull’Ordine del Nobile Scudo e sulla sua storia… la maggior parte di esse non dovrebbe essere resa pubblica. I dettagli dello scavo, comprese le fotografie del sito, sono stati divulgati alla stampa locale. La storia era intesa come un attacco alla mia persona, ma ora temo per la sicurezza del reperto. Ci sono vari documenti e manufatti che sarebbero molto preziosi per un collezionista senza scrupoli. Mi dispiace di essere vago, ma non osò scrivere di più nel caso in cui questa lettera venga intercettata. Non so di chi fidarmi, qualcuno della mia squadra probabilmente lavora contro di me. Ho bisogno che tu venga subito a Vinkovci. Ti aspetterò all’Hotel Lehrner. Non dire a nessuno che stai venendo qui. Se non ci sono, ti lascerò un messaggio alla reception. Una volta arrivata in città non parlare con nessuno, ma vai diretta in albergo. Ti spiegherò tutto di persona. Spero di aver sistemato quasi tutto per il tuo arrivo. Odio metterti in pericolo, ma non so di chi altro posso fidarmi. Per favore, porta la mia pistola d’ordinanza e la scatola di munizioni che tengo nel mio studio. Sono accanto al mio libro preferito; dovresti ricordarti di quale parlo. Papà Zagrebacka Zvonarska Kralja Zvonimia Fai attenzione, ti amo. Lui sa. Congedati e chiuso tutto. Invitata la figlia. Comportamento bizzarro. Ti dirò di più stasera al Giardino delle Rose. Štessa stanza. L. UN CUDOVISTE SI AGGIURA PER VINKOVCI! Quando, ieri sera, Vinko Servenka si è affacciato alla finestra, i suoi capelli sono quasi diventati bianchi dal terrore. Ha visto una strana figura sulla casa di fronte: "Era enorme, più grosso di un uomo, con lunghe braccia. Si è arrampicato sul tetto e si è messo a balzare da un edificio all’altro. Indossava abiti da uomo, ma non era umano!" ha raccontato l'idraulico terrorizzato. "Era un mostro con la faccia da cinghiale!" Naturalmente, il signor Servenka è stato l'unico testimone di questo Cudoviste. Ma, a seguito delle indagini, sono state trovate alcune tegole a terra tra gli edifici su cui è stata avvistata la creatura. Un Cudoviste si aggira per Vinkovci! Finché non ne saremo certi, di notte tutti dovrebbero pregare, chiudere a chiave le porte ed evitare il consueto bicchiere di Rakia prima di coricarsi. Chiunque abbia avvistato la creatura è pregato di farsi avanti e raccontare la propria versione. Sospettiamo che si tratti più di un'altra delle strane opere d'arte di Dragan Aleksić che di un mostro mitologico! RIASSUNTO DEL TACCUINO DEL PROFESSOR MORIC Questo taccuino contiene le scoperte fatte nella tomba del crociato a Vinkovci, una cripta del XIII secolo appartenente all'Ordine del Nobile Scudo. L'Ordine del Nobile Scudo aveva il duplice scopo di dare la caccia a eretici insidiosi e di custodire pericolosi manufatti satanici. L'Ordine fu costituito da Iolanda di Fiandra, imperatrice latina reggente di Costantinopoli, e da papa Onorio III nel 1218 d.C. La cripta venne costruita da Sir Miho da Dubrovnik, uno dei membri fondatori dell'ordine assieme ad altri cavalieri franchi. Fu utilizzata per conservare oggetti e documenti satanici recuperati dal fratello di Iolanda, il conte Baldovino, alla fine della quarta crociata. Loggetto più pericoloso della collezione era l'Artiglio del Serpente, noto anche come Mims Sahis, un coltello dai poteri malefici e satanici un tempo brandito da Sedefkar, un nemico mortale delle forze della cristianità. Il primo resoconto sul Mims Sahis risale all'inizio del IV secolo, a opera delle truppe al servizio di Costantino il Grande. Vedi Testimonia Tillii Corvi. I culti pericolosi che celebrano la scuoiatura di esseri umani e la creazione di abomini considerano sacro il Mims Sahis. L'Ordine credeva che l'Artiglio del Serpente potesse essere distrutto se ridotto in polvere, ma ai loro tempi non esisteva alcuna forza in grado di farlo. L'ultima pagina contiene il seguente testo: Parlerò con Goran e visiterò il cementificio Bulatovic. Ho inviato una lettera a Jazmina... Jazmina, se stai leggendo questo messaggio, assicurati che tutti i reperti vengano consegnati al professor R. Jordanov, Direttore del Dipartimento di Storia Antica presso il Museo Archeologico Nazionale di Sofia, in Bulgaria. Testimonia Tillii Corvi Questo manoscritto latino risalente al 330 d.C. racconta le vicende di un drappello d'élite di soldati ausiliari romani prossimi al ritiro, i quali partono per la loro ultima missione, sotto la guida del loro comandante Tillio Corvo. Partono da Costantinopoli per indagare sulle voci relative a una setta misteriosa che starebbe diffondendo una nuova epidemia mortale e terrificante in una provincia limitrofa. Li, i soldati affrontano terrore e nemici mai incontrati prima e diventano testimoni della nascita di un nuovo male. Il Senza Pelle reclama ciò che è suo. Che Garaznet il Ladro sia maledetto. Testimonia Tillii Corvi Lettera allegata alla traduzione del manoscritto Testimonia Tillii Corvi. Egregio Prof. Moric, ho completato l’esame del documento da lei richiesto, Testimonia Tillii Corvi. Le pergamene contengono un’incredibile testimonianza risalente agli albori dell’epoca bizantina. Nel marzo 330 d.C., un manipolo di esploratori d’élite dell’unità ausiliaria dei Fortes Falcones, sotto il comando del tribuni comites Tilio Corvo, partì da Costantinopoli diretto nella vicina provincia della Lidia. La loro missione consisteva nel verificare le segnalazioni di una nuova terribile epidemia diffusa da mostri o da adoratori di Satana, o da entrambi. Il resoconto di Corvo descrive il ritrovamento delle vittime di una temibile malattia chiamata Peste di Valeriano, che faceva sì che la pelle degli individui che ne erano affetti prendesse vita e strisciasse via dai loro cadaveri. Sembra che all’origine della Peste di Valeriano ci fosse la magia nera di un folle stregone goto e della sua congrega di satanisti autolesionisti. All’arrivo dei soldati, diversi villaggi erano già stati conquistati dalla setta, che si faceva chiamare gli “Scorticati”. Alla fine, Tilio Corvo si scontrò con Unwen, lo stregone goto. Il folle brandiva una lama alquanto insolita che aveva chiamato Mims Sahis, che nella sua lingua nativa significava “coltello della pelle”. Corvo uccise Unwen, ma rimase intriso del sangue dello stregone e cadde in un coma profondo. I soldati sopravvissuti fecero ritorno a Costantinopoli con il loro comandante privo di sensi e il misterioso coltello del goto folle. Sostennero che il Mims Sahis aveva il potere di generare mostri. Le pergamene proseguono, ma non sono più redatte da Tilio Corvo, bensì si tratta di resoconti su di lui. I documenti affermano che Tilio Corvo uscì dal coma come un uomo corrotto e consumato dal male. Fu allontanato da Costantinopoli dopo essere stato coinvolto in decine di omicidi. Corvo, un tempo un eroe militare decorato, divenne un fuggitivo. Ci sono alcuni elementi di questo resoconto che potrebbero essere collegati a una curiosità archeologica qui presente, in Bulgaria. Dovremmo incontrarci di persona per poterne discutere assieme. Cordiali saluti, Prof. Radko Jordanov Direttore del Dipartimento di Storia Antica Museo Archeologico Nazionale di Sofia Estratto dagli Archivi delle Campagne Militari di Niceforo I (802-811 d.C.) “Durante le spedizioni di frontiera nella regione, è stato scoperto che il tempio-bordello di Cibele, nella foresta della Mesia, nascondeva attività tanto ripugnanti per le menti degli uomini cristiani che si poteva contemplare solo la sua totale distruzione con il fuoco. Il drungario ha riferito che alcuni dei suoi uomini hanno visto, nel fumo che si levava dal tempio, lo spirito stesso della dea pagana ergersi come un Titano, urlando a più voci, con i capelli che si agitavano come per effetto di una possente tempesta. I deboli di cuore si sono spaventati e si sono dati alla fuga ma, al mattino, tra le ceneri delle rovine, non era rimasto nulla.” UN’ONDATA DI BAMBINI SCOMPARSI La polizia sospetta gli schiavisti. Interrogati dei greci. Oggi è stata denunciata la scomparsa del quindicesimo bambino nell’area della città. Blarek Mayval, 7 anni, è stato prelevato dall’ingresso della casa da tè del padre a Stamboul ieri a mezzogiorno, nel bel mezzo del traffico dell’ora di pranzo. La polizia non ha sospetti concreti, ma ritiene che il responsabile sia un gruppo di schiavisti. I cittadini sono invitati a sorvegliare con attenzione i propri figli. La polizia sta interrogando molti greci, in seguito alla segnalazione che questo Paese potrebbe essere la meta finale dei bambini rapiti. Padrone, come hai disposto, il simulacro dev’essere presente. Il tuo servitore OMICIDIO DI UN UFFICIALE BRITANNICO SULL’ORIENT EXPRESS (Costantinopoli, Turchia): IERI IL COLONNELLO BRITANNICO BARTHOLOMEW PHELPS è stato trovato assassinato a bordo dell’Orient Express, alla Stazione di Sirkeci, pugnalato due volte dall'uomo d'affari inglese Charles Drake e dalla sua complice, la signora Evelyn Drake. Il corpo del colonnello Phelps è stato scoperto da un conducente del treno. I signori Drake sono fuggiti dalla scena del crimine prima dell'arrivo della polizia e sono ancora latitanti. Il colonnello, assegnato al consolato britannico, stava indagando sul contrabbando di armi in Turchia. Un rapporto non confermato di un ospite dell’Hotel Oasis, dove i Drake hanno alloggiato poco prima dell’omicidio, afferma che il signor Drake aveva legami con una banda criminale locale. Tuttavia, si ritiene che la signora Drake possa aver agito sotto costrizione, dato che, il giorno prima, nella sua camera d'albergo era stata lasciata una scimmia scuoziata, un presunto avvertimento da parte della banda a non farsi coinvolgere nelle discutibili operazioni commerciali del marito. La polizia locale sta collaborando attivamente con il consolato britannico affinché i due colpevoli siano arrestati. ASSASSINATO NEGOZIANTE DI ISLINGTON Segni di colluttazione Il proprietario di un negozio di Islington è stato trovato morto in circostanze misteriose. Robert Osborne, proprietario di Osborne's Gentlemen's Outfitters in Nelson Street, è stato ritrovato senza vita all'interno del suo negozio da un dipendente appena arrivato a lavoro. L'ispettore Phillips di Scotland Yard ha dichiarato: "Il negozio era a soqquadro, il che indica una colluttazione che dev'essere stata alquanto rumorosa. Tuttavia, le porte erano chiuse a chiave e non c'erano segni di effrazione. Invito chiunque si trovasse nei pressi di Nelson Street tra le cinque e le sette di ieri mattina a mettersi in contatto con la polizia". VAGABONDO UCCISO A ISLINGTON La polizia nega collegamenti con l'omicidio del negozio. L'area circostante il Bookbinder's Arms di Combe Street rimane transennata mentre la polizia continua ad indagare sull'omicidio di un vagabondo nelle cantine del noto pub di Islington. L'ispettore Joseph Phillips di Scotland Yard ha dichiarato: "Il corpo di un senzatetto è stato scoperto questa mattina nelle cantine del Bookbinder's. È stato brutalmente aggredito e invito chiunque sappia qualcosa su questa aggressione a farsi avanti". Alla domanda se questo caso fosse in qualche modo collegato alla morte di Robert Osborne nella vicina Nelson Street, l'ispettore Phillips ha risposto: "Smentisco categoricamente che i due casi siano in qualche modo collegati. Il signor Osborne è stato strangolato, mentre l'uomo della cantina ha riportato diverse ferite al torace". Profilo — John Milton All'età di venti anni, John Milton ha fondato red-heart.com, un sito di incontri online nato dal nulla e diventato uno dei siti di maggior successo nel suo genere, quasi da un giorno all'altro. Nel giro di tre anni, Milton ha venduto il sito per una cifra dichiarata di 2,5 milioni di dollari. Milton ha continuato a fondare e vendere tutta una serie di note aziende basate sul web, tra cui garppy.com, sito specializzato in moda, bombilate.com, rivenditore di musica online, e ogge.com, fornitore di alimenti di lusso. Nato nel 1991, le umili origini di Milton sono documentate nella sua autobiografia pubblicata nel 2020, *Beyond the Hill*. Figlio unico di genitori appartenenti alla classe operaia, Milton ha trascorso gli anni della formazione alla Bakewell Comprehensive School nel Derbyshire, in Inghilterra, prima di intraprendere gli studi classici all'Università di Londra. Ha in seguito abbandonato gli studi, affermando di volersi concentrare sulla sua nascente attività online (red-heart.com). Il resto è storia. Nel 2023, Milton ha lanciato una nuova impresa, lux-vista.com, che mira a offrire viaggi di lusso a prezzi accessibili alle masse. Il nuovo sito web ha attratto l'attenzione degli investitori e della stampa grazie alla campagna di marketing di Milton “Chiunque può viaggiare”, che offre dodici biglietti gratuiti per un viaggio tutto speso sull'Orient Express. Documentazione: Istanbul 4 Carissima Chantel incontriamoci oggi alle (-) del pomeriggio nel (-) vieni da sola ti prego di perdonare questo bisogno di segretezza ti prometto che tutto sarà rivelato Documentazione: Istanbul 3 Incantevole Chantal Mi sale la rabbia perché tu continui a ignorare i miei appelli di amore Qualcosa deve succedere Ti darò un'ultima possibilità Ti ricontatterò presto L'amore della tua vita ITINERARIO ORIENT EXPRESS Giorno 1 – Venerdì 30 giugno 15:53 Imbarco sull’OE alla stazione di Parigi Est. Giorno 2 – Sabato 1 luglio 15:42 L’OE arriva a Budapest, in Ungheria. Trasferimento all’Hilton Hotel per il pernottamento. Giorno 3 – Domenica 2 luglio 10:00-16:00 Visita guidata facoltativa di Budapest. 18:08 L’OE parte, diretto in Romania. Giorno 4 – Lunedì 3 luglio 08:52 L’OE arriva alla cittadina montana di Sinaia. 10:00-12:00 Visita guidata facoltativa al castello di Peles. 12:20 L’OE parte, diretto a Bucarest. 14:16 L’OE arriva alla stazione di Bucarest Nord. Trasferimento all’Athenee Palace Hilton Hotel per il pernottamento. Giorno 5 – Martedì 4 luglio 09:05 L’OE parte, diretto in Bulgaria. 14:00-16:00 Breve escursione a Varna, in Bulgaria. 17:04 L’OE parte, diretto in Turchia. Giorno 6 – Mercoledì 5 luglio 15:18 L’OE arriva alla stazione di Sirkeci, a Istanbul. ESTRATTO UNO Nessun uomo può fermarmi! Sono preparato. L'Aklo è su di me e ho pronti gli angoli necessari. Così a lungo! Così a lungo ho atteso, raccogliendo le mie risorse. Ia! Il SIGNORE OSCURO non mi farà mancare nulla. Non mi spezzerò mai. Non perderà mai la fiducia che nutre in me. Perché io e solo io sono degno di forgiare il nuovo recipiente. Riunisci i pezzi e dal sangue nasce nuovo sangue. La mia eccitazione cresce ogni giorno, ma devo contenerla. Devo operare in silenzio, di nascosto, nell'ombra, finché le mie pedine non saranno sulla scacchiera. Sono il loro padrone. Sanno così poco! Sono il pastore, che raduna il gregge per mandarlo al macello. Mi credono ricco e potente, ma queste non sono che inezie, mostrerò a tutti loro cos'è il vero potere quando il mio coltello avrà reciso la carne e reso pronto ciò che nessun altro, a parte me, può produrre. Ia! Ia! Nyarlathotep! Signore della Pelle! Mio salvatore! Quando dagli stolti saranno tagliati i pezzi il sangue scorrerà, ma nessuno indovinerà cos'ho in mente. Ho bevuto a sazietà dal pozzo dell'antica conoscenza e adesso è il mio momento. Solo il tempo di far tremare il mondo in SUO NOME e LUI MI riconoscerà. Riconoscerà il suo VERO SERVITORE! Il simulacro rinato! Io sono il simulacro! ESTRATTO DUE Sì, ce l'ho fatta. Finalmente! Nessuna linea di sangue mi è nascosta. Richmond mi ha fornito le informazioni sull'albero genealogico del ficcanaso! Proprio come mostrato nella mia visione! Ho inviato all'indegno discendente un biglietto. Non sospetta nulla! Si crederà fortunato, mentre invece sono io il padrone della sua fortuna. Assaporerò il suo rantolo di morte e lo farò mio. Lo fisserò mentre la linfa vitale sgorgherà dai tagli che avrò praticato. Gli sussurrerò che IO SO! Che io so chi è e chi era il suo nonno ficcanaso e che la sua vita è offerta in pegno al PADRONE. Io sono la mano della vendetta e farò a pezzi coloro che si oppongono a LUI, usando i loro stessi corpi come strumenti per la mia più grande creazione. Che meravigliosa ironia! ESTRATTO TRE I sei elementi devono essere collocati nelle nicchie. Lordine è preciso, come mi è stato rivelato nella mia visione. Il braccio destro nella seconda, il braccio sinistro nella quarta, il busto nella terza, la gamba destra nella quinta, la gamba sinistra nella sesta. La testa dev'essere l'ultima e posizionata nella prima nicchia. Walters, Roti, Gonzaga, Griffin, Banuelos e, infine, il discendente! Ia! Il SUO servo è scaltro! La cerimonia è pronta. Conosco le cantilene Dhol. LUI concederà grandi meraviglie al proprio servitore. Devo essere pronto. Devo essere degno, per evitare che mi consideri falso. Mai! Con la mia stessa mano inciderò gli elementi in Suo nome e LUI MI RICONOSCERÀ! Ordinerò agli altri di liberarmi del mio attuale corpo fisico. Con il coltello metteranno fine a John Milton e la mia essenza viaggerà verso il nuovo Simulacro, dove prenderà dimora, e tutto il potere sarà MIO.
c643e491-e73a-4e83-b31d-624d34c21dae
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
81,011
SERVICIO SOCIAL INTERNACIONAL Sustracción internacional de menores Patrones, marco legal, servicios ¿Qué es la sustracción internacional de menores? El término "secuestro de menores" se refiere a la situación en la que un niño es sustraído o retenido ilícitamente por uno de sus padres del país donde tiene su "residencia habitual". La instalación en el extranjero es ilícita cuando el padre sustractor no tiene el derecho de cambiar el lugar de residencia del niño, o lo comparte con el otro padre. La sustracción internacional parental de niños es diferente al secuestro extra familiar. Las investigaciones 1 y el trabajo social del SSI muestran las siguientes tendencias principales de la sustracción internacional parental de niños: * La sustracción o retención ilícita del niño en situaciones en las que la custodia es compartida (lo que implica que el derecho de instalación en otro país también sea compartido). * El padre que tiene la custodia viaja con el niño en un contexto de presunta violencia doméstica o familiar ("sustracciones de protección"). * Traslado ilícito del niño, por el padre que tiene la custodia, al país de origen de ese padre. En este caso, se separa al niño del padre que no tiene la custodia. * Traslado o retención del niño por parte del padre que no tiene la custodia. En este caso, se separa al niño del padre que tiene la custodia. 1Ver:http://www.europarl.europa.eu/RegData/etudes/STUD/2015/510012/IPOL_STU(2015)510 012_EN.pdf (pág. 17 ss.) ¿Por qué los padres "secuestran" a sus hijos? Existen tantas razones como casos individuales. Frecuentemente vemos uno, o varios, de los siguientes motivos en los que los padres: * No ven un futuro realista con su hijo en el país de residencia y buscan apoyo de familiares y amigos en el país de origen. * No tuvieron acceso a procedimientos legales y rápidos de instalación en otro país. * Se escapan de un contexto de violencia familiar física o psicológica. * No aceptan una decisión en cuanto a visitas o custodia legal, y creen que saben mejor que el juez qué es lo mejor para el niño. * Se sienten deshonrados o humillados tras el procedimiento legal y buscan hacer "justicia por mano propia". * Pierden su permiso de residencia y se llevan a "su" hijo con ellos. * Temen que las autoridades de protección de la infancia les quiten a su hijo (por ejemplo, acogimiento familiar). Estándares internacionales y documentos internos del SSI orientativos: * Convención sobre los Derechos del Niño * Convenio del 25 de octubre de 1980 sobre los Aspectos Civiles de la Sustracción Internacional de Menores * Directiva 2008/52/ce del Parlamento Europeo y del Consejo sobre ciertos aspectos de la Mediación en Asuntos Civiles y Mercantiles * Guía para la mediación familiar internacional del SSI * Bruselas II bis * Manual de Trabajo Social del SSI * Guía de buenas prácticas Mediación de la HCCH * Principios para el Establecimiento de Estructuras de Mediación en el Contexto del Proceso de Malta * Código deontológico relativo a los procesos de mediación familiar internacional ¿Cómo afecta la sustracción internacional a los niños? Las consecuencias en los niños son distintas según el patrón en cuestión y varían mucho según cada caso particular. Algunos de los efectos negativos son: la separación repentina del niño de quien principalmente se ocupa de cuidarlo y/o de otras figuras de apego (como los hermanos); el cambio repentino e improvisado del entorno social y familiar del niño; los procedimientos legales estresantes para los padres, con consecuencias perjudiciales para el niño, etc. ¿Qué respuestas tenemos para este fenómeno? La primera es la prevención. La sustracción internacional de niños puede prevenirse con terapia y servicios de mediación familiar (voluntarios y obligatorios), y mediante el fácil acceso a procedimientos rápidos de instalación en otro país ( ver hoja de información adicional). Si la sustracción ya ocurrió, las posibles respuestas varían según varios factores, especialmente según si los dos países en cuestión son estados parte de la Convenio de La Haya de 1980. En 98 países, esta convención es un recurso legal internacional, aunque en la práctica enfrenta grandes obstáculos. En los más de 100 países del mundo restantes, las posibilidades legales que existen son muy limitadas, y la respuesta más efectiva es la negociación y la mediación para garantizar que el contacto entre los padres y el niño sea satisfactorio, o de ser posible, para lograr el retorno del niño. Recomendaciones del SSI en estos casos * Programas sistemáticos de prevención, que incluyan asesoramiento legal y mediación * Establecer reglas y procedimientos prácticos para la instalación en otro país y permitir que la toma de decisiones sea rápida * Incrementar el uso de procesos de mediación antes y después de la sustracción * Contacto y visitas regulares entre el niño y el padre privado del niño y entre ambos padres, durante la resolución del conflicto * Escuchar la opinión del niño y que tenga un representante legal en los procedimientos * Adaptar la interpretación de la Convenio de La Haya de 1980 a la amplia variedad de patrones de sustracción internacional de niños, en especial de acuerdo con el artículo 13(1)(b) ( ver hoja de información adicional) * Un enfoque interdisciplinario, en lugar de uno principalmente jurídico Los servicios de asistencia social del SSI comprenden: * Asesoramiento psico-social y jurídico centrado en el niño para el padre privado del niño y el padre que lo sustrajo * Asesoramiento para padres sobre medios legales para reubicarse en otro país * Prevención de la sustracción internacional de niños a través de asesoramiento sobre los efectos perjudiciales de esta práctica y posibles recursos: legales (locales e internacionales) y a través de la mediación o negociación * Visitas al hogar y evaluaciones a través de la red de miembros del SSI * Facilitar el contacto o las visitas entre el niño y el padre privado de él * Seguimiento tras el regreso del niño * Mediación internacional familiar * Cooperación con las Autoridades Centrales en los Estados Partes de la Convención de La Haya * Cooperación con autoridades diplomáticas en Estados no partes de la Convención de La Haya La promoción y la concientización comprenden: * Conferencias sobre la materia * Capacitación para profesionales de la protección del niño, abogados, mediadores, trabajadores sociales, universidades, etc. * Publicaciones e investigación sobre causas y efectos * Promoción de la mediación familiar internacional para la resolución de casos * Cooperación con la HCCH
<urn:uuid:e0786b80-bf88-4ce5-88bd-4d608f4b30a3>
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
6,611
PONTPRENNAU PONTPRENNAU PCSO David Cordingley 07929 720163 email@example.com Bob Dydd Mercher – Canolfan Chymuned Eglwys Pontprennau (11:00-13:00) Every Wednesday – Pontprennau Community Church (11:00-13:00) @SWPCardiff
<urn:uuid:2f636ab6-f1a8-4b41-a8f9-9134dbb8b564>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
224
Hoofdlijn dissertatie De Transformatieve Dialoog Stabiele en rechtvaardige oplossingen van hardnekkige, identiteitsgerelateerde morele conflicten onderscheiden Superkort * Er zijn conflicten waarin voor partijen iets essentieels op het spel staat. Zij kunnen hierover niet onderhandelen, want dat zou het opgeven van de eigen identiteit of zelfs bestaansreden betekenen. Invloedrijke filosofische theorieën zijn niet in staat om een stabiele en rechtvaardige oplossing te onderscheiden voor zulke conflicten. * Als authenticiteit niet individualistisch, maar intersubjectief wordt begrepen, dan kan wel een gerechtvaardigde theorie gevormd worden die stabiele en rechtvaardige oplossingen kan onderscheiden. Dit is de theorie van de Transformatieve Dialoog. * Gegeven de uitdagingen in de hedendaagse, geglobaliseerde wereld is het urgent om het vermogen te ontwikkelen om zulke conflicten vreedzaam en voorspoedig op te lossen. Institutionalisering van de Transformatieve Dialoog is daarom nodig zodat een transformatief-deliberatieve samenleving ontstaat waarin het transformeren van zelfbegrip even vanzelfsprekend is als het uitwisselen van feitelijke argumenten of onderhandelen, en vechten overbodig is geraakt. Hoofdlijn van de dissertatie 1. Er zijn identiteitsgerelateerde morele conflicten * Er bestaan conflicten die hardnekkig zijn: niet of moeilijk oplosbaar, met het risico tot ernstige escalatie. Deze conflicten gaan over opvattingen over wat wel of niet toegestaan is in interpersoonlijke relaties en zijn hardnekkig omdat ze gerelateerd zijn aan fundamentele behoeften of waarden die mensen als essentieel beschouwen voor wie ze zijn. Het zijn daarmee morele conflicten. * Wat iemand als essentieel beschouwt voor wie hij of zij is, noem ik 'identiteit'. Een identiteit kan begrepen worden als een netwerk van commitments. * Conflicten kunnen bestaan uit o een meningsverschil over feiten, o belangenstrijd om schaarse hulpbronnen en/of o een frustratie om de eigen identiteit tot uitdrukking te kunnen brengen. * Er zijn conflicten die alleen maar goed begrepen kunnen worden door ook de dimensie van een conflict over identiteit erbij te betrekken. Deze conflicten zijn identiteitsgerelateerde morele conflicten (IRMC). NB: deze conflicten hoeven dus niet direct over identiteit te gaan; het conflict kan tot uiting komen in een discussie over feiten of normen, niet direct over identiteit. 2. Hoe kunnen IRMC's stabiel en rechtvaardig worden opgelost? * In de dissertatie zoek ik naar stabiele en rechtvaardige oplossingen: o Stabiel, omdat we niet willen dat het conflict even weg is en dan weer terugkomt; o Rechtvaardig, omdat we er in beginsel van uitgaan dat eenieder mag zijn wie hij of zij meent te zijn. * Dit onderzoek levert een verfijnder begrip op van wat 'rechtvaardigheid' inhoudt. 3. Bestaande theorieën kunnen geen stabiele en rechtvaardige oplossingen onderscheiden voor IRMC's Vele filosofen hebben voorstellen gedaan voor hoe stabiele en rechtvaardige oplossingen van sociale conflicten tot stand kunnen komen. Twee ideeën staan op gespannen voet met elkaar. Enerzijds het idee dat het mogelijk is universele, ofwel voor iedereen geldende, oplossingen te rechtvaardigen, anderzijds dat mensen onvermijdelijk onderdeel zijn van een gemeenschap met specifieke (particuliere) en verschillende fundamentele waarden. Bij identiteitsgerelateerde morele conflicten staat de gespannen verhouding tussen deze basisideeën maximaal onder druk. De particuliere waarden zijn niet-onderhandelbaar, maar staan elkaar wel in de weg. Hoe is dan ooit een universele oplossing te onderscheiden? Er zijn drie strategieën denkbaar, die elk uitgewerkt worden in een invloedrijke filosofie: * Strategie 1: privatiseren van identiteitsverschillen: dit wil zeggen dat er onderscheid gemaakt wordt tussen een publieke en privé-sfeer. In de privé-sfeer is iedereen vrij om te leven naar eigen particuliere waarden, maar de publieke sfeer wordt georganiseerd aan de hand van universeel onderbouwde waarden. Een invloedrijke uitwerking van deze gedachte is te vinden in John Rawls' Politiek Liberalisme. Het probleem van deze theorie is dat het onderscheid tussen publiek en privé gebaseerd is op bepaalde, eveneens particuliere, waarden, die niet iedereen deelt. Identiteiten die deze politiek-liberale waarden niet delen worden ongerechtvaardigd achtergesteld. Daardoor kan deze theorie noch een stabiele noch een rechtvaardige oplossing onderscheiden. * Strategie 2: argumenteren vanuit identiteitsverschillen: om te voorkomen dat bepaalde identiteiten achtergesteld worden, is een tweede strategie om een dialoog te organiseren waarin ieder denkbare norm of waarde voorgesteld mag worden en waarin op basis van rationele argumenten (en niet bijvoorbeeld door machtsverschillen) overeenstemming wordt bereikt. Jürgen Habermas' Diskours Ethiek is een invloedrijke uitwerking van deze strategie. Het probleem is dat over fundamentele waarden uiteindelijk geen argumentatie mogelijk is. Zo'n dialoog kán best tot nieuwe inzichten leiden, maar partijen kunnen ook vasthouden aan de eigen identiteit. Met behulp van deze theorie kunnen daarom geen stabiele en rechtvaardige oplossingen onderscheiden worden. * Strategie 3: inleven in identiteitsverschillen: de analyse van de eerste twee strategieën heeft opgeleverd dat een verandering van zelf-begrip onderdeel moet zijn van de oplossing. Op basis van het denken van de filosoof Charles Taylor kan deze gedachte uitgewerkt worden in een zogenaamde Articulatie-Ethiek. In deze denklijn zijn morele conflicten gelegenheden om het eigen zelf-begrip te verfijnen. Zo'n proces kan inderdaad tot stabiele oplossingen leiden. Het is alleen niet duidelijk welk zelf-begrip authentiek is. Het probleem daarvan is dat er op elk willekeurig moment elke willekeurige transformatie van zelf-begrip gerechtvaardigd zou zijn, waardoor oplossingen niet stabiel zijn. 4. Het idee: De Transformatieve Dialoog * Het kernidee van de Transformatieve Dialoog is om de normatieve rechtvaardiging die de Articulatie-Ethiek ontbeert geïnspireerd door de Discours Ethiek vorm te geven als een vorm van overeenstemming die tot stand komt in een specifieke dialoog, de Transformatieve Dialoog. De Transformatieve Dialoog wordt uitgewerkt in vijf stappen: o Stap 1: Commitment aan conflictoplossing (zie punt 6); o Stap 2: Fusie van horizonnen; o Stap 3: Alternatieven van zichzelf onderscheiden; o Stap 4: Interne en externe consistentietoets in netwerken van commitments; o Stap 5: Transformatie: identificatie als een nieuw alternatief van zichzelf. * Een belangrijke belemmering voor een succesvolle Transformatieve Dialoog is de overtuiging van een min of meer vaststaande identiteit. Immers, als een identiteit vaststaat, waarom en hoe zou je dan alternatieven van jezelf onderscheiden en overwegen? Vanuit cognitieve theorievorming is er echter geen aanleiding om uit te gaan van een vaststaande identiteit. Identiteit komt tot stand in interactie met anderen, waarbij opgroeiende kinderen hun zelf-begrip bij opeenvolgende coördinatieproblemen bijstellen. Een coördinatieprobleem wil zeggen dat partijen elkaar in de weg zitten bij iets dat zij trachten te bereiken. Zo'n coördinatieprobleem kan betrekking hebben op zelf-expressie of het tot uitdrukking brengen van iemands zelf-begrip. Om harmonieus samenleven te bereiken passen opgroeiende kinderen (en soms ook volwassenen) hun zelf-begrip aan. Ofwel, mensen vormen elkaar ('mindshaping'). * Bij succesvolle socialisatie nemen zulke coördinatieproblemen af, waardoor iemands zelf-begrip voortdurend herbevestigd wordt en gefixeerd raakt. Het lijkt dan alsof we een min of meer vaststaande identiteit hebben. Dit ingesleten proces is echter niet productief in een geglobaliseerde wereld waarin ook volwassenen herhaaldelijk geconfronteerd worden met identiteitsgerelateerde coördinatieproblemen en actuele vraagstukken zoals klimaatverandering mondiale samenwerking vereisen. 5. Intersubjectief begrip van authenticiteit en autonomie * Het idee van overeenstemming in een Transformatieve Dialoog moet de autonomie van betrokken partijen waarborgen, anders is de oplossing niet rechtvaardig (maar onderdrukkend). * Autonomie en authenticiteit moeten intersubjectief worden begrepen. Zelf-begrip vindt altijd plaats binnen een in interactie gevormde betekenishorizon. Zelf-begrip is daarom altijd al intersubjectief bepaald, en daarmee is wat authentiek kan zijn ook intersubjectief bepaald. Binnen wat authentiek kan zijn voor iemand, zijn er aspecten die geen aanleiding geven tot een conflict. Deze kunnen individueel gekozen worden. Aspecten van zelf-begrip waar conflict over ontstaat, behoeven een Transformatieve Dialoog om te bepalen wat authentiek is. 6. Erkenning en morele rechtvaardiging van de Transformatieve Dialoog * Om een identiteit te ontwikkelen is het noodzakelijk voor mensen om bevestiging en erkenning te krijgen. Relaties van sociale erkenning blijven nodig om zelfexpressief te kunnen zijn; sociale erkenning is constitutief voor het hebben van een identiteit. * Als mensen geen erkenning ervaren, dan is er sprake van miskenning. Mensen worden dan belemmerd in hun zelf-expressie. Aangezien het uitgangspunt is dat iedereen mag zijn wie hij of zij is, is miskenning onrechtvaardig. Het is moreel vereist om anderen de erkenning te geven die nodig is voor hun zelf-expressie (die wil je immers ook zelf ontvangen). * In een IRMC is er wederzijds sprake van miskenning. Omdat miskenning ongerechtvaardigd is, is het oplossen van een IRMC dan ook moreel vereist. * Daarmee is de Transformatieve Dialoog nog niet helemaal gerechtvaardigd, want het commitment aan de Transformatieve Dialoog veronderstelt al dat mensen geen vaststaand zelf-begrip hebben. In IRMC's hebben mensen juist wèl een min of meer vaststaand zelf-begrip. Ik voeg daarom een argument toe waarmee ik laat zien dat het zelf-ondermijnend is om in een IRMC niet gecommitteerd te zijn aan de Transformatieve Dialoog. De kern van dit argument is dat iemand alleen zelfexpressief kan zijn als hij of zij relaties van sociale erkenning onderhoudt (en die zijn per definitie wederzijds). Binnen zulke relaties kan een identiteitsgerelateerd coördinatieprobleem ontstaan. Om de relatie van sociale erkenning in stand te houden is een commitment aan oplossing van zo'n identiteitsgerelateerd coördinatieprobleem noodzakelijk, en dat impliceert een commitment aan de Transformatieve Dialoog. 7. Institutionalisering van de Transformatieve Dialoog * De Transformatieve Dialoog verrijkt de deliberatieve traditie om sociale conflicten op te lossen door rationeel overleg, met een dialoog die niet argumentatief is, maar over fundamentele waarden gaat. Gegeven onze geglobaliseerde wereld is het vermogen tot de Transformatieve Dialoog nodig om hardnekkige conflicten stabiel en rechtvaardig op te lossen. * Er ontstaat dan een transformatief-deliberatieve samenleving waarin mensen vaardig zijn om identiteitsgerelateerde coördinatieproblemen op te lossen door wederzijdse 'mindshaping'. * De basis is een verandering in ons begrip van wat authentiek is. Authenticiteit gaat niet over een ware identiteit in feitelijke zin, maar authenticiteit gaat over een onderlinge overeenstemming over ieders zelf-begrip zodanig dat identiteitsgerelateerde coördinatieproblemen worden opgelost. Meer weten over toepassing in de praktijk? * Kijk op www.videadvies.nl/videpedia. Vragen of meedenken? Wil je van gedachten wisselen over het creëren van partnerschap in jouw situatie, heb je een vraag of een idee dat je wilt delen, mail dan naar email@example.com. Florian Bekkers, september 2022 -o-
<urn:uuid:79a253f4-33bc-486a-9903-b989ae6c5495>
HuggingFaceFW/finepdfs/tree/main/data/nld_Latn/train
finepdfs
nld_Latn
11,683
IN THE COURT OF APPEALS OF TENNESSEE AT KNOXVILLE July 20, 2021 Session JENNIFER KING v. DELFASCO, LLC, ET AL. Appeal from the Circuit Court for Greene County No. 14-CV-409 Beth Boniface, Judge No. E2020-01038-COA-R3-CV This appeal concerns an alleged violation of Tenn. Code Ann. § 50-1-304, the Tennessee Public Protection Act ("TPPA"), as well as common law retaliatory discharge. Jennifer King ("King"), a former shipping and receiving coordinator for Delfasco, LLC, a company that manufactures defense-related products, sued Delfasco, LLC and related entity Delfasco Finance, LLC ("Delfasco" collectively) in the Circuit Court for Greene County ("the Trial Court") alleging she was wrongfully fired for refusing to share with Delfasco owner Jack Goldenberg ("Goldenberg") her government-issued password to the Department of Defense ("DOD") Wide Area Workflow ("WAWF") system. King had consulted a DOD representative who advised her not to reveal her password. After a trial, the Trial Court found in favor of King and awarded her damages. Delfasco appeals, arguing among other things that King was not asked to perform an illegal act. King raises her own issues concerning damages. We find, inter alia, that the evidence does not preponderate against the Trial Court's factual findings, and we leave undisturbed the Trial Court's credibility determinations. King acted under the reasonable belief that it was unlawful to share her password with Goldenberg. Further, the record reflects that King was fired solely because she refused to reveal her password to Goldenberg. We affirm the judgment of the Trial Court in its entirety, and remand for an award to King of her reasonable attorney's fees incurred on appeal. Tenn. R. App. P. 3 Appeal as of Right; Judgment of the Circuit Court Affirmed; Case Remanded D. MICHAEL SWINEY, C.J., delivered the opinion of the court, in which J. STEVEN STAFFORD, P.J., W.S., and THOMAS R. FRIERSON, II, J., joined. Henry C. Shelton, III, Lucian T. Pera, and J. Bennett Fox, Jr., Memphis, Tennessee, for the appellants, Delfasco, LLC and Delfasco Finance, LLC. Jimmie C. Miller and Joseph B. Harvey, Kingsport, Tennessee, for the appellee, Jennifer King. OPINION Background King worked for Delfasco, LLC, and its predecessor Delfasco, Inc., from 1995 until her termination on October 23, 2013. In 2010, Goldenberg bought Delfasco and became King's new boss. Delfasco does much of its business with the DOD. King applied for payment on Delfasco's behalf by submitting electronic invoices via WAWF, a governmental system. As a prerequisite for using WAWF, King had to agree to the terms of the User Agreement. The User Agreement provided, as relevant: All Users shall: … Protect their password(s) and/or Common Access Card (CAC) personal identification number (PIN). Promptly change their password/PIN when possibly compromised, forgotten or when it appears in an audit document. Immediately notify their Terminal Area Security Officer (TASO) or their IAM [Information Assurance Manager] if they believe their password/PIN has been compromised and promptly change their password/PIN. (Your TASO or IAM will verify that your password changed and/or PIN has been reset.) *** I understand that I may be subject to civil, criminal or administrative action for failure to follow the DoD Standard User Agreement, and the System Security and Privacy Rules of Behavior (ROB/ Acceptable Use Policy (AUP) applicable to me. At some point before October 15, 2013, King made certain typographical errors on invoices that resulted in Delfasco not getting paid promptly. Goldenberg, based in New York, emailed King to ask about the delay. King responded that she was working to resolve the issue. Part of their email exchange, which is contained in the record, went as follows: Oct 16, Goldenberg to King "If you knew this yesterday why do I have to find out today? I am very frustrated and upset that 160k is in limbo because of your "mistakes" and lack of communication" Oct 16, King to Goldenberg "All I can say is I am sorry and trying to fix it the quickest way possible" This sort of back-and-forth drew on over a week's time. Eventually, Goldenberg demanded that King share her WAWF password with him. King refused. Goldenberg stated he would fire her if she did not comply. King stuck to her refusal, and Goldenberg fired her. The email exchange culminated as follows: Oct 22, Goldenberg to King "Send me the login info now!" Oct 22, King to Goldenberg "With all due respect I am not able to give you my login password[.] WAWF has informed me that you will have to set up an account under your name with your login information. Do you wish me to circumvent their direction to me? If so I will send it immediately. I am not trying to make this difficult I am only trying to abide by the rules of the government." Oct 22, Goldenberg to King "You have 2 options. 1 send me the info. Its my company and what ever access u have is with my consent. 2 file for unemployment tom. Ur choice." Oct 23, King to Goldenberg, copy Tammee Rohr "Jack, Last week when I corrected invoices I was instructed by DFAS to correct receiving reports manually and have Deanna to sign off on them then fax them to DFAS. Every time I have spoke to DFAS they have told me they had the faxed copies just having to match them to invoices. On Monday DFAS told me they were in payable status so I did not know there was anymore issues till you emailed me yesterday. I called DCMA yesterday to see if they could tell me what was going on…." Oct 23, Goldenberg to King "Why did you come in today?" Oct 23, King to Goldenberg "I reported today just like always this is my place to work" Oct 23, Goldenberg to King "So let me make it clear for you get out from my plant. Your last day was yesterday." King's 18-year tenure at Delfasco thus came to an end. In September 2014, King sued Delfasco in the Trial Court alleging common law retaliatory discharge and violation of the TPPA. Delfasco filed an answer in opposition. Delfasco also filed two motions for summary judgment, which were denied. In March 2020, this case was tried without a jury. King requested, among other damages, emotional distress damages and punitive damages. Goldenberg did not testify at trial; King, among other witnesses, did. 1 We proceed to review the pertinent testimony. King, age 56, testified she was fired for refusing to reveal her WAWF password to Goldenberg despite his insistence that she do so. King stated she refused because "[WAWF] said it was illegal to reveal our passwords." King testified to the nature of Delfasco's business and its hierarchy when she worked there. Delfasco is involved in metal fabricating, and has a facility in Greeneville, Tennessee. From 2001 or 2002, King's supervisor was Tammee Rohr ("Rohr"). Randy Shipley ("Shipley") was plant manager. Goldenberg was Delfasco's owner from 2010 onward. Goldenberg did not work on site but visited the facility from time to time. King testified that she held negative views of Goldenberg's management of Delfasco. King stated, for example, that Goldenberg once "put money into our personal accounts and pulled it out." King stated further that Goldenberg had gone "behind the government's back and brought in material that wasn't approved by the government." King also testified that Goldenberg brought in one Clyde Mullins as a consultant to assist in operations. King then testified regarding WAWF, the governmental electronic system at the heart of the present dispute. King stated that DOD suppliers were required to use this system. Defense Logistics was the agency that administered WAWF. King testified to how WAWF worked: Well, we had items to be shipped to the government. There was line items on the contract, and the quality inspector for the government would come and inspect our parts. And, once they approved it, I would submit the invoice by putting in the quantity, the amount, and the line item of the contract we were shipping against. And it would go up through the [WAWF] system. Once it was approved, it would send an email back saying that the invoice had been approved for payment. 1 Goldenberg was deposed, but his deposition was not introduced at trial. King stated that she needed a password to access WAWF. King testified to the application process she underwent to obtain her WAWF password: At the time when I did mine, there was paperwork that I had to fill out. At one time they even requested -- I had to prove why my name had changed. I had been married and divorced and remarried, and I had to show my marriage license and my divorce papers why my name had changed [sic]. King testified that the agreement she signed to obtain a password contained a "statement of accountability" stating in part: "I understand my obligation to protect my password certificate. I assume the responsibility for the data and system I am granted access to. I will not exceed my authorization access." Continuing her testimony, King stated that she loved her job at Delfasco and was good at it. King then was asked about delays in the shipment of Delfasco products, particularly in regard to "first article testing." King described first article testing as follows: When we get a contract you have to have a submission of vendors. And the government comes in and you have that layout of the vendors. And, once the first article is completed, there's a vendor list and you can't go and get another vendor for that product; you have to stay with those vendors. King stated that shipment of Delfasco products had been delayed in the past because of problems with first article testing. For instance, in March 2013, Delfasco's product was put on hold. In October 2013, the government finally agreed to release the product. However, there was a problem with the invoices. King made an error—specifically, a typo. King testified that Goldenberg was aware of this error as of October 15, 2013. Goldenberg went on to press King to give him her WAWF password. King explained why she was hesitant to give Goldenberg her WAWF password upon his demand: "Because of the things he had done in the past with our paychecks, with the law; he had been arrested for fraudulent activity and I was afraid to give him my password." After Goldenberg made his demand, King called WAWF to ask whether it would be appropriate to share her password. According to King, she spoke to an administrator at WAWF. King testified to her conversation with this administrator as follows: I told him that the owner of the company, Mr. Goldenberg, was wanting my password and that he was threatening to terminate me if I did not give him my password. They told me that it was illegal, he could not terminate my position for -- revealing my password, that he had to create his own account and get his own password. As to her options at this point, King stated: "Well, it wasn't much of an option; I either had to commit a crime or lose my job. So I did not reveal my password to him." King testified that no one else at Delfasco had access to her WAWF password in October 2013. Proceeding with our review of the testimony, King was asked to read an email Goldenberg sent to Rohr asking who else in the company might have a WAWF password. Rohr responded that no one else had a WAWF password that she was aware of, and that whenever King shared her password with Rohr when she was out of town, etc., King would change the password upon her return. King acknowledged that, on occasion, she had shared her password with Rohr. King also testified that she kept her password on a post-it note stuck on her computer monitor in her office which Rohr could see. King testified that she and Rohr were the only people who had keys to her office. King stated she never thought about whether sharing her password with Rohr might be illegal until Goldenberg asked for it. King, again citing her negative views about Goldenberg, explained: "Because of the things he had done in the past, he just wasn't trustworthy. And so that's why I called Wide Area Workflow, to confirm about revealing my password to him." King testified that after her conversations with WAWF, she never shared her WAWF password with anyone else again. King testified she was "devastated" to lose her job of 18 years. King saw a doctor the day after she was fired. King was prescribed a "mild nerve medicine" to calm her down which she took for a "short time." King suffered from depression. With regard to her search for a new job, King stated that she was overqualified for many positions. In February 2015, King found a new permanent job. King began her new job as a shipping and receiving clerk. She later took a position as shipping coordinator. King stated that "[d]ue to this loss of my job, my husband and I have lost about everything. We have no savings. We can't recoup that." King stated of Goldenberg: "He gave me the choice of employment or committing a crime. So that's no choice." The video deposition of Kym Witherspoon ("Witherspoon"), Information Systems Security Manager for the Defense Logistics Agency, was introduced. Counsel for Delfasco objected: MR. HUTCHINSON: Your honor, I have a variety of ongoing objections to portions of this testimony. But I guess one of my initial objections will be that Ms. Witherspoon testified -- and I believe you've heard this before -- that to have someone use someone else's password is unauthorized according to the terms of the user agreement. And we continue our objection that that should not be allowed because that is opinion testimony … And she's not qualified as an expert. *** MR: RANGE: The other basis, Your Honor, for that particular objection, I think is that the document speaks for itself. Over Delfasco's objections, the Trial Court admitted Witherspoon's deposition. As relevant, Witherspoon stated that disclosing one's WAWF log-in credentials to another person makes the disclosing party subject to criminal penalties. Witherspoon testified that King had been issued a personal and unique username and password for the WAWF system. Witherspoon testified further that Goldenberg was not authorized to access the password-protected areas of WAWF using King's log-in information. After Witherspoon's video deposition was played, portions of Clyde Mullins' deposition were read. Clyde Mullins had advised King that she should tell Goldenberg to get his own WAWF password. Shipley, Delfasco's plant manager at the time of these events, testified. Shipley worked at Delfasco for 30 years before resigning voluntarily. Shipley testified it "would usually take almost a year to terminate anyone" at Delfasco and that progressive discipline typically would be implemented. Shipley testified he was unaware of any Delfasco employees having been terminated over typographical or paperwork errors. When Goldenberg demanded King's password, King went to see Shipley. Shipley testified to what he told King: I told her that it looked like she had a decision to make, that she could either give it to Mr. Goldenberg or it looks like he was going to fire her. And I'll just tell you, when I seen that, I knew she was in between a rock and a hard place. She had to pick the less of the two evils. Rohr, formerly King's supervisor, also testified. Rohr began working for Delfasco in 1989 and still worked there as of trial. Rohr stated she recalled no discussion about King having been fired for job performance reasons. Rather, King told Rohr she was fired for not providing her password. After King was fired, Rohr obtained her own WAWF password and username. Rohr testified she did not remember the last time King shared her password with her, but stated "[t]here was always a piece of paper on her desk -- or on her monitor with passwords." Rohr testified that, as for herself, she did not share her WAWF password with anyone. Rohr stated that anyone who wishes to access WAWF must obtain her own password and username. Rohr testified that when King told her Goldenberg was demanding her password, Rohr's response was something along the lines of "it's your password, it's your call." Rohr testified that Goldenberg has since obtained his own WAWF password. At this juncture, King returned to the stand. King stated she believed Goldenberg wanted her password so he could see the invoices at issue for himself. King testified that if Goldenberg had used her password to access WAWF, it would have shown as though King herself were using the system. Goldenberg then could then have looked at or changed invoices—provided they were not already approved—as though he were King. Finally, Robert Baird McDonald, Jr. ("McDonald"), a forensic accountant and consultant, testified as an expert for Delfasco. In McDonald's view, WAWF safeguards would have made it highly unlikely that fraud could be committed on the system, which was a concern King testified to as a basis for her reluctance to give Goldenberg her password. McDonald testified at length to WAWF's security measures, concluding thusly: [A]gain, once that final 3-item verification takes place, payment's scheduled only then … [T]he visibility by the various stakeholders in terms of each -each step of the way. And, so for these reasons, I think the system has transactional integrity. And that's why I think that fraud, if it were to be attempted by using the WAWF system, would be exceptionally difficult in every respect. On cross-examination, McDonald stated, among other things, that government contracting is different from other industries; that accessing WAWF is not analogous to accessing, for example, Netflix, Yahoo, MySpace, or Facebook accounts; and that he was not offering the opinion that WAWF's instruction to King that she could not disclose her password was incorrect. In March 2020, the Trial Court entered its memorandum opinion. The Trial Court found that King had proven her claims against Delfasco of common law retaliatory discharge and violation of the TPPA. However, the Trial Court ruled against King with respect to her requests for emotional distress damages and punitive damages. In its detailed memorandum opinion, the Trial Court found, in part: 1. Retaliatory Discharge, Tennessee Code Annotated § 50-1-304 and the common law King must show the following elements to be successful in her claim for retaliatory discharge under T.C.A. § 50-1-304: 1. [That] King is an employee of the defendant employer; 2. That she refused to participate in, or remain silent about, "illegal activities" as defined in the statute; 3. That she was terminated from her employment; and 4. That an exclusive causal relationship exists between her refusal to participate in/remain silent about illegal activities and her termination. Voss v. Shelter Mut. Ins. Co., 958 S.W.2d 342, 344 (Tenn. Ct. App. 1997). The elements of common law retaliatory discharge are very similar: 1. That she was an employee-at-will; 2. That she was discharged; 3. That the reason for the discharge was that she attempted to exercise a statutory or constitutional right. Or for any other reason which violates a clear public policy evidenced by an unambiguous constitutional, statutory, or regulatory provision; and 4. That the employee's action was a substantial factor in the employee's discharge. Crews v. Buckman Labs Int'l, Inc., 78 S.W.3d 852, 862 (Tenn. 2002). All previous facts are incorporated herein. Under the Tennessee Public Protection Act, Tennessee Code Annotated § 50-1-304, elements 1 and 3 are uncontested. King was an employee of Delfasco whose employment was terminated on October 23, 2013. The first contested issue is whether King refused to participate in or remain silent about "illegal activities" as defined in the statute. King declined to provide her log-in information to Goldenberg because she reasonably believed that to do so would be unlawful. Mason v. Seaton, 942 S.W.2d 470, 472 (Tenn. 1997). King refused to violate the terms of the User Agreement and did not facilitate Goldenberg in accessing the password-protected areas of the DOD website, WAWF. Defendants argue that sharing her log-in credentials would be akin to someone accessing a Netflix account or MySpace account. This comparison is not credible. The process of applying for permission to access the governmental website is stringent. There is no meaningful vetting of a Netflix account user. Sharing movies is in no way comparable to accessing a secure DOD website. The DLA [Defense Logistics Agency] maintains many security checks to avoid fraudulent activity on its WAWF system. One of the security measures is the use of personal log-in information so that any activity may be tracked to the source. King sought advice from the DLA and was told not to share her password. The DLA sent King the User Agreement, which clearly stated that she was to protect her log-in information from dissemination, and failure to do so could result in "civil, criminal or administrative action." The evidence is clear and convincing that an exclusive causal relationship existed between King's refusal to provide her personal log-in information and her termination. Goldenberg did not appear at trial. The only credible evidence at trial was Goldenberg's emails showing that King was fired for not providing her password. There had never been any discipline of King, and her firing was contemporaneous to her refusal to deliver her log-in information. Her co-workers believe that her employment was terminated due to her decision to protect her log-in information. Defendants argue that King was fired for insubordination, but the only insubordination was her refusal to comply with Goldenberg's ultimatum. The elements of common law retaliatory discharge are that King was an employee-at-will, who was discharged because she attempted to exercise a statutory or constitutional right or for any other reason which violates a clear public policy evidenced by an unambiguous constitutional, statutory, or regulatory provision; and that her action was a substantial factor in the employee's discharge. It is uncontested that King's employment was terminated. King credibly states that her focal reason for not disclosing her personal information was that she consulted a DOD administrator who instructed her to withhold her log-in information. She points to her email wherein she denied access to her personal information and stated that she was "only trying to abide by the rules of the government." King did not know what specific law she would violate by allowing Goldenberg to access the DOD website with her log-in information, but she relied on the User Agreement, which mandates sharing her credentials could subject her to "civil, criminal or administrative action." King did not have an opportunity to consult with an attorney, Goldenberg issued an ultimatum, and she had to decide immediately. Upon her declination, Goldenberg fired her. With regard to King's request for emotional distress damages, the Trial Court found as follows: King lost medical insurance benefits totaling $5,096 and fringe benefits of $16,625. At trial, King testified that she was distraught over the loss of her job and cried non-stop for two days. She sought medical treatment on March 24, 2013 [sic], and took medicine for a short period of time. King did not require long-term treatment, and she only saw her treating physician once on March 24, 2013 [sic]. King's mental distress was appropriate due to her employment status, but her stress did not rise to the level or duration deserving of monetary damages. With respect to King's request for punitive damages, the Trial Court found as follows: Delfasco's conduct harmed King, and she should be compensated for her loss, but Delfasco's actions were not egregious and do not justify the imposition of punitive damages. Delfasco was not condoning sexual abuse of a minor, as seen in LaMore v. Check Advance of Tennessee, LCC, No. E20090442COAR3CV, 2020 WL 323077 (Tenn. Ct. App. Jan. 28, 2010). There was no pattern of retaliation by Delfasco, as seen in Coffey v. Fayette Tubular Products, 929 S.W.2d 326 (Tenn. 1996). Delfasco improperly fired King and she deserves compensation, but the conduct does not warrant punitive damages. The Trial Court awarded King damages for backpay, frontpay, lost benefits, prejudgment interest, attorney's fees, and costs. An additional hearing was later held regarding King's motion for attorney's fees. In July 2020, the Trial Court entered its final order regarding damages and fees. Delfasco timely appealed to this Court. Discussion We restate and consolidate the issues raised by Delfasco on appeal as follows: 1) whether the Trial Court erred in concluding that King had a reasonable belief that sharing her password with Goldenberg was unlawful; 2) whether the Trial Court erred in concluding that King's refusal to share her password was the sole basis for her termination; 3) whether the Trial Court erred in admitting DOD employee Witherspoon's deposition testimony; and 4) whether the Trial Court erred in awarding King attorney's fees under the TPPA. Although not stated exactly as such, King raises the following separate issues: 1) whether the Trial Court erred in declining to award King any damages for emotional distress; 2) whether the Trial Court erred in declining to award King punitive damages; and 3) whether King is entitled to an award of attorney's fees incurred on appeal. Our review is de novo upon the record, accompanied by a presumption of correctness of the findings of fact of the trial court, unless the preponderance of the evidence is otherwise. Tenn. R. App. P. 13(d); Bogan v. Bogan, 60 S.W.3d 721, 727 (Tenn. 2001). A trial court's conclusions of law are subject to a de novo review with no presumption of correctness. S. Constructors, Inc. v. Loudon County Bd. of Educ., 58 S.W.3d 706, 710 (Tenn. 2001). Regarding witness credibility, our Supreme Court has stated: When it comes to live, in-court witnesses, appellate courts should afford trial courts considerable deference when reviewing issues that hinge on the witnesses' credibility because trial courts are "uniquely positioned to observe the demeanor and conduct of witnesses." State v. Binette, 33 S.W.3d 215, 217 (Tenn. 2000). "[A]ppellate courts will not re-evaluate a trial judge's assessment of witness credibility absent clear and convincing evidence to the contrary." Wells v. Tennessee Bd. of Regents, 9 S.W.3d 779, 783 (Tenn. 1999); see also Hughes v. Metro. Gov't of Nashville & Davidson Cnty., 340 S.W.3d 352, 360 (Tenn. 2011). In order for evidence to be clear and convincing, it must eliminate any "serious or substantial doubt about the correctness of the conclusions drawn from the evidence." State v. Sexton, 368 S.W.3d 371, 404 (Tenn. 2012) (quoting Grindstaff v. State, 297 S.W.3d 208, 221 (Tenn. 2009)). Whether the evidence is clear and convincing is a question of law that appellate courts review de novo without a presumption of correctness. Reid ex rel. Martiniano v. State, 396 S.W.3d 478, 515 (Tenn. 2013), (citing In re Bernard T., 319 S.W.3d 586, 596-97 (Tenn. 2010)), cert. denied, ––– U.S. ––––, 134 S.Ct. 224, 187 L.Ed.2d 167 (2013). Kelly v. Kelly, 445 S.W.3d 685, 692-93 (Tenn. 2014). We first address whether the Trial Court erred in concluding that King had a reasonable belief that sharing her password with Goldenberg was unlawful. This Court has outlined the elements for claims of retaliatory discharge under the TPPA and at common law as follows: Under the TPPA, "[n]o employee shall be discharged or terminated solely for refusing to participate in, or for refusing to remain silent about, illegal activities." Tenn. Code Ann. § 50-1-304(b) (2014) (emphasis added). To state a claim for relief under the Act, a plaintiff must allege that (1) the plaintiff was an employee of the defendant; (2) the plaintiff refused to participate in or remain silent about illegal activity; (3) the defendant employer terminated the plaintiff's employment; and (4) the sole reason for termination was plaintiff's refusal to participate in or remain silent about the illegal activity. Davis v. Vanderbilt Univ. Med. Ctr., No. M2019-01860COA-R3-CV, 2020 WL 4516094, at *3 (Tenn. Ct. App. Aug. 5, 2020), perm. app. denied (Tenn. Nov. 12, 2020) (citing Webb, 346 S.W.3d at 437). Our Supreme Court has emphasized that this statutory cause of action "requires an employee to show that his or her refusal to remain silent was the sole reason for the discharge." Haynes v. Formac Stables, Inc., 463 S.W.3d 34, 37 (Tenn. 2015) (citing Guy v. Mut. of Omaha Ins. Co., 79 S.W.3d 528, 537 (Tenn. 2002)). The TPPA defines illegal activities as "activities that are in violation of the criminal or civil code of this state or the United States or any regulation intended to protect the public health, safety or welfare." Tenn. Code Ann. § 50-1-304(a)(3). At all stages of a case, the plaintiff has the burden of establishing a prima facie case of retaliatory discharge. Id. § 501-304(f). *** To state a claim for common law retaliatory discharge, a plaintiff must allege that (1) an employment-at-will relationship existed; (2) he was discharged; (3) the reason for his discharge was that he attempted to exercise a statutory or constitutional right, or for any other reason which violates a clear public policy evidenced by an unambiguous constitutional, statutory, or regulatory provision; and (4) a substantial factor in the employer's decision to discharge him was his exercise of protected rights or his compliance with clear public policy. Richmond v. Vanguard Healthcare Servs., LLC, No. M2014-02461COA-R3-CV, 2016 WL 373279, at *9 (Tenn. Ct. App. Jan. 29, 2016) (citing Collins v. AmSouth Bank, 241 S.W.3d 879, 884 (Tenn. Ct. App. 2007)). Notably, unlike a TPPA claim, a retaliatory discharge claim under common law requires the plaintiff to show that the alleged protected action was a substantial factor, not the sole factor leading to termination. Id. (citing Williams v. City of Burns, 465 S.W.3d 96, 111 (Tenn. 2015)). This cause of action aims to balance '"the employment-at-will doctrine and rights granted employees under well-defined public policy."' Konvalinka, 2019 WL 2323831, at *4 (citation omitted). However, this "public policy exception" to the employment-at-will doctrine "must be narrowly construed to prevent it from 'consum[ing] or eliminat[ing] the general rule.'" Id. (quoting Chism v. Mid-S. Milling Co., 762 S.W.2d 552, 556 (Tenn. 1988)). Thus, a common law retaliatory discharge claim is available only "'in limited circumstances, [where] certain well-defined, unambiguous principles of public policy confer upon employees implicit rights which must not be circumscribed or chilled by the potential of termination.'" Quinn-Glover v. Reg'l Med. Ctr. at Memphis, No. W201100100-COA-R3-CV, 2012 WL 120209, at *6 (Tenn. Ct. App. Jan. 17, 2012) (internal quotation marks omitted) (citing Franklin v. Swift Transp. Co., Inc., 210 S.W.3d 521, 530-31 (Tenn. Ct. App. 2006) (citation omitted)). Parker v. ABC Technologies, Inc., No. M2020-00675-COA-R3-CV, 2021 WL 694912, at *4-5 (Tenn. Ct. App. Feb. 23, 2021), no appl. perm. appeal filed. 2 To prevail on a TPPA claim, a plaintiff must prove each element of the claim by a preponderance of the evidence. Coffey v. City of Oak Ridge, No. E2013-02200-COA-R3-CV, 2014 WL 4536364, at *3 (Tenn. Ct. App. Sept. 12, 2014), Rule 11 perm. app. denied Jan. 16, 2015. 3 An employee may not prevail under the TPPA simply by characterizing the employer's actions as "wrong" nor by citing "public policy" in a conclusory fashion. Sanders v. Henry Cnty., No. W2008-01832-COA-R3-CV, 2009 WL 1065916, at *8 (Tenn. Ct. App. April 21, 2009), Rule 11 perm. app. denied Oct. 19, 2009. Rather, an employee's burden as to element (2) of a TPPA claim has been described as "formidable." Id. In support of her contention that sharing her WAWF password with Goldenberg would have been an "illegal activity" under the TPPA, King cites, alongside the User Agreement, the Tennessee Personal and Commercial Computer Act and the federal Computer Fraud and Abuse Act for the proposition that "unauthorized access" to a governmental computer system is unlawful. Under the Tennessee statute cited by King, "[w]hoever intentionally and without authorization, directly or indirectly: (1) Accesses any computer, computer system, or computer network commits a Class C misdemeanor…." Tenn. Code Ann. § 39-14-602(b)(1) (2018). Under the federal statute cited by King, it is unlawful to "intentionally access[] a computer without authorization or exceed[] authorized access, and thereby obtain[] … (B) information from any department or agency of the United States; or (C) information from any protected computer;…" 18 U.S.C. § 1030(a)(2). As relevant, a "protected computer" is one used in or affecting interstate or foreign commerce or communication. 18 U.S.C. § 1030(e)(2)(B). King brought these statutes to the Trial Court's attention, as well. Our inquiry, however, is not whether it would have been conclusively illegal for King to have shared her WAWF password with Goldenberg for purposes of the TPPA. As this Court has explained, it is sufficient for the employee to have reasonably believed that the activity in question was illegal: The trial court incorrectly concluded that the law requires that a plaintiff show an instruction from his or her employer to participate in illegal 2 We observe that effective July 1, 2014, the TPPA was amended to "abrogate[ ] and supersede[ ] the common law with respect to any claim that could have been brought under this section." See Williams v. City of Burns, 465 S.W.3d 96, 110 n.11 (Tenn. 2015); Tenn. Code Ann. § 50-1-304(g). The amendment applies to actions accruing on or after July 1, 2014. See 2014 Tennessee Laws Pub. Ch. 995 (S.B. 2126). 3 Although not raised as an issue, we note that the Trial Court found King had proven her claims by clear and convincing evidence. While clear and convincing evidence is the applicable standard for an award of punitive damages as we will discuss further herein, based on our research it does not appear to be the applicable standard for common law retaliatory discharge or claims brought under the TPPA. activities. There is no such requirement in the law. Mason v. Seaton, 942 S.W.2d at 475-76. Furthermore, the plaintiffs do not have the burden of proving that the actions they complained of were conclusively illegal. Rather, it is sufficient if they had reasonable cause to believe that illegal conduct had occurred or would occur and reported it in good faith. See id. at 472. ("The statute's protection extends to employees who have reasonable cause to believe a law, regulation, or rule has been violated or will be violated, and in good faith report it.") Sykes v. Chattanooga Housing Authority, No. E2008-00525-COA-R3-CV, 2009 WL 2365705, at *13 (Tenn. Ct. App. July 31, 2009) aff'd 343 S.W.3d 18 (Tenn. 2011). Nevertheless, under the TPPA, "[a plaintiff] must identify the law and policy that [he or she] contends was contravened and must be able to substantiate these allegations to some degree." Richmond v. Vanguard Healthcare Servs., LLC, No. M2014-02461-COA-R3CV, 2016 WL 373279, at *7 (Tenn. Ct. App. Jan. 29, 2016) (citations and quotation marks omitted), R. 11 perm. app. denied Nov. 16, 2016. For its part, Delfasco points to, among other cases, Chua v. St. Paul Fed. Bank for Sav., 1996 WL 312079 (N.D. Ill. June 7, 1996) for the proposition that an employee's refusal to provide a password to her superior is not protected activity when that employee only has the password by virtue of her employment. In the Chua case, Chua sued the defendant bank alleging he was wrongly terminated for refusing to give his password to his superior. Id. at *1-2. Chua cited a "Fedline User Guide" as a basis for withholding his password, which contained a Password protection sub-section providing: "It is your responsibility to protect your password from use by others. Your password should not be shown or given to anyone else." Id. at *7. The District Court ruled against Chua at the summary judgment stage, stating: Lao Chua argues that because his refusal to divulge his security access codes was made in good faith, he is entitled to a trial on his whistleblower claims without regard to whether the FRB's security procedures were mandatory or whether they were violated. This argument fails. If Lao Chua's refusal was in good faith and reasonable his actions might be protected. Cf. Alexander v. Gerhardt Enterprises, Inc., 40 F.3d 187, 195 (7th Cir. 1994) (in order to prevail on retaliatory discharge claim, Title VII plaintiff only need show that she reasonably believed in good faith that the practice she opposed violated Title VII; she need not show a prima facie case of discrimination). However, Lao Chua's actions were not reasonable. Although the Fedline User Guide and FRB callback procedure state that fedwire codes and passwords should generally be kept secret, Lao Chua did not own or control his codes and passwords independently from the bank. Rather, Lao Chua held the codes and passwords as an agent of the bank for purposes of doing the bank's business. Accordingly, it was not reasonable for Lao Chua to withhold his security access codes from superiors authorized by the bank to use the fedwire system and in need of training on the fedwire system; Lao Chua was the only bank employee with full access to the fedwire system, and was threatening to resign. To the extent that Lao Chua did not understand his status as an agent of the bank, Lao Chua's ignorance was not reasonable. Lao Chua is not entitled to a trial on his whistleblower claims. Chua, 1996 WL 312079, at *9 (emphases in original). Having reviewed the relevant law, we consider whether King had reasonable cause to believe sharing her WAWF password with Goldenberg would have been illegal. The Trial Court specifically credited King's testimony that she consulted with a DOD administrator who instructed her to withhold her log-in information. Such an instruction coming from a government administrator to not reveal one's password to a secure government system likely would give most reasonable people second thoughts about revealing that password. As observed by the Trial Court, sharing access to a secure DOD website is a far cry from sharing one's Netflix password. To be clear, we do not condone the latter, but the difference in gravity is relevant to determining the reasonableness of King's belief. The Trial Court further found that the Defense Logistics Agency sent King the User Agreement, reiterating that failure to protect her password could result in "civil, criminal or administrative action." We think that to "protect" one's password entails, at the very least, not giving it away to unauthorized persons, even temporarily as Delfasco suggests would be appropriate provided one quickly changed the password thereafter. Although King did not cite a statute or case to Goldenberg as grounds for not revealing her WAWF password, King has since identified 18 U.S.C. § 1030(a)(2) and Tenn. Code Ann. § 39-14-602(b) as laws against unauthorized access to computers. We do not and need not hold that it would have been conclusively illegal under these statutes for King to have given Goldenberg her WAWF password. Again, our inquiry is whether King had reasonable cause to believe revealing her password would be illegal, or, specifically for purposes of her common law claim, whether a clear public policy evidenced by an unambiguous constitutional, statutory, or regulatory provision was violated. The statutes cited by King indeed reflect a clear and definite public policy against unauthorized access to computer systems. Situated in a defense context, this public policy is brought into sharper relief still. Clear public policy, state and federal law, the User Agreement, and the advice given by the WAWF administrator all converge to support King in her contention that her belief was reasonable and substantiated to a sufficient degree. The evidence does not preponderate against the Trial Court's factual findings, nor is there clear and convincing evidence to overturn the Trial Court's credibility determinations. Nevertheless, Delfasco argues that King could not have had a reasonable belief that sharing her WAWF password was illegal when she repeatedly shared it with Rohr and kept it on a post-it note on her computer monitor in her office. According to Delfasco, King only conveniently discovered the potential illegality of this practice when Goldenberg asked for her password. Delfasco points to King's negative views about Goldenberg as evidenced by her testimony. However, as found by the Trial Court, King called and spoke to an administrator who told her she must not share her password. Regardless of King's prior views about Goldenberg or her past practices of sharing her password, this conversation was an intervening event after which King's beliefs changed. The Trial Court found that "King credibly states that her focal reason for not disclosing her personal information was that she consulted a DOD administrator who instructed her to withhold her log-in information." The evidence does not preponderate against this factual finding, and the Trial Court's credibility determination is entitled to deference. We now look to the Chua case cited by Delfasco, which is superficially on-point. However, Chua ultimately is not persuasive for a number of reasons. The plaintiff's claims in Chua were brought under different laws than those of the present case. In addition, the District Court in Chua found that "there is persuasive evidence that the security procedures outlined in the Fedline User Guide were recommendations, not legally binding mandates." Chua, 1996 WL 312079, at *8. That is quite distinct from the evidence in the case before us, as the User Agreement can hardly be deemed a mere set of recommendations. Delfasco argues all the same that "[i]n Chua, as here, it was not only legal for the employee to share a password with his or her supervisor, it was unreasonable not to do so when it is understood that the only reason Ms. King held the password was as an agent of the employer…." (emphasis in original). This is only half-right. It is true that King obtained WAWF passwords only by virtue of her job at Delfasco. However, the government issued King, herself, a personalized password and username. King testified to the background check she underwent as part of the WAWF registration process. This strongly suggests that the WAWF password was not something King could freely give out but instead was personal and exclusive to her. Goldenberg's frustration with King was, on one level, understandable. As boss and company owner, he expected his employee to follow his instructions. Nevertheless, Goldenberg demanded King do something she had reasonable cause to believe was illegal. Goldenberg could have obtained his own log-in credentials if he wanted to access WAWF, which according to the evidence he later did. As found by the Trial Court, King reasonably believed that sharing her government-issued password to a secure DOD system was illegal. The evidence does not preponderate against any of the Trial Court's findings relative to this issue. We affirm the Trial Court in its conclusion that King held a reasonable belief that sharing her password with Goldenberg would have been unlawful. We next address whether the Trial Court erred in concluding that King's refusal to share her password was the sole basis for her termination. Delfasco argues that King was fired for multiple reasons, and thus her TPPA claim must fail. Delfasco points to the series of emails stretching from mid-October 2013 through October 23, 2013 wherein Goldenberg became more and more frustrated with King's excuses for failing to fix the problem with the invoices. However, the Trial Court found that "[t]he only credible evidence at trial was Goldenberg's emails showing that King was fired for not providing her password. There had never been any discipline of King, and her firing was contemporaneous to her refusal to deliver her log-in information." The evidence does not preponderate against these factual findings. We need not infer why King was fired when the reason she was fired was spelled out in an email contained in the record. In fact, Goldenberg teed up the option to King in a perfect binary: either give me your password, or you are fired. King declined to comply as she had reasonable cause to believe it would be illegal for her to do so. She was fired for that and no other reason shown in the record. Any other purported reason offered by Delfasco on appeal, such as that King was fired for incompetence, finds no support in the record. We affirm the Trial Court in its finding that King's refusal to share her password was the sole basis for her termination. Thus, King has successfully proven each element of her TPPA claim. The next issue of Delfasco's that we address is whether the Trial Court erred in admitting DOD employee Witherspoon's deposition testimony. In its brief on appeal, Delfasco asserts: "Witherspoon was not qualified to give a legal opinion and the opinion she did give did not begin to establish the sort of policy protected by either the TPPA or Tennessee common law." However, Delfasco fails to pinpoint any specific prejudice it incurred as a result of Witherspoon's testimony. The Trial Court did not cite Witherspoon's testimony in its memorandum opinion. As to Witherspoon's testimony that not protecting a WAWF password may lead to criminal liability, the User Agreement says as much and speaks for itself. Respectfully, Witherspoon's testimony on this subject was more superfluous than in any way dispositive. If the Trial Court erred in allowing Witherspoon's deposition into evidence, such error was harmless considering the record as a whole as it did not "more probably than not [affect] the judgment or ... result in prejudice to the judicial process." Tenn. R. App. P. 36(b). The final issue of Delfasco's we address is whether the Trial Court erred in awarding King attorney's fees under the TPPA. Tenn. Code Ann. § 50-1-304 (c)(2) (2014) provides: "Any employee terminated in violation of subsection (b) solely for refusing to participate in, or for refusing to remain silent about, illegal activities who prevails in a cause of action against an employer for retaliatory discharge for the actions shall be entitled to recover reasonable attorney fees and costs." On this issue, Delfasco's sole argument is that King failed to prove her TPPA claim, and, therefore, she may not rely on the statute for an award of attorney's fees. King has successfully proven each element of her TPPA claim, and we have affirmed the Trial Court on that claim. Therefore, the Trial Court did not err in awarding King her attorney's fees pursuant to Tenn. Code Ann. § 50-1-304 (c)(2). Moving now to King's issues, we address whether the Trial Court erred in declining to award King any damages for emotional distress. King asserts that the Trial Court concluded she suffered an injury, but that there was no remedy to be had. King states further that the Trial Court, misled by a brief filed by Delfasco, wrongly applied a heightened standard for recovery of damages applicable to claims of negligent infliction of emotional distress and intentional infliction of emotional distress. It is instructive to review what the Trial Court actually found on this issue. The Trial Court found that King was distraught over losing her job and cried non-stop for two days; that King saw her treating physician once and was prescribed medicine; and that King took this medicine for a short period of time and did not require long-term treatment. The Trial Court concluded that "King's mental distress was appropriate due to her employment status, but her stress did not rise to the level or duration deserving of monetary damages." In other words, the Trial Court did not categorically rule out a remedy for emotional distress suffered by King; it simply found as a factual matter that King failed to prove a compensable injury for emotional distress. The evidence does not preponderate against the Trial Court's factual findings relative to this issue. We affirm the Trial Court in its declining King's request for emotional distress damages. We next address whether the Trial Court erred in declining to award King punitive damages. "[B]ecause punitive damages are to be awarded only in the most egregious of cases, a plaintiff must prove the defendant's intentional, fraudulent, malicious, or reckless conduct by clear and convincing evidence. 4 " Hodges v. S.C. Toof & Co., 833 S.W.2d 896, 901 (Tenn. 1992) (footnote in original but renumbered). Hodges defines these types of conduct thusly, as pertinent: A person acts intentionally when it is the person's conscious objective or desire to engage in the conduct or cause the result. Cf. T.C.A. § 39-11302(a) (1991) (criminal definition of "intentional").… A person acts maliciously when the person is motivated by ill will, hatred, or personal spite. A person acts recklessly when the person is aware of, but consciously disregards, a substantial and unjustifiable risk of such a nature that its disregard constitutes a gross deviation from the standard of care that an ordinary person would exercise under all the circumstances. Cf. T.C.A. § 3911-302(c) (1991) (criminal definition of "reckless"). 4 Clear and convincing evidence means evidence in which there is no serious or substantial doubt about the correctness of the conclusions drawn from the evidence. Id. King asserts that three types of conduct, each justifying an award of punitive damages, were proven here: (1) Goldenberg acted intentionally in firing King as found by the Trial Court, by the standard of clear and convincing evidence, (2) Goldenberg acted maliciously by firing King in a brutal and insulting manner, and (3) Goldenberg was reckless by not showing any concern for what the law required by unlawfully firing King. According to King, the Trial Court wrongly relied on a nebulous concept of egregiousness in denying her an award of punitive damages when egregious conduct is simply conduct which is shown to be intentional, fraudulent, malicious or reckless as proven by clear and convincing evidence. King cites Holland v. Sullivan, No. M201600538-COA-R3-CV, 2017 WL 3917142, at *11 (Tenn. Ct. App. Sept. 7, 2017), no appl. perm. appeal filed, in which the Sullivans were found to have made the intentional decision "to deprive Mr. Holland of his security interest in the vehicles after Mr. Holland attempted to possess the BMW. They accomplished their goal by obtaining duplicate titles based on the false representations that the titles were lost and then by using the duplicate titles to sell the BMW." This Court rejected an argument by the Sullivans that theirs was not one of "the most egregious" of cases as contemplated by Hodges. Id. at *12. This Court found instead that clear and convincing proof of intentional conduct was sufficient to warrant punitive damages. Id. This Court stated: "Mr. Holland proved by the clear and convincing standard that the Sullivans acted intentionally and by unlawful means to deprive him of his property interest in the BMW. Thus, as the trial court correctly found, Mr. Holland satisfied the requirements for an award of punitive damages." Id. In King's interpretation of Hodges and progeny, there is no separate analysis for egregiousness. We disagree with King insofar as she completely subsumes consideration of what constitutes 'the most egregious of cases' into a determination of whether the conduct at issue was intentional, fraudulent, malicious or reckless. The Tennessee Supreme Court in Hodges stated clearly that "punitive damages are to be awarded only in the most egregious of cases…." 833 S.W.2d at 901 (emphasis added); see also Sanford v. Waugh & Co., Inc., 328 S.W.3d 836, 849 (Tenn. 2010) ("a reasonable jury could not find by clear and convincing evidence that the Waughs' conduct was intentional, fraudulent, malicious, or reckless to such an extent as to justify punitive damages, nor could it possibly be found to involve the most egregious of wrongs") (emphasis added). Failure to consider whether a case is among the most egregious of cases when deciding whether punitive damages are warranted would be to ignore Hodges. We are not at liberty to do so. In a case of rather different factual and procedural circumstances, this Court nevertheless discussed how not every instance of conduct corresponding to a Hodges category will give rise to an award of punitive damages: In the case before us, the trial court allowed the jury to consider Buyers' claims of fraud and deceit, abuse of process, and conversion, and later approved the jury's verdicts against the Sellers on those claims. This approval included, at the least, an implicit finding the Buyers had shown by a preponderance of the evidence that Sellers had acted intentionally and/or fraudulently. Buyers assert that the same conduct by the Sellers that the jury and judge found sufficient to subject them to liability for compensatory damages was also sufficient to withstand a motion for directed verdict on punitive damages. There is certainly some logic in Buyers' argument. However, their argument would necessitate a conclusion that in every action for fraud or misrepresentation, or in every action based on an intentional tort, or in every case where the underlying cause of action requires a showing of fraudulent, intentional, malicious, or reckless conduct, a directed verdict for defendants on punitive damages is never appropriate where liability for compensatory damages is allowed to go to the jury. That is simply not the law. There are a number of cases where compensatory damages for fraudulent conduct have been awarded and upheld and punitive damages denied. See, e.g., Gage v. Seaman, No. 03A01-9711-CH-00503, 1999 WL 95185 (Tenn. Ct. App. Feb. 23, 1999) (no Tenn. R. App. P. 11 application filed). While an award of punitive damages must be based on the same conduct warranting the award of compensatory damages, Metcalfe v. Waters, No. 02A01-9510-CV-00236, 1996 WL 622696 at *6 (Tenn. Ct. App. Oct. 29, 1996) (reversed in part on other grounds, 970 S.W.2d 448), the converse is not true. Fraudulent, intentional, malicious, or reckless conduct which warrants an award of compensatory damages does not necessarily qualify for an award of punitive damages. Jarmakowicz v. Suddarth, No. M1998-00920-COA-R3-CV, 2001 WL 196982, at *12-13 (Tenn. Ct. App. Feb. 28, 2001), no appl. perm. appeal filed (emphasis added). First, we fail to see how Goldenberg's firing of King via email could be construed as "reckless" for purposes of awarding punitive damages unless every unlawful termination is to be counted as reckless. Likewise, Goldenberg's rudeness toward King in their email exchange in no sense arises to malicious conduct so as to warrant punitive damages. Lastly, King alleges Goldenberg acted intentionally. To be sure, Goldenberg intended to bring about King's termination when he fired her; it could scarcely have been otherwise. However, we find that is distinct from the sort of intentional conduct that could give rise to punitive damages in connection with retaliatory discharge. Otherwise, every employee who prevails in a retaliatory discharge case would be entitled to an award of punitive damages regardless of the facts of a particular case. That is not the law. With all due respect to King, there simply is nothing about this case that makes it a candidate for one of 'the most egregious of cases,' and certainly not by the applicable standard of clear and convincing evidence. We, therefore, affirm the Trial Court in its declining to award King punitive damages. The final issue we address is whether King is entitled to an award of attorney's fees incurred on appeal. As King prevailed on her TPPA claim, she is entitled to an award of her attorney's fees incurred on appeal. On remand, the Trial Court is to determine and enter an award of reasonable attorney's fees to King pursuant to Tenn. Code Ann. § 50-1304(c)(2). We affirm the judgment of the Trial Court in its entirety. Conclusion The judgment of the Trial Court is affirmed, and this cause is remanded to the Trial Court for collection of the costs below and further proceedings consistent with this Opinion. The costs on appeal are assessed against the Appellants, Delfasco, LLC and Delfasco Finance, LLC, and their surety, if any. s/ D. Michael Swiney____________________ D. MICHAEL SWINEY, CHIEF JUDGE
<urn:uuid:36c2fa3a-9f13-4f8c-a52a-93f55df330d7>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
57,253
Biographie de Jean-Jacques DUMONT Commissaire de l’Autorité de sûreté nucléaire (ASN) Né à la Chapelle-Saint-Sauveur (Saône-et-Loire) le 18 novembre 1946, Jean-Jacques DUMONT est ancien élève de l’Ecole Polytechnique (1966-1969) et de l’Ecole nationale Supérieure des Mines de Paris (1969-1972). Jean-Jacques DUMONT a débuté sa carrière en 1972 à l’arrondissement minéralogique de Rouen (Ministère de l’Industrie) et à la préfecture de la région Haute-Normandie en tant que chargé de mission auprès du préfet. De 1974 à 1979, Jean-Jacques DUMONT a été Adjoint au sous-directeur de la réglementation technique des véhicules du Ministère de l’équipement à la Direction des routes et de la circulation routière. De 1979 à 1986, il assure les fonctions de secrétaire général adjoint au Ministère de l’industrie, tout d’abord à la Direction de la qualité et de la sécurité industrielles, puis à la Délégation aux affaires régionales, puis Direction générale du développement régional et de l’environnement industriel et technologique. Du 1er octobre 1986 au 31 décembre 1989, il est secrétaire général des DRIRE (Directions régionales de l’industrie, de la recherche et de l’environnement) à la Direction générale de l’industrie au Ministère de l’industrie. Au 1er janvier 1990, Jean-Jacques DUMONT est nommé secrétaire général de la Direction générale de l’industrie, puis à compter du 15 mai 1991, de la Direction générale des stratégies industrielles, chargé du Service de la technologie et de la stratégie (STS). De juin 1992 à septembre 1997, il prend la Direction régionale de l’industrie, de la recherche et de l’environnement d’Île-de-France. Il est ensuite nommé Directeur de l’action régionale et de la petite et moyenne industrie au Ministère de l’économie, des Finances et de l’industrie entre septembre 1997 et février 2005. De février 2005 à avril 2006, il occupe le poste de Directeur de l’action régionale, de la qualité et de la sécurité industrielle, adjoint au Directeur général des entreprises au Ministère de l’économie, des finances et de l’industrie. Le 5 avril 2006, il devient vice-président du Conseil général des mines au Ministère de l’économie, des finances et de l’industrie. Depuis le 1er février 2009, il est vice-président délégué du Conseil général de l’industrie, de l’énergie et des technologies. Jean-Jacques DUMONT a été nommé, par décret, le 15 décembre 2010 membre du collège de l’Autorité de sûreté nucléaire pour une durée de 6 ans.
<urn:uuid:458448e1-98d6-494b-976e-ded7cddae337>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
2,481
Comunicación electoral e interés ciudadano Por Marta Martín Llaguno y Helena Alvarez de Arcaya Ajuria Marta Martín Llaguno y Helena Álvarez de Arcaya y Ajuria son profesoras de la Universidad de Alicante. Artículo Resumen Resumen: En esta investigación nos planteamos, en primer lugar, identificar y cuantificar los sesgos de "americanización" de la última cobertura de elecciones nacionales en España. En segundo lugar, ante la inexistencia de trabajos de este tipo, nuestro interés se centra en cuantificar la relación entre las características de la agenda mediática y el interés ciudadano por la información política. Para ello, utilizando la comparación de medias, se pretende analizar la variación del share y del rating de audiencia en las noticias dependiendo de la existencia de determinados rasgos en la cobertura electoral. Los resultados apuntan que la audiencia española sí ha sido sensible a algunas de las peculiaridades de las coberturas electorales señaladas por los autores del periodismo cívico (por ejemplo, las noticias con tono positivo han acaparado más atención) pero que ha permanecido indiferente ante otras. En este sentido, se apunta que la utilización de variables que midan las actitudes de hecho (como los ratings y los shares) y no la opinión (como las encuestas) puede ser una buena alternativa para realizar trabajos que evalúen qué factores del periodismo pueden "desenganchar" a los ciudadanos y hacer descender el consumo de medios. Palabras clave: Comunicación política, opinión pública, televisión, audiencias, periodismo cívico Abstract: The main objective of this research is to identify and quantify the "American" influences on the coverage of the past national elections in Spain. Secondly, considering the non-existence of previous works, our interest focuses on quantifying the relation between the media's agenda and the public interest for political information. Using the comparison of media, the intention is to analyse the variation of share and rating of audience in the news depending on the existence of certain characteristics in the electoral coverage. The results show that the Spanish audience has been sensible to some of the peculiarities of the electoral coverage indicated by authors of civic journalism (e.g.: news having a positive tone captured more attention), but it has remained indifferent to others. In this sense, the use of variables that measure the attitudes (like ratings and shares) and not the opinion (like surveys) can be a good alternative for carrying out studies that evaluate which factors can disconnect citizens and decrease media consumption. Key Words: Political communication, public opinion, television, audiencies, civic media 1. Introducción En la sociedad de la información, la conexión entre comunicación colectiva y proceso político parece cada vez más estrecha. Medios de difusión y democracia son las dos caras de una misma moneda: si los ciudadanos no participan de la vida pública, no necesitan información; pero, a la vez, si no se informan, no pueden participar en la vida pública. Esta interdependencia entre política y comunicación social se afianza en los procesos electorales. A medida que las diferencias ideológicas se evaporan, la similitud entre programas se pronuncia y los líderes políticos se transforman en símbolos, los medios de comunicación asumen una responsabilidad de marcar diferencias entre opciones y se convierten en elementos esenciales para la decisión de voto (Herreros Arconada, 1984: 201). Así, en muchas de las que Blumler (1999: 112) denomina "democracias dominadas por lo mediático", el consumo de información pública en general -y el interés por la información política en concreto- es un marcador indirecto de la participación política (Conway, 1985: 55). No es, por tanto, baladí que, en algunas democracias con una crisis de participación cívica, como la norteamericana, dentro del debate sobre la apatía pública, sobre todo a raíz de los comicios electorales del 88 –en los que los medios fueron parte, y no solución a los problemas- se haya generado una corriente profesional y académica- de reflexión en torno a las características reales e ideales de las coberturas electorales (Haas, 2000; Voakes, 1999, Altschull, 1996; Fiskin, 1995, Fallows, 1996) que se ha institucionalizado bajo el apelativo de "periodismo cívico". El "periodismo cívico" subraya que la génesis de la ineficiencia de los mensajes políticos para el sistema democrático se halla, grosso modo, en tres cánones del periodismo contemporáneo (Compton 2000: 451). En primer lugar, en el ideal liberal de los medios como watchdogs, o centinelas del sistema, que ha terminado por primar el periodismo adversarial (Canel, 1999:147). La percepción de que los periodistas son los perros guardianes de la democracia ha hecho que en los espacios informativos abunde la crítica no constructiva, que ha terminado por saturar a los ciudadanos (Hallin, 1985: 41). En segundo lugar, en el "falso paradigma de la objetividad" que fomenta una actitud neutral en los periodistas y que ha privilegiado una información técnica (Rosen, 1992:25) que, al abrumar con datos, anula toda posibilidad de diálogo. En tercer lugar, en la popularización de la televisión y la profesionalización de la comunicación política que han terminado por enfatizar lo trivial y lo sensacionalista, por obviar la discusión de cuestiones básicas y por confundir a los electores (Paletz, 1997). El "periodismo cívico" lleva, así, abogando más de una década por la renovación de las prácticas y de las agendas informativas y ha puesto en marcha diversas experiencias en algunas redacciones estadounidenses1. La filosofía subyacente a todas sus intervenciones es la de que el eje de sus actuaciones ha de ser el interés de los ciudadanos, y no el de los políticos. Los periódicos involucrados han apostado por el intercambio, la participación y la reflexión en los medios. En este sentido, han hecho esfuerzos por modificar los enfoques (frames), los temas (issues) y el tono de las coberturas políticas. Con respecto a los primeros, se ha puesto más énfasis en el componente problemático y programático del mensaje electoral (qué problemas tienen los ciudadanos y qué soluciones les ofrecen las opciones políticas) en detrimento del componente personal y partidista (Canel, 1999: 147). Con respecto a los segundos, se ha sugerido dar más peso al tratamiento de las cuestiones que interesan al público, en detrimento de las cuestiones que interesan a los políticos. Con respecto al tono, se ha apostado por disminuir las informaciones crispadas y por aumentar las noticias positivas que, además de denunciar un tema, propongan una solución. Al margen de las críticas teóricas a estas alternativas, lo cierto es que las evaluaciones de este "nuevo periodismo" no han sido contundentes. Como apuntan los análisis del Poynter Election Project (1997), los medios involucrados en proyectos de periodismo cívico publicaron más noticias sobre problemas concretos y menos sobre encuestas de intención de voto, pero no consiguieron un cambio significativo en el tono de las informaciones, que siguió siendo crispado. Por otra parte, no se ha encontrado una relación clara entre los cambios de la agenda mediática, a) el mayor conocimiento de las audiencias en general, b) el incremento de la confianza hacia la información política, o c) el incremento del capital social. Este debate en torno a la profesión periodística, que lleva siendo relevante en EEUU más de una década, no ha arraigado en nuestro país, probablemente porque las vicisitudes de la transición, como muestran distintos indicadores, han impedido que en España, la apatía cívica sea todavía una cuestión crucial2. Sin embargo, como sugiere Dader (1998), al menos teóricamente, nuestro sistema sí presenta rasgos que ilustran el protagonismo de la mediocracia que, supuestamente, ha llevado a la crisis a los medios americanos -entre otros, la utilización de los mass media como plataforma para críticas políticas, la personalización de las opciones en los candidatos, las coberturas de campaña al estilo "horce-race" o los debates electorales. Es decir, como apunta este autor, el proceso de americanización de la comunicación política en general -y de las coberturas electorales en concreto- es más alto en España que en otras naciones europeas. En este contexto, nos parece interesante determinar en qué medida son identificables empíricamente algunos de estos rasgos y explorar si, tal y como sostienen los críticos estadounidenses, la ciudadanía se muestra sensible ante estas peculiaridades y si hay determinados factores de la cobertura mediática que provocan especial interés o rechazo entre los ciudadanos. 2. Objetivos e hipótesis El objetivo que nos planteamos en este trabajo era doble: - en primer lugar, queríamos identificar y cuantificar los sesgos de "americanización" de la última cobertura de elecciones nacionales en España. - en segundo lugar, ante la inexistencia de trabajos de este tipo, nuestro interés se centraba en cuantificar la relación entre las características de la agenda mediática y el interés ciudadano por la información política. En este sentido, y siguiendo los supuestos del periodismo cívico, nuestra hipótesis de partida era que determinados factores de la cobertura mediática provocan especial interés o rechazo en los receptores. De manera más concreta el interés por las informaciones debería haber aumentado en la medida en que en los medios se hubiera: - incrementado el tiempo de las informaciones políticas, - enfatizado componente problemático y programático del mensaje electoral, - tratado problemas públicos fuera de la agenda política y con propuesta de soluciones, y - disminuido las informaciones crispadas, - reducido el componente personalista. 3. Diseño de la investigación: corpus de estudio y metodología Para llevar a cabo los objetivos expuestos se escogió la televisión como medio para el análisis, en primer lugar, por ser la fuente masiva de información política y, en segundo lugar, porque permitió cuantificar la atención hacia las noticias electorales con un indicador poco explorado en España en los estudios sobre los efectos: los ratings y shares de audiencia. Delimitamos nuestro corpus de estudio a todas aquellas noticias emitidas en la sección de nacional de los informativos diarios de las cadenas TVE1, Antena 3 y Telecinco, en su primera y segunda edición, entre el 10 de febrero y el 11 de marzo de 2000, en cuyo cuerpo de la noticia se hiciera referencia a uno o varios de los siguientes conceptos: elecciones nacionales, programas electorales, encuestas electorales, candidatos electorales o partidos políticos. La horquilla temporal en la que se desarrolló el trabajo corresponde a las cuatro semanas anteriores a las elecciones (las dos semanas de precampaña electoral y las dos semanas de campaña). La elección de este periodo responde a la tendencia habitual en los medios españoles (sobre todo la prensa) a insertar secciones especiales dedicadas a la política, bajo el epígrafe de "precampaña" desde 30 días antes a los comicios. Se codificaron un total de 717 noticias. De manera más específica, para acometer nuestro primer objetivo centrado en la identificación de rasgos de "americanización" de la cobertura, una vez seleccionadas las informaciones, se llevó a cabo un análisis de contenido para aislar variables que, según el periodismo cívico, podían incrementar o disminuir el interés del telespectador: (i) el tiempo de duración de la noticia; (ii) el componente substancial del mensaje; (iii) el problema principal tratado en ella; (iv) el tono general de la información; y (v) la mención de candidatos específicos. La obtención del (i) tiempo de duración de las piezas vino a través del banco de datos del Gabinete de Estudios de la Comunicación Audiovisual (GECA) que, basándose en los datos de SOFRES A.M., contiene todas las informaciones a texto completo emitidas en los informativos de las principales cadenas de televisión en España, con sus respectivas audiencias –pieza a pieza-, y el tiempo (en minutos y segundos) que ha estado la noticia en el aire. Para hacer operativas el resto de las variables (componente, problema, tono y mención) se elaboró un código para un análisis de contenido con las otras cuatro variables mencionadas en esta investigación. Para la codificación del (ii) componente substancial de las informaciones (el aspecto del mensaje electoral en el que se centraron las noticias) se contemplaron seis categorías excluyentes entre sí: programa, problema, candidato, partido, campaña, y encuestas. Para la codificación del (iii) problema principal (sobre qué tema de agenda versó la información), se decidió usar cinco categorías: pacto a la francesa, impuestos/economía, campaña, terrorismo, y otros. En cuanto al (iv) tono, se manejó la posibilidad de que fuera negativo, positivo, o neutro. Finalmente, en la categoría (v) candidatos se registraron las menciones específicas a los tres líderes de las fuerzas políticas con más representación: Aznar, Almunia, y Frutos. En el proceso de codificación trabajaron durante dos semanas dos personas, con una fiabilidad entre ellos del 93%. Con objeto de acometer nuestro segundo objetivo, y explorar si existieron diferencias en la atención ciudadana a las informaciones dependiendo de ciertas características de las noticias, decidimos hacer una comparación de medias de los share y los rating de audiencia en función de las variables mencionadas. Para ello utilizamos la prueba del ANOVA con el contraste post hoc de Scheffé (que usando la distribución muestral F realiza comparaciones conjuntas simultáneas por pares para todas las posibles parejas de combinaciones de las medidas). No obstante, la contrastación de nuestra hipótesis exigía previamente controlar ciertas variables que podían contaminar resultados y que iban a determinar cómo debían ser hechos nuestros análisis. En concreto debíamos determinar que las diferencias en nuestras comparaciones de medias en la audiencia no eran debidas a) a las diferencias de audiencias hacia la información política entre cadenas, b) a las diferencias en la atención ciudadana hacia la cobertura electoral a lo largo del tiempo, c) a las diferencias en la atención ciudadana hacia la cobertura electoral a lo largo de los informativos y d) a la ubicación temporal sistemática de los distintos tipos de noticias dentro de los noticiarios. a) Con respecto a la primera cuestión, la prueba de Scheffé mostró que el rating de audiencia entre TVE1 y las otras cadenas era significativamente distinto (p<0,05). TVE1 se erigió como el canal cuyas noticias políticas acapararon mayor audiencia, seguida de Telecinco y finalmente de Antena 3. Por esta razón, cada uno de los análisis para la contrastación de las hipótesis se desarrolló independientemente cadena por cadena. b) En segundo lugar, el rating y share de audiencia de las tres cadenas en conjunto no experimentaron variaciones significativas a lo largo de las cinco semanas del estudio (p<,099 y p<,302), es decir, la atención general prestada a la información política no sufrió cambios en el espacio del análisis (ni aumentó, ni disminuyó significativamente). Sin embargo, el análisis pormenorizado por cadenas arrojó que, mientras en el caso de Antena 3 no se apreciaron variaciones significativas, ni en el share ni en rating, en el caso de Telecinco sí se vio que se había producido un ascenso casi progresivo en el número de televidentes de la primera a la quinta semana (de un share de 19,2864 el diez de febrero a uno de 20,2989 el 11 de marzo, aunque la prueba de Sheffé no arroja diferencias significativas). En el caso de TVE1 la tendencia anterior fue la inversa a la producida en Telecinco: a lo largo de los 30 días analizados se pasó de un share de 26,16 a uno de 24,1185 (p<.000). Por tanto, la tendencia general en la cobertura fue que la televisión estatal perdió los espectadores que Telecinco pudo absorber. c) En tercer lugar, no se encontraron tendencias en la evolución del share de audiencia a lo largo de un mismo informativo ni en A3, ni de TVE1. En el único caso en el que se identificó una correlación significativa entre el share de audiencia y la ubicación de las noticias en un informativo fue en el del noticiario de sobremesa de Tele5 –Informativos Tele5 14:30-, en el que las noticias ubicadas al final del programa parecieron recibir menos atención. d) En cuarto lugar, la distribución temporal en los informativos de los factores analizados para este estudio fue aleatoria en los noticiarios de primera edición de TVE1y de Telecinco; y también, en el caso de Antena 3 en ambas ediciones. Sólo se detectaron patrones sistemáticos de aparición de noticias con determinadas características en los informativos prime time de TVE1 y Telecinco. En el primer caso, el nombre de Aznar apareció, sistemáticamente, antes que el de Almunia y el de Frutos (F= 3,234 , sig <0, 045). En el segundo, las informaciones de tono más neutro se insertaron sistemáticamente con posterioridad a las positivas y negativas (p<,001) y a las informaciones enfocadas hacia los problemas ciudadanos, que aparecieron también sistemáticamente en el última parte del informativo (p<000). 4. Resultados 4.1. Descripción general de la agenda Los datos confirman de modo relativo la propuesta teórica de que los medios españoles habrían reproducido algunos rasgos del modelo americano de la cobertura electoral aunque, como se verá, el tratamiento de las elecciones difirió significativamente entre cadenas y entre fechas. (i) El tiempo medio de las noticias fue relativamente corto (de 1 minuto y medio) pero, a lo largo de las semanas estudiadas, no hubo una variación significativa en la duración media de las informaciones. Atendiendo a las diferencias entre cadenas, sólo se apreciaron diferencias en cuanto a la duración de las piezas entre TVE1 (que fue la cadena con informaciones más cortas) y Telecinco (que superó como media los dos minutos de duración) (DMS, sig= ,032). (ii) En cuanto al componente substancial de las informaciones, (ver "Tabla 1. Porcentajes de componentes substanciales del mensaje informativo en la cobertura electoral"), en la cobertura electoral en televisión, en su conjunto, dominó el componente personalista en los mensajes (el 38% de las noticias se enfocaron hacia los candidatos). Por orden de importancia, el segundo encuadre más frecuente fue el programático (19,5%) seguido del ideológico (17%), por tanto, fueron los tres elementos tradicionales del discurso electoral los que sirvieron de marco a la mayoría relativa de informaciones. Tabla 1: Porcentajes de componentes substanciales del mensaje informativo en la cobertura electoral El peso relativo de estos enfoques principales en las noticias de la cobertura varió significativamente (X2 = 370,343, p<000) a lo largo del tiempo (ver "Ilustración 1. Evolución de los enfoques en la cobertura"). Ilustración 1: Evolución de los enfoques en la cobertura Así, durante la primera semana, fueron los candidatos y las encuestas quienes, en comparación con el resto del tiempo, recibieron más atención. En la segunda semana, que coincidió con la presentación de algunos programas, la atención de los medios viró y el componentes programático consiguió cierto peso. En la primera semana de campaña (tercera del análisis), el componente ideológico y de la propia campaña se enfatizaron en detrimento del componente personalista. La cuarta semana se caracterizó por una vuelta a la fórmula del horse-racing, centrado en las encuestas, y en la quinta semana, en la que por ley no se pueden publicar sondeos electorales, las cadenas de televisión se detuvieron en tratar con más interés que en el resto de los tiempos los problemas y la cobertura en sí. La dinámica cronológica de la cobertura queda resumida en el esquema siguiente: Por otra parte, hay que destacar que, en el conjunto del tiempo, TVE1, Telecinco y Antena 3 encuadraron el proceso electoral de forma significativamente diferente (X2 =115,686, p<,000). Antena 3 ofreció el enfoque más personalista de la campaña electoral (con un 43% de noticias centradas en los candidatos); TVE1, fue el medio que hizo comparativamente el encuadre más ideológico de la campaña (con un 32,80% de informaciones encuadradas en el partido), mientras que Telecinco enfatizó relativamente las informaciones provenientes de fuentes distintas a los partidos políticos y publicó más textos enfocados sobre problemas de agenda (14%), campaña electoral (14%), y encuestas (13%), que no versaron siempre sobre intención de voto, sino que también trataron la actitud ciudadana ante determinados problemas públicos. (iii) Con respecto al problema principal (issue) tratado en la noticia, como se aprecia en la Tabla 2 (ver "Tabla 2. Porcentajes de problemas principales tratados en las noticias (issues) de la cobertura electoral en televisión"), fue la propia dinámica de la campaña la que se trató como motivo principal en más noticias. Al margen de esta cuestión, cabe destacar que el PP "marcó la agenda" ligeramente por encima del bloque de izquierdas, al lograr que la bajada de impuestos apareciera como tema central en el 10% de las informaciones frente al 9,5% de noticias que trataron la cuestión de la alianza PSOE-IU. Como en el caso de los enfoques, también con los temas se produjo una metamorfosis significativa en el tiempo (X2 = 138,848, p<000), (ver "Ilustración 2. Evolución de los temas (issues) de la cobertura electoral"). A lo largo de las dos primeras semanas (de precampaña), en comparación con el resto de periodos, el pacto a la francesa se convirtió en el tema estrella en el conjunto de las cadenas. Sin embargo, al comienzo de la campaña electoral, el interés periodístico hacia esta cuestión fue decayendo a lo largo del tiempo, en detrimento del florecimiento de la cuestión del terrorismo y la rebaja fiscal. Como se puede observar en la gráfica anterior, en la tercera semana de análisis, en la que se produjo el asesinato del dirigente socialista Fernando Buesa y su escolta, el tema del terrorismo afloró como problema de agenda en la campaña electoral y permaneció presente hasta el final de las elecciones. Tabla 2: Porcentajes de problemas principales tratados en las noticias (issues) de la cobertura electoral en televisión Sin embargo, de nuevo, la agenda de issues no fue homogénea entre medios y hubo diferencias significativas entre las cadenas (X2 =19,320 ; p<,013). Frente a TVE1 y Antena 3, Telecinco subrayó comparativamente menos en su cobertura los ejes políticos de la campaña (tanto el problema de los impuestos -6,8% frente al 13,6% de Antena 3 y el 9% de TVE1-, como el del pacto a la francesa -7,1% frente al 13,6% de Antena 3 y el 8,9% de TVE1). Esta cadena trató significativamente más que el resto la propia cobertura y las vicisitudes de la campaña electoral (22% frente al 17% de TVE1 y el 13,6% de Antena 3). Por otra parte, también en este canal hubo menor atención a un tema de agenda (el terrorismo). (iv) Con respecto al tono de las informaciones, como muestra la Tabla 3 (ver "Tabla 3. Porcentaje de informaciones según el tono en la cobertura electoral de televisión"), al contrario de lo que cabía esperar de acuerdo con nuestra hipótesis, en su conjunto, la mayoría relativa de las noticias fueron neutras o equilibradas (41%) seguidas de las positivas (30,1%) y finalmente de las negativas (29%). Ilustración 2: Evolución de los temas (issues) de la cobertura electoral También con esta variable se apreciaron diferencias significativas entre periodos (X2 = 385,304, p<000). De todo el tiempo analizado fue especialmente positiva la segunda semana de precampaña, en la hubo más propuestas de soluciones y en general un tono constructivo en los mensajes. Fue en la cuarta semana del estudio, la segunda de campaña, en la que el tono de la cobertura se crispó y se pudo apreciar un aumento significativo de mensajes negativos, en comparación con el resto de los periodos (ver "Ilustración 3. Evolución del tono de la cobertura electoral"). Tabla 3: Porcentaje de informaciones según el tono en la cobertura electoral de televisión Asimismo, el tono de la cobertura varió significativamente entre cadenas (X2 =48,369, p<,000). Comparativamente, la televisión estatal fue la cadena más positiva y en un 44% de sus noticias se hicieron promesas, se habló de logros, o se propusieron soluciones. Antena 3 apareció como la emisora más extrema, (con un volumen de noticias tanto positivas como negativas superior a la media) mientras que Telecinco fue el canal que emitió más noticias neutras (sin descréditos, insultos o promesas). (v) Finalmente, en el conjunto de la cobertura, el personaje que se mencionó en más noticias fue Aznar (40%) seguido de Almunia (36%) y por Frutos (23%). Sin embargo, en este aspecto no se aprecian diferencias significativas entre cadenas. 4.2. Exploración de la sensibilidad de la audiencia ante determinados factores de la cobertura Como se expone a continuación, sólo con algunas variables independientes se confirmó nuestra segunda hipótesis que presuponía que determinadas características de la cobertura mediática provocan entre la audiencia un especial interés o rechazo (i) Con respecto al tiempo de duración de las piezas informativas, no se observaron diferencias estadísticamente significativas con respecto a la atención ciudadana y la longitud de las noticias. (ii) Con respecto al componente principal de la cobertura, tampoco se pudo observar una sensibilidad especial de la audiencia ante ninguna de las tres cadenas. (iii) Con respecto a los temas principales de la campaña, en el único caso en el que se apreciaron diferencias estadísticamente significativas fue en el de Telecinco (p<,050), en el que las noticias sobre la campaña recibieron más atención por parte de los ciudadanos que el resto de los temas, y en el que, las referentes al pacto a la francesa y al tema de los impuestos sufrieron un descenso de audiencia. Ilustración 3: Evolución del tono de la cobertura electoral (iii) Con respecto al tono de los mensajes, las audiencias de Telecinco y TVE1 sí fueron significativamente más altas en el caso de las informaciones positivas frente a las negativas y a las neutras respectivamente. (ver "Tabla 4. Comparación de medias de audiencias y share para la cobertura electoral según el tono (Telecinco y TVE1)"). (iv) Finalmente, con respecto a los personajes principales mencionados en las noticias, no se observó variación significativa en ninguno de los tres casos analizados. Tabla 4: Comparación de medias de audiencias y share para la cobertura electoral según el tono (Telecinco y TVE 1) 5. Discusión 1. Los resultados ponen de manifiesto que, si bien en las coberturas electorales por televisión en España se detectan algunos rasgos de americanización, la asimilación no es todavía absoluta y, en algunas cadenas, como Telecinco, se observan ya ciertos indicios de que se están buscando fórmulas alternativas para informar sobre este proceso político (por ejemplo, los esfuerzos por centrar la cobertura sobre las vicisitudes de campaña y problemas o temas de agenda). A la luz de los datos sobre la audiencia, parece que estos intentos pueden ser bien acogidos por los ciudadanos. 2. Como era de prever, la cobertura electoral en su conjunto ha hecho énfasis en los encuadres centrados en los candidatos. El sistema mediático ha primado el componente personalista de las campañas, seguido del programático y finalmente del ideológico. En cierta medida, este esquema es un reflejo de la realidad política: los partidos han tratado cada vez más de despojarse de sus apellidos y ubicarse en el centro, y ofrecen, sobre todo en las últimas elecciones, pocas diferencias que reflejar por los medios. La desvinculación mediática a las causas ideológicas se ve plasmada también en el desinterés relativo de los medios por el pacto de la izquierda. A pesar de que este eje captó la atención en las semanas de precampaña, desde el momento en que el PP lanzó a la arena pública el tema de la rebaja fiscal, los medios tendieron a cubrirlo también en aras a la satisfacción inmediata y directa de los ciudadanos. 3. El impacto mediático de los ejes de comunicación de las formaciones políticas merece una reflexión. La cuestión de la unión de las izquierdas dio más popularidad mediática a Frutos que a Almunia. Este último líder político, por el seguimiento informativo que tuvo el tema de los impuestos, se vio arrastrado a la discusión pública planteada por Aznar. Finalmente, en el debate sobre el terrorismo en los espacios informativos prácticamente se excluyó al líder de IU. 4. Tal y como se ha visto con el análisis del tono de los mensajes, la cobertura electoral en televisión parece haber sido bastante equilibrada. Se ha dado una negatividad relativa de las campañas y los medios han reflejado a través de sus espacios muchas propuestas de actuación. Este hecho puede ser también fruto de las propias estrategias electorales de las fuerzas políticas: como se muestra en la Tabla 5 (ver "Tabla 5. Tono de las informaciones según el candidato protagonista de la información") las informaciones con desacreditaciones e insultos fueron atribuibles sobre todo a la oposición (Almunia y Frutos) mientras que José María Aznar hizo una campaña mayoritariamente positiva (las diferencias son significativas p<004). 5. La especial sensibilidad del share de audiencia de TVE1 y Telecinco con las noticias de tono positivo coincide con la tendencia identificada en las campañas americanas. Según el Vanishing Voter Project, que monitorizó la reacción de la audiencia estadounidense ante la cobertura electoral del 2000, a medida que la campaña se volvió más negativa el porcentaje de americanos descorazonado con la cobertura aumentó del 25% al 39%. Sin embargo, a pesar de que la negatividad de la campaña disgusta, las intenciones de voto, según las encuestas no decrecen, con lo cual la negatividad no parece deflaccionar los números. Tabla 5: Tono de las informaciones según el candidato protagonista de la infor mación 6. Con respecto al método para la observación de la sensibilidad de la audiencia se puede abrir aquí una discusión. La intención inicial de este trabajo era explorar métodos alternativos a las encuestas de opinión para mediar el interés hacia la información política. Como afirman Iyengar y Simon (2000), "la mayoría de los estudiosos de la comunicación política están entrenados en la técnica de la encuesta, y aceptan que las respuestas de los encuestados sobre la exposición a la información política es un indicador válido de la actual exposición" y esto plantea diversos problemas. En este estudio, nuestro interés se centraba en medir la posible fluctuación de la exposición real a los medios ante la ausencia/presencia de determinadas características del mensaje y no la fluctuación de la opinión sobre la exposición. Para explorar "cuestiones de matiz", además de los métodos cualitativos, pensamos que esta opción con una franja de tiempo más extensa, podría ser útil porque trabaja con acciones reales y no con opiniones. Referencias Bibliográficas Alaminos, a. (1994): "La cultura política en los jóvenes", pp. 57-76 en Martín Serrano, M.: Historia de los cambios de mentalidades en los jóvenes entre 1960-1990. Madrid: Instituto de la Juventud. Altschull, J. (1996): "A crisis of conscience. Is community journalism the answer", Journal of Mass Media Ethics, vol 11(3), 166-172. Álvarez Teijeiro, C. (1990). Fundamentos teóricos del public journalism. Exposición y crítical Drama Televisivo. Identidad y contenidos sociales, Cuadernos Autrales de Comunicación, Buenos Aires: Universidad Austral. Barnhust, K.G., Wartella, E. (1991): "Newspapers & Citizenship: Young Adult Subjective Experience of Newspapers", Critical Studies in Mass Communication, nº 8(2), pp. 195-209. _ (2000): "Political Engagement and the Audience to News. Lessons form Spain", Journalism & Comunication Monographs 2 (1). Blumler, J.G. (1999): "Tendencias en la comunicación política en las campañas electorales británicas", pp. 113 en Muñoz-Alonso, A., Rospir A. Democracia mediática y campañas electorales. Madrid: Ariel Comunicación. Canel, M.J. (1999). Comunicación política: tendencias y estrategias para la sociedad de la información. Madrid: Tecnos. Carey, J. (1988). Comunication as culture: essays on media and society. London and New York: Routledge. Carey, J. (1995). "The press, public opinion and public discourse", en Glasser, T,. Salmon, C. (1995): Public opinion and the communication of consent. New York: Guildford Press. Centro de Investigaciones Sociológicas, (1995): "Datos de opinión 2" en Series históricas del CIS, disponible en URL: http://www.cis.es/boletin/2/estl.html. Compton, J. (2000): "Communicative politics and public journalism", Journalism Studies, nº 1 (3), pp. 449-467. Conway, M. (1985). La participación política en los Estados Unidos. EE.UU.:Gernika. Dader, J.L. (1985). "Entre la retórica mediática y la cultura autóctona: la comunicación política electoral española como encrucijada de la "americanización" y el pluralismo democrático tradicional", en CIC, 4, disponible en http://www.ucm.es/info/per3/cic/cic4ar6.htm. De Tocqueville, A. (1945): Democracy in America (2). Toronto: Vintage Books. Dewey, J. (1927). The public and its problems. Denver: Alan Swallow. El anuario de la televisión 2000. Madrid: Geca Consultores S.A. El anuario de la televisión 2001. Madrid: Geca Consultores S.A. Fallows, J. (1996): Breaking the news. How the media undermine American democracy. New York: Pantheon. Fiskin, J. (1995): The voice of the people. Public opinion and democracy. New Haven: Yale University.Fiskin, J. (1995): The voice of the people. Public opinion and democracy. New Haven: Yale University. Fouhy, E.M. (1996): Civic Journalism: Rebuilding the Foundations of Democracy, Civic Partners, Pew Partnership for Civic Change, disponible en http://www.journalism.wisc.edu/cpn/pew...nwship/civiv_partners_journalism.html. Habermas, J. (1971): Knowledge and Human Interest. Boston: Bacon Press. _ (1989): The structural transformation of the public sphere: an inquiry into a category of bourgeois society. Massachussetts: MIT Press. _ (1990): Moral Conciousness and Communicative Action, Massachussetts: MIT Press. Haas, T. (2000): "Public journalism challenges to curriculum and instruction", Journalism & Mass Communication Educator. Vol. 55 (3) pp. 27. Herreros Arconada, M. (1989): Teoría y técnica de la propaganda electoral (formas publicitarias)rversiones Televisivas. Barcelona: PPU. Hodges, L.W. (1996): "Ruminations about the communitarian debate", Journal of Mass Media Ethics, nº 11 (3), pp. 133-139. Informe SGAE sobre hábitos de consumo cultural (2000): Sociedad General de Autores y Editores, disponible en URL: http://www.sgae.es/page3705.htm. Iyengar, S., Simon, A.F. (2000): "New prespectives and evidence on political communication and campaign effects", Annu Rev Psycho 2000, 51. pp. 149-69. Just, M., Crigler, A., Buhr, T. (1992): "Discordant Discourse Campaign News, Candidate Interviews and Political Advertising in the 1992 Presidential Campaign", ponencia presentada en American Politics Workshop (University of Chicago) disponible en http://www.spc.uchicago.edu/depts/polsci(research/american/just.htm. Paletz, D. (1997): "Campañas y elecciones" (trad. Dader, J.L.) en Cuadernos de Información y Documentación, nº 3, disponible en http://www.ucm.es/info/per3/cic/cic3ar1.htm. Patterson, T. (1994): Out of order. Nueva York: Vintage Books. Scott, R., Potter, D. (2001): "Public journalism through the lens: How television broadcasters covered Campaign '96, Journal of Broadcasting & Electronic Media, 45 (2), pp. 320-334. Rosen, J. (1992): "Politics, Vision and the Press: towards a public agenda for journalism", en Rosen, J., Taylor, P. (ed.), The New News versus the Old News: the press and politics in the 1990's. New York: Twentieth Century Fundation. _ (1996): Getting the Connections Right: Public Journalism and the troubles in the press, New York: Twentieth Century Fund Press/The Electronic Policy Network. Schaffer, J., Miller, E.D. (1996): Civic Journalism: Six Case Studies. Washington DC: The Pew Center for Civic Journalism. Ministerio del Interior (2000): Elecciones a Cortes Generales 2000, disponible en http://www.mir.es/elecciones2000/paginas/Congreso/Congreso.htm. Mexico Election Monitor (2000): The Media´s Influence in Mexico´s Electoral Campaign, Mexico Election Monitor 2000 Issue 5 June 2000, disponible en http://www.wola.org/mexbulletin5.html. The Pew Center for Civic Journalism (1996): Civic Lessons: Report on Four Civic Journalism Projects, The Center for Civic Journalism. The Pew Center for Civic Journalism (1994): "Public Gives Press "c" grade for campaing coverage, Survey Report, The Pew Research Center for the People and the Press. The Pew Center for Civic Journalism (2000): "Audiences Fragmented & Skeptical: the though job of communicating with voters", en http://www.people-press.org/jan00rpt2.htm. The Poynter Election Proyect (1997): Making a difference: An updated on Poynter´s Study of the Campaign Coverage, St. Petersburg: The Poynter Institute for Media Studies disponible en http://www.poynter.org /pehb/up_date.htm. The Vanishing Voter Project (2000): "Americans' Attention to Campaign Rises, as Does Their Perception that the Campaign Has Turned Negative", Feb. 25, 2000, disponible en URL: http://www.vanishingvoter. org/archive.html. Voakes, P. (1999): "Civic duties: Newspaper journalists' views on public journalism", Journalism and Mass Communication Quarterly, Vol. 76 (4), pp. 756 y ss. Westphalen, M.H., Piñuel, J.L. (1993): La dirección de comunicación: prácticas profesionales, diccionario técnico. Madrid: El Prado. Yankelovich, D.(1991): Coming to Public Judgement: making democracy work in a complex world, Syracuse: Syracuse University Press.
<urn:uuid:5d92baea-0630-4e90-9373-e8fa0c12d812>
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
38,141
new customer activation guide pdf 2 Monarch 15 Installation and Activation Guide 5 GB disk space (if installing on a machine with no prerequisites or upgrading from .NET 4.5) Sufficient disk space for working with large data inputs 2 GHz or faster processor Google Chrome .NET Framework 4.5.2 Microsoft Access Database Engine 2010 version 14.0.7015.100 ... Monarch 15 Installation and Activation Guide 21 Customer Acquisition Strategies to Win New Customers. Figuring out how to acquire new customers is difficult. I've spend the past few years working with all kinds of different businesses across a range of industries to help them figure this out. 21 Customer Acquisition Strategies to Win New Customers Quick Start Guide Updated 2017.06.30 1 Create a New My WorkKeys Account Document Purpose This document is about how to create a new “MyWorkKeys― personal account to access and Create a New My WorkKeys Account - Home | ACT CUSTOMER CARE. Whether you need a quick tune-up or a complete overhaul, our service department is here to help. We have been taking care of our customers for over 80 years and have the knowledge and high-quality parts on hand to keep your plant running at peak performance. Customer Care - Columbia Machine This guide is a practical resource for developing a set of transactional emails that will move your new users through the sales funnel toward becoming happy, engaged, and paying customers. Resources / Email Generator · Sendwithus Feb 5, 2:00pm Almost any attempt to bring modern technology into a financial institution â€" be it for advanced analytics, personalization, artificial intelligence, predictive marketing, or real-time payments AB Resources | American Banker Inside the VOFM Program 7/25/2005 Page 14 of 36 Technical Guide Copyright © 2005 The Smith Consulting Group, Inc. All Rights Reserved. SAPtechsolutions.com Inside the VOFM Program - SAPtech Solutions 12 13 HELP/SPOT S.O.V. For non-life threatening situations, ask for help from friends and family or gain a direct line to professional assistance SPOT GEN3 USER GUIDE - findmespot.com A. Software activation authorizes and activates the Cisco IOS ® Software feature set. A special file contained in the switch, called a license file, is examined by Cisco IOS Software when the switch is powered on. Based on the license's type, Cisco IOS Software activates the appropriate feature set. Software Activation - Cisco ISSUE 3.0 1-4 Understanding License Manager 5.1 SV9100 STANDARD USER LIC-01 (Standard User Client License) This is the entry level user license. The Standard User License provides the following feature activation codes. UNIVERGE SV9100 License Manager Server User Guide BibMe Free Bibliography & Citation Maker - MLA, APA, Chicago, Harvard BibMe: Free Bibliography & Citation Maker - MLA, APA Insert the SIM card. Insert the battery. Before using the device, ensure the battery is fully charged. Turn power on by holding the Power button for 2 seconds. Activation is performed automatically and may take several minutes to complete. Activation is complete when the LED indicator is green ... Set Up Device - Verizon Jetpack® 4G LTE Mobile Hotspot eAgreements User Guide 4 For information on using eAgreements with other volume licensing programs, see the other guide titled eAgreements User Guide: Open Value Programs. Note: There may be some minor differences between the live eAgreements tool and the screenshots in this guide. eAgreements User Guide: Open Value Programs 15 February 2017 V1 © 2015 Avaya, Inc. all rights reserved. 5 5) VUE CandidateID - Permanent VUE system external testing ID assigned by Pearson VUE; Avaya Credential Management System User Guide Buy Autel TS401 MaxiTPMS Activation Tool with MX-sensor Programming Service: Code Readers & Scan Tools - Amazon.com FREE DELIVERY possible on eligible purchases Autel TS401 MaxiTPMS Activation Tool with MX-sensor Make sure you have a License and Activation Key.Keep it with you while you install Stata. Determine from the License and Activation Key whether you should install Stata/MP, Stata/SE, or Stata/IC. Installation guide | Stata Treasury and Trade Solutions . Citi® Chip and PIN for Department of Defense Government Travel Charge Cards (GTCC) APCs & DTAs . Frequently Asked Questions . On October 17, 2014, President Obama issued an Executive Order requiring federal agencies to Citi Chip and PIN for Department of Defense Government 2 MobilePASS | Reference Guide Thank you for your interest in the CitiDirect BE® MobilePASS Token solution. This is an important part of Citi’s continuing effort to bring a best-in-class client experience to Digital Security. CitiDirect BE MobilePASS Token - Responsible Finance Register. If you are a new customer, register now for access to product evaluations and purchasing capabilities. Need access to an account? If your company has an existing Red Hat account, your organization administrator can grant you access. Documentation for Red Hat Products - Red Hat Customer Portal 1 spot trace user guide theft-alert tracking device 100% satellite technology 100% SATELLITE TECHNOLOGY SPOT TRACE USER GUIDE © 2009 Directed Electronics. All rights Reserved. 1 Quick Reference Install Guide Remote Start w/ Keyless Entry 1-Way SuperCode CPU1 LIGHT FLASH POLARITY (10A ... Valet switch Control button LED Status LED Quick Reference 1 welcome Your Guide to B.C.’s Enhanced Driver’s Licence Program contains everything you need to know before applying for an enhanced driver’s licence or enhanced identification card. your guide to B.C.’s enhanced driver’s licence program Overview. From 1987 to 2015, frontal air bags saved 44,869 lives. That’s enough people to fill a major league ballpark. Learn about the safety benefits of frontal and side air bags and why it’s so important to use a seat beltâ€"your first line of defense. Air Bags | NHTSA There was a problem adding this item to Cart. Please try again later. SiriusXM SXPL1V1 Onyx Plus Satellite Radio with Vehicle There is no question that digital video is garnering major consumer attention and that brands want to be a part of the experience. In order to fulfill digital video’s long-term promise of delivering powerful brand advertising at scale, IAB is devoted to the advancement of the digital video medium in the global marketplace. IAB by Prakash Palani (firstname.lastname@example.org) A BasisOnDemand.com White Paper GUIDE TO PERFORM EFFICIENT SYSTEM COPY FOR SAP BW SYSTEMS Helps you to plan and execute BW System Copy An Introduction To, or a Short Discourse Concerning, Universal History. in Two Parts. Faithfully Compared With, and Done (with Some Little Alterations) from the Original of ... James Benigne Bossuet, ... Now Published by Richard Spencer, ... - 320 AP Calculus BC Problems arranged by Topic and Difficulty Level, 2nd Edition: 160 Test Questions with Solutions, 160 Additional Questions with Answers (320 AP Calculus Problems)320 GRE Math Problems arranged by Topic and Difficulty Level: 160 GRE Questions with Solutions, 160 Additional Questions with Answers - A Mask of Myself: A First Time/Coming Out Lesbian Romance - Advances in the Study of Entrepreneurship, Innovation, and Economic Growth, Volume 18: Technological Innovation: Generating Economic Results - A Handbook of Literature for the Flute - A Funny Thing Happened on the Way to the Altar - Accelerate Your Abundance Beyond “Think and Grow Rich―: Become a Money Magnet - Ang: Probability Concepts In Engineering Plann Ing And Design Decision Risk & ReliabilityTao Te ChingAng Tundo Man May Langit DinAnguiSH (AnguiSH, #1) - A History of Philosophy: Volume 1 - 642 Things to Draw Graphite Pencils - A Life in Twilight: The Final Years of J. Robert OppenheimerZero Zero ZeroRoberto's SmileRobert Owen and His Legacy - Ageless Brazilian Beauty: The Skincare Secrets of Supermodels Revealed - An Economy of Signs: Contemporary Indian Photographs Analog Synthesis: The Newbie Guide to Synthesizers and Sound-Design [With CDROM] - A Gockle of Fear (The Department of Occult Investigations) - 2003 International Plumbing Codes Handbook - American Citizen, Global Citizen: How Expanding Our Identities Makes Us Safer, Stronger, Wiser - And Builds a Better World - A Long Way from Paradise: Surviving the Rwandan Genocide - An Historical Geography Of Modern Australia: The Restive Fringe - Adding Depth to Your Destiny: 50 Days of Focus Brings Jubilee! - A History of Painting in Italy, Vol. 3 of 6: Umbria, Florence and Siena, from the Second to the Sixteenth Century; The Sienese, Umbrian, North Italian Schools (Classic Reprint) - 101 Reasons Why He Won't Commit To You: The Secret Fears, Doubts, And Insecurities That Prevent Most Men From Getting Married - Analytical Solutions for Transport Processes: Fluid Mechanics, Heat and Mass Transfer (Mathematical Engineering)Process Improvement Essentials - 100 Common Misconceptions about Is Everyone Hanging Out Without Me?Is Everyone Really Equal?: An Introduction to Key Concepts in Social Justice EducationIsevilik Isaretleri: Jesus Signs - A Journey by Chance (The Other Way Home #1) - Amputations and Prosthetics: A Case Study Approach - Agricultural Electronics: 1983 And Beyond : Field Equipment, Irrigation, and Drainage (Asae Publication, 84-8--84-9.) - ABC, Follow Me! Phonics Rhymes and Crafts Grades K-1 - America in the Fifties A Librarian's Guide to an Uncertain Job Market - Aging with Humor and Grace: A Hilarious Woman's Guide Using Funny Stories and Embarrassing Moments as Milestones in Life's JourneyThe Grace of Coming Home: Spirituality, Sexuality, and the Struggle for Justice - Android App Inventor for the Absolute Beginner - 101 Nights: True Stories of Muslims coming to Jesus told in an Ancient Paradigm - 2006 Essential Guide To The National Security Agency (Nsa) And Central Security Service, Signals Intelligence (Sigint), Cryptology, Information Assurance (Dvd Rom) - A Manual of Qualitative Chemical Analysis, Tr. by W. Ramsay - Algorithm-Architecture Matching for Signal and Image Processing: Best papers from Design and Architectures for Signal and Image Processing 2007 & 2008 & 2009 (Lecture Notes in Electrical Engineering) - American Pow Memoirs From The Revolutionary War Through The Vietnam War: The Autobiography Seminar, Providence College, Spring Semester 2006 -
<urn:uuid:88a0bc7d-4e45-4036-acd3-189e0d077f00>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
10,376
Consultant 31 16 September 2013 Dear Julie Hawes I understand the Competition Commission is investigating the above matter and I am writing to you with a personal example of the bullying approach used by insurers against doctors. [] In summary, in a letter dated [] one insurance company threatened to deregister me unless I immediately repaid "overpayments" of []. In this letter they did not detail how they arrived at this figure and I had no way of understanding what overpayments were being referred to. I wrote to them on [] to complain about their unnecessarily threatening behaviour and requesting a breakdown of the £[] being demanded. They wrote back on [] saying the actual figure owed by me was much greater ([]) and gave a breakdown of only [] worth of charges. I wrote back to them on [] stating that they had made an error and incorrectly capped charges because of coding errors. I also informed them that I was unhappy with their aggressive approach and requested a copy of their complaints procedure. I re-requested evidence to justify the [] they were still demanding. It has been [] weeks since I wrote to the insurance company and they have not replied. It is appalling that any company can threaten any individual in this manner on the basis of erroneous evidence and then refuse to apologise and later, even reply to letters.
<urn:uuid:77263523-9a5e-4484-81d8-8baaa5d44380>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,352
Quelle due vite del "biondo" tra Juve e Lazio c'è Nedved MAURIZIO CROSETTI TORINO. Pavel corre dappertutto, galoppando nelle sue numerose vite. Il biondo non si è fermato mai un momento. A Roma era "cuore acciaio Nedved", il coro ritmato sulla musichetta di jeeg robot, a Torino raccoglie — ovviamente di corsa — le sue palline da golf. Era l'ossessione agonistica nel cuore della Lazio con cui tolse alla Juve il più crudele degli scudetti, quello affogato il 14 maggio 2000 nella pozzanghera di Perugia, e ora della Juve è addirittura il vicepresidente, il più decorativo dei ruoli. Ma il biondo non lo interpreta così, fa invece opera di raccordo tra società e squadra, rappresenta la Juventus in giro per l'Europa e non si limita a giocare a golf e a pallone con Andrea Agnelli, il suo amico del cuore, colui che lo volle alla scrivania accanto alla sua. Perché se durante una partita hai Nedved a fianco, è molto probabile che quella partita tu la vinca. «Senza offesa per la Lazio, con cui ho vissuto anni indimenticabili, mi sento più juventino». Il biondo si prendeva cascate di fischi quando tornava all'Olimpico da avversario, però non ha mai cambiato versione secondo utilità. Non ha mai parlato male del presidente Cragnotti («Lo chiamavo il vecchio, e stato importante per me»), figurarsi di Zeman che lo portò a Roma e che non è proprio uno storico amico della Juve («Gli devo quasi tutto, il suo calcio matto mi affascina, i matti a questo mondo servono», e neppure ha mai rinnegato quel suo scudetto anti-bianconero («Forse Perugia-Juve non si doveva giocare, il campo era impraticabile, però lo era per entrambe le squadre»). Frasi sempre nette come i suoi tagli di campo. Qualche anno fa le ha messe in un libro dal titolo La mia vita normale (Add), difendendo quello che un giorno gli disse suo padre: ricorda, Pavel, tu sei una persona normale che una volta alla settimana gioca al calcio per 90 minuti. Il libro, il biondo lo ha fatto con un interista, Michele Dalai, altro amico del cuore. «Pavel è una bella persona, generosa anche emotivamente», dice Dalai. «Preferisce una birra a un'auto veloce, è un ottimo padre e mi ha pure insegnato a giocare a calcio con un concetto solo: devi sbagliare tentando di fare la cosa giusta. Se devi tirare di sinistro, tira e non aggiustare la palla sul destro, poi come va va». Vivere con lucido fanatismo ogni gesto, e con lo stupore di chi è appena arrivato. «L'impatto con Roma fu fortissimo, mi sembrò di entrare in un altro pianeta e in una cartolina». Lui che in Boemia aveva visto la Rivoluzione di velluto (sentiva sparare, là fuori, ma i nonni gli dicevano che erano i cacciatori per volgere il dolore in favola, come Benigni col bimbo nel campo di sterminio), giunse in Italia pensando che fosse troppo presto: «Non ero pronto ma andò benissimo». Uomo di campagna, scelse di vivere all'Olgiata e non a Roma, come del resto non avrebbe scelto Torino ma il parco della Mandria, vicino di casa un signore che la mattina passava a trovarlo per il caffè. La moglie Ivana, non aveva mai visto quel signore e un giorno telefonò al marito, gli disse «caro, in cucina c'è un vecchietto che chiede di te». Era Umberto Agnelli. Forse non c'era mai stato un giocatore come Pavel Nedved. Divenne l'anima di una Lazio a volte inquieta ma fortissima. Nel libro si legge: «Ho visto cose davvero folli, c'era gente che non si sopportava e a volte si improvvisavano ring, partivano scazzottate e lanci di oggetti, a volte frutta e ortaggi, come in un film d'azione». Quando Cragnotti decise di venderlo alla Juve, Pavel non lo sapeva e rifiutò. Poi si convinse. Zidane era appena passato al Real per 120 miliardi di lire, Nedved ne costò 70 e fu l'inizio di una nuova epoca, «anche se tutti pensavano che io dovesse diventare il nuovo Zizou ed era impossibile». Fioccarono scudetti, «restituiti alla Juventus il tricolore che le avevo tolto nel 2000». Un luogo diverso, la strana fabbrica degli scudetti: «Azienda, famiglia e squadra». Il biondo la visse ovviamente da fanatico, correndo nel parco anche il giorno di Natale, e | ROLOGNA | TORINO | EMPOLI | UDINESE | GENOA | CROTONE | PESCARA | SASSUOLO | ATALANTA | SAMPDORIA | ROMA | CAGLIARI | |---------|--------|--------|---------|-------|---------|---------|----------|----------|-----------|------|----------| | MIRABITE | 83 21 | HART | SKORUPSKI | 28 1 | KARNEZIS | LAMANNA | 23 1 | CORDAZ | BIZZARRI | 31 47 | CONSIGLI | BERISHA | 1 1 | PUCCIONI | SZCZESNY | 25 1 | RAPAI | | KRAFTH | 4 7 | ZAPPACOSTA | LAURINI | 2 37 | FARAGONI | IZZO | 5 22 | ROSI | FORNASIER | 44 20 | LIRIOLA | TOLCI | 3 13 | PEREBIA | RUIGER | 2 19 | PISACANE | | MAIETTA | 20 16 | ROSSINI | BELLICCI | 15 30 | DANIELO | BUROSSO | 8 13 | FERRARI | CODA | 35 34 | CANNAVACCIO | CALDARA | 13 26 | SILVESTRE | CERUTI | 23 | CERUTI | | CHIKWOKOU | 24 1 | MORETTI | COSTA | 24 1 | FELINI | SAMIR | 24 1 | CECCHI | CECCHI | 80 15 | MONTIBBIO | GIOVANFILIPPO | 17 | BRUNO ALVES | MURRU | | MASINA | 25 23 | BARRECA | PASQUAL | 21 3 | SAMIR | EDENLSON | 2 87 | MARTELLA | CRESCENZI | 2 13 | PEULSO | CONTI | 24 19 | REGINI | BRUNO PERES | 13 29 | MURRU | | NAGY | 16 15 | BENASSI | KRUNIC | 33 6 | TOFANA | CATALDI | 94 6 | ROCHEIN | VERRE | 7 21 | AQUILANI | GRASSI | 88 8 | BARRETO | STRICKOTMAN | 6 77 | TACHTSIDIS | | VIVIANI | 6 10 | VALDRIPE | SCHIEL | 20 1 | HALLFREDSKOG | 30 8 | CRISTIANO | LAXALT | 93 28 | CAPEZZI | MEMUSHAJ | 8 6 | PELLEGRINI | KURTIC | 27 10 | B.FERNANDES | DIESSENA | 4 | | OZEMALI | 31 8 | BASSELLI | CIOCE | 11 14 | JANIKTO | LAZOVIC | 22 12 | STOIAN | BIRAGHI | 3 25 | BERARDI | PETAGNA | 20 17 | GUAGLIARELLA | BARELLA | 4 18 | BARELLA | | DEFRANCESCO | 14 14 | IAGO FALQUE | SAPONARA | 10 10 | DEPAUL | ZAPATA | 51 29 | TROTTA | PINILLA | 7 9 | MATTEI | GOMEZ | 1 14 | SCHNECK | DIZZO | 1 12 | FORBELLO | | DESTRO | 10 31 | BOYE | PUCCARIELLI | 20 9 | PUGLIESE | 11 11 | THEREAU | OCAMPAS | 20 16 | POLITANO | | | | | | | **ARBITRO: GHERSINI** ORE 15 SKY CALCIO 2 **ARBITRO: BUSCO** ORE 15 SKY CALCIO 4 **ARBITRO: MARIANI** ORE 15 SKY CALCIO 3 E PREMIUM 1 **ARBITRO: VALLEI** ORE 15 SKY CALCIO 5 **ARBITRO: BIZZOLI** ORE 18 SKY CALCIO 2 **ARBITRO: GUIDA** ORE 20.45 SKY SPORT E PREMIUM SPORT
<urn:uuid:5c2c1b05-0991-4145-bb35-bdcc88b5eb7b>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
6,438
Protokoll der 12. Vereinsversammlung OGW vom April 2021 Da aufgrund der aktuellen Lage die Vereinsversammlung des OGW nicht in gewohnter Form stattfinden konnte hat der Vorstand am 15. März 2021 beschlossen, eine schriftliche Abstimmung für das Jahr 2020 durchzuführen. Die schriftliche Durchführung kann aufgrund der Verordnung 3 des Bundesrates über Massnahmen zur Bekämpfung des Coronavirus (COVID-19) vom 19.06.2020 auch stattfinden, ohne dass dies in den Statuten vorgesehen ist. Die Einladung wurde allen Mitgliedern mit den nötigen Unterlagen am 6. April 2021 per Post zugestellt. Das ausgefüllte und unterschriebene Abstimm- und Wahlformular konnte bis am 27.4.2021 zurückgesandt werden. Traktandenliste für die 12. Vereinsversammlung (schriftliche Durchführung) 1. Protokoll der Vereinsversammlung vom 25.06.2020 2. Mutationen 3. Jahresbericht 2020 des Präsidenten 4. Jahresrechnung 2020 mit Revisorenbericht OGW Entlastung des Vorstandes 5. Budget 2021 OGW 6. Rückblick chinoworb und Filmclub 7. Tätigkeiten 2021 8. Wahlen 9. Anträge Die Auswertung der zurückgesandten Formulare ergab, dass der Jahresbericht des Präsidenten, die Jahresrechnung und das Budget genehmigt wurden. Der Revisorenbericht wurde zur Kenntnis genommen unter Entlastung des Vorstandes. Alle Wahlen wurden bestätigt. Abstimm- und Wahlformular schriftliche Vereinsversammlung 2021 Total gültige Abstimm- und Wahlformulare: 62 Art der Mitgliedschaft: - 6 Firmen - 14 Vereine - 42 Private | Traktandum | Ja | Nein | Enthaltung | |---------------------------------------------------------------------------|----|------|------------| | 1. Protokoll der Vereinsversammlung vom 25.6.2020 | 59 | 0 | 3 | | 3. Jahresbericht 2020 des Präsidenten | 62 | 0 | 0 | | 4. Jahresrechnung 2020 | 62 | 0 | 0 | | Revisorenbericht OGW zur Kenntnis genommen | 62 | 0 | 0 | | Entlastung des Vorstandes | 62 | 0 | 0 | | 5. Budget 2021 OGW | 61 | 0 | 1 | | 8. Wahlen | | | | | Sepp Graf, Präsident | 61 | 0 | 1 | | Ruedi Steiner, Kassier/Vizepräsident | 62 | 0 | 0 | | Thomas Pulver, Sekretär | 61 | 0 | 1 | | Boris Kaiser, Betrieb | 61 | 0 | 1 | | Meinrad Ender, Filmclub/Marketing | 62 | 0 | 0 | | Rita Seifritz, Revisor | 62 | 0 | 0 | | Urs Tännler, Revisor | 62 | 0 | 0 | Datum: 3.5.2021 Unterschrift: [Signature] Worb, 11. 5.2021 Josef Graf Präsident Thomas Pulver Sekretär (Protokoll) - Jahresbericht des Präsidenten Jahresbericht 2020 Nach dem guten Start im chinoworb im Jahr 2019 hatte sich der Vorstand auch für das Jahr 2020 viel vorgenommen. Hatten wir doch bis Sommer 2020 bereits rund 25 fest zugesagte Vermietungen und fast jede Woche kamen neue Anfragen. An der Vorstandssitzung vom 13. Januar mussten wir zu unserem Bedauern die Kündigung von Operateur Nicolas Fernandez zur Kenntnis nehmen. Nun hiess es auf die Suche nach Ersatz. Wir hatten Glück, dass uns Nicolas beim Einarbeiten der Operateure mithalf. Verschiedene freiwillige HelferInnen machten die ersten Schritte und am Schluss konnte mit Rita Suppiger die geeignete Person als Chefoperateurin gefunden werden. Vielen Dank Rita für deinen unermüdlichen Einsatz für das chino-worb. An der zweiten Vorstandssitzung vom 13. Februar wurde unter anderem die Hauptversammlung vom 24. März 2020 vorbereitet. Doch anfangs März schlug das Schicksal zu. Die Corona-Pandemie verbreitete sich mit Riesenschritten aus. Plötzlich hiess es kein Händeschütteln mehr, Abstand halten und Bundesrat Berset forderte uns auf, zu Hause zu bleiben. Ab dem 16. März wurde in der ganzen Schweiz den Lockdown verhängt. Die Läden (ausser Lebensmittelläden), Schulen, alle Freizeitangebote, Kulturstätten, Hotels und Restaurants und auch diverse Gewerbe- und Fabriken wurden geschlossen. Wer konnte, musste im Homeoffice arbeiten. Der öffentliche Verkehr wurde teilweise eingestellt, so dass das ganze Leben praktisch von einem Moment auf den Andern stillgelegt wurde. Auch für das chino hatte dieser Lockdown Konsequenzen. Sämtliche Kinovorstellungen mussten abgesagt werden. Die Vermietungen konnten teilweise verschoben werden und nur wenige wurden abgesagt. Bis zum ersten Lokdown konnte ich nur 5 Vermietungen durchführen. Ebenso musste die Hauptversammlung am 24. März auf unbestimmte Zeit verschoben werden. Das chino-Team nutzte die Zeit der Betriebseinstellung für die Umbauarbeiten, welche eigentlich für den Sommer geplant waren. Die Technik wurde vom Technikraum in das Foyer verlegt. Es mussten mehrere Stromleitungen gezogen werden. Diese Arbeiten wurden soweit möglich von den freiwilligen VorstandskollegInnen in vielen Stunden vollbracht. An dieser Stelle danke ich allen Beteiligten, angefangen bei Thomas, der als wahrer Allrounder entdeckt wurde, ebenso Rita und Katharina für den grossen Einsatz. Tatkräftigen Mithilfe in Sachen Technik hatten wir von Daniel Tschanz vom Kino Belp. Ebenso danke ich der Firma Merz für den Einbau der zwei Wände beim WC-Eingang und der Firma Thomas Lehmann für die Malerarbeiten im Eingang. Beide Firmen verzichteten auf eine Entschädigung. Danken möchte ich auch der Firma Olwo für die gesponsert Thekenplatten. Ebenso danke ich allen beteiligten Firmen, die uns in irgendwelcher Art unterstützt haben. Ein erster Lichtblick erreichte uns Ende Mai. Die Massnahmen wurden leicht gelockert. Wir konnten das chino ab dem 8. Juni unter den nötigen Schutzvorkehrungen und dem Schutzkonzept wieder öffnen. An der verschobenen Hauptversammlung vom 25. Juni im chino nahmen 20 Mitglieder inkl. Vereinsdelegierte teil. 27 Einzelpersonen, Firmen und Vereine haben sich für die HV entschuldigt. Sämtliche Anträge wurden an der HV einstimmig genehmigt. Am 27. Juni durften wir erstmals die Neuzuzüger in der Gemeinde Worb in Zusammenarbeit mit der Gemeinde mit ca. 50 Personen begrüssen. Gemeindepräsident Niklaus Gfeller stellte die Gemeinde und Katharina Schär die Geschichte und die verschiedenen Angebote im chino via Powerpräsentation vor. Ich hoffe auf eine Fortsetzung des Angebotes in einer anderen Reihenfolge (ev. Schlussprogramm?) Das 17. Pétanque-Turnier im August mussten wir aus Sicherheitsgründen absagen. Auch dieses Jahr war der Zivilschutz Worb - Bigenthal unter der Leitung von Markus Zürcher für uns im Einsatz. So wurden an diversen Orten neue Sockel platziert. 10 neue Bänke wurden in der Gemeinde erstellt und Bestehende mit neuem Holz ersetzt. Weitere Bänke wurden mit den neuen OGW-Schildern ausgerüstet. Ich danke allen beteiligten Landbesitzern für die gute Zusammenarbeit und Max Brunner als Bänkliprojektleiter. Ebenso danke ich Paul Vollenwyder für die Mithilfe bei der Brettermontage sowie Erich Müller von der Bächelmattgarage für die kostenlose Zurverfügungstellung des Fahrzeugs. Danken möchte ich an dieser Stelle auch Bruno Allemann und dem ganzen Werkhofteam für ihre Unterstützung. Aktuell betreut der Ortsverein Gemeinde Worb im ganzen Gemeindegebiet 122 Bänke. Alle Standorte sind auf dem Ortsplan eingezeichnet und werden laufend nachgeführt. Eigentlich sollten sie auch auf der Website der Gemeinde Worb erscheinen, ist aber für den Moment noch nicht realisiert. Alle Bänke werden pro Jahr durch mich drei bis viermal mit dem Auto abgehauen und gepflegt, d.h. Gras mähen, von Schmierereien befreien, Abfall zusammenlesen usw.. Der Arbeitsaufwand beträgt jedesmal rund 2 ½ Tage. Am 16. September konnte in Zusammenarbeit mit der Schmöckerei die verschobene Lesung vom 26. März mit Arno Camenisch durchgeführt werden. Der Anlass wurde mit 80 Personen sehr gut besucht. Ab dem 24. Oktober mussten wir auf Befehl der Berner Regierung das chino infolge der zweiten Coronawelle wieder schliessen und somit konnten auch die vorgesehenen oder verschobenen Vermietungen nicht stattfinden. Von August bis Ende Dezember konnte ich nur drei Vermietungen durchführen. Am 21. November war es wieder soweit. Dann hiess es nämlich, Weihnachtsbäume stellen. Manfred Lehmann vom Zächer, seine beiden Söhne, der Schwiegersohn und ich waren im Einsatz. Dieses Jahr hatte ich genug Bäume. Die 3 Tannen konnten in Worb abgeholt werden. Besten Dank den Spendern; der Familie Beat Moser, Richigenstrasse, Jürg Wenger, Rubigenstrasse und Fritz Ellenberger, Promenadenstrasse. Für die schönen Tannenbäume konnten wir viele Komplimente entgegennehmen. Vielen Dank und ein grosses Merci an alle Beteiligten. Zum Schluss möchte ich der Gemeinde Worb und der Bank SLM ganz herzlich für die grosszügigen Spenden danken. Danken möchte ich auch meinen Vorstandskolleginnen und -kollegen für ihr unermüdliches Engagement für unseren Verein. Nicht zuletzt geht mein Dank auch an die vielen freiwilligen Helferinnen und Helfern, ohne die das chinoworb gar nicht existieren könnte. Und hier muss ich ausdrücklich erwähnen, dass Alle nach wie vor ohne Entschädigung arbeiten. Vielen Dank auch all jenen, die unseren Verein in irgendeiner Weise unterstützt haben. Worb, 10. März 2021 Sepp Graf, Präsident Sepp Graf
3f61c11e-a267-41bc-b3b5-d4a77cb9a216
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
9,804
MODELLING OF SINGLE GAS SORPTION PROCESSES IN SHALLOW FIXED BED ADSORBERS M.J.G. Linders\textsuperscript{1,2}, L.J.P. van den Broeke\textsuperscript{1}, E.P.J. Mallens\textsuperscript{2}, J.J.G.M. van Bokhoven\textsuperscript{1}, F. Kapteijn\textsuperscript{1} and J.A. Moulijn\textsuperscript{1} \textsuperscript{1} Industrial Catalysis - CPT, Delft University of Technology Julianalaan 136, 2628 BL Delft, The Netherlands \textsuperscript{2} TNO - Prins Maurits-Laboratory, Lange Kleiweg 137, 2280 AA Rijswijk, The Netherlands Introduction The objective of this work was to simulate the adsorption process of gases in a filter bed of activated carbon, mainly focussed on the application to gasmask canisters. The model was validated by comparison of the simulation results with experimental results on the adsorption of toluene at ambient temperature in a shallow packed bed of activated carbon. Mathematical model The transport mechanism in the gas phase was described by a dispersed plug flow model accounting for mixing in the axial direction. The resistance for mass transfer between the bulk of the gas phase and the outer surface of the particle was located in a fictitious film around the particle. Intraparticle gas transport was described by a diffusive contribution assuming Ficks law and an effective molecular diffusion coefficient as transport parameter. Equilibrium between the gas phase and solid phase concentrations was assumed at each position throughout the particle. Both phases were assumed to be isothermal. The continuity equation for the adsorptive over the gas phase is given by: $$\varepsilon_b \frac{\partial C_b}{\partial t} = D_{ea} \frac{\partial^2 C_b}{\partial z^2} - u_z \frac{\partial C_b}{\partial z} - (1 - \varepsilon_b) k_f a (C_b - C_i)$$ where $C_b$ is the bulk gas phase concentration, $u_z$ is the superficial gas velocity, $D_{ea}$ is the effective axial diffusion coefficient, $z$ is the axial coordinate, $\varepsilon_b$ is the bed porosity, $a$ is the external surface area per unit particle volume and $k_f$ is the mass transfer coefficient. Assuming spherical particles, and assuming local equilibrium in the particles, the continuity equation for the adsorptive over the solid phase is given by: $$\left( \frac{\partial q}{\partial C_p} + \varepsilon_p \right) \frac{\partial C_p}{\partial t} = \frac{D_{ef}}{r^2} \frac{\partial}{\partial r} \left( r^2 \frac{\partial C_p}{\partial r} \right)$$ where $C_p$ is the intraparticle gas phase concentration, $q$ is the adsorptive loading, $\varepsilon_p$ is the particle porosity, $D_{ef}$ is the effective molecular diffusion coefficient and $r$ is the radial coordinate inside the particle. The following boundary conditions were used: $$D_{ef} \left. \frac{\partial C_p}{\partial t} \right|_{r=r_p} = k_f \left( C_b - C_i \right) \quad \text{and} \quad \left. \frac{\partial C_p}{\partial t} \right|_{r=0} = 0$$ The Dubinin-Radushkevich adsorption isotherm was applied to describe the equilibrium sorption data of toluene on activated carbon: $$\frac{q}{q_{\text{max}}} = \exp \left( - \left( \frac{R T}{\beta E_0} \right)^2 \ln^2 \left( \frac{c}{c_e(T)} \right) \right)$$ The values of the parameters $E_0$ en $q_{\text{max}}$ were estimated by regression of this equation to the experimental isotherm data of toluene for a calculated value of $\beta$ (Duisterwinkel\textsuperscript{1}). The set of partial differential equations and corresponding initial and boundary conditions was solved numerically by discretisation of the equations (method of lines) followed by integration of the set of ordinary differential equations using a standard numerical integration routine for stiff problems with a sparse Jacobian. Model parameters The values of the parameters used in the simulations are shown in Table 1. The gas mixture consists of nitrogen and toluene, the latter present in very low concentrations. Therefore the physical parameters of the gas mixture are based on the values of pure nitrogen. The effective axial diffusion coefficient (Gunn\(^2\)) and mass transfer coefficient (Dwivedi and Upadhyay\(^3\)) were calculated from correlations for classical fixed beds. Variables in the simulations were the bed length, 0.01 to 0.035 m, the superficial gas velocity, 0.127 to 0.191 m\(^3\) m\(^{-2}\) s\(^{-1}\) and the toluene inlet concentration, 1.11 \(10^{-3}\) to 4.83 \(10^{-3}\) kg m\(^{-3}\)_f. The adsorbent used in the experiments was Norit R1 activated carbon (Norit N.V., The Netherlands), which has a bimodal pore size distribution with both macro- and micropores. During the experiments the activated carbon was placed in a quartz tube with a precision diameter of 0.05 m. **Table 1. Parameter values used in the simulation of the sorption process of toluene in a shallow packed bed of activated carbon** | Value | Unit | Value | Unit | |---------|---------------|---------|---------------| | \(q_{\text{max}}\) | kg m\(^{-3}\)_pt | \(D_{\text{eff}}\) | m\(^2\) m\(^{-1}\)_pore s\(^{-1}\) | | \(E_0\) | J mol\(^{-1}\) | \(\varepsilon_b\) | m\(^3\) m\(^{-3}\)_p | | \(\beta\) | -- | \(\varepsilon_p\) | m\(^3\) m\(^{-1}\)_p | | \(d_{\text{pt}}\) | m\(_{\text{pt}}\) | \(P_{\text{eas}}\) | 2 | | \(C_{\text{sat}}\) | kg m\(^{-3}\)_f | \(\rho_{\text{gas}}\) | kg m\(^{-3}\) | | \(T\) | K | \(\mu_{\text{gas}}\) | 1.8 \(10^{-5}\) kg m\(^{-3}\) s\(^{-1}\) | **Results and Discussion** Typical results for calculated and experimentally determined outlet concentrations of toluene as a function of time are shown in Figure 1 and 2 for different bed lengths. The symbols refer to experimentally determined outlet concentrations while the solid lines refer to simulated values. In Figure 2 the y-axis is shown on a semilogarithmic scale to allow a better comparison at low normalised toluene concentrations. **Figure 2. Normalised outlet concentrations of toluene as a function of time when continuously feeding a mixture of toluene and nitrogen to a packed bed of activated carbon with \(C_o = 2.35 \times 10^{-3}\) kg m\(^{-3}\)_f and \(u_s = 0.191\) m\(^3\) f m\(^{-2}\) s\(^{-1}\).** The agreement between purely calculated and experimentally determined toluene outlet concentrations is good, though it is slightly less at low concentrations. The model is able to account well for changes in the mass transport rates due to changes in the superficial gas velocity and toluene inlet concentration. Simulations are currently being carried out to investigate the influence of different filter geometries and variations in the superficial gas velocity, i.e. respiration patterns, on the breakthrough behavior of organic components. **Conclusions** A mathematical model was developed to simulate the sorption process of toluene in shallow packed beds of activated carbon. The values of the transport parameters were estimated from correlations for classical fixed beds. A good agreement was obtained between calculated and measured toluene outlet concentrations at varying bed length, superficial gas velocity and toluene inlet concentration. **References** 1. Duisterwinkel, A.E., *Carbon*, 1993, 1354. 2. Gunn, D.J., *Chem. Eng. Sci.*, 1987, 42(2), 263. 3. Dwivedi, P.N. and Upadhyay, S.N., *Ind. Eng. Chem., Process Des. Dev.*, 1977, 16(2), 157.
<urn:uuid:00d6456d-6cf6-42b3-aced-4209a0b1f199>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
7,348
Traditions irlandaises au bord du Léman MUSIC-HALL «Rhythm of the Dance» réunit 28 danseurs, 5 musiciens et 3 ténors. la troupe irlandaise à se produire devant plus de 3 millions de spectateurs. inspirée de l'épopée des deux clans rivaux: les Leinster et les Ulster. Le chorégraphe Mark C. Tynan et le compositeur Carl Hession s'inspirent de la culture millénaire celte pour reproduire des tableaux modernes, une musique originale incluant des influences modernes telles que le beat, le jazz et la musique latino. CHANTAL SAVIOZ A les voir sauter et taper des pieds à ce rythme, on ne sait comment ils ont pu aligner autant de spectacles à travers le monde. Rhythm of the Dance fait escale ce week-end au Théâtre du Léman à l'occasion d'une tournée internationale qui a conduit PUBLICITÉ Rhythm of the Dance se veut aussi un plaisir des sens. Costumes, lumières habillent ces deux heures de fresque. Du spectacle, du rythme. Jusqu'à plus soif! ❚ «Rhythm of the Dance», di 16 mars au Théâtre du Léman à 20 h. Réservations Fnac. Le succès de cette comédie musicale made in Dublin tient sans doute au talent et à l'endurance des 28 danseurs, 5 musiciens et 3 ténors présents sur le plateau. Il est aussi à mettre au compte d'une production ultra professionnelle signée Kieran Cavanagh, une locomotive dans la profession qui tient à son actif les shows de stars telles que James Brown, Van Morrison, Johnny Cashes. Rhythm of the Dance propose une balade en terre irlandaise qui puise son âme, ses traditions dans la culture celte. La trame de ce music-hall est Musique du monde Anouar Brahem Trio Le grand maître de l'oud <wm>%"0g1+bnI%K6%4gh8%7S%tV'Xr-aAQN9'-lT-/jkRlOy8l%U3%9nDp%Sy</wm> Mardi 18 mars à 20h30 < F % Q "% y PQ g v G r db m d %7q% R 5 7 Y e a L E f W 2r% o v G T A. d i u%r e % h 6r1 nm w RL" b X % d h % D l U /1 b % X m5 R q+ X 3 h % l 'p 4 % d h % D l L /u b % X m O k D -i U j5 QO - r b - C q y K r I E /r. Y G Q % o w %'1 f R m 2%r a %/2r1 nm S b f Z b % 0 T E w B .31 j % v T % N" e .7% L B + Z 6 c k c Q D % UL % 9 t J 32 wy Q % 0 d % O 5 HI S - y M r W l H - C v -j D xw C a h Q C % G g w m> % 4 q w B + hgm % j /% E w P l % C a + A N D JX %3 x % c 4 = . C %7 S + = H z E + o 1+ M o % i K w J % l I a r+ v u2+ X 1 F O %3 a % cd F O og % 5 e < / w m> Théâtre Forum Meyrin / T. 022 989 34 34 / www.forum-meyrin.ch Service culturel Migros Genève Stand Info Balexert / Migros Nyon-La Combe JEUDI 13 MARS 2008 WEEK-END TRIBUNE DE GENÈVE Paolo Fresu, R ichard Galliano et Jan Lundgren naviguent sur l'océan sans limites du jazz CONCERT Réuni par le pianiste Jan Lundgren, le trio «Mare Nostrum» fait escale au Victoria Hall. Rencontre. Nous partageons les mêmes valeurs musicales, l'amour de la mélodie, notamment, mais aussi un intérêt pour la musique populaire. Paolo a travaillé sur le folklore sarde, Richard joue du tango et de la musette, j'ai enregistré un album d'improvisations sur des chansons traditionnelles suédoises. Et nous parlons un langage commun, le jazz. LUCA SABBATINI Qu'est-ce qui peut bien réunir le trompettiste sarde Paolo Fresu, l'accordéoniste niçois Richard Galliano et le pianiste suédois Jan Lundgren? L'amour du jazz et de la mer. «Mare Nostrum», c'est la réunion de trois stars de la scène musicale européenne à la recherche de leurs origines communes. Le résultat: un pre- MARE NOSTRUM Paolo Fresu, Richard Galliano, Jan ➜ Lundgren Trio Victoria Hall, vendredi 14 mars à 20 h 30, location tél. 0900 800 800, points de vente TicketCorner, Fnac, Manor, Globus, La Poste, gares CFF. «Mare Nostrum», 1 CD ACT/Musikvertrieb. mier album désigné comme un chef-d'œuvre par toute la presse spécialisée (CD ACT/Musikvertrieb). Vendredi, ce trio d'exception fera résonner ses mélodies poétiques sur la scène du Victoria Hall. A l'origine de ce fabuleux projet, Jan Lundgren, un pianiste suédois en quête permanente de nouveaux défis. Rencontre. Comment est né «Mare Nostrum»? Tout a commencé dans un festival au Japon, où jouait aussi Richard Galliano. Il a écouté mon concert, ça lui a plu, nous sommes restés en contact. Plus tard, mon agent, le Lausannois René Hess, m'a envoyé des disques de Paolo Fresu que j'ai adorés. L'association inédite de deux Latins avec un Suédois était née! La première fois que nous nous sommes rencontrés tous les trois, nous avons eu un coup de foudre musical les uns pour les autres. Une trompette, un accordéon et un piano, c'est une formation inhabituelle… Oui, la combinaison est rare, mais elle fonctionne bien. Tout est question de tempérament. Nous avons l'air calme en surface, mais ça bout à l'intérieur! Vous passez avec aisance d'un projet à l'autre. D'où naissent les idées? Des rencontres. A part «Mare Nostrum», j'ai un autre projet où j'improvise au piano sur des chants de la Renaissance. L'idée m'est venue en écoutant le travail d'un chef de chœur que je connais depuis des années. Le mélange fonctionne très bien! Votre style pianistique mêle swing et impressionnisme… Jusqu'à 14 ans, j'ai étudié le piano classique. Puis j'ai découvert Oscar Peterson et ma vie a changé. Je suis tombé amoureux de l'improvisation, du feeling… Improviser, c'est comme apprendre à parler, un mélange d'imitation et de création. Il faut savoir rester soi-même tout en écoutant les autres. Marc Perrenoud Trio, du beau piano jazz au labo Lieu culturel aussi élégant que mystérieux, le Flux Laboratory carougeois invite jeudi soir le pianiste genevois Marc Perrenoud et ses complices, le bassiste Marc Müller et le batteur Cyril Regamey. Une occasion idéale pour savourer le jazz coloré et dynamique de ce formida- ble trio, juste après une tournée argentine couronnée de succès et juste avant l'enregistrement d'un premier CD. Luca Sabbatini ❚ Marc Perrenoud Trio, Flux Laboratory, 10, rue JacquesDalphin, Carouge, jeudi 13 mars à 21 h 30, loc. 022 308 14 50, www.fluxlaboratory.com, entrée 20 francs. PUBLICITÉ Danse / Famille dès 7 ans L'Ange du foyer Création Alias < w m> %" 0 g 1+ b n I % K 6% 4gh 8 %7 S %t V' X r - a A QN e j-l T - / jk R l O y 8 l % U 3% 9n D p% S y < / w m> Chorégraphie Guilherme Botelho < X 3 h + o 1+ M = % i K j 0 % l I B '+ v u2+ X 1 F O %3 a % cd F O og % 5 e < / w m> 32 wy Q % 0 d % O 5 HI S - y M r W / D - C v -j D w B .31 F % Q "% y PQ g v G r db m d %7q% R 5 7 Y e a L E f W 2r% o v G T A. d i u%r e % h 6r1 nm w RL" b X % d h % D l U /1 b % X m5 R q+ % G g % l 'p 4 % d h % D l L /u b % X m O k D -i U j5l q - r b - C q y K r I E /r. Y G Q % o w %'1 f R m 2%r a %/2r1 nm S b f Z b % 0 T E j % v T % N" e .7% L B + Z 6 c k c Q D % UL % 9 t J w m> % 4 q w B + hgm % j /% E w P l % C a + A N D JX %3 x % c 4 = . C %7 S + = H z E xw C a h Q C Du mardi 1er au jeudi 3 avril à 19h00 Théâtre Forum Meyrin / T. 022 989 34 34 / www.forum-meyrin.ch Service culturel Migros Genève Stand Info Balexert / Migros Nyon-La Combe 5
<urn:uuid:3610a002-1ba1-4204-86ba-93f6f3293b86>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
7,427
Procedure Nome procedura: Conferimenti poteri mediante procura Scopo: Raccogliere sinteticamente le deleghe di poteri conferite dall'Ente per l'attuazione delle funzioni aziendali subordinate a quelle del Presidente Ambito di applicazione: Tutte le funzioni aziendali Responsabilità e diffusione: Presidente Riferimenti normativi: Definizioni: Poteri delegati I poteri delegati dal consiglio di amministrazione sono quelli risultanti dalle delibere allegate Principi di comportamento: Le posizioni aziendali cui sono stati delegati poteri dal Consiglio di amministrazione sono elencate nel relativo Verbale di CdA. Gli atti compiuti dai procuratori della Società sono validi e vincolanti nell'ambito dei poteri conferiti a ciascuno di loro. Le deliberazioni del Consiglio di amministrazione prevedono, distintamente, poteri da esercitare individualmente e poteri da esercitare congiuntamente. Descrizione del processo: I documenti relativi a procedimenti destinati a concludersi con atti congiunti devono essere siglati dai relativi promotori, Ove l'esercizio dei poteri delegati comporti decentramenti di attività, nei confronti dei collaboratori diretti e indiretti, ai procuratori incombe l'obbligo e la responsabilità del controllo, quali garanti del corretto espletamento di detta attività e dei risultati di essa. Reportistica: Conservazione della documentazione: Presidenza Nome procedura: Rapporti con la pubblica amministrazione Scopo: Lo scopo di questa procedura è definire le modalità di comportamento nei rapporti con la pubblica amministrazione. Ambito di applicazione: Dipendenti, consulenti, collaboratori esterni Responsabilità e diffusione: Presidenza Riferimenti normativi: Definizioni: Principi di comportamento: Nei rapporti con la pubblica amministrazione e i pubblici dipendenti è vietato: - offrire denaro o doni a dirigenti, funzionari o dipendenti della Pubblica Amministrazione o a loro parenti, sia italiani che di altri paesi; - offrire qualsiasi oggetto, servizio, prestazione di favore per ottenere un trattamento più favorevole in relazione a qualsiasi rapporto intrattenuto con la Pubblica Amministrazione; - quando è in corso una qualsiasi trattativa d'affari, richiesta o rapporto con la Pubblica Amministrazione; - cercare di influenzare impropriamente le decisioni della controparte, comprese quelle dei funzionari che trattano o prendono decisioni, per conto della Pubblica Amministrazione; - nel caso specifico dell'effettuazione di una gara con la Pubblica Amministrazione, operare nel rispetto della legge e della corretta pratica commerciale; - nel corso di una trattativa d'affari, richiesta o rapporto commerciale con la Pubblica Amministrazione, intraprendere (direttamente o indirettamente) le seguenti azioni: - esaminare o proporre opportunità di impiego e/o commerciali che possano avvantaggiare dipendenti della Pubblica Amministrazione a titolo personale; - offrire o in alcun modo fornire omaggi; - sollecitare o ottenere informazioni riservate che possano compromettere l'integrità o la reputazione di entrambe le parti. Descrizione del processo: Reportistica: Conservazione della documentazione: Presidenza Nome procedura: Falsificazione di banconote, monete e altri valori Scopo: Definire i principi di comportamento relativi a banconote, monete e altri valori contraffatti o alterati Ambito di applicazione: Dipendenti - Utenti Responsabilità e diffusione: Presidenza - Responsabile Amministrativo Riferimenti normativi: Codice penale e civile Definizioni: Principi di comportamento: Il personale dovrà rispettare l’assoluto divieto di detenere, spendere o comunque mettere in circolazione banconote, monete carte di pubblico credito, valori di bollo contraffatti o alterati. Per carte di pubblico credito si intendono, oltre quelle che hanno corso legale come moneta, le carte e le cedole al portatore emesse dal Governo. Descrizione del processo: Chi riceve banconote o monete o carte di pubblico credito sospette di falsità o rubate dovrà segnalare il fatto al proprio superiore gerarchico o al Presidente o all’OdV. Reportistica: Conservazione della documentazione: Presidente Nome procedura: affidamento lavori con appalti di fornitura o di servizi Scopo: Gestione delle imprese esterne e degli appaltatori operanti in sito Definizione delle modalità di scelta e di gestione degli appalti promossi da Dedalo Ambito di applicazione: La presente procedura si applica a tutti gli appaltatori operanti presso Dedalo Responsabilità e diffusione: - Direttore Generale - Responsabili dell’area che richiede la fornitura; - Responsabile Amministrazione; Riferimenti normativi: Definizioni: Principi di comportamento: Tutto il personale coinvolto nel processo deve attenersi rigorosamente alla normativa ed alle specifiche procedure di cui sopra predisposta dall’ente, segnalando al direttore superiore ogni non conformità o anomalia individuata. Descrizione del processo: Applicazione delle procedure interne. Reportistica: Conservazione della documentazione: La documentazione attestante la qualificazione del fornitore è conservata dal Responsabile Amministrativo Nome procedura: fatturazione e gestione del credito Scopo: definire le modalità di fatturazione e di gestione del credito Ambito di applicazione: l’attività di Dedalo che porta alla fatturazione (uso spazi e strutture, certificazioni, etc etc) Responsabilità e diffusione: Responsabile Amministrativo Presidente Riferimenti normativi: Definizioni: Principi di comportamento: Descrizione del processo: La fatturazione avviene a seconda della tipologia del fruitore del servizio. Si precisa che i revisori effettuano un controllo a campione sulle fatture e le relative documentazioni, anche contrattuali. In caso di mancato pagamento in termini, il Responsabile Amministrativo provvede in automatico (mensilmente) ad aggiornare lo scadenziario delle posizioni debitorie e ad inviare solleciti, a mezzo mail o raccomandata. Per cifre consistenti si provvede anche a telefonare. In caso di persistente inadempimento, la pratica viene passata al legale. Reportistica: Conservazione della documentazione: Responsabile Settore Amministrativo Nome procedura: Relazioni e contatti con i minori Scopo: Disciplinare con tatto e massima attenzione tutti i contatti tra il personale delle scuole ed i minori e tra gli stessi minori utenti Ambito di applicazione: Tutte le aree di Dedalo in cui si trovano soggetti minori di età Responsabilità e diffusione: Presidente Corpo Docente Riferimenti normativi: Reati in materia di pornografia minorile, sfruttamento della prostituzione minorile, detenzione di materiale pedo-pornografico Definizioni: Principi di comportamento: Tutto il personale di Dedalo si deve attenere strettamente al disposto normativo in materia, nonché ai principi sanciti nel Codice Etico Descrizione del processo: In caso vi sia anche solo il sospetto - dall'osservazione delle condotte del minore o di particolari eventi, ovvero dai colloqui con la famiglia - del rischio di commissione di simili reati, il personale di Dedalo deve immediatamente avvisare il Presidente e/o l'Organismo di Vigilanza. Il tutto fermo l'onere di denuncia alle autorità competenti, qualora la condotta palesi di per sé il reato. Per quanto concerne gli accessi informatici si precisa che tutti i terminali sono dotati di password di accesso (per dipendenti, docenti, studenti) e che la rete interna è dotata di firewall, anti-virus e programmi atti a scongiurare l'accesso a siti sconvenienti, con relativo download ed upload. Reportistica: Ogni segnalazione deve rimanere tracciata per iscritto in apposito registro. Conservazione della documentazione: Tale report è conservato a cura di chi ha ricevuto la segnalazione. Nome procedura: Diffusione del modello organizzativo di cui al D.Lgs 231/2001 e del relativo Codice Etico Scopo: Consentire e favorire la massima diffusione del modello organizzativo e del codice etico Ambito di applicazione: tutti i settori di Dedalo, oltre che tutti i soggetti che a diverso titolo entrano in contatto con l’ente Responsabilità e diffusione: Presidente Responsabile Amministrativo Riferimenti normativi: Definizioni: Principi di comportamento: massima accessibilità e conoscibilità del modelle e dei principi riportati nel codice etico Descrizione del processo: Facilitare la massima presa visione del modello e del codice etico sia con strumenti cartacei, sia con strumenti informatici attraverso il sito web di Dedalo. Una copia dell’estratto del modello e del codice etico dovranno essere consegnati a mano ai dipendenti, previa sottoscrizione di una ricevuta. Una copia dell’estratto del modello organizzativo o, quantomeno, del Codice Etico verrà comunque inviato a tutti i fornitori e comunque a tutti i soggetti con cui vi sono contatti. Verranno organizzati corsi formazione. Reportistica: Conservazione della documentazione: Nome procedura: Coercizione Psicologica sui minori Scopo: Evitare stati di coercizione dei minori tali da sopraffare la loro volontà e personalità. Ambito di applicazione: Tutte le aree di Dedalo in cui si trovano minori di età Responsabilità e diffusione: Presidente Corpo Docente Riferimenti normativi: Normativa in tema di riduzione in schiavitù o di Sequestro di persona Definizioni: Principi di comportamento: Dedalo si ispira ai principi sanciti nel proprio Codice Etico e ne dispone l'adesione, oltre al rispetto della normativa in materia. Descrizione del processo: Qualsiasi condotta dei minori o del personale di Dedalo che lasci intendere la soggezione del minore a suoi coetanei, a compagni o ad adulti (anche appartenenti al personale di Dedalo) deve essere subito denunciata al Presidente e/o all'Organismo di Vigilanza. Il tutto fermo l'onere di immediata denuncia alle autorità competenti qualora quanto verificatosi costituisca di per sé fattispecie di reato. Reportistica: Deve restare traccia di ogni eventuale segnalazione-denuncia Conservazione della documentazione: A cura di chi la riceve Nome procedura: definizione delle responsabilità in materia di sicurezza Scopo: qualificare in capo a ciascun soggetto la relativa responsabilità Ambito di applicazione: Datore di lavoro; suo delegato e subdelegati; RSPP Responsabilità e diffusione: Riferimenti normativi: D.lgs 81/08 art. 16-17 Definizioni: Principi di comportamento: rispetto della normativa in materia di sicurezza Descrizione del processo: il Datore di lavoro deve adempiere agli obblighi non delegabili e deve preoccuparsi di nominare: - un responsabile del servizio prevenzione e protezione, attribuendogli i dovuti poteri di legge; - un suo delegato ai sensi dell'art. 16 D.lgs. 81/08 (ove ritenuto). Reportistica: Conservazione della documentazione: a cura del datore di Lavoro / segreteria generale Nome procedura: Gestione delle Risorse Umane Scopo: consentire la migliore gestione delle risorse del personale di Dedalo Ambito di applicazione: tutti i dipendenti di Dedalo Responsabilità e diffusione: Presidenza Responsabile Amministrativo Dirigenti Scolastici Riferimenti normativi: Definizioni: Principi di comportamento: Descrizione del processo: Decidere l’assunzione di nuove risorse umane sulla base di valutazioni oggettive in merito alle competenze possedute in relazione alla funzione da ricoprire. In particolare, la necessità di una nuova assunzione verrà comunicata dai Dirigenti Scolastici competenti direttamente al Presidente, che provvederà ad informare il Consiglio di Amministrazione. A seguito della relativa delibera, si procederà nelle forme, nei tempi e nei modi ritenuti opportuni. Adottare ed utilizzare specifiche procedure atte a disciplinare l’erogazione delle retribuzioni, al fine di evitare il pagamento di somme non autorizzate e non dovute e di accertare l’esistenza e la validità dei presupposti formali e sostanziali per la liquidazione di trasferte, rimborsi spese, premi, incentivi. Convenire le retribuzioni eccedenti quelle fissate da contratti collettivi sulla base delle responsabilità e delle mansioni attribuite al dipendente. Organizzare le attività di formazione, in forza del piano di formazione annuale predisposto dai Dirigenti Scolastici Verificare periodicamente: - il possesso delle competenze richieste per l’espletamento delle attività a rischio (quali per esempio, RLP, RSPP, addetti prevenzione incendi e primo soccorso); - il livello di conoscenza delle responsabilità e delle deleghe attribuite al personale che svolge specifiche attività a rischio. Prevedere l’organizzazione di corsi specifici per tutto il personale sulle tematiche dell’etica, della sicurezza e della tutela dei minori, nonché la consegna di tutta la documentazione di riferimento, aggiornando i dipendenti in caso di modifiche legislative o degli strumenti predisposti dall’ente. Nome procedura: Gestione dei sistemi informativi Scopo: assicurare una corretta gestione ed un corretto utilizzo del sistema informativo interno e delle connessioni esterne Ambito di applicazione: l’attività di Dedalo che comporta l’utilizzo del sistema informativo interno Responsabilità e diffusione: Presidenza Riferimenti normativi: Definizioni: Principi di comportamento: Descrizione del processo: Gestione e monitoraggio degli accessi, con profilo utente dedicato; protezione delle reti e degli accessi; gestione degli output di sistema e verifica della sicurezza di hardware e cablaggi. Blocco download e upload materiale non autorizzato Verifica e controllo periodico sull’efficienza del sistema, con segnalazione all’Organismo di vigilanze di eventuali utilizzi illegittimi da parte del personale delle attrezzature hardware e software ricevuta in dotazione. Reportistica: Conservazione della documentazione: Nome procedura: Gestione delle segnalazioni ricevute dall’organismo di vigilanza e dai soggetti preposti Scopo: Scopo della seguente procedura è: - un completo e rigoroso monitoraggio delle segnalazioni ricevute dall’Organismo di Vigilanza o dalle funzioni preposte di Dedalo; - misure organizzative, gestionali e di controllo volte anche alla ragionevole prevenzione delle ipotesi di reato previste dal D.lgs. 8 giugno 2001, n. 231 (“Decreto 231”). Ambito di applicazione: La presente procedura si applica al processo di gestione delle segnalazioni ricevute dall’Organismo di Vigilanza o dalle funzioni preposte di Dedalo. Essa definisce il quadro delle norme operative essenziali per la gestione delle segnalazioni regolamentando e garantendo, mediante l’istituzione di idonei canali informativi, la ricezione, l’analisi ed il trattamento di segnalazioni relative alle problematiche in materia di responsabilità amministrativa della società (violazioni delle Procedure Generali, del Modello di Organizzazione e Gestione, del Codice Etico, ecc.) inoltrate dai collaboratori di Dedalo (“Destinatari”). Responsabilità e diffusione: Nell’ambito del processo di gestione delle segnalazioni di cui alla presente procedura, le responsabilità sono ripartite come segue: - il Responsabile dell’Internal Audit (“IA”) è responsabile dell’applicazione, aggiornamento e modifica della presente procedura; - i responsabili delle direzioni/funzioni aziendali coinvolte nelle attività di cui alla presente procedura hanno la responsabilità di osservare e farne osservare il contenuto. Inoltre, la presente procedura sarà consegnata e/o inviata e/o comunque resa conoscibile a cura dell’IA: • ad ogni membro del Consiglio di Amministrazione e del Collegio Sindacale di [Dedalo]; • ad ogni membro dell’Organismo di Vigilanza di [Dedalo]; • ad ogni dipendente, consulente, collaboratore, partner commerciale e fornitore di [Dedalo] La presente procedura può essere consultata e prelevata, anche su supporto elettronico, nel file contenuto nel sistema informativo interno seguendo. Riferimenti normativi: La presente procedura tiene in considerazione i seguenti documenti: - Codice Etico ex D.Lgs. 231/2001 (“Codice Etico”), adottato dalla Società con delibera del Consiglio di Amministrazione del 22 dicembre 2010 ed adeguatamente comunicato; - Modello di Organizzazione Gestione e Controllo (ex art. 6 del Decreto 231) adottato dalla Società e disponibile presso l’ufficio dell’Organismo di Vigilanza e sul sito internet; - Procedure Generali e Protocolli di cui al Modello di Organizzazione e Gestione. A tal proposito, tutti i Destinatari sono tenuti a prendere conoscenza della normativa sopra richiamata. Definizioni: Ai fini della presente procedura, per “Segnalazione” si intende, qualsiasi notizia avente ad oggetto presunti rilievi, irregolarità, violazioni, comportamenti, fatti censurabili e/o, più in, qualsiasi criticità o questione che possa arrecare danno o pregiudizio, anche solo di immagine, a [Dedalo], riferibile a dipendenti (inclusi i top manager), membri degli organi sociali (Consiglio di Amministrazione, Collegio Sindacale), società di revisione di [Dedalo] e a terzi (partner, clienti, fornitori, consulenti, collaboratori) in relazioni d’affari con tali società nelle materie di cui al D.lgs. n. 231/2001. Segnalazione anonima Per “Segnalazione anonima” si intende qualsiasi segnalazione in cui le generalità del segnalante non siano esplicitate, né siano rintracciabili. Segnalazione in mala fede Per “Segnalazione in mala fede” si intende la segnalazione priva di fondamento, fatta esclusivamente allo scopo di danneggiare, o altrimenti recare pregiudizio, a dipendenti (inclusi top manager) a membri degli organi sociali (Consiglio di Amministrazione, Collegio Sindacale). Soggetti segnalanti Le segnalazioni possono provenire dai seguenti soggetti: dipendenti (inclusi top manager), membri di organi sociali (Consiglio di Amministrazione e Collegio Sindacale), partner, fornitori e collaboratori di [Dedalo]. Ai fini della presente procedura, per “partner” si intende qualsiasi persona, fisica o giuridica, privata o pubblica, ente o associazione con cui [Dedalo] intrattiene rapporti di collaborazione commerciale. Ai fini della presente procedura, per “fornitori” si intende qualsiasi persona, fisica o giuridica, che abbia rapporti di fornitura con [Dedalo] e che sia stata inserita nell’Elenco Clienti e Fornitori; Ai fini della presente procedura, per “collaboratori” si intende qualsiasi persona, fisica o giuridica, con cui [Dedalo] ha un rapporto negoziale avente ad oggetto la prestazione continuativa di servizi. Soggetti segnalati Le segnalazioni possono riguardare dipendenti (inclusi top manager), membri degli organi sociali (Consiglio di Amministrazione e Collegio Sindacale), clienti, fornitori, partner, azionisti e collaboratori come definiti precedentemente. Soggetti riceventi I destinatari della segnalazione (dipendenti, inclusi i top manager, membri degli organi sociali) trasmettono tempestivamente in originale quanto ricevuto all’Organismo di Vigilanza, utilizzando criteri di riservatezza idonei a tutelare l’efficacia degli accertamenti e l’onorabilità delle persone interessate. All’Organismo di Vigilanza deve essere trasmessa anche l’eventuale documentazione in possesso dello stesso soggetto ricevente ed attinente i fatti segnalati. Principi di comportamento: Garanzia di anonimato e protezione Tutte le funzioni/posizioni organizzative di [Dedalo] interessate dalla ricezione e trattamento delle segnalazioni, devono garantire l’assoluta riservatezza ed anonimato delle persone segnalanti, fatti salvi gli obblighi di legge e la tutela dei diritti della Società. [Dedalo] non tollererà alcuna forma di minaccia, ritorsione o azioni simili nei confronti di un dipendente che abbia svolto o collaborato allo svolgimento della segnalazione. Anonimato Verranno prese in considerazione anche le segnalazioni anonime indicate precedentemente, a condizione che contengano fatti circostanziati e non segnalazioni di contenuto generico e/o confuso, alle quali si applicheranno, in quanto compatibili, le norme successivamente indicate. Protezione dalle segnalazioni in mala fede L’Organismo di Vigilanza garantisce adeguata risposta alle segnalazioni in “mala fede”, censurando simili condotte ed informando i soggetti nei casi di accertata “mala fede”. Iter operativo Le attività in cui si articola il processo descritto al precedente § 2 sono: - Comunicazione; - Istruttoria; - Accertamento; - Piano di azione. Comunicazione L’Organismo di Vigilanza, al fine di favorire l’invio delle segnalazioni, predispone tutti i possibili canali di comunicazione, comprendenti, a titolo esemplificativo: - posta ordinaria (Indirizzare a: [Dedalo scs ONLUS viale Varese, 30 Como CO]); - indirizzo di posta elettronica [email@example.com]. Il mantenimento dei suddetti canali di comunicazione è garantito dall’Organismo di Vigilanza. Istruttoria L’Organismo di Vigilanza è competente a: - ricevere ed annotare ciascuna segnalazione in un apposito documento denominato “Registro delle segnalazioni” (“Registro”); - registrare le informazioni relative ad ogni segnalazione ricevuta; Accertamento L’Organismo di Vigilanza è competente a decidere se procedere o meno ad ulteriori verifiche motivando per iscritto nel libro delle riunioni dell’Organismo di Vigilanza la decisione assunta. L’Organismo di Vigilanza informa il Collegio Sindacale delle decisioni prese. A conclusione della fase di accertamento l’Organismo di Vigilanza aggiorna il Registro e, in caso di decisione a non procedere, archivia la segnalazione. L’Organismo di Vigilanza garantisce che la fase di accertamento sia svolta nel minor tempo possibile. Piano di azione L’Organismo di Vigilanza in accordo con il top management dell’entità oggetto di accertamento definisce i contenuti del “Piano di azione” necessario per la rimozione delle eventuali criticità rilevate. Per ogni rilievo deve essere definita anche la rispettiva scadenza delle azioni correttive e l’indicazione della posizione organizzativa e del nominativo del Responsabile competente per l’attuazione dell’azione correttiva stessa. Mala fede Se dalla istruttoria o dall’accertamento emergono elementi oggettivi comprovanti la "mala fede" da parte del soggetto che ha effettuato la segnalazione, l’Organismo di Vigilanza ne dà comunicazione al Comitato per il Controllo Interno. L’Organismo di Vigilanza ed il Comitato per il Controllo Interno decidono d’intesa le eventuali azioni da intraprendere nei confronti del soggetto segnalante in mala fede, ne garantiscono l’attuazione e assicurano che sia informato tempestivamente il soggetto segnalato. Nei casi di accertata “mala fede”, il segnalante potrà essere soggetto ad adeguate misure disciplinari. Follow-up L’Organismo di Vigilanza garantisce il monitoraggio dello stato di avanzamento del piano d’azione. A conclusione dell’attività di follow-up, l’Organismo di Vigilanza aggiorna il Registro. Reportistica: Annualmente, l’Organismo di Vigilanza provvede a stilare un rapporto relativo alle segnalazioni ricevute nel periodo di riferimento nonché uno contenente lo stato di avanzamento dei lavori delle segnalazioni ricevute. Tali report sono trasmessi al Presidente, agli Amministratori, al Collegio Sindacale ed alla Società di revisione di [Dedalo]. Inoltre, l’Organismo di Vigilanza provvede a garantire idonea informativa ai soggetti che hanno trasmesso la segnalazione sull’esito dell’istruttoria. Conservazione della documentazione: E’ responsabilità di chi riceve la segnalazione conservare copia della relativa documentazione e degli eventuali allegati. Nome procedura: Procedura sanzionatoria ai sensi del d.lgs 231 Scopo: Definire l’apparato disciplinare e sanzionatorio previsto dal Modello Organizzativo aziendale. Ambito di applicazione: Il presente sistema disciplinare si inquadra nell’ambito dei più generali obblighi previsti dagli articoli 2103, 2106 e 2118 del Codice Civile di diligenza ed obbedienza del lavoratore nonché nei poteri: – del datore di lavoro – di predisporre e attuare appositi strumenti di tipo disciplinare. Il sistema disciplinare deve prevedere sanzioni commisurate alla gravità dell’infrazione commessa e deve rispettare le disposizioni contenute nello Statuto dei Lavoratori e nel vigente Contratto Collettivo Nazionale, in altre parole, il Contratto Collettivo Nazionale di Lavoro applicabile ai dipendenti di Dedalo; nel caso specifico il Contratto Collettivo Nazionale di Lavoro AGIDAE e successive modifiche e integrazioni. Pertanto, i soggetti potenzialmente destinatari dei provvedimenti disciplinari sono i soggetti in posizione apicale e i soggetti sottoposti all’altrui direzione. Tra i suddetti soggetti devono ricomprendersi quelli indicati dagli articoli 2094 e 2095 del Codice Civile – prestatori di lavoro subordinato – e, ove non ostino imperative norme di legge, tutti i “portatori di interesse” della Società. Responsabilità e diffusione: [Dedalo] – nell’organo del Consiglio di Amministrazione – è responsabile della formalizzazione, applicazione e revisione del presente sistema disciplinare. Inoltre, nell’ambito del Modello Organizzativo, l’Organismo di Controllo (detto anche Organismo di Vigilanza - previsto dagli articoli 6 e 7 del D. Lgs. 231/2001) ha compiti di vigilanza sulla corretta applicazione del modello con specifiche funzioni di supervisione e indirizzo, per quanto concerne quelle infrazioni che possano incidere sulla funzionalità del Modello stesso. A tal proposito, in contemperanza con quanto stabilito dallo Statuto dei Lavoratori si può prevedere la partecipazione dell’Organismo di Controllo nella duplice funzione di struttura istruttoria con intervento preliminare alla contestazione dell’addebito, nonché di figura consultiva nel momento precedente alla eventuale irrogazione della sanzione. Di seguito si riportano in termini schematici i flussi procedurali delle diverse forme di partecipazione dell’Organismo di Controllo al sistema disciplinare. Riferimenti normativi: art. 7 comma 4 lett. b) D.lgs 231/2001 Definizioni: Principi di comportamento: Il rispetto della normativa applicabile ed in particolare di quanto disposto in materia di sicurezza sui luoghi di lavoro (D.Lgs 81/2008), dal presente Modello Organizzativo e dal Codice Etico Descrizione del processo: Lavoratori subordinati (art. 23 del CNL) In proporzione con la gravità delle infrazioni previste per ciascuna fattispecie, saranno applicate le seguenti sanzioni. Ammonizione scritta Lieve inosservanza delle norme di comportamento del Codice Etico aziendale e del Modello Organizzativo interno; ☐ Tolleranza di lievi irregolarità commesse da propri sottoposti o dal altri appartenenti al personale ai sensi del Modello Organizzativo interno. Multa fino ad un massimo di tre ore di retribuzione; ☐ Ripetizione di mancanze punibili con il rimprovero scritto; ☐ Inosservanza non grave delle norme di comportamento previste dal Codice Etico aziendale e dal Modello Organizzativo interno; ☐ Omessa segnalazione o tolleranza di irregolarità non gravi commesse da propri sottoposti o da altro personale ai sensi del Modello Organizzativo interno; ☐ Inosservanza dei piani di azione e dei provvedimenti adottati dall’Organismo di Controllo ai sensi del D.Lgs. 231/2001. Sospensione dal servizio o dal trattamento economico e dal servizio per un periodo non superiore a 3 giorni ☐ Mancanze punibili con le precedenti sanzioni, quando per circostanze obiettive, per conseguenze specifiche o per recidività, rivestano maggiore importanza; ☐ Inosservanza ripetuta o di una certa gravità delle norme di comportamento previste dal Codice Etico aziendale o dal Modello Organizzativo; ☐ Omessa segnalazione o tolleranza di gravi irregolarità ai sensi del D.Lgs. Tutte le sanzioni (anche di sola ammonizione) devono essere formalizzate per 231/2001 commessi da propri sottoposti o altri appartenenti al personale; iscritto (anche a mezzo mail all’indirizzo di ciascun dipendente) ☐ Negligenza ai sensi del D.Lgs. 231/2001 di una certa gravità o che abbia avuto riflessi negativi per l’azienda o per i terzi. Sospensione dal servizio con mantenimento del trattamento economico per lavoratori sottoposti a procedimento penale ex D.Lgs. 231/2001 Conformemente all’articolo 7 dello Statuto dei Lavoratori, la presente procedura Nei confronti di lavoratori/lavoratrici sottoposti ad indagini preliminari ovvero deve essere portata a conoscenza dei lavoratori mediante affissione in locali del sottoposti ad azione penale per reato che, ai sensi del D.Lgs. 231/2001, comporti luogo di lavoro accessibili a tutto il personale. l’applicazione di pena detentiva anche in alternativa a pena pecuniaria, l’azienda può Oltre al rispetto di obblighi di affissione, unitamente al Codice Etico, la presente disporre, in ogni fase del procedimento penale in atto, l’allontanamento dal servizio procedura deve essere divulgata nel corso di opportune sessioni informative dirette a del soggetto interessato per motivi cautelari. tutti i “portatori di interesse” dell’azienda. L’allontanamento dal servizio deve essere reso noto per iscritto al lavoratore/lavoratrice interessato e può essere mantenuto dall’azienda per il tempo dalla medesima ritenuto necessario ma non oltre il momento in cui sia divenuto irrevocabile la decisione del giudice penale. Il lavoratore/lavoratrice allontanato dal servizio conserva per il periodo relativo il diritto all’intero trattamento economico ed il periodo stesso è considerato servizio attivo per ogni altro effetto previsto dal Contratto Nazionale di Lavoro della categoria di appartenenza. Licenziamento per giustificato motivo – con preavviso ☐ Violazione delle norme di comportamento previste dal Codice Etico e dei doveri inerenti alla sfera disciplinare, alle direttive dell’azienda in tema di prevenzione dei reati previsti dal D.Lgs. 231/2001, tale da configurare, per la particolare natura della mancanza o per la sua recidività un inadempimento notevole degli obblighi relativi. Licenziamento per giusta causa – senza preavviso ☐ Infrazione di norme interne emanate ai sensi del D.Lgs. 231/2001 di gravità tale, o per la dolosità del fatto o per i riflessi penali o pecuniari o per la recidività o per la sua particolare natura, da far venire meno la fiducia sulla quale è basato il rapporto di lavoro, da non consentire comunque la prosecuzione nemmeno provvisoria del rapporto stesso; ☐ Compimento di atti non dovuti o mancata esecuzione di atti dovuti ai sensi del Modello Organizzativo interno, che abbia causato, al termine di un processo giudiziario, la condanna della società a pene pecuniarie e/o interdittive per aver compiuto i reati previsti dal D.Lgs. 231/2001. Lavoratori Autonomi e Collaboratori della Società Per quanto concerne le figure dei lavoratori autonomi e dei collaboratori della Società, si richiamano le disposizioni dell’articolo 1453 e seguenti del Codice Civile in relazione alla risolubilità del contratto per inadempimento. Pertanto, nei confronti di tali soggetti dovranno prevedersi specifiche clausole risolutive all’interno dei contratti di fornitura e collaborazione. Soci Per quanto concerne le figure dei Soci ☐ in caso di gravi inadempienze delle obbligazioni che derivano dalla legge o dal contratto ☐ si dovrà applicare l’articolo 2286 del Codice Civile che prevede l’esclusione del socio. **Reportistica:** Tutte le sanzioni (anche di sola ammonizione) devono essere formalizzate per iscritto (anche a mezzo mail all’indirizzo di ciascun dipendente) **Conservazione della documentazione:** Conformemente all’articolo 7 dello Statuto dei Lavoratori, la presente procedura deve essere portata a conoscenza dei lavoratori mediante affissione in locali del luogo di lavoro accessibili a tutto il personale. Oltre al rispetto di obblighi di affissione, unitamente al Codice Etico, la presente procedura deve essere divulgata nel corso di opportune sessioni informative dirette a tutti i “portatori di interesse” dell’azienda. Nome procedura: Gestione infortuni, incidenti, comportamenti pericolosi, azioni correttive e preventive Scopo: Lo scopo di questo documento è di: _a_ definire le modalità per la gestione di infortuni, incidenti e comportamenti pericolosi allo scopo di attuare azioni preventive e correttive finalizzate ad annullare o ridurre al minimo la probabilità che gli stessi si ripetano; _b_ definire le modalità con cui si gestiscono le azioni correttive o preventive attuate per eliminare le cause effettive o potenziali di rischio. Ambito di applicazione: Quanto definito in questo documento si applica a: - verificarsi di infortuni, incidenti, comportamenti pericolosi; - segnalazioni di situazioni di rischio da parte del Rappresentante dei Lavoratori per la Sicurezza, dei lavoratori, dei preposti, del RSPP, del Medico Competente, degli Addetti all’emergenza e primo soccorso, dell’organo di vigilanza ed enti di controllo, dei fornitori di beni e servizi. Responsabilità e diffusione: Il datore di lavoro, in collaborazione con RSPP, RLS e Medico Competente, ha il compito di assicurare l’applicazione Riferimenti normativi: D.lgs 81/08 Definizioni: Si definisce incidente un evento che ha comportato un danno a impianti, attrezzature, strutture, e che avrebbe potuto provocare un infortunio. Si indica con il termine comportamento pericoloso un’azione che può esporre i dipendenti e/o eventuali altre persone presenti (fornitori, clienti), ad un rischio di infortunio o di incidente.] Principi di comportamento: Al verificarsi di un infortunio, di un incidente o qualora si riscontri un comportamento pericoloso per la salute e la sicurezza dei lavoratori e/o di altri operatori eventualmente presenti, ogni dipendente è tenuto a comunicarlo al datore di lavoro o suo incaricato che provvede alla compilazione del modulo di registrazione. Il trattamento o risoluzione di infortuni, incidenti, comportamenti pericolosi prevede l’accertamento, l’analisi e la successiva rimozione delle cause dell’evento segnalato con l’attuazione delle necessarie azioni correttive/preventive. Tale attività viene condotta dal datore di lavoro con RSPP, RLS ed ogni altro eventuale soggetto utile allo scopo. E’ importante che siano definite le azioni da attuare per evitare il ripetersi dell’evento, siano chiaramente definiti i tempi di attuazione, ed individuati i soggetti incaricati dell’attuazione e della verifica. Descrizione del processo: Nell’analisi dell’evento sono da considerare le seguenti possibili cause: _procedure ed istruzioni di lavoro insufficienti; _personale non sufficientemente informato, formato,addestrato; _carenza di coordinamento/comunicazione con i lavoratori e/o i fornitori; _carenze tecniche o manutentive di impianti, strutture, attrezzature messe a disposizione degli operatori; _imprudenza, disattenzione degli operatori; _carenza nell’attività di vigilanza e controllo da parte di datore di lavoro, Preposti, Lavoratori; _dispositivi di protezione individuale non adeguati o non efficaci; _altro. Le azioni correttive/preventive da adottare possono essere: - aggiornare/adeguare procedure ed istruzioni di lavoro; - adeguare l’informazione, la formazione e l’addestramento del personale; - migliorare la comunicazione interna ed il coordinamento con i fornitori esterni; - prevedere il richiamo formale e/o provvedimento disciplinare degli operatori interessati, ove necessario; - aggiornare la valutazione dei rischi; - migliorare/sostituire/manutentare le attrezzature ed i dispositivi di protezione individuale; - estendere le misure di sicurezza identificate ad altre situazioni di rischio analoghe presenti in azienda. Nell’intervallo di tempo che intercorre tra il momento di rilevazione dell’evento e l’attuazione dell’azione correttiva/preventiva il datore di lavoro mette in atto interventi d’urgenza necessari per la tutela della salute e della sicurezza dei lavoratori. **Reportistica:** - Scheda registrazione infortunio - Elenco di controllo azioni preventive e correttive **Conservazione della documentazione:** Nome procedura: Elenco di controllo azioni preventive e correttive, infortunio, incidente, comportamento pericoloso Scopo: Descrivere le modalità per la pianificazione e la registrazione delle attività periodiche e in emergenza di controllo, manutenzione e verifica delle risorse strumentali (macchine, attrezzature, veicoli, strutture e impianti) in dotazione ai lavoratori in modo da prevenire e/o ridurre l’incidenza di danni a persone o cose derivanti da anomalie causate da rotture, mal funzionamenti, sovraccarichi di lavoro. Ambito di applicazione: Interventi di manutenzione ordinaria e straordinaria (preventiva e in emergenza) su macchine, attrezzature, impianti, strutture dell’azienda effettuati sia da squadra di manutenzione interna che da ditte esterne specializzate. Responsabilità e diffusione: Datore di lavoro, RSPP, Preposti Riferimenti normativi: D.lgs 81/08 Definizioni: Principi di comportamento: Al controllo periodico ed alla manutenzione ordinaria, programmata e straordinaria della struttura e delle attrezzature, in particolare di laboratorio, sono soggette le risorse strumentali utilizzate dall’ente. Gli interventi di manutenzione da realizzare sono quelli previsti nei Manuali o Libretti di Istruzione per l’uso consegnati dal fornitore a corredo. Prima di iniziare un intervento manutentivo, l’operatore addetto dovrà informare il Datore di Lavoro, delimitare la zona in modo da non renderla accessibile ad altro personale; tale disposizione si applica anche in caso di interventi manutentivi effettuati da ditte esterne specializzate. Descrizione del processo: In caso di adozione/acquisto di una nuova risorsa il datore di lavoro o suo incaricato aggiorna lo scadenziario. La realizzazione degli interventi da parte di ditte esterne specializzate avviene conformemente a quanto previsto dal D.lgs 81/08 La registrazione di tutti gli interventi manutentivi realizzati deve essere effettuata su un apposito modulo. Se si effettuano ripetuti interventi di emergenza su una stessa attrezzatura, questa deve essere sottoposta a manutenzione periodica oppure deve essere aumentata la frequenza degli interventi programmati. Reportistica: - Calendario manutenzioni - Registro manutenzione Conservazione della documentazione: Nome procedura: Gestione dei dispositivi di protezione individuale Scopo: Definire le modalità per la scelta e l’acquisto, la distribuzione e l’utilizzo dei dispositivi di protezione individuali. Ambito di applicazione: La presente procedura si applica a tutti i DPI (compresi anche quelli per il primo soccorso e la gestione emergenza) che vengono adottati dai lavoratori (dipendenti, lavoratori internali, lavoratori con contratto di lavoro atipico, tirocinanti/stagisti), che operano presso la azienda, quando i rischi non possono essere evitati o significativamente ridotti da misure tecniche collettive. Si applica altresì ad eventuali DPI che dovessero essere disposti a tutela degli Utenti delle scuole o dei centri di formazione. Responsabilità e diffusione: Datore di lavoro, RSPP, RLS, Medico competente Riferimenti normativi: D.lgs 81/08 Definizioni: Principi di comportamento: Tutto il personale coinvolto nel processo deve attenersi rigorosamente alla procedura, segnalando al direttore superiore ogni non conformità o anomalia individuata. Descrizione del processo: I dispositivi di protezione sono scelti ed adottati a seguito ed in conformità con la valutazione dei rischi e in base al programma delle misure di Prevenzione e Protezione. A seguito di indagini ambientali, fonometriche, informazioni da letteratura tecnica, ma anche segnalazione dei lavoratori o fornitori di DPI, il Datore di lavoro, in collaborazione con il RSPP e consultando il Medico Competente ed il Rappresentante dei Lavoratori per la Sicurezza individua le tipologie di DPI più idonee e valuta le caratteristiche dei DPI disponibili sul mercato, scegliendo quelli che soddisfano sia le specifiche esigenze di natura protettiva, sia gli aspetti ergonomici e di accettabilità da parte degli utilizzatori. Per tale valutazione è necessario acquisire le schede tecniche dei dispositivi dal fornitore degli stessi. Il datore di lavoro provvede, in collaborazione con il RSPP, affinché i DPI siano stoccati in spazi idonei (es. armadietto). La formazione e l’addestramento specifici all’uso sono curati dal datore di lavoro o suo incaricato: - al momento dell’inserimento dell’operatore in reparto; - al momento della consegna di nuovi DPI. Per i DPI per cui il costruttore ha specificato la data di scadenza, l’addetto incaricato alla consegna, prima di procedere, verifica la data di scadenza del DPI, in modo da non fornire ai lavoratori dispositivi non più efficaci in quanto scaduti. Inoltre, almeno una volta all’anno (nel corso dell’effettuazione dell’inventario) il datore di lavoro o suo incaricato controlla la data di scadenza, ove presente, dei DPI tenuti a magazzino. Il datore di lavoro e i preposti verificano costantemente: - l’effettivo ed il corretto utilizzo dei DPI da parte degli operatori; - l’utilizzo non promiscuo di uno stesso DPI in dotazione personale (es. maschere, occhiali, guanti, scarpe, …) da parte di più operatori; - che i DPI siano riposti in luogo idoneo quando non utilizzati. Inoltre, controlli sull’utilizzo dei DPI sono effettuati anche in occasione di: sopralluoghi di RSPP, Medico Competente, RLS, analisi dell’andamento infortunistico. Il Datore di Lavoro, con la collaborazione di tutti i soggetti aziendali, compresi gli utilizzatori, assicura il mantenimento nel tempo delle loro caratteristiche specifiche, attraverso la pulizia o la sostituzione. In particolare, gli indumenti che svolgono la funzione di DPI, ovvero vengono indossati per proteggere il lavoratore da rischi per la salute e sicurezza (indumenti fluorescenti, contro caldo e freddo, che evitano il contatto con sostanze corrosive, nocive, tossiche, agenti biologici, ecc.) e che non sono monouso, sono puliti periodicamente sotto la responsabilità e onere del Datore di Lavoro, che ne programma la periodicità, stabilisce dove e come effettuare le operazioni di pulizia, tenendo conto dei rischi che gli indumenti “sporchi” portano e delle misure di protezione da mettere in atto. **Reportistica:** - Elenco tipologie dispositivi di protezione individuale - Scheda rischi DPI - Scheda consegna DPI **Conservazione della documentazione:** - Datore di lavoro, RSPP Nome procedura: Gestione informazione, formazione, addestramento inerente la prevenzione infortuni Scopo: Fornire criteri per la programmazione, la realizzazione e la registrazione della informazione, formazione, addestramento dei lavoratori nonché degli utenti. Ambito di applicazione: Il presente documento si applica a tutte le attività di informazione, formazione ed addestramento (realizzate internamente o da professionisti esterni) dedicate a tutti i soggetti dell’Ente. Responsabilità e diffusione: Datore di lavoro, RSPP, RLS, Medico competente Riferimenti normativi: D.lgs 81/08 Definizioni: Principi di comportamento: Tutto il personale coinvolto nel processo deve attenersi rigorosamente alla procedura, segnalando al direttore superiore ogni non conformità o anomalia individuata. Descrizione del processo: 1) Analisi dei bisogni formativi. L’analisi dei bisogni formativi ha l’obiettivo di realizzare interventi di informazione, formazione ed addestramento mirati alla mansione ed ai rischi ad essa connessi. L’analisi deve essere svolta dal datore di lavoro, in collaborazione con RSPP, RLS, Medico Competente e preposti, esaminando: - bisogni connessi al cambio mansione, all’andamento degli infortuni ed incidenti e alle segnalazioni di comportamento pericoloso; - presenza di neoassunti; - segnalazioni fatte dal Medico Competente; - valutazione del rischio e programma delle misure di prevenzione e protezione; - documentazione per la sicurezza presente in azienda (es. manuali uso e manutenzione, schede di sicurezza, verbale dell’Organo di vigilanza); - notizie su cambiamenti nelle leggi e norme tecniche per la sicurezza. L’analisi dei bisogni formativi deve aver identificato: i soggetti da coinvolgere (nome, cognome, mansion), gli argomenti, la priorità degli interventi. 2) Progettazione e pianificazione. La progettazione e pianificazione riguardano principalmente l’individuazione di obiettivi dell’informazione, formazione ed addestramento, contenuti, soggetti incaricati, metodologie didattiche e strumenti, tempi e modalità di valutazione dell’efficacia degli stessi. a) Obiettivi (perché fare l’intervento? A cosa serve?). L’intervento consiste nella trasmissione/consolidamento/aggiornamento di conoscenze e di pratiche di lavoro finalizzate all’attuazione della sicurezza in azienda. b) Contenuti: (cosa spiegare?) Contenuti minimi della informazione e formazione. c) Soggetti incaricati (chi spiega le cose?). Tali soggetti possono essere ad esempio: Datore di lavoro, RSPP, Medico Competente, RLS, Preposto (particolarmente indicato per l’addestramento con affiancamento), Consulenti esterni. La scelta dei soggetti a cui affidare l’intervento viene condotta valutando anche la preparazione degli stessi rispetto alla tematica da trattare (es. corsi frequentati, esperienza, titolo di studio, etc.). d) Metodologie didattiche: (come fare?) Le metodologie da adottare possono essere: - Incontri, colloqui - esercitazioni pratiche in aula o in reparto (es. esercitazione per l’evacuazione in caso di emergenza) - addestramento sul lavoro con affiancamento Sono privilegiate le metodologie che assicurano il maggior coinvolgimento dei destinatari. e) Strumenti: (con che cosa?). Ad esempio: - lavagna luminosa - lucidi - lavagna a fogli mobili - cartelloni - dispense - videoregistratore e televisore - videoproiettore f) Programmazione (quando?) Il programma delle attività di informazione, formazione e addestramento deve essere redatto utilizzando il MOD 4.3 Piano della informazione, formazione e addestramento. Le attività devono essere ripetute periodicamente e comunque sempre in occasione di nuove assunzioni, cambi mansioni, cambiamenti organizzativi (attrezzature, tecnologie, macchinari, sostanze e preparati pericolosi). g) Valutazione: (l’intervento è stato efficace?). Ad esempio: - Questionari/test di verifica dell’apprendimento - osservazione del comportamento dei lavoratori dopo l’intervento - addestramento in seguito alla lezione teorica - controllo dello stato aziendale di infortuni, incidenti, comportamenti pericolosi. 3) Realizzazione dell’intervento. Il datore di lavoro, in collaborazione con RSPP, RLS, MC, capireparto/preposti, garantisce l’esecuzione delle attività programmate di informazione /formazione/addestramento). Gli interventi realizzati sono registrati utilizzando MOD 4.4 Registro presenze. Tale registrazione non vale per l’addestramento con affiancamento per il quale si adotta MOD 4.5 Scheda addestramento. Il datore di lavoro o suo incaricato raccoglie e archivia la documentazione relativa all’attività svolta (attestati di partecipazione, registri presenze, materiale informativo fornito, …). 4) Verifica di realizzazione ed efficacia Il datore di lavoro, in collaborazione con RSPP, MC, RLS, preposti: - valuta i risultati conseguiti dopo la formazione (subito con la prova di valutazione finale, ed in seguito con il controllo dello stato aziendale di infortuni, incidenti, comportamenti pericolosi) MOD. 4.6 Scheda di verifica apprendimento; - osserva i comportamenti dei lavoratori correggendo quelli scorretti e rinforzando quelli corretti.; - verifica, in particolare, il corretto utilizzo dei dispositivi di sicurezza; - segnala al dipendente per iscritto (utilizzando il sistema di gestione interno) l’eventuale mancata utilizzazione dei dispositivi di sicurezza. **Reportistica:** - Piano tipo di informazione di base - Piano tipo di informazione sui rischi specifici - Piano della informazione, formazione e addestramento - Registro delle presenze - Scheda addestramento - Scheda di verifica apprendimento Nome procedura: Acquisti da fornitori di beni e servizi Scopo: - Gestione dei fornitori di beni e servizi rilevanti per gli aspetti di salute e sicurezza del lavoro ed ambientali. - Gestione dei pagamenti ai fornitori onde evitare che siano sottratte o destinate ad uso illecito risorse aziendali. Ambito di applicazione: La presente procedura si applica a tutti gli appaltatori operanti presso Dedalo ed in generale, a tutti i fornitori di beni e servizi, anche rilevanti per gli aspetti ambientali e di salute e sicurezza. Responsabilità e diffusione: - Presidente - Responsabili dell’area che richiede la fornitura; - Responsabile Amministrazione; Riferimenti normativi: procedure previste da verbale CdA che definisce i diversi poteri in materia Definizioni: Principi di comportamento: Tutto il personale coinvolto nel processo deve attenersi rigorosamente alla procedura, segnalando al direttore superiore ogni non conformità o anomalia individuata. Descrizione del processo: Qualificazione iniziale Prima dell’effettuazione del primo ordine ad un nuovo fornitore, il Responsabile Amministrativo richiede le informazioni pertinenti al fornitore stesso, valutando l’offerta e l’offerente e comparando il tutto con altre eventualmente raccolte. All’atto della risposta e della verifica dei requisiti minimi, il fornitore viene inserito nell’elenco dei fornitori qualificati, aggiornato periodicamente. I soggetti che ricevono le merce sono tenuti a verificarne la qualità e la conformità, oltre che la provenienza e la corrispondenza di ordine/fattura/DDT, dandone riscontro scritto (anche a mezzo del solo visto di approvazione sulla stessa bolla o sulla stessa fattura) Elenco dei fornitori Il responsabile amministrativo mantiene aggiornato l’elenco dei fornitori Nell’ordine di acquisto devono essere indicati tutti i riferimenti utili ad identificare esattamente la merce, ivi comprese le richieste di eventuali certificazioni, attestazioni e documenti ritenuti necessari. All’atto dell’ingresso di un nuovo impianto/macchina/ecc. Il Responsabile Amministrativo avvisa il RSPP per aggiornare la valutazione dei rischi. Nel caso siano rilevate non conformità all’atto dell’ingresso della macchina/impianto rispetto ai requisiti fissati, viene aperta una non conformità. Descrizione operativa del processo A) Area richiedente - se l’acquisto comporta una spesa inferiore al budget assegnato, procede in via autonoma, salvo obbligo di rendiconto al Responsabile Amministrativo - se l’acquisto è superiore al budget di spesa (assegnato con verbale CdA) invia richiesta di acquisto al Responsabile Amministrativo B) Responsabile Amministrativo - Identifica il fornitore in base ai criteri di scelta standardizzati nelle procedure aziendali e all’elenco fornitori di cui sopra; - in caso di richiesta da area interessata autorizza l’acquisto richiesto, o vi procede direttamente (a seconda dei casi), sempre nei limiti del suo budget di spesa definito anch’esso con apposito verbale CdA); - in caso di richiesta di spesa superiore al Budget a disposizione del Responsabile Amministrativo, questi chiede formale autorizzazione alla spesa al Presidente, procedendo all’acquisto solo dopo essere stato autorizzato. Si precisa che i pagamenti vengono tutti preparati dal Responsabile Amministrativo (o dal suo settore), unico ad essere in possesso - con il Presidente - dei codici e dei poteri di firma presso gli istituti di credito, salvo le piccole spese lasciate alla diretta responsabilità della sede di Roma (per ovvie ragioni di gestione e di logistica). **Reportistica:** **Conservazione della documentazione:** La documentazione attestante la qualificazione del fornitore è conservata dal Responsabile Amministrativo. La documentazione relativa ai pagamenti (compresi ordini, fatture e DDT) è conservata a cura del Responsabile Amministrativo. Nome procedura: Incassi Rette e contributi utenti Scopo: Fissare le norme interne di procedimento relativamente agli incassi dagli utenti Ambito di applicazione: Rientrano in questa procedura gli incassi a mezzo: - Assegni circolari o bancari di c/c - Bonifici bancari - Effetti - Contanti Responsabilità e diffusione: Responsabile amministrativo Settore Servizi finanziari, Amministrazione, Controllo di Gestione Presidente Riferimenti normativi: Definizioni: Principi di comportamento: Tutto il personale coinvolto nel processo deve attenersi rigorosamente alla procedura, segnalando al direttio superiore ogni non conformità o anomalia individuata. Descrizione del processo: Effetti cambiari Vengono consegnati All'Area Amministrativa e saranno trasferiti a Contabilità Generale, con indicazione del codice utente e del numero di partita di riferimento. Il Settore amministrativo nell'ambito della bancabilità degli stessi provvederà all'inoltro dell'incasso mediante le banche dell'ente, effettuando le registrazioni manuali di prima nota Nel caso di insoluti, immediato avviso al Responsabile Amministrativo e al Presidente. Bonifico bancario La contabile bancaria di accredito su nostro c/c sarà passata al Settore Amministrativo, che effettuerà le registrazioni manuali di prima nota sul partitario clienti. Assegno circolare Dopo l'apertura della posta, vanno trasferiti al Settore Servizi finanziari e di amministrazione, che provvede alle registrazioni di prima nota su partitario clienti e al versamento in banca Reportistica: Conservazione della documentazione: Settore amministrativo Nome procedura: Poteri di firma Scopo: La presente procedura ha lo scopo di regolare le approvazioni interne alle spese da effettuare o effettuare in nome e per conto dell'Ente. Ambito di applicazione: Tutte le funzioni aziendali Responsabilità e diffusione: Presidenza, Direzione amministrativa Riferimenti normativi: Definizioni: Principi di comportamento: Descrizione del processo: La procedura di autorizzazione di spesa deve essere autorizzata, nei termini e nei modi di cui al relativo verbale di CDA. Restano salve le procedure descritte relativamente alla voce "acquisti da fornitori di beni e servizi" Reportistica: Riportare l'eventuale reportistica allegata alla presente procedura Conservazione della documentazione: La documentazione è conservata presso direzione amministrativa e direzione generale
<urn:uuid:75d7ab5e-a58c-4291-b83e-bfe1c7c7cc27>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
54,351
COMUNICATO STAMPA Precisazione in merito ad articolo di Corriere Economia: il fatturato 2013 riportato si riferisce alla stima formulata nel Documento di Ammissione al mercato AIM Italia Safe Bag S.p.A. precisa che – in relazione all'articolo pubblicato oggi sulla testata Corriere Economia – il fatturato 2013 in esso indicato è la stima formulata nel Documento di Ammissione pubblicato in occasione della quotazione sul mercato AIM Italia. Il Consiglio di Amministrazione di Safe Bag approverà il progetto di bilancio d'esercizio 2013 in data 10 aprile 2013. Safe Bag è una delle aziende di riferimento a livello mondiale nella prestazione dei servizi di protezione bagagli per i passeggeri aeroportuali, attraverso un portafoglio integrato di soluzioni per la sicurezza ed il confort del passeggero: avvolgimento del bagaglio; rintracciabilità ; garanzia di rimborso in caso di smarrimento o danno; prodotti e accessori da viaggio. Il gruppo è leader in Europa e serve circa 2 milioni di clienti, attraverso oltre 60 punti vendita in 27 aeroporti, di cui 10 in Italia, 16 in Europa e, da giugno 2013, l' aeroporto di Miami in Florida. Per aggiornamenti e news è possibile seguire Safe Bag su Twitter: @Safe_Bag Per maggiori informazioni: Safe Bag S.p.A. Investor Relations Rudolph Gentile email@example.com www.safe-bag.com Nomad Baldi & Partners S.r.l. Antonio Boccia firstname.lastname@example.org Via Cino del Duca, 5 Fax:+ 39 06 57011910 Tel: +39 06 57011900 20122 Milano, Italia Tel: +39 02 58318214 Fax:+39 02 58310893 Contatti per la stampa: Barabino&Partners Stefania Bassi email@example.com Elena Bacis firstname.lastname@example.org Tel: 02 72023535
<urn:uuid:0c91ede1-12e4-41aa-b0fc-d7d0f2e03e65>
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
1,678
ACTA DE REUNIÓN DE LA COMISIÓN DE EDUCACIÓN Y CULTURA DEL 09 DE FEBRERO DE 2016. En la sala de juntas del Regidor Profr. Baltazar Javier Sáenz Islas y siendo las 10:00 horas del día Martes 09 de Febrero de 2016, se inicia la reunión de la Comisión en donde se desahogaron los siguientes puntos: Como primer asunto en la orden del día se tomó lista de asistencia estando presentes los Regidores: el Profr. Baltazar Javier Sáenz Islas, la Profra. Mireya Porras Armendáriz y la M.C. Evangelina Mercado Aguirre, Coordinador, Secretaria y Vocal respectivamente de la Comisión, así como: C. América L. Jaramillo, asistente de Nueva Alianza. Como segundo asunto se lee el Acta de la reunión anterior para su aprobación. Como tercer asunto en el orden del día y en respuesta a las inquietudes de la población que estudia la Lic. en Educación en la UACJ se da información por parte del Regidor Baltazar Sáenz sobre las diferentes opciones en que los alumnos de la Universidad Autónoma de Ciudad Juárez pueden hacer sus prácticas profesionales y el servicio social, aclarando que la UACJ cuenta para servicio social con un catálogo de las instituciones que están registradas facilitándole a el alumnado la opción de escoger la que mejor le beneficie; en prácticas profesionales tienen la libertad de escoger cualquier institución. Como cuarto asunto en el orden del día se informa que para obtener una plaza de maestro(a) tanto en el Estado como en la federación es necesario presentar un examen y aprobarlo, los promedios más altos serán los primeros beneficiados, las personas que no aprueben pueden solicitar un interinato. No habiendo más asuntos que tratar, se da por terminada la reunión, siendo las 11:20 horas. H. CUERPO DE REGIDORES LISTA DE ASISTENCIA Reunión de la Comisión de Educación y Cultura Fecha: 09 de Febrero de 2016 Hora: 10:30 Lugar: Oficina Regidor Profr. Baltazar Javier Sáenz Islas Integrantes de la Comisión: BALTAZAR JAVIER SÁENZ ISLAS Coordinador MIREYA PORRAS ARMENDÁRIZ Secretaria EVANGELINA MERCADO AGUIRRE Vocal Asistentes: | Nombre | Dependencia | Firma | |-----------------|------------------------------|--------------------------------------------| | América L. Jaramillo | Regidores Asist. Ayuntamiento | |
<urn:uuid:532252de-9a4d-422b-bec5-67d6b04d7c18>
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
2,353
By: Delegate Kramer Introduced and read first time: February 11, 2015 Assigned to: Economic Matters A BILL ENTITLED 1 AN ACT concerning. [Brackets] indicate matter deleted from existing law. 1 2–202. HOUSE BILL 522 (2) (I) A PERSON, WHETHER OR NOT THEN A STOCKHOLDER, MAY 1 ASSENT TO AN ACTION BY A CONSENT THAT WILL BE EFFECTIVE AT A FUTURE TIME 2 THAT IS NO LATER THAN 60 DAYS AFTER THE CONSENT IS DELIVERED TO THE 3 CORPORATION OR ITS AGENT. 4 1 36 (3) [ ] (6) "Stockholder" includes a shareholder of a real estate investment HOUSE BILL 522
<urn:uuid:f8e7ec87-d74a-46ec-a204-18b56432ba1f>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
555
Avgifter för medlemsskap i nätverket Österlen Syd 2020 Österlen Syd är en förening för näringsidkare och privatpersoner som vill arbeta gemensamt för att förbättra för turism och besöksnäring inom regionen södra Österlen. Bl a sprider vi en gratis turistkarta och informerar på vår webbplats: www.osterlensyd.se och i vår Facebook-grupp: Österlen Syd Anslagstavlan. Vi hälsar nya medlemmar välkomna i nätverket! Avgifter: Stödmedlem, medlemsavgift 250 kr; kommer inte med på kartan och inte på hemsidan. Grundavgift för verksamhet 550 kr; inkluderar medlemsavgift, prick på turistkartan med en kategori, och på webbplatsen en kategori och en fördjupningssida. Extra prick på kartan för den som har verksamhet på mer än ett ställe 200 kr/st. Extra kategori på karta och webbplats 200 kr/st. Fördjupningssida på webbplatsen för extra kategori 200 kr/st. Exempel: Ett galleri, som också har café. Grundavgift 550 kr. En extra kategori på både karta och webbplats 200 kr. En fördjupningssida ingår i grundavgiften, och där kan de två verksamheterna beskrivas. Totalt 750 kr. Alternativt kan man beställa ytterligare en fördjupningssida à 200 kr, så att var och en av verksamheterna har sin egen sida. Avgiften blir då totalt 950 kr. Nedsatt avgift efter 1 augusti: Efter 1 augusti betalar verksamheter halv avgift, dvs lägst 275 kr. Stödmedlemmar betalar som vanligt 250 kr i medlemsavgift. Turistkartan Den tryckta kartan är en z-vikt folder. Hopvikt är formatet halv stående A4, 105x297 mm. Det geografiska området finns på kartan över södra Österlen på www.osterlensyd.se. Upplagan blir i år 35 000 ex. Annonser på turistkartan: Halvspalt, 45x32 mm, 800 kr Helspalt, 92x30 mm, 1500 kr Helspalt dubbel höjd, 92x63 mm, 3000 kr Styrelsen för Österlen Syd
<urn:uuid:dd9736ef-61c1-49ef-a423-5493b79d6d64>
HuggingFaceFW/finepdfs/tree/main/data/swe_Latn/train
finepdfs
swe_Latn
1,775
Dear Parent, Congratulations! Your child has been chosen to be the Hero of the Week! To promote the use of English and encourage good habits and positive conduct both inside and outside the classroom, we have launched a new initiative based on the development of Life Skills. Each week during lessons, we focus on a life skill and identify the specific values and demonstrable behaviours that can contribute to the development of this valuable skill for life. At the end of the week, a child that has genuinely demonstrated that they have understood and can apply the life skill in their day to day conduct is nominated and voted to be a Hero of the Week. As such, they are presented with a medal to wear at school and home for one week in recognition of their conduct and effort. The benefits of having such a Hero of the Week award are multiple. It encourages children to think about their own values and behaviours and motivates them to apply positive behaviours in their lives - both inside and outside the classroom. It teaches civic and social values and equips them to be citizens, not only of their school but also of the world! Please join us in celebrating your child's achievement by talking to them about the life skill they were developing, the behaviours and conducts and what they have learned from the experience. You play a vital part in your child's education so join them and be Heroes of the Week together! ............................. For more information about this initiative visit: www.macmillanelt.es/pupils-corner/ and download the extra material necessary for learning and enjoying after class.
<urn:uuid:602f74a6-15c1-473f-875c-904c8270d484>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
1,633
comme un Manager qui sait mobiliser une équipe comme un Manager qui sait mobiliser une équipe sa vision opérationnelle sa vision opérationnelle Les épreuves sous l'autorité de INITIATIVES Les épreuves Contrôle continu Projet professionnel Projet professionnel Organisation de la formation
<urn:uuid:70cd149e-a29f-4bb9-a92f-27dc35de52e1>
HuggingFaceFW/finepdfs/tree/main/data/fra_Latn/train
finepdfs
fra_Latn
291
TIPS FOR PARENTS We all worry about our children. Many of us are particularly worried about our children's use of the Internet. It is a world that they are more familiar with and know much more about than many parents do. Fortunately, we do not have to become tech wizards to be able to offer our children effective guidance and supervision about the Internet. If we can learn about the risks in the online world and how we can be effective in helping our children to avoid those risks, we are likely to make a positive contribution to their safety. What are the risks? There are four primary risks: sexual predators; harrassment ("cyber bullying"); identification theft; and computer viruses. Our focus here is on Internet activity that places children at risk of sexual abuse. Studies indicate that most Internet-initiated sex crimes involve adult men seeking to meet and seduce teenagers. (Statutory rape comprises 25% of the sex crimes against minors reported to police. Internet-initiated sex crimes comprise about 7% of all statutory rapes.) The approach of an adult using the Internet to access children does not begin abruptly. Sex is usually brought up casually in an online conversation that takes place in a "chatroom." Chatrooms are a common place in which predators seek potential victims. Young persons who have problems with parents, experience frequent sadness and loneliness, or have histories of sexual abuse are more vulnerable to predators who may be lurking in a chatroom. Parents need to know if their children are using "chatrooms" or other forms of Internet messaging. In general, girls are more at risk than boys on the Internet. This is especially so for girls who are experimenting sexually. Boys who identify themselves as gay or who are confused about their sexual orientation are also vulnerable. Giving personal information to an unknown person places a young Internet user at risk. Young persons who share personal information with unknown persons over the Internet and who are willing to arrange meetings with them are most at risk. Uploading or downloading images using file-sharing programs is risky Internet activity. Not surprisingly, posting provocative pictures increases the likelihood that a young person will receive a sexual solicitation. Those pictures also are downloaded and circulated by others. Perpetrators not only seek provocative pictures, they may ask youths to take and post such pictures of themselves or friends. They can be used or even sold for pornography. Older teenage victims and perpetrators sometimes collude to create secrecy and isolation. Few youths have the mature judgment and emotional self-regulation to engage in such relationships safely. Young persons who are victimized may not report to parents or police because they may not view the actions as criminal or themselves as victims. Some youthful victims will feel love and allegiance toward offenders and victimized by authorities and parents. Victims may be pressured not to say anything or feel intimated by threats or fears. Here are some tips for parents who want to keep their children safe from Internet sex predators: * Make your number one priority having a relationship with your children that encourages them to speak to you about what troubles them. * Involve yourself in your child's life. Ask questions and listen to the answers. * Set some basic rules about using the computer – how much time and when. * Talk about respecting their privacy when they use the computer. Talk about the difference between appropriate privacy and potentially harmful secrecy. * Come to a mutual understanding about the content of their "personal" pages on the Internet (Facebook, etc.) * Talk about the dangers of the Internet such as sharing personal information, discussing sex online or sharing provocative pictures. * Talk about what they would do in certain situations, such as, "What if someone you've been talking to in a chatroom wants you to send a photo of yourself?" * Encourage discussion about Internet safety for your children in religious education, youth groups or health classes that naturally address proper and healthy behavior. * Take advantage of opportunities at your parish or your child's school to learn more about Internet safety. * Visit these Web sites for more information: www.fbi.gov/publications/pguide/pguidee.htm www.azag.gov/children_family/InternetSafety.pdf www.netsmartz.org www.GetNetWise.org www.internetsafety.com www.netsmartz.org
<urn:uuid:ea3cd00c-f932-45b4-99d2-6ecd48c877d2>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
4,507
Chihuahuas (Long Coat) 7 Chihuahuas (Long Coat), Puppy (6-9 Months) Dogs 1 Tlc Boot Scootin. TS57698402 Chihuahuas (Long Coat), Puppy (9-12 Months) Dogs 7/14/2022 Breeder: Laurie D Thompson/Kathryn V Hulstein. Sire: CH Loucan's Talk Of The Town Dam: Victory It Takes Moxie At Tlc. Owner:Laurie Thompson. 9 1 Lazy K's Crusier From Schroeder. TS54647201 Chihuahuas (Long Coat), 12-18 Months Dogs 3/28/2022 Breeder: Donna Schroeder. Sire: GCHB CH Schroeder's Mini Cooper Dam: Mishamai Coat Of Many Colors At Schroeders. Owner:Kathleen Coulter|Merle Parreira. 15 1 Aramis (Sanchez). FCMB8183A Chihuahuas (Long Coat), Bred-By-Exhibitor Dogs 10/12/2021 Breeder: Romulo Sanchez Torres. Sire: Super Can (Sanchez) Dam: Candace (Sanchez). Owner:Karen Temple|Judy Ellis. 1/W/BW 19 Knockout Sumthin' Bout Dat Vanilla. TS56198601 21 2/R 5/29/2022 Breeder: Rachel K Green. Sire: GCH CH Knockout Not Sure This Is Edible Dam: CH Knockout Sweet And Simple. Owner:Rachel K Green|Grace A Morris. Bellastaff It Takes Two To Mango. TS57009102 Chihuahuas (Long Coat), Puppy (6-9 Months) Bitches 7/29/2022 Breeder: Gina Dattilo. Sire: GCH CH Mar-El-To's Shake Your Shamrock Dam: GCH CH Bellastaff You Make Me Peachless. Owner:Gina Dattilo. 1 6 Valkyrie's Casino Royale At Improv. TS56527904 Best Puppy 12 2 7/13/2022 Breeder: Jeri Johnson. Sire: CH Blanch-O's Knockin Boots Dam: CH Valkyrie's Kickstart My Heart. Owner:Christy Collins. Tlc Wild Daisy. TS57698403 Chihuahuas (Long Coat), Puppy (9-12 Months) Bitches 7/14/2022 Breeder: Laurie D Thompson/Kathryn V Hulstein. Sire: CH Loucan's Talk Of The Town Dam: Victory It Takes Moxie At Tlc. Owner:Laura Hudson. 16 1 Two'J's Never Say Never. TS56066902 Chihuahuas (Long Coat), 12-18 Months Bitches 4/20/2022 Breeder: Jackie Parisek/Alexis Parisek. Sire: GCHP CH Destiny's To Infinity And Beyond Dam: CH Mar-El-To's Dream Catcher. Owner:Sheila Hoskins . 18 1 Jen-Jeans Tootsie Roll At Wee Scotch. TS54101902 Chihuahuas (Long Coat), Bred-By-Exhibitor Bitches 12/11/2021 Breeder: Jean Pratt. Sire: GCH CH Chula's Light Em Up-L Dam: Jen-Jeans For The Love Of Ivy. Owner:Barbara J. Calhoun. Jen-Jeans Keeper Of The Flame. TS54101903 12/11/2021 Breeder: Jean Pratt. Sire: GCH CH Chula's Light Em Up-L Dam: Jen-Jeans For The Love Of Ivy. Owner:Jean Pratt. Ardently Angel Eyes. TS56726901 20 3 22 2/R 24 4/2/2021 Breeder: Lori Anne Kruger. Sire: GCHB CH Bloomsbury Bellissimo Dam: Ardently A Wink Of Her Eye. Owner:Lori Anne Kruger. 1/W 7/29/2022 Breeder: Gina Dattilo. Sire: GCH CH Mar-El-To's Shake Your Shamrock Dam: GCH CH Bellastaff You Make Me Peachless. Owner:Gina Dattilo. Bellastaff No Fig Deal. TS57009101 Best Bred By Chihuahuas (Long Coat), Open Bitches Who's Australian Lolly - L. TS49711401 28 1 30 8/24/2020 Breeder: Heather A Bondra. Sire: GCHS CH Sparklchi Eskimo Joe Buttons Dam: GCH CH Who's Reisen To Be Wild - L. Owner:Heather A Bondra Kimberly Bling. 2 Bstar & Temple's Xena: Warrior Princess. TS53607101 Chihuahuas (Long Coat), Veteran Dogs 9/8/2021 Breeder: Corbyn Griffin. Sire: GCHS CH Temple & Tip's Say Boom Baby Too Dam: Bstar Cookie Dough. Owner:Karen Temple|Corbyn Griffin.Agent: Judy Ellis GCHS CH Tegs Let's Have A Party. TS23137101 3/6/2014 Breeder: Gerry Desjardins/Tammy Desjardins. Sire: GCH CH Starsen Naughty Norman Dam: CH Starsen On The Ball. Owner:Jennifer Snyder|Sylvia Farkas. 25 1/AOM Chihuahuas (Long Coat), Best of Breed 25 1/Best Stud Dog GCHS CH Tegs Let's Have A Party. TS23137101 3/6/2014 Breeder: Gerry Desjardins/Tammy Desjardins. Sire: GCH CH Starsen Naughty Norman Dam: Judge: CH Starsen On The Ball. Owner:Jennifer Snyder|Sylvia Farkas. 1814 Mr. John C Ramirez Chihuahuas (Smooth Coat), Puppy (6-9 Months) Dogs Chihuahuas (Smooth Coat) 105 1/W Valkyrie's Bad Romance. TS57108901 7/25/2022 Breeder: Jeri Johnson. Sire: CH Destiny's Take A Chance On Me Dam: CH Valkyrie's Rebel 107 Just For Kix. Owner:Jeri Johnson.Agent: Christy Collins 2/R Tlc N Hurd's Leave A Message. TS58460701 Hurd N Tlc's Halley's Comet. Owner:Laurie Thompson|Max Hurd. 8/7/2022 Breeder: Mr. Max E Hurd/Laurie Thompson. Sire: Jem 'N Improv's Smash And Dash Dam: CH Chihuahuas (Smooth Coat), 12-18 Months Dogs 1 111 Jen-Jeans Little Rascal At Wee Scotch. TS54101901 Ivy. Owner:Barbara J. Calhoun. 12/11/2021 Breeder: Jean Pratt. Sire: GCH CH Chula's Light Em Up-L Dam: Jen-Jeans For The Love Of Chihuahuas (Smooth Coat), American Bred Dogs 1 115 Nida's Happy Poncho. TS46957201 Chihuahuas (Smooth Coat), Puppy (6-9 Months) Bitches 6/18/2020 Breeder: Judy L Nida. Sire: Nida's El Guapo Dam: Lavidas Happy Hailey. Owner:Judy Nida. 1/W/BW Lazy K Beautiful Marie's Reezie. TS56846201 9/1/2022 Breeder: Kathleen A Coulter/Meryl Parreira/Toney Alley. Sire: GCH CH Sho-Me's Manuel@Jillis Dam: CH Lazy K Shadows Beautiful Marie. Owner:Kathleen Coulter|Meryl Parreira|Toney Alley. Best Puppy 106 108 2 Lazy K Beautiful Marie's Violet. TS56846202 Chihuahuas (Smooth Coat), Puppy (9-12 Months) Bitches 9/1/2022 Breeder: Kathleen A Coulter/Meryl Parreira/Toney Alley. Sire: GCH CH Sho-Me's Manuel@Jillis Dam: CH Lazy K Shadows Beautiful Marie. Owner:Kathleen Coulter|Meryl Parreira|Toney Alley. 110 1 Mar-El-To's All About The Tan Lines. TS56283902 Chihuahuas (Smooth Coat), 12-18 Months Bitches 5/31/2022 Breeder: Jennifer A Dunlap-Snyder/Ryan Snyder. Sire: GCH CH Knockout Captain America Dam: Mar-El-To's Let It Shine. Owner:Jennifer Snyder. 1/R 112 Mar-El-To's Let's Keep It Hush Hush. TS54087201 12/11/2021 Breeder: Jennifer A Dunlap-Snyder/Ryan N Snyder. Sire: GCHS CH Tegs Let's Have A Party 114 Dam: Mar-El-To's La Vie En Rose. Owner:Katelyn Rust|Jake Scott. AB Neo Fabulous Call Me La'Lisa. TS57220701 Show Me The Money. Owner:Keum dong han. Runchana L Deview 2/3/2022 Breeder: Keum-Dong Han. Sire: GCH CH Bramver's Frank Dam: GCHB CH Neo Fabulous Chihuahuas (Smooth Coat), Open Bitches 1 116 Sheppard's Defining Elegance. TS33820303 1/24/2017 Breeder: Susan Molash/Kelee Hirn-Sheppard. Sire: GCHP CH Dartan Wow Factor Of Josam 118 2 Dam: CH Bellachi's Missouri China Doll By Koniki. Owner:Katelyn Rust. Lazy K's Tucker's My Mom Cook-E. TS51489802 Chihuahuas (Smooth Coat), Veteran Dogs 6/15/2021 Breeder: Kathleen A Coulter/Stacey M Christy. Sire: GCH CH Sho-Me's Manuel@Jillis Dam: Lazy K Shadows Tucker. Owner:Kathleen Coulter|Stacey Christy. 117 1 9/21/2015 Breeder: Heather A Bondra. Sire: GCH CH Mataje-N-Reno's Who Willoughby Mine Dam: GCH GCHS CH Who's Love Was Outcast - S. TS29315901 CH Tradewinds Kiss Me Kiska. Owner:Heather A Bondra. AOM Chihuahuas (Smooth Coat), Veteran Bitches 2 120 GCH CH Knockout Fireball. TS12050501 122 6/8/2012 Breeder: Rachel K Green/Miles A Green. Sire: GCHB CH Dartan On Fire Again Dam: GCH CH Journey's Little Miss Sunshine. Owner:Rachel K Green. 1/BV GCH CH Blanch-O's Warrior Princess. TS25656501 11/7/2014 Breeder: Debbie Mullusky Caponetto/John Caponetto. Sire: CH Caletto Bling Bling For Blanchos Dam: Blanch-O's N' D'Bara Rock On. Owner:Christy Collins|Debbie Caponetto|John Caponetto. Best Veteran Chihuahuas (Smooth Coat), Best of Breed OS 119 121 124 126 128 130 5/7/2019 Breeder: Chizuru Kadowaki. Sire: Bramver's Iris Dam: Bramver's Amiable. Owner:Laura strecky . GCH CH Bramver's Frank. TS45421101 Runchana L Deview CH Knockout London Steele. TS48619401 Knockout Fire Shot Dam: CH Knockout Shine Bright. Owner:Rachel K Green|Grace A Morris. 10/13/2020 Breeder: Rachel K Green/Bill Shelton/Deborah Salow/Victoria Seiler-Cushman. Sire: GCH CH GCHS CH Cogie's Amazing Lilly. TS35805701 Cogie's Precious Streak CGC. Owner:Patricia Holzkopf|Michael Holzkopf. 4/1/2017 Breeder: Cathleen Cogan Bird/David Roy. Sire: CH Cogie's Je Suis Charlie Dam: GCHS CH GCHG CH Knockout Pretty Little Liar. TS42679602 Whiskey Girl. Owner:Rachel K Green. 5/4/2019 Breeder: Rachel K Green. Sire: GCH CH Knockout Fire Shot Dam: GCH CH Knockout Little GCHS CH Jubilee Urban Pride Its All About Me. TS42850503 L Urban.Agent: Christa Cook 3/2/2019 Breeder: Joann Doubrawa. Sire: Jubilee's New Joy Dam: CH Hongwei'S. Animato. Owner:Penny CH Mar-El-To's Let's Not And Say We Did. TS54087202 SEL SEL AB OHBV 12/11/2021 Breeder: Jennifer A Dunlap-Snyder/Ryan N Snyder. Sire: GCHS CH Tegs Let's Have A Party 132 Dam: Mar-El-To's La Vie En Rose. Owner:Jennifer Snyder|Ryan Snyder. CH Guichon's The Time Is Now. TS54984304 Owner:Katelyn Rust|Jake Scott. 3/5/2022 Breeder: Junko Guichon. Sire: GCH CH Guichon's Panic At The Disco Dam: Guichon's Spot On. Junior Showmanship Jr (Open) 2/RBJ GCH CH Glademist Highland Snow Prince. TS50505302 2/3/2021 Breeder: Kevin K Wineburner/Sheryl A Wineburner/Donna Bledsoe. Sire: CH Chedon's Sing Me A Song Dam: CH Chedon's Luck Be A Lady. Owner:Layna|Emily Landers|Sheryl Wineburner . 19 20 1/BJ GCHS CH Who's Love Was Outcast - S. TS29315901 9/21/2015 Breeder: Heather A Bondra. Sire: GCH CH Mataje-N-Reno's Who Willoughby Mine Dam: GCH CH Tradewinds Kiss Me Kiska. Owner:Heather A Bondra.
<urn:uuid:f7827d5f-0d32-4bf4-8c57-8758224c9cff>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
9,177
DATAPULSE TECHNOLOGY LIMITED (Incorporated in the Republic of Singapore) (Company Registration No: 198002677D) BOARD'S RESPONSE TO THE PROPOSED NEW DIRECTORS' PLAN FOR A PROPOSED PAYOUT TO SHAREHOLDERS The board of directors ("Board") of Datapulse Technology Limited (the "Company" or "Datapulse") refers to certain statements made by Ms Ng Bie Tjin @ Djuniarti Intan ("Ms Intan Ng") published today in the media (Business Times "Datapulse boardroom challenger pledges S$70m payout to shareholders") (the "Business Times Article") in relation to her plan to return some S$70 million cash in dividend and through a capital reduction to Shareholders of the Company ("Proposed Payout"). Proposed Payout The Board notes that Ms Intan Ng has outlined her plan for the Proposed Payout ahead of the upcoming Extraordinary General Meeting ("EGM") of the Company to be held on 20 April 2018, seeking, amongst other resolutions, Shareholders' support to appoint certain proposed new directors, including Ms Intan Ng ("Proposed New Directors" or "New Board"). The Board notes that Ms Intan Ng has mentioned that the Proposed Payout would entail, inter alia, a capital reduction to be undertaken by the Company, presumably because she is aware that the Company does not have sufficient distributable profits to return S$70 million cash to Shareholders by way of dividend, and Shareholders would need to approve the Proposed Payout. However, Ms Intan Ng has omitted to mention is that in order to effect a capital reduction, the Company has to convene a general meeting of Shareholders to pass a special resolution, which requires the approval of 75% or more of the votes cast by Shareholders present at the meeting. As at the date of this announcement, the Company has a total issued share capital of 219,074,844 shares (excluding treasury shares), of which Ms Ng Siew Hong, a controlling shareholder of the Company, holds 63,531,705 shares, representing approximately 29.0% of the total issued share capital of the Company, while Ms Intan Ng has a direct and deemed interest in 35,038,133 shares, representing approximately 16.0% of the total issued share capital of the Company. Since Ms Ng Siew Hong holds 29.0% of the total issued share capital of the Company, any proposed special resolution for a capital reduction (requiring 75% approval) may not be passed if she and/or other shareholders who support the business diversification proposed by the current board choose to vote against it. In light of the foregoing, the Board is of the view that it may be potentially misleading or irresponsible not to clarify that any implementation of the Proposed Payout has to be subject, inter alia, to the New Board obtaining the requisite 75% support, including Ms Ng Siew Hong, for the Proposed Payout. Plans After the Proposed Payout On her plans for the Company after the Proposed Payout (assuming it occurs), Ms Intan Ng has mentioned that the Proposed New Directors plan to conduct a feasibility study on Datapulse's diversification into a new business, and if that does not pan out, a sale of the listed vehicle or voluntary liquidation may be contemplated. Voluntary liquidation Considerations Ms Intan Ng has again omitted to clarify that in order to effect a voluntary liquidation, the Company has to convene a general meeting of Shareholders to pass a special resolution, which requires the approval of 75% or more of the votes cast by Shareholders present at the meeting, and the Board is of the view that it may be potentially misleading or irresponsible not to clarify that based on the current shareholding composition of the Company, the Company will not be able to obtain approval for such special resolution if the requisite shareholders including, Ms Ng Siew Hong, do not support it. Separately, the Board notes that assuming the Proposed Payout is duly approved, the Company will be left with less than S$15 million in cash. In relation to the use of such remaining cash, the Board understands that Ms Intan Ng may have mentioned elsewhere, inter alia, that she does not rule out the option of the Company undertaking the property business for which the Company previously obtained a mandate from Shareholders to engage in, on 8 March 2013, although she recognizes that such cash may not be sufficient for such purpose and the Company may need to raise funding from capital markets or through issuance of new shares. Fund Raising Considerations As Shareholders will be aware, raising funding typically carries implications for the Company and Shareholders, either in terms of interest servicing costs (in the event of debt funding) and/or the potential dilution of existing Shareholders' interests (in the event of equity funding). Shareholders should also note that despite obtaining a mandate from Shareholders to engage in property business since 8 March 2013 whilst Ms Intan Ng was still an Executive Director of the Company, the Company did not carry out any such plans until her departure from the Company, as announced on 1 September 2014. With such considerations in mind, the Board questions the feasibility of the Proposed Payout including whether it is in the best interests of the Company and Shareholders, and Shareholders are advised to consider carefully the implications of the Proposed Payout for the Company and Shareholders in totality. Other Matters The Board had previously raised certain queries relating to the circumstances leading to Ms Intan Ng's departure as Executive Director and Finance Director of the Company, including the reasons for her issuance of a formal written apology to a fellow director, Mr Ng Cheow Chye, to which Ms Intan Ng has chosen not to respond to the Board. Instead, Ms Intan Ng has chosen to inform the media that "the matter was mainly related to a private matter between two shareholders that happened a long time ago, even before the company's listing", and continues to maintain such position, despite the Company releasing information (via its announcement of 27 March 2018), that the Company's statutory records disclosed that the apology letter from Ms Intan Ng to Mr Ng Cheow Chye was issued on 27 August 2014, and that prior thereto, there were discussions, inter alia, of Ms Intan Ng's conduct and performance of her role as Finance Director at formal board meetings, and a possible suggestion that her conduct may have warranted a dismissal, or removal from office, but for her apology. The Board can only conclude that perhaps Ms Intan Ng may have inadvertently forgotten that the apology letter was issued well after the Company was listed (on 1 March 1994), and not on a private matter, but on matters related to the Company. BY ORDER OF THE BOARD Lee Kam Seng Chief Financial Officer and Company Secretary 12 April 2018
<urn:uuid:20dedd97-ca4b-43f1-ba55-fbf1539fb426>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
6,819
ИЗПИТНИ ДАТИ ЗА ПРИСЪЖДАНЕ НА ПКС ЧЕТВЪРТА ПКС Кандидатите за IV ПКС полагат писмен изпит по теми от конспекта, конкретизирани в контекста на темата на подготвителния курс: "SТЕМ базирано обучение - основни характеристики, подходи за организация и планиране, роли на учителя" За присъждане на ІV ПКС е необходим успех много добър 4,50 на писмения изпит. Продължителността на изпита е 2 АСТРОНОМИЧЕСКИ часа. ПЕТА ПКС Кандидатите за V ПКС полагат устен изпит по задание, предварително изготвено от Департамента и съответстващо на темата на подготвителния курс: "SТЕМ базирано обучение - основни характеристики, подходи за организация и планиране, роли на учителя" За присъждане на V ПКС е необходим успех много добър 4,50 на устния изпит.
<urn:uuid:6a02ee8d-45f4-41d1-a323-5b6db3da3603>
HuggingFaceFW/finepdfs/tree/main/data/bul_Cyrl/train
finepdfs
bul_Cyrl
743
Radosnych Świąt Zmartwychwstania Pańskiego wszystkim Czytelnikom życzy Redakcja Pełnych spokoju i radości Świąt Wielkanocnych, ciepłej, radosnej atmosfery, wypoczynku w rodzinnym gronie oraz optymizmu i wiosennego nastroju życzę Tomasz Mencina Burmistrz Dzielnicy Bielany Słowo od Burmistrza Drodzy Mieszkańcy, Mam przyjemność przedstawić podsumowanie przedsięwzięć, które udało nam się wspólnie z Państwem zrealizować na Bielanach w 2017 r. Zeszłoroczny budżet na inwestycje w naszej dzielnicy przekroczył 40 mln zł. Zatem był to rok intensywnych prac i wielu zmian. Niezmienne priorytetem przy podejmowaniu wszelkich decyzji była dbałość o poprawę jakości życia i bezpieczeństwa bielanczyków. W ubiegłym roku zakończyliśmy wiele kompleksowych remontów w placówkach oświatowych, wyremontowaliśmy boiska szkolne i powstały kolejne, nowe place zabaw. Dbamy także o przyjazną przestrzeń do odpoczynku i rekreacji, odnawiając tereny zielone. Stałe pracujemy nad poszerzaniem oferty kulturalnej i sportowej dla osób w każdym wieku. Nie zapominamy o naszych zacnych seniorach i osobach potrzebujących. Dziękuję także Państwu za zaangażowanie w budżet partyencyjny i wszystkie lokalne inicjatywy. Zapraszam Państwa do lektury dodatku podsumowującego 2017 r. dołączonego do tego numeru „Naszych Bielan”. Z pozdrowieniami Tomasz Mencina Burmistrz Dzielnicy Bielany W świątecznym numerze „Naszych Bielan” znajdą Państwo Bielańską Mapę Kultury. To najnowsze wydawnictwo Urzędu Dzielnicy Bielany, prezentujące miejsca i instytucje, w których regularnie organizowane są wydarzenia kulturalne. Powstanie mapy jest jednym z elementów prac nad Planem rozwoju usług kulturalnych w Dzielnicy Bielany. Mam nadzieję, że dla tych z Państwa, którzy dopiero poznają naszą dzielnicę, mapa ta stanie się pierwszym przewodnikiem po najważniejszych wydarzeniach i instytucjach kultury. Ci z Państwa, którzy mieszkają na Bielanach od lat na pewno odnajdą w niej dobrze znane lubiane placówki, być może też z zaciekawieniem odkryją Państwo miejsca lub wydarzenia, których jeszcze nie udało Wam się poznać. Magdalena Lerczak Zastępca Burmistrza Dzielnicy XLIII Sesja Rady Dzielnicy 1 marca grudnia 2018 r. odbyła się XLIII Sesja Rady Dzielnicy Bielan m.st. Warszawy. W pierwszej kolejności prezydium Uchwałą Nr 200/XLIII/2018 rozstrzyno skargę na działanie Dyrektora Przedszkola nr 340 „Kaszubskiego Ludka” w Warszawie, uznając ją za bezzasadną. Następnie tematem dyskusji był projekt uchwały Rady Miasta Stołecznego Warszawy w sprawie przyjęcia Strategii #Warszawa2030. Rada pozytywnie zaopiniowała dokument definiujący długofalową politykę rozwoju miasta. W Uchwale Nr 201/XLIII/2018 zwrócono uwagę na konieczność uerkonkowania ww. strategii na zagadnienie przetwarzania i unieszkodliwiania odpadów. Uchwałą Nr 202/XLIII/2018 Rada pozytywnie zaopiniowała projekt Uchwały Rady m.st. Warszawy w sprawie zmienienia nazwy ulicy w Dzielnicy Bielany (ul. Słonecznikowa) na jej nieistniejącym odcinku. Następną część sesji poświęcona była sprawom budżetowym. W pierwszej kolejności radni przyjęli sprawozdanie z wykonania budżetu Dzielnicy za rok 2017 (Uchwała Nr 203/XLIII/2018). Następnie wyrazili pozytywną opinię w odniesieniu do trzech propozycji przesunięć budżetowych na rok 2018. Uchwałą Nr 204/XLIII/2018 przyjęto propozycję zwiększenia wydatków na 2018 r. na łączna kwotę 6,6 mln zł, których głównymi składnikami są dochody własne Dzielnicy, m.in. środki ze sprzedaży gruntu przy ul. Marymonckiej oraz środki wyrownawcze z budżetu m.st. Warszawy, dedykowane na konkretne wydatki. Uchwałą Nr 205/XLIII/2018 zaopiniowano propozycję zwiększenia wydatków bieżących w ramach środków przewidzianych na realizację Programu Profilaktyki i Rozwiązywania Problemów Alkoholowych oraz propozycję zmniejszenia wydatków w związku z przesunięciem dwóch zadań inwestycyjnych, tj. budowa Skweru Integrator oraz projektu „Zieleń parkowa i łąki kwietne na osiedlach” do realizacji przez Zarząd Zieleni m.st. Warszawy. Ostatnią z propozycji korekty (przyjęta Uchwałą Nr 206/XLIII/2018) wiąże się ze zwiększeniem środków na zadania inwestycyjne „Modernizacja Parku Herberta” oraz przesunięciem środków między zakładami inwestycyjnymi. W dalszej części posiedzenia Rada Dzielnicy Bielany podjęła uchwałę Nr 207 wprowadzającą na całym obszarze Bielan miejscową stawkę czynszu najmu za 1 m² powierzchni użytkowej lokali mieszkalnych, stanowiących mieszkanowy zaśp m.st Warszawy. Uchwałą Nr 208/XLIII/2018 Rada pozytywnie zaopiniowała projekt uchwały Rady m.st. Warszawy w sprawie przystąpienia do sporządzania studium uwierzytowiania i kierunków zagospodarowania przestrzennego m.st. Warszawy. Następny blok tematyczny obrad poświęcony był kwestiom wyborów w jednostkach samorządowych niższego rzędu. Dwie pierwsze uchwały dotyczyły odstąpienia od złożenia wniosku o przeprowadzenie konsultacji z mieszkańcami dotyczących zmianienia Samorządu Mieszkańców Chomiczówka Polsko (Nr 209/XLIII/2018) oraz Chomiczówka Zachód (Nr 210/XLIII/2018). Uchwałą Nr 211/XLIII/2018 zmieniony został Samorząd Mieszkańców Chomiczówka Północ, natomiast Uchwała 212/ XLIII/2018 – Samorząd Mieszkańców Chomiczówka Zachód. Nadzrzednym celem powyższych uchwał było powołanie jednego wspólnego samorządu dla całego osiedla. Został on utworzony na mocy Uchwały Nr 213/XLIII/2018. Ostatnie uchwały poświęcone sprawom jednostek niższego rzędu na Bielanach to: Uchwała Nr 214/XLIII/2018 w sprawie uznania ważności wyborów do Rady Samorządu Mieszkańców Wólka Węglowa-Placówka, 215/XLIII/2018 w sprawie zarządzenia wyborów do Rady Samorządu Mieszkańców Domków Rodzinnych „Stare Bielany” oraz 216/XLIII/2018 w sprawie zarządzenia wyborów do Rady Samorządu Mieszkańców Chomiczówka. W ostatniej części obrad, bezpośrednio poprzedzającej interpelacje i zapytania radnych, Rada Dzielnicy przyjęła do wiadomości sprawozdania z działalności komisji: Rewizyjnej, Bezpieczeństwa i Porządku Publicznego oraz Samorządowej i Dialogu Społecznego. Zapoznano się również z planami pracy ostatnich z dwóch wymienionych komisji. Robert Wróbel Przewodniczący Rady Dzielnicy (Treść Uchwał Nr 211, 212, 213, 215 i 216 na str. 19 i 20). ZDANIEIEM PRZEWODNICZĄCEJ KOMISJI RADY DZIELNICY... Joanna Radziejewska – Przewodnicząca Komisji Samorządowej i Dialogu Społecznego. Jakimi sprawami zajmuje się Komisja Samorządowa i Dialogu Społecznego? Komisja przechodząca w ostatnich latach różne przeobrażenia jest po prostu Komisją Samorządową, jak zwyczajowo ją nazywamy. Znaczy to, że wspólnie z mieszkańcami możemy decydować o sprawach istotnych dla naszej dzielnicy i życia w społeczności bielańskiej. Komisja ma bardzo szerokie spektrum działania. Nasze posiedzenia obfitują w tematy z życia codziennego mieszkańców odnoszące się do spraw bezpieczeństwa na podwórkach i drogach, utrzymania porządku i zieleni, sprawnej komunikacji miejskiej, współpracy z organizacjami pozarządowymi i samorządami mieszkańców. Jakim tematem w ostatnim czasie zajmowała się Komisja? Zdecydowanie dominowała sprawa utworzenia Samorządu Mieszkańców Chomiczówka. Wychodząc naprzeciw oczekiwaniam grupy inicjatywnych mieszkańców z Chomiczówki, komisja podjęła działania zmierzające do jego utworzenia. Mimo złożoności problemów udało się sprawę doprowadzić do pomyślnego zakończenia i znacznie skrócenia procesu jego powstania. Zgodnie z wolą mieszkańców powstała jednostka samorządowa, obejmująca swoim zasięgiem całą Chomiczówkę a nie, jak do tej pory tylko jej północny zachodni obszar. Jeżeli wybory zakonczą się sukcesem będzie to największy samorząd pracujący w naszej dzielnicy. Majowe wybory do Rady Samorządu będą wielkim wydarzeniem dla społeczności lokalnej, na które już dziś zapraszamy mieszkańców Chomiczówki oraz osoby chętne do pracy w radzie tego Samorządu! A jak wygląda sytuacja z samorządami w pozostałych rejonach Bielan? Rok 2018 jest rokiem obfitującym w wybory do rad samorządowych. Mimo złożoności problemów udało się sprawę doprowadzić do pomyślnego zakończenia i znacznie skrócenia procesu jego powstania. Zgodnie z wolą mieszkańców powstała jednostka samorządowa, obejmująca swoim zasięgiem całą Chomiczówkę a nie, jak do tej pory tylko jej północny zachodni obszar. Jeżeli wybory zakonczą się sukcesem będzie to największy samorząd pracujący w naszej dzielnicy. Majowe Co uważa Pani za największy sukces czy sukcesy Komisji? Najbliższa mojemu sercu jest sprawa nadania imienia Maryny Falskiej skwerowi na Starych Bielanach, mająca swój początek właśnie na Komisji Samorządowej i doprowadzona do szczęśliwego finału. Skwer między ulicami A. Fontany i Lisowską o mały włos nie został nazwany im. Józefa Piłsudskiego, jak proponowała i doceniał jego dorobek, nie wiemy jednak nadzoru przygotowania planu podpisu z naszymi radnymi. Prześliskiśmy uhonorować kogoś nam bliższego, kto pozostawił wraży na tych ulicach zatruć Muszla, na ul. Piłsudskiego 20, Przybyszewskiego 32/34, a ostatnio przy Kasprzowicza 105. Wraz z chodnikami revitalizowana jest zieleń podwórkowa, a na wiosnę może pojawić także nowe laweczki, o ile wspólnoty mieszkaniowe wyrażą zgodę na ich ustawienie. Na podobne zmiany ciekają jeszcze inne rejony Starych Bielan. Będziemy je omawiać podczas jednego z najbliższych posiedzeń komisji. A co w najbliższym czasie? Przed nami omówienie planów rewitalizacji podwórek na Starych Bielanach, która już się rozpoczęła. Swoj wygląd zmieniły już budynki na tylach ulic zabudowań, na ul. Piłsudskiego 20, Przybyszewskiego 32/34, a ostatnio przy Kasprzowicza 105. Wraz z chodnikami revitalizowana jest zieleń podwórkowa, a na wiosnę może pojawić także nowe laweczki, o ile wspólnoty mieszkaniowe wyrażą zgodę na ich ustawienie. Na podobne zmiany ciekają jeszcze inne rejony Starych Bielan. Będziemy je omawiać podczas jednego z najbliższych posiedzeń komisji. 3 nowe hale pneumatyczne i ponad 1 mln zł na poprawę bezpieczeństwa w szkołach Dzielnicę Bielany wygospodarowała ponad 1 mln zł na kolejne zakupy mające poprawić bezpieczeństwo w szkołach. Przeznaczy również 2,185 mln zł na 3 hale pneumatyczne, które zostaną zamontowane na boiskach szkolnych. Decyzje Zarządu Dzielnicy poprąli bielańscy radni 1 marca na sesji Rady Dzielnicy. Od 3 lat intensywnie remontujemy i modernizujemy nasze placówki oświatowe oraz dopasowujemy je do nowoczesny sprzęt. Dla mnie jednak istotne w tym jest to, że dzięki temu sukcesywnie poprawiamy nie tylko warunki komfort nauki, ale także bezpieczeństwo naszych najmłodszych mieszkańców. Teraz prze- znaczymy kolejne pieniądze – ponad 1 mln zł na ten cel, m.in. na zakup sprzętu do monitoringu do 10 bielańskich szkół” – mówi Tomasz Mencina, Burmistrz Dzielnicy Bielany. Zmodernizowany lub rozbudowany zostanie monitoring w szkołach podstawowych nr: 77, 80, 133, 187, 209, 247, 273, 289, 293 i 352. Ponadto zostanie wykonanych szereg innych prac, np. przebudowa wejść czy bramy wjazdowej, które również mają służyć poprawie bezpieczeństwa uczniów. Ponadto zostaną zamontowane 3 hale pneumatyczne na boiskach w szkołach podstawowych: nr 80 przy ul. Aspekt 48, nr 263 przy ul. Szegedynskiej 11 i nr 293 przy ul. Kochanowskiego 8. Hale zostaną wykonywane na zamówienie, zgodnie z wymarami boisk i wraz z odpowiednim wyposażeniem sportowym. Będą rozstawiane na sezon jesienny-zimowy. „Jego typu rozwiązania mamy już na 2 boiskach: na Syrencie w Parku Olszyna oraz w SP nr 53 przy ul. Rudzkiej 6. I mamy bardzo pozytywny odzew. Hale pozwalają na korzystanie ze boisk przez cały rok nie tylko przez uczniów ze szkół, ale także przez kluby sportowe i naszych mieszkańców” – dodaje Artur Wolczacki, Zastępca Burmistrza. Pieniądze na zakup hali pneumatycznych pochodzą ze zwiększonych dochodów własnych dzielnicy. Małgorzata Kink Wesoły nam dzień dziś nastał, Którego z nas każdy żądał, Tego dnia Chrystus zmartwychwstał. Alleluja, Alleluja Niech Święta Wielkiej Nocy będą dla nas źródłem wiary, radości i pokoju Joanna Fabisiak – Poseł na Sejm RP Szanowni Mieszkańcy Bielan, z okazji Świąt Wielkiej Nocy życzymy Państwu zdrowia, wszelkiej pomocy oraz sukcesów w życiu prywatnym i zawodowym. Niech ten wielkanocny czas będzie okazją do spotkań w gronie najbliższych. Z życzeniami Radni Klubu Platforma Obywatelska Mieszkańcom Bielan, z okazji zbliżających się Świąt Wielkanocnych – dużo nadziei i radości, spokoju i miłości oraz satysfakcji ze spotkań w gronie najbliższych. Smacznego jajka życzą Radne Niezrzeszone Z okazji Świąt Zmartwychwstania Pańskiego składamy mieszkańcom Bielan serdeczne życzenia wszelkiego dobra, miłości i pokoju. Z radosnym ALLELUJA Radni Klubu Prawo i Sprawiedliwość 76 lat 1. Dywizji Pancernej im. gen. Stanisława Maczka 24 lutego 1942 r. generał Władysław Sikorski wydał rozkaz utworzenia 1. Polskiej Dywizji Pancernej, na dowódcę której powołał gen. Stanisława Maczka – powiedział Prezes Stołecznego Środowiska 1. Polskiej Dywizji Pancernej, mjr Janusz Goluchowski, rozpoczynając obchody rocznicy. Tego roku minęło 76 lat od wydarzenia, które trwałe wpisało się w historię Polski. Z tej okazji w ostatnią sobotę lutego pod Pomnikiem 1 Dywizji Pancernej gen. Stanisława Maczka przy placu Inwalidów przybyły osoby związane z historią Dywizji: Burmistrz Dzielnicy Żoliborz, Maczkowcy, przedstawiciele Wojska Polskiego oraz dyrekcja, nauczyciele i uczniowie XCIV Liceum Ogólnokształcącego im. gen. Stanisława Maczka w Warszawie. O genezie powstania 1. Dywizji Pancernej oraz jej drodze przez Francję i Anglię mówili, wspomnieli już, mjr Janusz Goluchowski. Podkreślił wkład dowódcy tej jednostki słowami: „Wszystko się częstoło w zasadzie od pana generała Maczka”, opisywał go także: „[…] legendarny już general, który nie przegrał żadnej bitwy”. Opowiadał również o istocie utworzenia Dywizji: „Wszyscy zachowali te swoje nazwy, tylko musieli zmienić konie na konie mechaniczne, musieli się z koni przesiąść na czołgi. Dywizja powstała 2 lata, od 1942 roku do 1944 roku […] liczyła wówczas 16 tys. ludzi”. Po przemówieniu zostały odowane hony poległym żołnierzom, a przed pomnikiem złożono wiązanki biało-czerwonych kwiatów. Uroczyste spotkanie uczestnicy upamiętnili wspólnym zdjęciem. Ta piękna uroczystość to lekcja historii, która przybliżyła uczniom XCIV Liceum Ogólnokształcącego im. gen. Stanisława Maczka sylwetkę Patrona – gorącego patrioty, żołnierza, który „walczył o wolność wszystkich narodów, a umierał tylko dla Polski”. Kamila Szymańska Łukasz Supergan o podróżowaniu i nie tylko... Od 2004 r. samotnie przemierzył Karpaty, Wysoko-górski Szlak Pirenejów, zrobił samotny trawers Islandii, masywu Mont Blanc i Izraelski Szlak Narodowy. Ostatnio przemierzył Szlak Abrahama, który prowadził przez Terytoria Palestyńskie. Bohater wydarzenia w rozmowie z animatorką kultury i reżyserką teatralną Joanną Grabowiecką odbły wyjątkową podróż po najdalszych zakamarkach naszego globu. Dwie ostatnie wypawy, jakie Supergan odbył na Bliski Wschód były dla niego szczególnie ważne, ponieważ postawiły go w sytuacjach z jakimi nigdy wcześniej się nie spotkał – tym samym poznał siebie z zupełnie innej strony. Ten wątek dał początek głębszym przemyśleńiom, i wirtualna „wspólna podróż” sięgnęła znacznie dalej, dotarła bowiem w głąb ludzkiej duszy. W czasie odbytych wędrówek nasz bohater zmagał się z rzeczami z pozoru wydającymi się, że są niemożliwe. I tak na przykład, zejście 800 m w dół prawie po pionowej ścianie, gdzie jednym „osprzętem” jaki miał w tamtej chwili była siła mięśni. Stało się możliwe, tylko dzięki sile umysłu i odciągnięciu od siebie myśli lęku i strachu. Ważne było tylko „tu i teraz” – liczyła się tylko ta jedna chwila. Wszystkie odbyte do tej pory podróże nauczyły go spokoju i wyzbycia się poczucia pospiechu, tak bardzo odczuwanego we współczesnym świecie. Kilkumiesięczne wypawy dały mu również wolność i możliwość poznania własnego „ja”. Bohater wspominał jednak, że tak długa „izolacja”, wymaga pewnej aklimatyzacji tuż po powrocie do codziennego świata. Jednocześnie daje możliwość docenienia tego, co na ten czas podróży się zostawiło. Na koniec zapraszamy do lektury dwóch książek autorstwa Łukasza Supergana – „Pustka wielkich ciszy” oraz „Plesio do irańskich nomadów”. Redakcja Dzień Kobiet w bielańskim Ratuszu Na Bielanach mieszka 130 686 osób, z czego aż 71 367 to kobiety. Korzystając z okazji, jakim był bez wątpienia Międzynarodowy Dzień Kobiet, postanowiliśmy uczcić ten niezwykły dzień i podziękować wszystkim paniom mieszkającym w naszej dzielnicy. 8 marca w Urzędzie na Pańnie czekała niespodzianka: wyjątkowe bielańskie notesy i balony z helem z życzeniami od Burmistrza Dzielnicy Bielańskiej Tomasz Menciny. Sympatycznym Mieszkańcom Bielan redakcja „NBT” życzy wszystkiego najlepszego. Zwycięstwo XXII LO im. José Martí w Konkursie Teatrów Szkolnych Po ponad 5 miesiącach pracy i prawie 70 godzinach prób 27 lutego 2018 r. w Stołecznym Centrum Edukacji Kulturalnej odbyła się premiera „Hay motín, compañe-ras” („Dziełczyńcy, mamy bunt!”) na podstawie sztuki Alberto Miralles. Sztuka została przygotowana przez grupę teatralną Chiringuito libre z XXII Liceum Ogólnokształcącego i Oddziałami Dwujęzycznymi im. José Martí. Spektakl został wyreżyserowany przez nauczycielkę języka hiszpańskiego i koordynatorkę sekcji dwujęzycznej Monikę Zwiernyńską-Pióro we współpracy z nauczycielką literatury hiszpańskiej, Cándida García Prieto. 1-2 marca 2018 r. w BCEK przy ul. Szegedyńskiej 9a odbyła się XIII edycja Ogólnopolskiego Konkursu Teatrów Szkolnych w Języku Hiszpańskim zorganizowanego przez Biuro Radcy ds. Edukacji przy Ambasadzie Hiszpanii. „Hay motín, compañe-ras” spotkał się z ciepłym przyjęciem i został doceniony przez publiczność owacją na stojo. Zespół Chiringuito libre zajął I miejsce, otrzymał dyplom i miał możliwość zrobienia pamiątkowego zdjęcia z ambasadorem Hiszpanii. Tomasz Mencina – Burmistrz Dzielnicy i Zofia Gajewicz – naczelnik WOW z grupą teatralną Chiringuito libre z XXII LO XXII LO KONKURS PLASTYCZNY! Zapraszamy dzieci i młodzież w wieku 6-16 lat do udziału w V edycji konkursu plastycznego „Bądź EKO na Bielanach”. W tym roku zadaniem uczestników będzie wykonanie pracy plastycznej ilustrującej hasło PTAKI BIELAN. Nagrodą dla laureatów jest pobyt na „Wakacjach z pasją”, organizowany przez Fundację Żył z pasją w dniach 8-21 lipca 2018 r. w Zakopanem. Uroczyste wręczenie nagród odbędzie się podczas jednej z letnich dzielnicowych imprez plenerowych, zaś prace laureatów i wyróżnionych planujemy pokazać w październiku podczas Bielańskiego Dnia Ptaków w Parku Olszyna. Na prace w formacie A2 lub A3 czekamy do 7 maja 2018 r. Należy je składać w Wydziale Ochrony Środowiska Urzędu Dzielnicy Bielany, ul. Żeromskiego 29, pok. 293 (tel. 22 37 33 226), w godz. 8.00-16.00 Więcej informacji: www.fundacjazyjaspa.pl (tel. 501 637 375), www.bielany.waw.pl ( zakładka: Dla mieszkańców/środowisko i ekologia). Idzie wiosna Idzie wiosna, powtarzamy z nadziej, że przyspieszymy nadejście wszystkiego, czego nam brakowało przez zimowe miesiące: ciepła, słonecznych dni, zwierającego wiatru gotującego chmurę po niebie. Ale taki mamy klimat, że w marcu jak w garncu, więc musimy ubrać się w cielliwość. Wiosna to nie tylko radę spacerowicza i żelaznego osłabienia, to także osłabienie i wynikające stąd częste zmiany w nawet lekarstwach, a skutek wiosennego przesilenia, które każdemu, w mniejszym lub większym stopniu, daje się we znaki i które staramy się zlikwidować, jak kto umie. Suplementy diety, witaminy, kuracje wzmacniające – wszystko to oferują reklamy telewizyjne, radiowe i billboardowe. No a ktoś z nas nie chce czuci się siły i zdrowy właśnie teraz, na wiosnę, gdy mamy tyle planów i pomysłów na życie. Słegamy więc po reklamowane medykamenty, jak coś doglea do „magicznej tabletki” powinniśmy. A jak nic nie doglea, zazajamy prołatykacyjnie, żeby nie doglealo. Porady internetowe zastępują diagnozę lekarską. A przecież interakcja leków przyjmowanych bez zaleceń lekarza może niwieczyć ich efekt. Jestemy jednym z krajów o najwyższym spożyciu leków. Przyjmujemy za dużo, za często, niezobowiązanie w wielu przypadkach chciałoby się dzisiaj. Zmiana nawyków pacjentów to jedno, ale istnieje także aspekt lekarski. Lekarze zapisując medykamenty zakładają, że pacjent zżyje całą zaaplikowaną dawkę. Jeśli jednak lek źle działa należy go odstawić i próbować dopasować inny. Tak dzieje się często na przykład przy lekach na nadciśnienie. W domowej aptece gromadzimy wiele leków niewykorzystane, których nie odnajdzie apteka, bo podczas badań wizytowych takich warunków były przechowywane. A w jakich są przechowywane na przykład na stacjach benzynowych? Rozumiem, że leki w płynie powinny być utylizowane, ale hermetycznie zamknięte i nieprzetworzone – czy powinny być wyruczane do śmiecinika? Nie mam przekonania do takiego rozwiązań. Pytałem o finansową wartość utylizowanych leków, ale nikt w Ministerstwie Zdrowia nie potrafił mi odpowiedzieć. Szkoda, bo wiele osób nie wie, że kupujemy. Ta sytuacja może być wykorzystywana chyba tylko dla firm farmaceutycznych, zainteresowanych maksymalną sprzedażą własnych wyrobów. Uniwersytet Śląski wraz ze Szpitalem Zakonn Bonifratrów w Katowicach podjęły kampanię na rzecz uwiadomiania o schorzeniach na cukrzycę. To dobry i potrzebna inicjatywa. Może rozszerzać ja na racjonalne wykorzystanie leków i zagospodarowywanie tych bezużytecznych. Dygresja lekowa oddalała nas od tematu obecnych rozważań. Wracając więc do wiosennego przesilenia i jego skutków, chcę przypomnieć stare a ciekawe niezłe sposoby jego pokonania. Zioła i ziółka, miod i mikroelementy dostarczają organizmom w większej ilości dzięki zmianie diet naprawdę czynią cuda. Nie od dziś wiadomo, że naturalne składniki nie tylko osłaniają wątroby, jak leki farmaceutyczne, a skutkują w wielu dolegliwościach równie dobrze. Królowie tu miod. Ten złościły nektar podbił świat przed tysiącem lat. Bogaty jest w witaminy z grupy B: B1, B5, B6, B12, a także biotynę czyli witaminę H i sporo witaminy C. Zawiera też witaminy A, D, E i antyoksydanty. Ma właściwości wzmacniające organizm, w tym system odpornościowy tak osłabiony po zimie. Zamiast zimowej herbaty proponuję więc skłądkę wody z łyżeczka miodu, cytryną i imbirem. Smakuje i skutkuje wspaniale. Podczas przygotowywania wielu potraw dodawany cukier warto zastępować miodem, będącym źródłem cukrów prostych. Naszą wiosenną dietę przyda się wbogaczyć też o zioła wzmacniające. Przede wszystkim przywraca, szala lekarka, miniszek lekarski. Działanie pokrzywy jest ogólnie znane, ale nie zawsze kojarzone z wiosną. Tymczasem jej właściwości krwiotwórcze i oczyszczające organizm z toksyn są szczególnie przydatne właśnie teraz. No i niedoceniana, przez lekarzy, chyba, a wzbudzająca wreszcie zachwyt starożytnych Greków, uznawana za syndrom długowieczności – szalwa lekarska. Z powodu dużej ilości witamin B1, C, A oraz związków mineralnych zbawienne wpływa na wzmacnianie systemu immunologicznego. Charakteryzuje się też silnym działaniem antybakteryjnym. Pewnie dlatego używana jest obecnie głównie do płukania gardła lub ramy ustnej. Niedoceniona daje się we znaki każdej zimy. Czekamy na świeże warzywa i owoce. Znudziła się kiszona kapusta i ogórki przygotowywane jesienią. Kiszonki, choć mało atrakcyjnie wyglądają, są niezastąpionym na przednóżku źródłem witamin. Kuszą nowalijki, ale hodowane w szklarniach, przy pomocy chemicznych odżywek, bardziej cieszą oko niż zmęczony organizm. Zawsze możemy sami wyhodować natkę pietruszki. To będzie bardzo zdrowy trening przed sezonem dzikowców. Zyczę powodzenia i smacznego. Joanna Fabisiak Posel na Sejm RP Jarnuszkiewiczowie – artystyczny ród z Bielan Na sąsiedniej stronie można przeczytać obszerny wywiad z Marceliną Jarnuszkiewicz i Piotrem Kornobisem. To dobry pretekst, by przypomnieć skąd wzięła się na Bielanach pracownia Jerzego Jarnuszkiewicza oraz opowiedzieć o artystach związanych z Bielanami od pokoleń. Konsepcja wygospodarowania w nowobudowanych blokach mieszkalnych przestrzeni na pracownie artystyczne powstała na przełomie lat 50. i 60. ubiegłego wieku. Związek Polskich Artystów Plastyków alarmował wówczas, że zdobycie przestrzeni do pracy jest dla artystów prawdziwym problemem. To sprawiło, że resorty Kultury i Sztuki oraz Gospodarki Komunalnej porozumiały się i w 1961 r. wydano Zarządzenie nr 27 „w sprawie programowania, projektowania i realizacji pracowni plastycznych w osiedlowym budownictwie mieszkaniowym realizowanym przez rady narodowe”. W tym też duchu projektowali bielańscy osiedla Maria i Kazimierz Piechotkowie. Niezwykle cenione małżeństwo architektów, wsławione nie tylko zaprojektowaniem układu urbanistycznego Bielan, ale także wieloma innymi pracami oraz wielką dbałością o pozostałości dziedzictwa architektonicznego, w tym badaniami i opisywaniem zachowanych na terenie Polski drewnianych bożnic. To ich talentowi Bielany w znacznej mierze zawdzięczają swój niepowtarzalny charakter. Od ich nazwiska wzięła się też zwyczajowo używana nazwa – „Piechotkowo”. Realizowana przez Marię i Kazimierza Piechotków wizja zaowocowała stworzeniem w bielańskich budynkach kilku artystycznych pracowni. W jednej z nich pracował Jerzy Jarnuszkiewicz. Urodził się on 27 lutego 1919 r. w Kaliszu. W latach 1936-38 studiował w krakowskim Instytucie Sztuk Plastycznych. W 1939 r. uzyskał dyplom Miejskiej Szkoły Sztuk Zdobniczych w Warszawie, zaś w latach 1947-50 uczył się Wydziału Rzeźby warszawskiej Akademii Sztuk Pięknych. Był uznany rzeźbiarzem i pedagogiem. Do połowy lat 80. prowadził pracownię rzeźby na stołecznej ASP. Zmarł 14 lipca 2005 r. w Warszawie. Choć był autorem wielu dzieł rzeźbiarskich (jego autorstwa jest m.in. pochodząca z 1947 r. płaskorzeźba „Plon” znajdująca się na Saskiej Kępie, dwie gipsowe płaskorzeźby zdobiące tunel schodów ruchomych przy warszawskiej Trasie W-Z, a także rzeźby na fontannie na rynku Mariensztackim na Powiślu), to najbardziej znanym jego pracą pozostaje usytuowany na murach Starego Miasta Pomnik Małego Powstańca. Projekt powstał jeszcze w latach 40. Pomnik uroczyście odsłonięto 1 października 1983 r. podczas obchodów 15-lecia nadania Chorągwii Warszawskiej ZHP imienia Bohaterów Warszawy. I choć Jerzy Jarnuszkiewicz zadeklarował swoje dzieło warszawskim harcerzom, po dziś dzień pojawiają się głosy, że rzeźba utrwala historyczną nieprawdę, bo Armia Krajowa nie przyjmowała w swoje szeregi nielicznych. Z dylematami tym borykał się także sam Jarnuszkiewicz: „Prowadzę z samym sobą spor o tę rzeźbę. Zaraz po wojnie uległem sentymentalnej potrzebie spłacenia długu walczącym dzieciom, potem jednak zacząłem się wstydzić tej rzeczy. Wyrzucałem sobie, że – choć nieświadomie – dokonałem manipulacji na najbardziej intymnych uczuciach, zaniebałem formę na rzecz treści, zrobiłem knota” – mówił. Trudno jednak nie zauważyć, że krytyka pomnika, czy to ze strony samego twórcy, czy widzów, wydaje się być zbyt surowa. Rzeźba przedstawia małego chłopca, na którego dziecięcej główce tkwi olbrzymi hełm, na nogach – za wielkie buty, a przez ramię przewieszony na wielki karabin maszynowy. Czyż może być lepsza alegoria tego, czym po dziś dzień jest wojna dla każdego dziecka? Pomnik we wstrząsającym sposobie pokazuje, że wojna to coś „za dużeżo” dla dzieci. Co, co je przytłacza, niszczą. Co obiema dzieciństwo i przynależy mu „mały świat”. Co nigdy żadnemu dziecku nie powinno się przytrafić. Synem Jerzego Jarnuszkiewicza był Marcin Jarnuszkiewicz (1947–2016), scenograf i reżyser teatralny. Absolwent Wydziału Architektury Wnętrz warszawskiej Akademii Sztuk Pięknych, którego zaraz po studiach zauroczył i wciągnął bez reszty magiczny świat teatru. Wszyscy teatromani albo pamiętają, albo znają z opowiadani i zdjęć słynną realizację „Ballady” Słowackiego, którą wystawił w 1974 r. w Teatrze Narodowym Adam Hanuszkiewicz. Tę, w której Goplana (Bożena Dykiel), Chochlik (Wiktor Zborowski) i Skierka (Mieczysław Hryniewicz) zachwycają widownię swoimi drobiazgowo opracowanymi przez kaskadera Krzysztofa Sztustera akrobacjami na motocyklach marki Honda w bajecznej scenografii. Jej autorem był właśnie Marcin Jarnuszkiewicz. Jednak praca scenografa z czasem przestała mu wystarczać. Podjął studia reżyserskie w warszawskiej PWST, zwięczenie asystowaniem Andrzeja Wojdję przy realizacji „Sprawy Dantona” w Teatrze Po-wszecznym (1975) i dyplomem reżysera w 1981 r. Marcin Jarnuszkiewicz całe swoje reżyserskie życie zawodowe dzielił między teatry dramatyczne, a teatr lalkowe. „Pod koniec swojego życia chyba odnalazł w teatrze lalkowym swój dom. Ostatnie jego przedstawienia, począwszy od 2013 r., powstawały już tylko w teatrach lalkowych: Ateneum w Katowicach, Baju w Warszawie, Pinokio w Łodzi i Teatrze Animacji w Poznaniu (...) Symbolicznie jego drogę można zobrazować następująco: od sukcesu w Teatrze Narodowym („Balladyna”) do lalkowego teatru. Czyżby to była droga zstępująca? Chyba nie. Ostatnie trzy spektakle oparte były na książkach i rysunkach Wolfa Erlbrucha – „Gęś, Śmierć i Tulipan” (2013), „Wielkie pytanie” (2015) i „Całe królestwo króla” (2015; tutaj tekst Heinzja Janischsa w wydaniu książkowym ilustrował Erlbruch, co chyba zawsze było na wyborze Jarnuszkiewicza). Dla dzieci to teksty bardzo trudne. Jak bowiem zadać im owe „wielkie pytania” o śmierć, przemijanie, sens? Ale jeśli uda się z dziećmi porozmawiać przez sztukę, to czy tego nie można uznać za madre zwieńczenie całego swojego życia? Jak bowiem porównać sukces „Balladyny” z pociągnięciem „Gęsi, Śmierci i Tulipana”? Co ma większe znaczenie?” – pisał w pośmiertnym wspomnieniu o Marcelinie Jarnuszkiewicz na łamach czasopisma „Teatr lalek” Tadeusz Korna. Przy ostatnim z wymienionych przez Kornasia przedstawień, czyli „Całym królestwie króla” wystawionym w Teatrze Animacji w Poznaniu, z Marcinem Jarnuszkiewiczem – reżyserem współpracowała już jako scenograf jego córka, Marcelina Jarnuszkiewicz. Absolwentka warszawskiej Akademii Sztuk Pięknych (Wydział Sztuki Mediów i Scenografii) oraz Uniwersytetu Warszawskiego (Etnologia i Antropologia Kulturowa), ilustratorka. Nie ma potrzeby pisac o niej w trzeciej osobie; w tym wydaniu „Naszych Bielan” sama zabrała przecież głos w wywiadzie. Nadmienić więc tylko, że Marcelina Jarnuszkiewicz wraz ze swoim mężem Piotrem Kornobisem ocalili pracownię Jerzego Jarnuszkiewicza i prowadzą dziś w niej bardzo interesującą i istotną działalność artystyczną i popularyzatorską, o której zgodził się opowiedzieć Czytelnikom naszej gazety. Pracownia przy ul. Maglery znajduje się w unikalny sposób cechy otwartego miejsca w której samemu można sprowadzać się w roli twórcy, z miejscem, w którym trwa pamięć po Jerzym i Marcinie Jarnuszkiewiczach – wybitnych artystach i wspańiałych pedagogach, którzy związały swoje życie z Bielanami. Pointą opowieści o Jarnuszkiewiczach z Bielan niech będzie fakt, że Marcelina Jarnuszkiewicz i Piotr Kornobis doczekali się właśnie potomka. Oczywiście, że nie można jeszcze niczego przesądzać, ale... Nie jest wykluczone, że w Pracowni przy ul. Maglery za kilka lat spotkać będzie można czwarte już pokolenie artystyczne-go rodu Jarnuszkiewiczów. Tak ważne dla dzielnicy Bielany, dla Warszawy i dla całej polskiej kultury. Rafał Dajbor Dzielenie się twórczością to naturalna rzecz Z Marceliną Jarnuszkiewicz i Piotrem Kornobisem rozmawia Rafał Dajbor. Czy to prawda, że jest Pan agentem swojej żony? Marcelina Jarnuszkiewicz: (śmiech). Piotr Kornobis: Jestem producentem audiovizualnym, zajmuję się dowożeniem projektów realizowanych przez współpracujących ze sobą twórców z różnych dziedzin. Równolegle prowadzę też sprawy mojej żony, która dzięki temu może skupić się na twórczości i nie martwić finansami, podatkami i umowami. Marcelina jest kierowniczką artystyczną w naszej agencji kreatywnej OKO i UCHO. Jesteśmy niezależnymi bytami twórczymi, które się wzajemnie wspomagają… MJ: …ale i często współdziała­ją na terenie naszej Pracowni. Jestem zresztą ze współpracy z moim mężem bardzo zadowolona! Od kiedy istnieje Pracownia? Tworzył w niej Pani dziadek, znakomity rzeźbiarz Jerzy Jarnuszkiewicz, teraz Pani w niej tworzy. MJ: W międzyczasie pracował w niej także zmarny przed dwoma laty mój ojciec, reżyser teatralny Marcin Jarnuszkiewicz, który oprócz reżyserii zajmował się również scenografią. Miałam przyjemność współpracować z ojcem przy spektaklu „Całe królestwo króla” wystawionym w Teatrze Animacji w Poznaniu. Tata reżyserował, a ja, wspólnie z Martą Zając robiłam scenografię, nad którą pracowaliśmy na Magiera. Pracownia funkcjonuje tu od wybudowania bloku, czyli od pierwszej połowy lat 60. XX wieku. PK: Od samego początku, gdy wyremontowaliśmy Pracownię, myśleliśmy o niej jako o miejscu spotkan – z innymi twórcami i sąsiadami. Lekki nielad, który w niej panuje, atmosfera pracy służy skracaniu dystansu, częściowo likwidują podział na twórcę i odbiorcę. Doszedł Pan tym samym do mojego kolejnego pytania. W jaki sposób Państwa pracownia służy sąsiadom, mieszkańcom Bielan? PK: Przyjęliśmy założenie, że otwarcie pracowni dla ludzi nie będzie jednorazowym wydarzeniem, ale cykliczną, wpisaną w życie okolicy działalnością. Dlatego regularnie zaczęliśmy brać udział w Nocy Muzeów. Szybko okazało się jednak, że raz na rok to trochę za mało. Postanowiliśmy połączyć nasze talenty jako twórcy i organi­zatorzy w geście spotkania, do którego pretekstem jest działanie twórcze. MJ: Inspiracją do otwierania Pracowni była moja pierwsza wystawa indywidualna. Po realizacji stypendium Ministra Kultury i Dziedzictwa Narodowego długo zastanawiałam się, gdzie i komu najbardziej chciałabym pokazać efekt mojej pracy. Zorganizowa­liśmy więc wystawę, na którą oprócz znajomych ze środowiska przyszli też nasi sąsiedzi, niektórzy znający jeszcze osobiście mojego Dziadka. Życie naszych sąsiadów jest arcy­ciekawe, podobnie jak fascynujący jest cykl życia osiedla, domu z jego ludźmi, zwierzętami i rolnymi mieszkańcami. To dzia­ło­go w mojej kolekcji pinów (przypinek) oprócz klasycznie pięknych koni, psów czy ptaków umieścili­am wszędobylską jemiłość, złoto­oki i muchy. Jaka jest Państwa koncepcja na istnienie Pracowni? PK: Od samego początku myśle­liśmy o otwarciu jej jako o części pewnego planu dla naszej okolicy. Jerzy Jarnuszkiewicz był przecież rzeźbiarzem. Tworzył z myślą o człowieku w przestrzeni. Pomy­śleliśmy więc, że zacznijmy od Pracowni, a z czasem wyjdziemy na zewnątrz. Najważniejsza jest dla nas współpraca z mieszkańca­mi. W końcu wszyscy sąsiedzi to nasi potencjalni goście i wspól­twórcy. Chcemy tworzyć w prze­strzeniach między blokami – tak by przez działalność kulturalną wspólnie z mieszkańcami opisy­wać przestrzeń wokół nas. Bardzo cieszę się uzyskaniem tytułu Warszawskiej Historycznej Pracowni Artystycznej, który przyznała nam komisja pod przewodnictwem Michała Krasuckiego, Stolecznego Konserwatora Zabytków. Daje on nam wreszcie legitymację do działania. Nie będziemy już po­strzegani przez sąsiadów jako pasjonaci próbujący ocalić jakąś anonimową suterenę. Zyskaliśmy wobec lokalnej społeczności pewne obowiązki, ale – co się z tym wiąże – także pewne prawa. MJ: Chcemy, by przynajmniej raz od kwartału pracownia była otwarta od rana do wieczora, by odbywały się w niej warsztaty po­kazujące cały proces twórczy – od inspiracji, aż do gotowego dzieła. Choćby na moim przykładzie – proces twórczy ilustratora. PK: Będziemy też zapraszać grupy zorganizowane. Mamy w okolicy Klub Seniora przy pl. Konfederacji, jest Klub Abstynen­ta „Stefan”, klub Amazonek, przed­szkole. Po wcześniejszym umówieniu się możemy zorganizować warsztaty dostosowane do potrzeb odwiedzających nas gości. Poza tym czeka nas digitalizacja zbiorów – tak by jeszcze w tym roku powstała wirtualna ekspozycja dostępna dla wszystkich w technologii 360 stopni. Chcielibyśmy, aby przewodnikiem po niej był, oprócz Marceliny, wybitny historyk sztuki i znawca twórczości Jerzego Jarnuszkiewicza – prof. Walde­mar Baraniewski. Zapowiada się szeroka oferta, skierowana do różnych grup wiekowych i społecznych. PK: Byle znaleźli się chętni! MJ: Pracownia tym się też różni od muzeum czy galerii, że widz jest świadkiem procesu twórczego, może doświadczyć go w naturalnym środowisku. W muzeach wszystko jest już ładne, gotowe, skonczone. U nas zaś można prze­śledzić cały proces powstawania dzieła i samemu spróbować przez niej przejść. To ma także pewien walor pedagogiczny i łączy się z naszymi tradycjami rodzinnymi. Zarówno dziadek Jerzy, jak i tata, Marcin Jarnuszkiewicz byli wybitnymi pedagogami. Dziś rodzin­na tradycja akademicka podtrzymuje moją brat, Prot Jarnuszkiewicz, dziekan Wydziału Sztuki Mediów warszawskiej ASP. PK: Dzielenie się twórczością to dla nas naturalna rzecz. Nie ma lepszej motywacji do pracy, niż bezpośredni kontakt z odbiorcą. Sytuacja, w której tymi odbiorcami stają się bliscy nam sąsiedzi jest spełnieniem naszych marzeń. 1918 r. – Bielany u progu niepodległości Polski W nowych granicach Warszawy Gdy 11 listopada 1918 roku milkną strzały na frontach pierwszej wojny światowej, a na wszystkich publicznych gmachach Warszawy powiewają narodowe flagi, Bielany jako dzielnica jeszcze nie istnieją – są w większości pustynią, na obrzeżach której wegetuje kilka wsi i osad. Tereny te tylko w części należały wtedy do Warszawy i to dopiero od 8 kwietnia 1916 roku, kiedy rozkazem ówczesnego niemieckiego general-gubernatora Hansa von Beselera do miasta przyłączono rozległe, ale niemal niezagospodarowane, słabo zaludnione przedmieścia. Na północy dawna granica Warszawy biegła łamaną linią poprowadzoną wzdłuż nasypu drogi żelaznej obwodowej przy Cmentarzu Powązkowskim, do rejonu obecnego ronda „Radosława” i dalej w kierunku Rogatki Marymonckiej (okolice dzisiejszego pl. Wilsona) do Wisły. Po inkorporacji przedmieść nowa linia graniczna pobiegła od ul. Obozowej na Kole w kierunku północnym, u nasady obwałowań Fortu P (od 1921 r. – Fort Bema), pozostawiając poza miastem folwark Parysów. W naszych czasach na jego gruntach funkcjonują ogrodki działkowe między ulicami Obrońców Tobruku, gen. Maczka i Powstańców Śląskich. Na kolejnym odcinku linia graniczna odchylała się nieco ku północnemu zachodowi, sięgając do kranców wsi Wawrzyszew w rejonie obecnego skrzyżowania ul. Żeromskiego z ul. Reynmonta. Tu skręcała gwałtownie niemal dokładnie na wschód, przecinając prostą linię pustynne Pole Wojenne Bielańskie, w tym dzisiejsze skrzyżowanie ul. Podczaszyńskiego i ul. Schroegera, aby dojść do Szosy Zakroczymskiej (ul. Marymonckiej), w miejscu obecnego biegu ul. Zabłocinskiej. Tu cofała się nieco ku północy, do linii drogi odpowiadającej dziś ul. Podleśnej i obrzeżom Lasu Bielańskiego. W końcu przekraczała Szose Bielańską (późniejsza ul. Kamiełków, dzisiaj Gwiazdista) i północny kraniec Kępy Potockiej. Analiza ówczesnego planu miasta prowadzi do wniosku, że opisana linia graniczna częściowo uwzględniała podziały dóbr na gruntuach wcześniejszej przynależnych do gminy Młociny, ale na terenie dzisiejszych Starych Bielan została poprowadzona tak, jak granice państw w postkolonialnej Afryce Północnej – prostą linią przez „nicyjną” pustynię. Ta bielańska stanowiła własność skarbowa, jako spadek po poligonie wojsk rosyjskich, a jeszcze wcześniej pruskich. Na obrzeżach tych pustkowia przynależności do stolicy mogły się teraz pochwalić przerażającą biedne, duszące się w oparach fabrycznych dymów oraz ścieków osady Powązków, Izaabelin i Czarny Dwór, włócińska kolonia Młociny B, zwana też Piaskami, wieś Buraków w rejonie obecnej ul. Włościańskiej, przemysłowa kolonia Słodowiec, a także Marymont z Kaskada, kolonia i folwark Ruda Fabryczna, kolonia Ruda Evansa i wieś Potok. Wszystkie wymienione ośrodki to albo stare wsie, albo później powstałe osady które od 1883 r. podlegały restrykcjom funkcjonowania Twierdzy Warszawa. Skutkiem jej powstania był zakaz wznoszenia budowli murowanych w zasięgu tzw. esplanady, czyli przedpola i otoczenia fortów, co owocowało masowym, tandetnym budownictwem drewnianym. Oczywiście wyjątkiem były murowane budowle wojskowe, szczególnie liczne na Powązkach, a także zakłady przemysłowe, lokujące się w pobliżu starych osad, wszędzie tam, gdzie ograniczenia nie były tak bezwzględne. W kolejnych odcinkach cyklu przyjrzymy się bliżej tym ośrodkom. Poza granicami miasta aż do 1930 r. miały pozostać tereny Lasu Bielańskiego z zespołem pokamedulskim i porzuconym przez wojska rosyjskie Obozem Bielańskim, a także pozostała część Pola Wojennego Bielańskiego. Nowo przyłączone tereny zostały objęte jurysdykcją XXVI Komisariatu, które to określenie, kojarzone zazwyczaj z okręgiem policyjnym, odnosiło się jednak do podziału administracyjnego. Co ciekawe, nowy Komisariat nie pokrył zasięgiem całego inkorporowanego obszaru, a jego granica biegła zgodnie z zasięgiem własności poszczególnych osad, ignorując skarbową pustynię po dawnym poligonie. Na Kaskadzie z tego samego powodu wyjątkowo wykraczała nieznacznie poza granice Warszawy, co budzi wątpliwości odnośnie precyzji wyznaczenia zasięgu inkorporacji w 1916 r. Z takim oto „bagażem” rozpoczynała się miejska kariera Bielan u progu niepodległości Rzeczypospolitej. Jarosław Zieliński kwiecień 2018 04 Spotkanie z podróżnikiem Spotkanie z Moniką Witkowską – TANZANIA. Wstęp wolny Bielański Ośrodek Kultury, ul. Goldoniego 1 04 Dyskusyjny Klub Książki Omawiane pozycje to "Dom z witrażem" Żanny Słoniewskiej oraz "Madame" Antoniego Libery. Wstęp wolny Wypożyczalnia dla Dorosłych i Młodzieży Nr 103, al. Reymonta 6 05 Gordonki Zajęcia umuzykalniające dla dzieci od 5 miesiąca życia. Gordonki to zajęcia stymulujące rozwój muzyczny dziecka za pomocą śpiewu. Kolejne zajęcia 8, 15, 22, 29 kwietnia. Prowadzenie Joanna Kiełbiewska. Koszt 30 zł/jednorazowo, 90 zł/m-c Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 05 Cały rok w Bibliotece Kolejne zajęcia z tego cyklu 12 i 26 kwietnia. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 26, ul. Romaszewskiego 19 05 Uwielbieniowy koncert Mate.O/TU Mate.O (Mateusz Otręba) powraca z projektem "Totalne Uwielbienie" (TU). Podczas koncertu będzie można usłyszeć utwory znane szerszej publiczności takie jak: "Wszystko poddane jest" czy "Cały świat niech pozna Cię" oraz osiem zupełnie nowych, premierowych kompozycji m.in. "Chrystus panuje", tytułowy "Król wszechświatów" czy "Cudowny dzień". Bilety na koncert w cenie 29 zł/os. do nabycia on-line na stronie sklepu „Chrześcijańskie Granie” Dobre Miejsce, ul. Dewajtis 3 06 Recital Andrzeja Brzeskiego Ech, mała – wspomnienia z PRL-u to retrospektywny koncert wielokrotnego laureata Międzynarodowego Festiwalu Bardów – OPPA. Usłyszymy takie utwory jak : „Ech mała”, „Żajączek słońca”, „Tamte panienki”, „Wsparmienia z PRL”. Instrumentarium – Florian Ciborowski. Bilety 15 zł. Rezerwacja miejsc: email@example.com Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 06 "Spotkanie z gwiazdą – kulisy sławy" Ewa Kuklińska Prowadzenie spotkania Krzysztof Wilkowski Bilety 25 zł, przedsprzedaż od 27 marca Bielański Ośrodek Kultury, ul. Goldoniego 1 06 "Piątek w Bibliotece" Zajęcia literacko-plastyczne (dzieci od lat 5). Kolejne zajęcia 20 kwietnia. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 27, al. Zjednoczenia 19 Bielańska Wymiana Umiejętności Na Bielanach mieszkają utalentowani i przedsiębiorczy ludzie. Dlatego też chcielibyśmy zaprosić mieszkańców naszej dzielnicy do wspólnego spotkania, z którego wynikną same korzyści. W internecie istnieje sporo grup osób wymieniających się sprzętem lub nie używanymi przedmiotami. A gdyby tak wymienić się umiejętnościami? Aby poznać osoby, które chciałyby nabycić nowe umiejętności należy wejść na stronę http://bit.ly/wymianaumiejetnosci. Na pierwszy ogień autor inicjatywy Sebastian Świerszcz podzieli się umiejętnościami spojnego mówienia i podstawy z przemowy publicznej. Następnie Karol Słobodzian - poprowadzi krótki kurs szeroko pojętej sprzedaży. Ruszamy 5 kwietnia w bielańskim Ratuszu o godz 17.00 Urząd Dzielnicy Bielany, ul. Żeromskiego 29, s. 155 (wejście od ul. Jarzębskiego) Opera na przestrzeni wieków Prelekcja z prezentacjami muzycznymi Anny i Tomasza Ostrowskich. Zapraszają społeczni animatorzy kultury Jan Marczak i Zbigniew Grądziel. Godz. 15.00. Wstęp wolny Bielański Ośrodek Kultury, ul. Goldoniego 1 Wibracje Miłości – koncert muzyki wysokowibracyjnej W trakcie koncertu lecznicze wibracje dźwięków naturalnych instrumentów wprowadzą uczestników w stan głębokiego relaksu i pozwolą odręgować codzienny stres. Wibracje dźwięków synchronizują półkulę mózgową, uwalniając pokłady kreatywności i jasność umysłu oraz uruchamiają wrażliwość na subtelne postrzeganie rozwijając zmysły. Zagrają: Wibracja Miłości – Asia Orłowska i Alek Sabuda. Godz. 18.00. Bilety 15 zł. Rezerwacja miejsc: firstname.lastname@example.org Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 07 godz. 10.30 Akademia Einsteina – elektryczność Pokazy i doświadczenia w trakcie których poruszamy zagadnienia elektrostatyki, metod elektryzowania ciał, stanów skupienia, różnic potencjałów, kul plazmowych oraz ładunków elektrycznych. Zapisy, 25 zł/ jednorazowo Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 08 godz. 12.00 Niedzielne balety Niedzielne balety – warsztaty baletowe dla dzieci od 4 roku życia. Zajęcia uczą podstawowych figur i kroków baletowych, kształtują estetykę ruchu. Prowadzenie Beata Kociolkowska. Kolejne zajęcia 15, 22, 29 kwietnia. Koszt 70 zł/m-c, 25 zł/zajęcia jednorazowe Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 08 godz. 18.00 "Wspomnienie" – koncert Koncert w wykonaniu uczestników sekcji śpiewu musicalowego i piosenki aktorskiej pod kierunkiem Maryli Grałczyk. Wstęp wolny Bielański Ośrodek Kultury, ul. Goldoniego 1 09 godz. 17.30 "Guliwer" Spektakl "Guliwer" w wykonaniu aktorów teatru Warianca. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 26, ul. Romaszewskiego 19 09 godz. 17.00 "Piraci i wyspa skarbów" Przedstawienie teatralne "Piraci i wyspa skarbów" w wykonaniu aktorów z Agencji Artystycznej Błażany Bębenek. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 49, al. Reymonta 6 10 godz. 17.45 Dyskusyjny Klub Książki dla młodzieży Konrad T. Lewandowski, SAGA O KOTOŁAKU Ksin. Początek Mediateka Start-Meta, ul. Szegedyska 13a 11 godz. 10.30 Od baśni do baśni Koncert edukacyjny Filharmonii Narodowej. Baśniowe historie opowiadane dźwiękami skrzypiec, fortepianu, saksofonu, klarnetu i barwami żeńskich głosów – sopranu i mezzosopranu. Bilet 4 zł Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 Kino za Rogiem w Bibliotece "Jackie" (spotkanie z Łukaszem Maciejewskim – krytykiem filmowym i teatralnym). Kolejne filmy 18 kwietnia – "Karski i władcy ludzkości" i 25 kwietnia – "Zakwakani". Wstęp wolny Biblioteka Publiczna, ul. Romaszewskiego 19 12 godz. 19.00 "Jazz w Podziemiach Kamedulskich" Wiosenną edycję cyklu "Jazz w Podziemiach Kamedulskich na Bielanach" rozpocznie Quartet znakomitego pianisty i kompozytora Leszka Kulakowskiego. Zespół w składzie: Leszek Kulakowski – fortepian, Jerzy Małek – trąbka, Piotr Kulakowski – kontrabas, Tomasz Sowiński – perkusja, zaprezentuje premierowy program z najnowszego albumu zespołu „Cantabile in G-minor” – muzykę łączącą klasykę z jazzem, pełną kolorów, liryzmu i szlachetności. Koncert organizowany jest przez Urząd Dzielnicy Bielany, Podziemia Kamedulskie oraz Agencję Koncertową Pianoart. Patronem koncertu jest Veolia Energia Warszawa S.A. Wstęp wolny Podziemia Kamedulskie, ul. Dewajtis 3 ROK NA BIELANACH 2017 CO W KULTURZE? 136 koncertów 230 wystaw i warsztatów 65 pokazów filmowych nowy portal naszebielany.pl audioprzewodnik po Bielanach pierwszy w Warszawie konkurs promujący czytelnictwo – Czytelnik roku 25 723 nowości (książki, multimedia) w bielańskiej bibliotece CO W SPORCIE? 33 500 uczestników imprez w obiektach Centrum Rekreacyjno-Sportowego Hala pneumatyczna nad boiskiem 9 200 uczestników imprez biegowych zorganizowanych przez Dzielnicę Bielany 115 imprez sportowych i rekreacyjnych zorganizowanych przy udziale finansowym Dzielnicy Bielany CO W OCHRONIE ŚRODOWISKA? 4,3 mln zł utrzymanie zieleni oraz czystości 2,7 mln zł modernizacja placów zabaw i terenów zielonych ławki dla mam karmiących nowy wybieg dla psów 424 tys. zł edukacja ekologiczna powstanie Bielańskiego Centrum Współpracy i Przedsiębiorczości CO W PRZEDSIĘBIORCZOŚCI? 8 100 złożonych wniosków dotyczących działalności gospodarczej 9 spotkań szkoleniowych dla bielańskich przedsiębiorców CO W INFRASTRUKTURZE? 32,3 mln zł budżet inwestycyjny 18,2 mln zł na budowę i modernizację placówek oświatowych, boisk i placów zabaw 10,5 mln zł budowa i remonty ulic 2,1 mln zł modernizacja otoczenia Bielańskiego Centrum Edukacji Kulturalnej 275 miejsc więcej w przedszkolach niż w roku poprzednim 11 mln zł na doposażenie szkół w sprzęt i pomoce dydaktyczne 28 007 dzieci i młodzieży w szkołach i przedszkolach 1 153 medale w zawodach sportowych w kraju i za granicą CO W OŚWIACIE? 262,5 mln zł budżet CO W SPRAWACH SPOŁECZNYCH? 6 001 osób objęto wsparciem świadczeń w Ośrodku Pomocy Społecznej 1 595 osób wzięło udział w spotkaniach świątecznych 57 par obchodziło jubileusz złotych godów Wczasy, bale i wycieczki dla seniorów 1 600 paczek dla podopiecznych Ośrodka Pomocy Społecznej CO W ZAKŁADZIE GOSPODAROWANIA NIERUCHOMOŚCIAMI? 5,4 mln zł na modernizację i remonty budynków komunalnych 1,8 mln zł na rewitalizację podwórek i remonty chodników Wyremontowano 123 pustostany CO W ZASOBACH LOKALOWYCH? 240 rodzinom udzielono pomocy mieszkaniowej 340 rodzinom obniżono czynsz 3 300 przyznanych dodatków mieszkaniowych i energetycznych 4 700 liczba złożonych wniosków o udzielenie pomocy mieszkaniowej w innej formie ROK DZIAŁAMY! 2018 kwiecień 2018 12 Obrazy z nici – warsztaty string Art godz. 18.00 String art to technika wyplatania obrazów z kolorowej włóczki, muliny lub nici na papierze, ścianie, ramkach lub deskach. Kontury wyplatanych wzorów najpierw nanosi się rysując wybrany wzór, a następnie wbija się w kontur gwoździe, które staną się stelażem dzieła. Wstęp wolny. Zapisy Studnia MAL, ul. Estrady 112 14 Klub Na Dziko – naczynia i pojemniki z kory godz. 10.00 Warsztaty rzemiosła polowego dla dorosłych. Wspólne gotowanie wody w garnku z kory i tykwy prosto z łąki. Uczestnicy wykonają też stylową torbę lub tacę z kory brzozowej. Instruktor Łukasz Tulej. Koszt 50 zł/osoba. Zapisy Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 15 Podróżniczek. Akademia Odkrywcy im. Tony Halika godz. 12.30 Śpiąjące małpki, leniwce – przedszkolaki i niezwykle niedźwiedziaki”. Bilety 10 zł, przedsprzedaż od 10.04 Bielanski Ośrodek Kultury, ul. Goldoniego 1 15 35 mm Kino Po staremu godz. 18.00 „Ludzie bez jutra” – pokaz filmu niemego z muzyką na żywo. Film, który zrealizowano w 1919 roku, wszedł na ekranы kin po wielu poprawkach dopiero w 1921 roku. W roli rotmistrza wystąpił Józef Wegrzyn, zaliczany do najciekawszych polskich aktorów pierwszej połowy XX wieku, zaś Lolę Wirską zagrała Halina Bruczówna, gwiazda teatru i filmu. Muzyka na żywo Ensamble Squad. Wstęp wolny Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 15 Rozśpiewane smyki w świecie muzyki godz. 11.00 Spotkamy się tym razem z harfą, przepięknym instrumentem, na którym usiadą motyle! Będziemy mieli wspaniałych gości Barbarę Ożarowską i Małgorzatę Kasprzak – młode harlistki, uczennice Zespołu Państwowych Ogólnokształcących Szkół Muzycznych nr 3 im. Grażyny Bacewicz. Poranek poprowadzi pomysłodawca i twórca cyklu Kamila Lewicka. Serdecznie zapraszamy! Urząd Dzielnicy Bielany, ul. Żeromskiego 29 16 Kino B godz. 17.00 Spotkanie z Zofią Wichlacz, które poprowadzi Łukasz Maciejewski oraz projekcja filmu „Powidoki”. Wstęp wolny Biblioteka Publiczna, ul. Romaszewskiego 19 18 Czytane Środy godz. 17.00 Zajęcia z cyklu pod hasłem „Ale SZTUKA” (dzieci 5-8 lat). BALET. Czym różni się balet od innych tańców? Ćwiczymy taniec z szarfą. Robimy obrazek z baletnicą. Kolejne zajęcia 25 kwietnia – CYRK. Inszenizujemy miniprzedstawienie cyrkowe. Robimy wesołego clowna. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 49, al. Reymonta 6 19 „Śpiąca królewna” godz. 17.00 Spektakl teatralny w wykonaniu Teatru Lalek „Czarodziej”. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 27, Al. Zjednoczenia 19 19 „O nieśmiałym księciu i odważnej księżniczce” godz. 18.00 Przedstawienie w wykonaniu aktorów z Agencji Artystycznej „Arlekin”. Wstęp wolny Wypożyczalnia dla Dorosłych i Młodzieży Nr 22, ul. Wrzeclowo 48 20 Film Songs godz. 19.00 Koncert Chóru Kohezja z Filii Bielańskiego Ośrodka Kultury. W programie znane hity z polskich i zagranicznych filmów i seriali. Usłyszmy takie utwory jak: Meluzyna, Szybki Bill, Staying Alive, Angel, Va Bank. Dyryguje Ewa Jurkiewicz, akompaniuje Natalia Pystina. Wstęp wolny Studnia MAL, ul. Estrady 112 22 Koncert z cyklu Piosenka autorska Recital Grzegorza Paczkowskiego otworzy tegoroczny cykl Piosenki autorskiej w Podziemiach Kamedułskich. Grzegorz Paczkowski, mieszkaniec Bielan, brał udział w wielu koncertach i festiwalach w całej Polsce. Do jego najważniejszych osiągnięć festiwalowych należy autorska nagroda im. Wojciecha Bellona (nagroda przyznawana najlepszym autorom tekstów) na 51. Studenckim Festiwalu Piosenki w Krakowie. W kwestii wykonawczej pozostaje wierny tradycyjnej formie pieśni na głos i gitarę. Wstęp wolny. Zapraszamy na godz. 17.00! Podziemia Pokamedułskie, ul. Dewajtis 3 22 Dwie Godziny dla Rodziny Spektakl „Ucieczka z piórnika” Teatrzyk Czekoladowy Słoń oraz zabawy plastyczne. Bilety 10 zł, przedsprzedaż od 17.04 Bielański Ośrodek Kultury, ul. Goldoniego 1 22 „Mandat” Spektakl „Mandat” Teatru Otwartego z Podkowy Leśnej. Reżyseria Joanna Cichór. Wstęp wolny Bielański Ośrodek Kultury, ul. Goldoniego 1 23 „WIOSNA RADOŚNA” Zajęcia origami prowadzone przez trenera Polskiego Centrum Origami Małgorzatę Spilarewicz. Wstęp wolny Biblioteka dla Dzieci i Młodzieży Nr 26, ul. Romaszewskiego 19 24 „Niezwykła podróż” Teatrzyk dla dzieci – NIEZWYKŁA PODRÓŻ w wykonaniu Teatru Dur-Moll. Zaprosimy dzieci do wzięcia udziału w niezwykłej podróży: polecimy na czarodziejskim dywanie, będziemy wędrować w butach stumilowych, poznamy zabawne zwyczaje panujące w różnych częściach świata. Wstęp wolny Mediateka Start-Meta, ul. Szegedyska 13a 25 Wieczór satyryczny Marek Majewski, Tadeusz Drozda i Aleksandra Dzierżawska godz. 19.00 Bilety 20 zł, przedsprzedaż od 17.04 Bielański Ośrodek Kultury, ul. Goldoniego 1 26 Bielawska Akademia Umiejętności godz. 17.00 W marcu zainaugurowaliśmy II edycję Bielańskiej Akademii Umiejętności, której pierwszy cykl poświęciliśmy mężczyznom. W kwietniu porozmawiamy o przedsiębiorczości. 26 kwietnia w czwartek w bielańskim Ratuszu będziemy gościć Jacka Santorskiego, a w każdą sobotę kwietnia zapraszamy na Warsztaty z profesjonalistami. Obowiązują zapisy, szczegóły na stronie www.bit.ly/przedsiębiorczebielany. Wstęp wolny dzięki Dzielnicy Bielany oraz Sponsorowi BAU firme Matexi Polska Sp. z o.o. Urząd Dzielnicy Bielany, ul. Żeromskiego 29, sala widowiskowa (wejście od ul. Jarzębalskiego) Głos Duszy – warsztaty śpiewu intuicyjnego godz. 18.00 Nie potrafiłeś śpiewać? Zawsze chciałeś śpiewać ale się wstydziłeś? A może ktoś ci w dzieciństwie powiedział, że falszujesz i od tamtej pory już nie śpiewasz? Jeśli tak, to ten warsztat jest dla Ciebie! Prowadząca: Anna Szyszka. Wstęp wolny. Partner projektu Fundacja Life Change Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 Studium zieleni – plener malarski godz. 18.00 Warsztaty malarskie z wykorzystaniem farb akrylowych. Uczestnicy stworzą paletę odcieni barw pochodnych, wykorzystując uważną obserwację natury. Instruktor Anna Sobol. Koszt 30 zł. Zapisy Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 28 Kocham Teatr godz. 12.00 Smok Wawelski – Teatr Domowy Chmielna. Przedstawienie edukacyjno-ekologiczne dla dzieci od lat 2. Bilet 5 zł/osoba Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112 Choroba wieńcowa (1) Serce jest najbardziej niezawodną i wydajną pompą mięśniową w naszym organizmie. Składa się z dwóch przedsięwiorów i dwóch komór podłączonych do głównych naczyń krwionośnych. W ciągu godziny transportuje ponad 350 litrów krwi od i do poszczególnych narządów naszego organizmu. Rytmiczne skurcze i rozkurcze wymuszają ruch krwi we właściwych kierunkach. Krwь transportuje tlen i wszystkie składniki odżywcze do wszystkich okolic ciała, zabierając zbędne produkty przemiany materii. Przepływ utlenionej krwi odbywa się za pośrednictwem tętnic, w żyłach natomiast płynie ku sercu krew „zużyta”, to znaczy pozbawiona tlenu. W ciągu naszego długiego życia serce uderza ponad 3,5 mld razy. Warto więc otaczać nasze serce szczególną troską, pamiętając o zasadach zdrowego stylu życia. Serce nieustannie bijąc dostarcza każdej komórce naszego organizmu ulewowaną krew bogatą w hormony, witaminy, mikroelementy i inne składniki niezbędne do prawidłowej pracy narządów. Zdrowie każdego narządu wewnętrznego uwarunkowane jest prawidłowym krajeniem, a więc zależy zarówno od skuteczności funkcjonowania mięśnia sercowego, jak i łatwości przepływu krwi przez tętnice. Kondycja układu krążenia zależy od tego, na ile naczynia krwionośne są wolne od rozmaitych przeszkód, np. złoże tłuszczu lub szkrepów krwi. Ważne jest też, aby ciśnienie krążącej krwi nie przekraczało pewnych wartości. Wysokie ciśnienie krwi może uszkodzić naczynia krwionośne lub zwiększyć ryzyko ich zablokowania. Jeśli natomiast za niedokrwienie odpowiadają inne przyczyny (nazywane pozawieńcowymi), takie jak np. reumatoidalne zapalenie stawów, niedokrwistość, wady serca czy niewydolność oddechowa, to wówczas mówimy o chorobie niedokrwiennej serca. Innymi słowy choroba niedokrwienienna serca jest pojęciem szerszym niż choroba wieńcowa, obejmuje bowiem wszystkie stany niedokrwienia mięśnia sercowego bez względu na przyczynę. Dławica piersiowa stabilna to zespół kliniczny charakteryzujący się uczuciem bólu za mostkiem z powodu niedokrwienia mięśnia sercowego, wywołanego zwykle wysiłkiem fizycznym, ale mogącego również występować w spoczynku (jest wówczas wywoływane emocjami lub obitym posiłkiem). Typowy ból za mostkiem ma charakter ucisku, ciężaru, może promieniować do szyi, żuchwy (ale nie do szczęki), lewego barku lub lewego ramienia (i dalej zwykle wzdłuż nerwu łokciowego do nadgarstka i palców reki), do nadbrzusza ponad pepek, do okolicy międzyłopatkowej. Wywoływany jest przez wysiłek fizyczny (próg wysiłku wywołującego ból u chorego może się zmieniać), stres emocjonalny, wyjście na zimne powietrze, obity posiłek. Ból ustępuje w trakcie odpoczyznku oraz po podaniu leku nitroglicerynowy; niekiedy ustępuje w trakcie dalszego wysiłku. Ból nie zmienia się w zależności od pozycji ciała ani fazy cyklu oddechowego. Natężenie bólu dławicowego często jest większe w godzinach porannych. Niedokrwienie mięśnia sercowego może przebiegać bezobjawowo. Określono też równowagę dławicy piersiowej. Są to objawy, mogące świadczyć o dławicy piersiowej, jeśli nie występuje ból za mostkiem. Należą do nich najczęściej duszność wysiłkowa (częściej u chorych w podleszym wieku lub z cukrzycą), zmęczenie, osłabienie, nadmierna potliwość po wysiłku, ból brzucha, nudności. Chorobę wieńcową rozpoznaje się na podstawie zgłaszanych przez chorych dolegliwości oraz wykonanych badań dodatkowych: EKG spoczynkowego, wysiłkowego, echo-kardiografii, scintygrafii, koronagrafii... Lek. med. Wojciech Borkowski specjalista medycyny rodzinnej Nie zostawiamy ludzi samych w ich cierpieniu „Nie zawsze będziemy mogli pomóc, ale staramy się przynajmniej o jedno: nie pozostawiać ludzi w samotności, w ich nieszczęściu”. Te słowa wypowiadane przed laty przez ks. Józefa Tischne wicarja nie tracą „terminu ważności”, a odniesienie ich do bielskiego Archidiecezjalnego Zespołu Domowej Opieki Paliatywnej wydaje się wyjątkowo trafne. Archidiecezjalny Zespół Domowej Opieki Paliatywnej, którego sekretariat mieści się przy kościele pw. św. Zygmunta przy pl. Konfederacji 55, jest instytucją powołaną przez Prymasa Polski 2 października 1996 r. do sprawowania opieki hospicyjnej nad ludźmi umierającymi na chorobę nowotworową. Hospicjum opieki lekarskiej, pielęgniarskiej, duchowej i socjalnej sprawuje w domu chorego, dając oparcie całej rodzinie, często zagubionej w tych najtrudniejszych chwilach związanych z cierpieniem i śmiercią najbliższej osoby. Chorzy w fazie terminalnej choroby nowotworowej bezwzględnie wypisywani są ze szpitali i oddawani pod opiekę najczęściej bezradnej rodziny, która szuka pomocy hospicyjnej. Pod opieką zespołu jest ponad 130 pacjentów dziennie. To osoby w terminalnej fazie choroby nowotworowej, charakteryzującej się wielkim cierpieniem fizycznym z powodu strasliwych bółów ogarniających z reguły całe ciało, cierpieniem psychicznym spowodowanym ogromną niepewnością i lękiem o swój los, jak i o los najbliższych, oraz wieloma innymi formami cierpienia. Hospicjum zapewnia pełną pomoc lekarską i pielęgniarską, jak również niezbędną aparaturę i sprzęt medyczny w ich domach. Od samego początku zespołem kieruje ks. Władysław Duda, dla którego ewangeliczne przesłanie jest nie tylko powołaniem, ale również ciężką i odpowiedzialną pracą, którą od ponad 20 lat niezłomnie wykonuje z ogromnym poświęceniem i pasją. Pacjenci do stałej dyspozycji mają 14 lekarzy prowadzących, 18 pielęgniarek, 3 psychologów, 2 pracowników socjalnych, 2 rehabilitantów, 6 lekarzy konsultantów oraz 1 duszpasterz. W sekretariacie, w którym pracują 3 osoby, które służą informacja, pomoc oraz zajmują się sprawami związanymi z przyjęciem pacjentów, uzyskaniem niezbędnej aparatury i sprzętu medycznego jest czynny od godz. 8.30 do 18.30. Hospicjum wspiera również 15 oddanych wolontariuszy. Zespół opieku swoją obejmuje pacjentów z rejonu lewobrzeżnej Warszawy, a dokładniej z Bielan, Żoliborza, Bemowa, Śródmieścia i Woli – wyluca Wojciech Perkowski, rzecznik AZDOP. Chory objęty opieką hospicjum domowego przebywa w swoim domu. Po dokonaniu zgłoszenia następuje pierwsza wizyta lekarska i pielęgniarska w terminie uzgodnionym z nim lub jego bliskimi. Lekarz odwiedza chorego średnio dwa razy w miesiącu, pielęgniarka 2 razy tygodniowo, a pozostała członkowie zespołu w zależności od zapotrzebowania. Każdy pacjent otrzymuje informacje dotyczące kontaktu telefonicznego z lekarzem i pielęgniarką, a częstotliwość wizyt dostosowuje się do potrzeb chorego. Chory objęty opieką hospicjum domowego ma możliwość bezpłatnego wypożyczenia sprzętu i aparatury medycznej (np. materaca przeciwdotlenowego, aparatu tlenowego, balkoniku, kul, chodzika, wózka inwalidzkiego itp.) Decydując o wyborze domowej opieki hospicyjnej musimy odpowiedzieć sobie na kilka pytań: jak ważne dla chorego jest przebywanie w domu wśród rodziny i przyjaciół; czy rodzina chorego lub jego przyjaciele mają możliwość, by w warunkach domowych zająć się chorym, biorąc pod uwagę, że będzie potrzebna opieka przez całą dobę, codziennie; czy członkowie rodziny chorego akceptują fakt, że będą musieli zaopiekować się chorym w warunkach domowych, podając mu lekarstwa, pomagając w poruszaniu się, korzystaniu z toalety, czynnościach higienicznych, podawaniu posiłków i napojów; czy są na tyle silni, by udziwić się to wyzwanie; czy mieszkanie/dom jest takim miejscem, które można dostosować do potrzeb chorego – czy jest wystarczająco dużo miejsca na wstawienie łóżka szpitalnego czy wózka inwalidzkiego, jeśli będzie to konieczne; czy opowiadanie objawów, takich jak ból, trudności w oddychaniu i przelękaniu lub innych możliwe jest w warunkach hospicjum domowego. Podjęcie decyzji o wyborze sposobu opieki hospicyjnej musi wiązać się ze szczera rozmową z chorym, jeśli może on w niej uczestniczyć. Dobrze by było taką rozmowę przeprowadzić w gronie rodziny i bliskich chorego. Warto ten temat dośćblennie przemyśleć, nie czekając jednak do ostatniej chwili. Hospicjum bez wsparcia darczyńców nie dałoby rady tak przeinnie działać. To dzięki wspaniałym ludziom, którzy przekazują swoje odliczenia od podatku bielskie hospicjum może objąć opiekę większą liczbę pacjentów spośród oczekujących w kolejce na pomoc. Dla rodzin dotkniętych bólem choroby nowotworowej to bezcenna nadzieja na godne przeżycie tych najtrudniejszych chwil w ich życiu. Więcej informacji na www.hospicjumdomowe.pl Tadeusz Olechowski ... wtedy czas dostaje skrzydeł W maju br. Rada Seniorów Dzielnicy Bielany m.st. Warszawy kończy swoją trzyletnią kadencję. Ile zdołała osiągnąć – rozmawiamy z jej przewodniczącą Krystyną Żebrowską. Co wyniosłaś z tych lat? Wiedzę, że taka Rada powołana jest nie do podziwiania, tylko do niewielkiej służby publicznej. Kto liczy na karierę mocno się przeliczy. Przekonałam się też, że radny–senior nie powinien „wiedzieć lepiej”, bo żeby troszczyć się o seniorów sprawy, trzeba najpierw dopytać się, czego ludzie oczekują od swojej Rady. Po to rozprowadzały ankiety wśród bielańskich seniorów. Pisali jut o nich, ale podsumujemy co przyniosły? Gdy mówimy o ankietach muszę podkreślić wielką pomoc kierowników naszych Klubów Seniora i Ośrodków Wsparcia, dzięki którym opracowane przez Radę pytania docierały do respondentów; przychodzili, zabierali ankietę, rozdawali, odnosili wypełnione. W sumie przez dwa lata z klubów, ośrodków i od osób niezrzeszonych wpłynęło 2310 ankiet, które analizował zespół powołany z gromu Rady. Ankiety z 2016 r. dały odpowiedź na pytanie czego seniorom brakuje w osiedlach, a te z ubiegłego roku składały się z dwóch części: dotyczącej potrzeb i oczekiwań podopiecznych oraz – na wniosek Komendy Rejonowej Policji – ich wiedzy o zagrożeniach. I okazało się, jak istotne są dla seniorów sprawy bezpieczeństwa. Kilkakrotnie w okresie kadencji Rady „Nasze Bielany” publikowały sprawozdania z debat i warsztatów dla seniorów z udziałem Policji, Straży Miejskiej, instruktorów samochodowych... Słuchacze uczyli się, jak zachować się w przypadku napadu, jakie są metody okradania nas przez oszustów, rozdano tematyczną broszurkę, instruktorzy czywiczy seniorów – jak się bronić. Była to prawie dwuletnia akcja, wspomniane monitorowana przez Delegaturę Biura Bezpieczeństwa i Zarządzania Krzyszowego. Uważam, że zaocenowała ona poprawę bezpieczeństwa bielańskich seniorów. Wykaż tych miejsc opublikowaliśmy w poprzednim numerze „NB” („Krajobraz życiowości”). Opoźnienie z sukcesu podświadczamy... Niechciano, bo jeszcze zyskam skrzyw podświadczacza. Stalem się dyżynowym wieczorem na przystanku tramwajowym, a obok trzy seniori głosno narzekały na rozkład jazdy: że zbyt mała cena cionka dla seniorów oczu, że niepodzielne, wiszą za wysoko... Pomyślałam, że musimy coś z tym zrobić. Rada przegłosowała pomysł konferencji z przedstawicielami Zarządu Transportu Miejskiego – i dzięki tej naszej inicjatywie zmieniane są rozkłady jazdy w całej Warszawie i okolicach – na czytelniejsze i niżzej przymocowane. Co jeszcze działała ustępująca Rada Seniorów? Na przykład będzie ogródek w Ośrodku Wsparcia Nr 2, o który prosili w ankietach seniorzy z Wrzosca. Niełatwa to była sprawa, ale zdolali ją załatwić Zastępcy Burmistrza: Grzegorz Pietruczuk i Włodzimierz Piatkowski. Zajmowaliśmy się też problemami życiowymi bielańskich seniorów, zgłaszanymi w listach do Rady. Zawsze powtarzałaś, że współpraca Rady Seniorów z władzami dzielnicy jest wręcz wspaniała... Bo tak jest! Zarząd, a zwłaszcza przywoływani wcześniej Zastępcy Burmistrza, urządzał seniorom baile, koncerty, wycieczki, Dni Seniora, poważnie traktują opinie i stanowisko Rady w sprawach dotyczących seniorów. Jestes członkiem Parlamentu Seniorów. Jeżdżisz, jak i inni członkowie Rady, na konferencje i szkolenia – organizujecie je także na Bielanach, uczestniczycie w posiedzeniach Komisji Polityki Senioralnej w Sejmie, w pracach Warszawskiej Rady Seniorów i Mazowieckiego Porozumienia Rad Seniorów; jesteś prezesem bielańskiego Zarządu PKPS, wiceprezesem TKKF „Chomiczówka”, a popolidunami pracujecie w Klubie Mieszkańców WSBM „Chomiczówka”. Żywy człowiek daje temu radę? Daje, bo to lubi. Moim zdaniem masz wyjątkowy wymiar organizatorski. Dziękuję. Jestem przede wszystkim społecznikiem. Kiedy dzieje się coś pożytecznego mój czas dostaje skrzydeł. Rozmawiała Irma Wieczorkowska-Bednarek Epitafium dla Zosi Bieguszewskiej-Kochan Pewnie patrzysz teraz na nas z góry i rzeczysz: – Nie wziąć, tylko wziąć Bo Źoska, odkąd ukończyła Teatralne Studium Wymowy (w wieku 60 lat), ciągle wszystkich poprawiała. Jeszcze niedawno biegała, cała i zdrowa, między ukołanym bielańskim PKPS a ukołaną Huta – dziś ArcelorMittal. Nagle, 20 lutego rozdzwoniły się telefony na tydzień: przed jej 76. urodzinami. Ale wspominając naszą Zosie nie wolno się rozcalać, bo Ona by tego nie chciała – radosna, choć na dworze plucha, żyjąca swoim dziennikarstwem, swoim wolontariatem, swoim śpiewaniem. I była przecież z tych, o których już Horacy pisał: „Extinctum amabitur idem” (w grobie będzie przez ludzi kochany). Absolwentka Filologii Polskiej i Studium Dziennikarskiego UW była reporterką skrupulatną i pedantyczną, której to zalety są u nas na waga złota, bo chochlik nie śpi. Swego czasu, w mrokach PRL, pisało się zamiast „kryminalistów radzieckich” – „kryminalistów radzieckich”. Wredny lapsus, grożący wówczas karnym wykluczeniem z zawodu, przechytrzył wszystkie korekty, cenzury i wydawał w druku. Uratował mnie zecer, logicznie wnioskując z tekstu, że piszę o naukowcach a nie o bandżorach. Natomiast red. Zofia Bieguszewska-Kochan była bodaj jedyna ze znanych mi osób w branży, która nigdy nie musiała zamieścić sprostowania, a my mawialiśmy: Poki ków Huty. Była wśród nich Zofia Bieguszewska-Kochan. Podjęła decyzję o założeniu Stowarzyszenia Przyjaciół Huty Warszawa. Zosia została członkiem pierwszego Zarządu. Była sekretarzem poprzedniej kadencji Zarządu Oddziału PTTK przy Hucie ArcelorMittal i działaczką energetycznych związków branżowych. Współpracowała z „Nową Gazetą Praską”, gdzie powierzono jej m.in. obsługę prasową Targówka. Tam to w 2007 r. trafiła na koncert chóru założonego przez panią prezesa brodnickiego oddziału Towarzystwa Przyjaciół Warszawy. A że Bożia obdarzyła Zosie pięknym, dźwięcznym sopranem, więc przymówiła się i od razu ją do chóru przyjęto. Bywała solistką! Jako wolontariuszka bielańskiego oddziału Polskiego Komitetu Pomocy Społecznej pracowała niemal od początku jego istnienia. Przez dziesięciolecia PKPS gnieździł się w poczynku przy ul. Kasprzowicza i tonu unijnej życzności trzeba było znośić po stromych schodach. Harowały przy tym wszystkie wolontariuszki – Zosia też. Systematycznie przychodziła na diżury, rozdzielała żywność wśród podopiecznych, załatwiała ich sprawy w terenie. Rodziny stale korzystające z pomocy znala, była z nim zaprzyjaźniała; słuchała każdego, kto czuł potrzebę „wygadania się” przed kimś życzliwym. Przez dwie ostatnie kadencje była sekretarzem Zarządu bielańskiego PKPS. Dwa lata temu obie odbieraliśmy zaszczytne certyfikaty „Bielanski Wolontariusz Roku 2016”, przyznane m.in. Zosi i niżej podpisanej. Pisywała i do „Naszych Bielan” – najchętniej o sprawach Jej bli­skich: Hucie, wolontariacie… Nie zabrakło Jej tekstu w numerze wydanym na 60-lecie Huty, gdzie opi­sala pomnik wytapiacza. Sercecznie dziękuję moim informatorkom: Reginie Głuchowskiej, Ewie Karpińskiej, Ewie Tuchołskiej, Barbarze Wojciechowskiej i Krystynie Żebrowskiej, dzięki którym mogło powstać wspomnienie o Zosi. Z okazji Świąt Wielkanocnych długich lat życia w zdrowiu, dostatku i pogodzie ducha życzy Rada Seniorów Dzielnicy Bielany m.st. Warszawy Irma Wieczorkowska-Bednarek Kobieta na Piątkę imprezą na szóstkę Druga edycja biegu Kobieta na Piątkę, rozegrana na terenie Parku Młocńskiego 10 marca okazała się organizacyjnym sukcesem. Ponad 300 zawodniczek, z czego dziesiątki mieszkańców Bielan, wzięło udział w rywalizacji na pięć kilometrów. W tym biegu nie czas, a spędzienie aktywnej soboty i świętowanie Dnia Kobiet w gronie innych biegaczek, były najważniejszymi celami. Tradycyjnie w organizowanym przez Dzielnicę Bielany biegu, godzinę wcześniej na różnych dystansach rywalizowały dzieci. 100 młodych mieszkańców naszej Dzielnicy walczyło o pamiątkowe medale przy oklaskach zgromadzonych kibiców. W zmagańciach dorosłych wzięły udział biegaczki z całej Warszawy, choć dominowały mieszkańki Bielan. Biegły zarówno te zrzeszone w klubach, jak także zupełnie biegowe nowiczuski, które chciały rozpoznać swoją przygodę z większą aktywnością fizyczną. To jedna z moich ulubionych inicjatyw sportowych na Bielanach. Dopisała pogoda. Rozmawiał z uczestniczkami i widzę, że bieg zyskuje coraz większą popularność. Od lat propagujemy aktywność ruchową kobiet i przyniosły to efekty, bo zebranie trzystu zawodniczek w jednym miejscu to rzadko spotykana sytuacja. Nam się to udało. Nie ulega wątpliwości, że impreza, która rokrocznie kontynuuje w kolejnych latach – opowiedział o biegu Grzegorz Pietruszczuk, Zastępca Burmistrza, który wraz z Włodzimierzem Piatkowskiem, Zastępcą Burmistrza i radną Iwoną Walentynowicz, wręczyli uczestniczkom pamiątkowe medale, nagrody i kwiaty z okazji Dnia Kobiet. Choć nie zmagańcia sportowe i walka o czas były tutaj najważniejsze, to warto podkreślić, że pierwszej pięćdziesiąte znało się wiele zawodniczek z naszej Dzielnicy, których listę podajemy. Na podium w biegu par stanęły także dwie pary z naszej Dzielnicy. Wyniki bielańskich biegaczek w rywalizacji Kobieta na Piątkę: 2. Anna Szymańek – Naprzód Młociny / RK Athletics / Razem dla Bielan – 19,48; 5. Aneta Śliwa – Naprzód Młociny – 20,10; 10. Marta Idzikowska-Słędz – Naprzód Młociny – 21,46; 14. Joanna Cieśluk – Adidas Runners Warsaw – 22,05; 20. Magda Gramburg – Naprzód Młociny – 23,23; 22. Małgorzata Kosman – Mamy Ruszamy – 23,35; 23. Roma Kobiakla – Naprzód Młociny – 23,37; 26. Anna Michalczuk – Naprzód Młociny – 23,47; 35. Renata Tula MykMyk – 24,42; 40. Klaudia Karwińska – Razem dla Bielan – 25,00; 41. Anna Kamińska – Naprzód Młociny – 25,05; 49. Ewa Harwyłuk-Stasiak – 25,49. Wyniki bielańskich par: 2. Marta Jastrzębska-Majak – Tomasz Szewczyk – Biegaj pod Okiem Trenera – 20,53; 3. Kamila Gala – Ivo Vuco – Naprzód Młociny – 24,41. SP 369 najlepsza na Dzień Chłopaka Tradycyjnie w hali przy ulicy Przybyszewskiego rozegrano turniej koszykarski z okazji Dnia Chłopaka. W tegorocznej edycji uczestniczyły cztery szkoły, rywalizujące w kategorii młodzieży. Najlepiej poszło gospodarzem z SP 369 w Warszawie. W stawce czterech drużyn komplet wygranych odniósł SP 369 pod wodzą Łukasza Bukowskiego. W pokonanym polu koszykarze z Przybyszewskiego zostawili LO Lelewela, LO Domeyki i SP 352 z ulicy Conrad. Kończąc fazę rywalizacji obserwowali Zastępcy Burmistrza Dzielnicy – Grzegorz Pietruszczuk i Włodzimierz Piatkowski, którzy wręczyli uczestnikom pamiątkowe medale, puchary i dyplomy. – Jestem bardzo pozytywnie zaskoczony poziomem rywalizacji. Widac, że dobre wyniki w tegorocznej edycji Warszawskiej Olimpiady Młodzieży zupełnie nie były przypadkowe – skomentował Grzegorz Pietruszczuk. Zmagania toczono w formule „każdy z każdym”. I. Szkoła Podstawowa nr 369; II. Liceum Ogólnokształcące Lelewela; III Liceum Ogólnokształcące Domeyki; IV Szkoła Podstawowa nr 352. Rondo w Ratuszu Tematem ostatniego wykładu w drugiej edycji Bielańskiej Akademii Seniora było „Spotkanie z pasją – Scena dla Seniora”. Na spotkaniu, które odbyło się w bielańskim Ratuszu pod koniec ub.r. obecni byli Zastępcy Burmistrza: Grzegorz Pietruszczuk i Włodzimierz Piatkowski, a także Krystyna Żebrowska – przewodnicząca Rady Seniorów. Na sceny wyszli sędziwi artyści z Bielan – pasjonaci, dzieląc się z przyjaciółmi swoimi talentami śpiewackimi, oratoryjnymi, tanecznymi oraz barwnymi przeżyciami. Wielu artystów było uczestnikami akademii. Grono odważnych wzbudzało żywe zainteresowanie, co skutkowało gromkimi oklaskami. Gość programu – Grupa Rondo – pod przewodnictwem Ewy Czarneckiej-Stanisławskiej zatańczyła oryginalne układy: Parostek, Mambo, Rumba i Slow fox. Twórczyny grupy i choreografii jest absolwentką Państwowej Szkoły Baletowej i Akademii Wychowania Fizycznego Józefa Pilсудskiego w Warszawie. Jest ekspertem w pracy z osobami niepełnosprawnymi, dziećmi, młodzieżą i dorosłymi w wielu ośrodkach. Założyła rodzinę Szkołę tańca „Happy Dance Studio”. Grupa Rondo będzie obchodziła wkrótce benefis działalności. W konkursach tanecznych zdobywały nagrody. Kolejne zaproszenie do wystąpienia wspólnie z Seniorami Akademii było wyrazem uznania dla efektów pracy Pani Ewy i Grupy Rondo. Malgorzata Borowska Naszej Drogiej Koleżance Ani Uzdowskiej-Gacek wyraży głębokiego współczucia z powodu śmierci Ojca składają koleżanki i koledzy z CRS Bielany Lelewel i Staszic zwyciężają w siatkówce XLI LO im. J. Lelewela w zmagańach dziewcząt i Zespół Szkół numer 10 S. Staszica w rywalizacji chłopców, okazały się najlepszymi drużynami w tegorocznych Mistrzostwach Dzielnicy Bielany w siatkówce. Obie szkoły będą reprezentowały Bielany w rozgrywkach Warszawskiej Olimpiady Młodzieży. Dużo większe emocje, jeśli chodzi o zaciętość, przyniosły zmagań siatkarek. Tutaj w finale bardzo zacięty mecz stoczyły drużyny gospodyń i zarówno zwyciężczy turniej, z zespołem LO im. gen. S. Maczka. Mecz zakończył się w tie-breaku niewysokim zwycięstwem szkoły z Kiwerskiej. Brązowy medal wywalczyły siatkarki ZS nr 35, które pokonały w decydującej konfrontacji CXXII LO im. I. Domeyki. Turniej finałowy WOM dziewcząt odbędzie się właśnie w Lelewelu, więc wszyscy liczą na dobre występy zawodniczek z Kiwerskiej we własnej szkole. Rywalizacja chłopaków zdominowali uczniowie Staszica, którzy górowali nad przeciwnikami, pewnie w finale pokonując CXXII LO im. I. Domeyki. Brązowy medal po bardzo zaciętej konfrontacji powródził do uczniów LIX LO im. J. Kusocińskiego, którzy wygrali z XLI LO im. J. Lelewela. – Doszły do mnie słuchy, że poziom tegorocznej rywalizacji licew w siatkówce stał na wysokim poziomie. Bardzo się cieszę. Mam dla licelistów dobrą informację. Od nowego roku szkolnego uruchamiamy rozgrywki ligi siatkówki dla liceów. Zgłaszano zapotrzebowanie na takie rozgrywki i postanowiliśmy się przychylić do sugestii pływących do nas od nauczycieli i uczniów. Wracając do WOM, życzę złotym medalistom zmagań dziewcząt i chłopców powodzenia – relacjonuje Grzegorz Pietruczuk, Zastępca Burmistrza Dzielnicy. Podium rywalizacji dziewcząt: 1. XLI LO im. J. Lelewela, 2. CXXII LO im. gen. S. Maczka, 3. ZS nr 35 im. Z. Jaroszewicz, „Kasi”. Podium rywalizacji chłopców: 1. ZS nr 10 im. S. Staszica, 2. CXXII LO im. I. Domeyki, 3. LIX LO im. J. Kusocińskiego. IV Otwarte Mistrzostwa Polski w Piłce Siatkowej Klubów Amatorskich To był weekend pełen sportowych emocji. W hali CRS Bielany przy ul. S. Lindego 20 w dniach 10 i 11 marca br. odbyły się IV Otwarte Mistrzostwa Polski w Piłce Siatkowej Klubów Amatorskich. Rywalizacja była zacięta do ostatniego seta. To największa tego typu impreza sportowa w Polsce i Europie. Co roku przyciąga wielką liczbę amatorów siatkówki. W tegorocznej edycji walczyły aż 72 zespoły. Nagrody dla najlepszych drużyn wręczyli m.in. Zastępca Burmistrza Dzielnicy Bielany Magdalena Lerczak oraz bielański Radny Daniel Pieniek. Wszystkim uczestnikom składamy serdeczne gratulacje! Redakcja Poczwórna wygrana pływaków SP 263 Anna Szymaczak-Galkowska – dyrektor CRS, Grzegorz Pietruczuk – Zastępca Burmistrza i Elżbieta Iglewiska-Romanowska – kierownik ZSR Kolejnymi zawodami w ramach eliminacji Warszawskiej Olimpiady Młodzieży w tym roku szkolnym była rywalizacja o Mistrzostwo Dzielnicy Bielany w pływaniu. Szkoła Podstawowa nr 263 przy ul. Szegedzynskiej udowodniła podczas zmagań na basenie CRS Bielany, że w tej konkurencji nie ma sobie równych. Uczniowie tej szkoły wygrali we wszystkich kategoriach. Wszystkich uczestników zawodów powitał na otwarciu Zastępca Burmistrza Dzielnicy – Grzegorz Pietruczuk. – Cieszę się ogromnie ze stałej, dużej frekwencji na zawodach. Pływanie to duma Dzielnicy Bielany i wierzę, że widzimy dziś na pływalni przy Lindego przyszłych mistrzów, także olimpijskim. Życzę powodzenia i poprawienia rekordów wszystkim młodym pływaczkom i pływakom – powiedział Grzegorz Pietruczuk przed rozpoczęciem zmagań. W rywalizacji dziewcząt i chłopców szkół podstawowych ekipa z Szegedzynskiej wygrała wszystkie 18 konkurencji. W niektórych przewaga była ogromna, innych symboliczna, jednak to warte podkreślenia, że przeciwnicy w żadnej konkurencji nie okazali się lepsi. Za plecami SP 263 toczyła się bardzo ciekawa walka o medale. W zmagańach dziewcząt i chłopców obie szkoły zamieniły się miejscami. Pierwsze piątki rywalizacji szkół podstawowych: Dziewczęta: 1. SP 263 – 333,40; 2. SSP 13 – 431,43; 3. SP 80 – 438,33; 4. SP 293 – 454,89; 5. SP 209 – 497,82. Chłopcy: 1. SP 263 – 322,18; 2. SP 80 – 430,78; 3. SSP 13 – 449,87; 4. SP 209 – 452,11; 5. SP 53 – 514,00. W zmagańach dziewcząt i chłopców wystartowało po 10 szkół. Nieco bardziej wyrównana była rywalizacja młodzieży, co obrazowały mniejsze różnice czasowe między zwyciężcami, a resztą stawki. I tutaj jednak dominacja drużyny z Szegedzynskiej była widoczna. Dziewczęta: 1. SP 263 – 281,53; 2. LO im. J. Kusocińskiego – 332,34; 3. SP 369 – 334,10; 4. LO im. J. Lelewela – 349,71; 5. SP 100 STO – 357,56. Chłopcy: 1. SP 263 – 265,32; 2. LO im. Lelewela – 305,41; 3. SSP 13 – 305,78; 4. SP 100 STO – 311,92; 5. LO im. J. Kusocińskiego – 322,17. Bielańska krzyżówka Witamy Czytelników w kolejnej krzyżówce z dzielnicowym hasłem w tle. Aby ją rozwiązać, należy wpisać prawidłowe odpowiedzi w poziomych kratkach. Litery zielonego pola utworzą hasło. Prosimy je podać, dzwoniąc do redakcji pod numer telefonu: (22) 373 33 17 lub wysłać e-mail na adres: email@example.com. Zawsze wygrywa pierwszych pięć osób, które dobrze odpowiedzą. Na zwycięzców czekają nagrody, którymi są książki pt.: „Bielany – Przewodnik historyczny” varsavianisty Jarosława Zielińskiego i „Bielanski wehikuł czasu” Marty Dobrowolskiej-Kierył z ilustracjami Agnieszki Korfanty. Prawidłowe hasło krzyżówki z poprzedniego numeru brzmiało: Biegany na Chomiczówce. Nagrody otrzymują: Alicja Giera, Anna Kopf, Jolanta Ostalska, Eugeniusz Pawłowski, Robert Plaska. Gratulujemy i zapraszamy do siedziby redakcji po odbiór książek. Czas na dzisiejsze pytania. Kategoria – najslynniejsze polskie seriale dla dzieci, młodzieży i dorosłych. Podajemy fragment tytułu, a zadaniem Czytelników jest jego uzupełnienie w krzyżówce. Imiona i nazwiska zwycięzców podamy w kwietniowej edycji gazety. Redakcja 1. Przygody kota ... 2. ... na Tolku Banana 3. Pan Samochodzik i ... 4. Podróż za jeden ... 5. Niewiarygodne przygody Marka ... 6. ... pancerni i pies 7. ... życzeń 8. Wojna ... 9. Stawka większa niż ... 10. ... 4 11. ... chmury 12. ... i Lolek 13. ... drogi 14. Kapitan Sowa na ... 15. ... Majki Skowron 16. ... z łachami 17. Przygody Michała 18. ... od szasy 19. Przygody psa ... 20. ... Cosel Konkurs „5” z BIELAN Przed nami kolejny konkurs ze znajomości naszej pięknej dzielnicy. Wystarczy spojrzeć na zdjęcie i prawidłowo udzielić odpowiedzi na zadane przez nas pytanie: jak nazywa się ulica widoczna na zdjęciu? W konkursie „5 z Bielan” zwyciężą pierwszych pięć osób, które prawidłowo rozszyfrują naszą zagadkę. Z właściwą odpowiedzią prosimy zadzwonić pod redakcyjny numer telefonu: (22) 373 33 17 lub wysłać e-mail na adres: firstname.lastname@example.org. Na zwycięzców czeka książka pt.: „Bielany. Przewodnik historyczny” – varsavianisty Jarosława Zielińskiego. Imiona i nazwiska laureatów opublikujemy w kwietniowym numerze „NB”. Podajemy rozwiązanie „5 z Bielan” i listę zwycięzców z poprzedniego wydania gazety. Prawidłowa odpowiedź to: Bieg o Puchar Bielan / Bieg Chomiczówki. Jako pierwsze dobrze rozwiązały naszą zagadkę następujące osoby: Mirosława Damieszko, Marzena Plaska, Arkadiusz Sokalski. Gratulujemy wiedzy o naszej dzielnicy i zapraszamy do redakcji po odbiór nagrody. „Piątka” ze znajomości Bielan. „Piątka” z Bielan wygrała! Redakcja Konkurs szachowy W poprzednim numerze pokazaliśmy dwa pierwsze zadania szachowe. Autorem tych zadań jest Samuel Loyd, żyjący w latach 1841–1911, amerykański wynalazca gier i specjalista od zagadek, chyba najwybitniejszy i najbardziej znany problemista tego stulecia. Najlepszych i najszybszych (5 osób) czekają nagrody książkowe: „Bielany – Przewodnik historyczny” Jarosława Zielińskiego i „Bielanski wehikuł czasu” – Marty Dobrowolskiej-Kierył z ilustracjami Anny Batte. Wygrają pierwszych pięcio dzieci. Listę zwycięzców opublikujemy w kwietniowym wydaniu „Naszych Bielan”. Podajemy rozwiązanie konkursu „3 po 3” z poprzedniego numeru gazety. Na prawidłowo sklejonych 9 fragmentach znajdowała się sympatyczna sikorka skubiąca pyszną słoninkę. Oto lista laureatów: Bartosz Jedynak, Varvara Marinenka, Marta Ostalska. Gratulujemy i zapraszamy serdecznie (pokój 317) po odbiór nagrody. Redakcja 3 po 3. Konkurs dla dzieci Serdecznie witamy najmłodszych Czytelników „Naszych Bielan” w marcowym konkursie na bryskość oka i manualną zręczność rąk. Należy wyciąć dziewięć kwadrackich ze zdjęcia umieszczonego obok, ułożyć w prawidłowej kolejności i nakleić na kartonik. Całość należy przefotografować aparatem cyfrowym / telefonem komórkowym i wysłać na adres e-mail: email@example.com lub przynieść do redakcji. Nagrodą jest książka: „Legendy warszawskie” – Marty Dobrowolskiej-Kierył z ilustracjami Anny Batte. Wygrają pierwszych pięcio dzieci. Listę zwycięzców opublikujemy w kwietniowym wydaniu „Naszych Bielan”. Podajemy rozwiązanie konkursu „3 po 3” z poprzedniego numeru gazety. Na prawidłowo sklejonych 9 fragmentach znajdowała się symatyczna sikorka skubiąca pyszną słoninkę. Oto lista laureatów: Bartosz Jedynak, Varvara Marinenka, Marta Ostalska. Gratulujemy i zapraszamy serdecznie (pokój 317) po odbiór nagrody. Redakcja ABC bielańskiej święconki Wielkimi krokami nadchodzi Wielkanoc oraz „lany poniedziałek”. W bielańskich domach trwają ostatnie przygotowania: sprzątanie, kupno i święcenie palemek, nabycie niezbędnych wiktualii itd. Integrальna część wspomnianych świąt jest oczywiście święconka. Przyjrzymy się jej zawartości oraz symbolice, którą w sobie zawiera. Gdyż posiada walor religijno-ethnograficzny. Zatem... W Wielką Sobotę poświęcimy pięknie ozdobiony koszyczek z pokarmami na stół wielkanocny. Stąd pochodzi właśnie nazwa – święconka. Oto ona: 1. KOSZYCZEK. Zdecydowanie tradycyjny – wiklinowy, okrągły, bądź owalny. Wykładamy go białą serwetkę i składamy pokarmy do poświęcenia. Należy go ozdobić bukszpanem, baziarnią i wiosennymi kwiatami: żonkiliami lub tulipanami. Zieleń budzi w nas nadzieję. Można też włożyć kurczaczka – symbol rodzącego się życia oraz zajączka – radość z nadejścia wiosny, jak również znak czułości. Zajrzymy więc do środka. 2. BARANEK. Najlepiej tradycyjny, zrobiony z cukru. Może być także baranek upieczonej z ciasta. Dawniej robiono go z mąki (wyścielności w drewnianej formie), a także wosku. Nie zaleca się plastikowego ze względów oczyszczonych. Baranek w święconce ma szczególne znaczenie; symbolizuje Zmartwychwstałego Jezusa, łagodność i pokój. Zwyczas poświęcenia baranka sięga VII wieku. Ustanowienie go na stole wprowadził w XIV wieku papież Urban V. W Polsce wielkanocnego baranka nazywano Ağruszkiem (lac. Agnus Dei – Baranek Boży – Chrystus) i pojawił się w XVII w. Stojąc na wielkanocnym stole baranek uzmysławia nam że Jezus umarł na krzyżu, a następnie Zmartwychwstał, by odkupić nasze grzechy. 3. CHLEB. Do święconki wkładamy kilka kromek, przylepke lub specjalnie pieczone na tę okazję mały bochenek. W Eucharystii chleb wyraża Ciało Pana, które jest pokarmem naszych dusz. Chleb traktowany jest jako szczególny dar Boży. Symbolizuje codzienne potrzeby: spokojne życie, dobrobyt, bezpieczeństwo i tradycyjną, staropolską gościnność. W Polsce od zawsze wpajano poznawanie do chleba, by go nie marnować. „Do kraju tego, gdzie kruszycy chleba podnoszą z ziemi przez uszanowanie dla darów Nieba…” – Cyprian Kamil Norwid. 4. JAJKO. Jajo jest ważną częścią święconki, a także stolów wielkanocnych. Symbolizuje płodność, żywoność, odradzanie życia, zwycięstwa nad śmiercią, ciągłość istnienia. Na Wielkanoc występuje również w postaci pisanki, krasnake i drapanek: farbowanych, malowanych, zdobionych we wzory. Dzielenie się jajkiem oraz składanie życzeń służy odnowieniu i umacnianiu więzi rodzinnych oraz sąsiadzkich. Wyrasa intencję zgody, wzajemnego zrozumienia, wzmacnia poczucie wspólnoty, siły i jedności. 5. WĘDLINA. W święconce wedlinę symbolizuje płodność, dostatek i zamożność naszej rodziny. W świątecznym koszyku mogą być rozmaita gatunki. Najpopularniejszą wśród białaczynków (i nie tylko) jest kawałek kiełbasy. Po nadto w święconkach pojawia się szynka, polędwica, boczek lub słonina. Nie należy zbytnio przesadzać z ilością czy wielkością wedlin, gdyż nie starczy miejsca na inne niezbędne pokarmy. 6. SÓL, PIEPRZ, CHRZAN. Obecność tych składników w święconce ma również wymiar symboliczny: chrzescijanie są „sóła” na swej ziemi ojczyźnie. Sól nie tylko dodaje stosownego smaku potrawom, ale jest niezbędnym do życia składnikiem mineralnym i naturalnym konserwantem żywności. Symbolizuje ochronę człowieka przed zepsuciem (moralnym), prostotę życia, dar oczyśćczania i prawdy. W tradycji ludowej chleb i sól wyrażają nie tylko skromność, ale poczucie bezpieczeństwa i gościnności. Wita się nimi na progu domu gości, a także młodzieńców. Pieprz czarny oznacza gorzcy zioł, które Żydzi dodawali do sosu, macając w nim kawałki mięsa paschalnego baranka. Chrzan w święconce może występować w postaci całego korzenia, ewentualnie uarty. Symbolizuje krzepkie, zdrowe, rzeszkość oraz witalność. 7. SER. W naszej święconcie wielkanocnej jego obecność jest niezbędna. Może to być zarówno ser żółty, ser twarogowy czy wreszcie osypek. Ser symbolizuje odwieczną więź człowieka z otaczającą go naturą (mleko od przydomowych zwierząt) jak również wszelką zdrowotność zarówno dla nas jak i naszej przydomowej hodowli. 8. CIASTO. Najczęściej spotykany ciastem w koszyczku ze święconką jest babka wielkanocna. To tradycyjne ciasto drożdżowe o charakterystycznym, stożkowym kształcie, polane lukrem lub posypane cukrem pudrem. Inne typowe ciasto wielkanocne to mazurek. Ślodzi, na kruchym spodzie, z masą orzechowa czy migdałowa, pokryty lukrowaną polewą i udekorowany bakaliami. W święconce może być też makowiec czy staropolski piernek na miodzie z kozernymi przyprawami. Ciasto wśród poswięconych pokarmów symbolizuje umiejętność dbania o nasze domowe ognisko, wszelki dobrobyt oraz radość życia. Alleluja! Życzę pięknych święconek Leszek Rudnicki | Okręg nr I | Imię i nazwisko | Funkcje | Miejsce dyżuru | Data i godzina | |-----------|-----------------|---------|---------------|----------------| | Teresa Renata Banasiak – PO | Wiceprzewodnicząca Komisji Mieszkaniowej; członek Komisji Kultury, Sportu i Promocji; Komisji Zdrowia, Rodziny i Pomocy Społecznej; Komisji Bezpieczeństwa i Porządku Publicznego | Siedziba Klubu Kultury „Barka”, ul. Klaudyny 18. Urząd Dzielnicy Bielany V p., pok. 513 ul. Żeromskiego 29. | 5 kwietnia, g. 18.00-19.00. 25 kwietnia, g. 18.00-19.00. | | Stefan Kulesza – PiS | Przewodniczący Komisji Rewizyjnej; Wiceprzewodniczący Komisji Budżetu i Inwestycji; członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska oraz Komisji Bezpieczeństwa i Porządku Publicznego | Urząd Dzielnicy Bielany V p., pok. 513 ul. Żeromskiego 29. | 16 kwietnia, g. 17.30-18.30 Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. Kontakt telefoniczny: tel. 507 699 046, firstname.lastname@example.org | | Daniel Pieniek – PO | Przewodniczący Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska; Wiceprzewodniczący Komisji Kultury, Sportu i Promocji; członek Komisji Oświaty, Komisji Zdrowia, Rodziny i Pomocy Społecznej oraz Komisji Samorządowej i Dialogu Społecznego | Urząd Dzielnicy Bielany V p., pok. 508 ul. Żeromskiego 29 – w ramach dyżuru Wiceprzewodniczącej Rady w drugi poniedziałek miesiąca. Zapisy w Sekretariacie Rady. | g. 15.00-17.00 | | Małgorzata Poręba – PO | Wiceprzewodniczacz Rady, członek Komisji Budżetu i Inwestycji; Komisji Oświaty oraz Komisji Zdrowia, Rodziny i Pomocy Społecznej oraz Komisji Mieszkaniowej | Urząd Dzielnicy Bielany V p., pok. 508 ul. Żeromskiego 29 – w ramach dyżuru Wiceprzewodniczącej Rady w czwartý poniedziałek miesiąca. Zapisy w Sekretariacie Rady. | g. 16.30-18.00 | | Jan Zaniewski – PiS | Wiceprzewodniczacy Rady, członek Komisji Budżetu i Inwestycji; Członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany I p., pok. 179 ul. Żeromskiego 29. | 3, 17 kwietnia, g. 16.00-17.00 Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Wojciech Borkowski – PO | Przewodniczący Komisji Zdrowia, Rodziny i Pomocy Społecznej; członek Komisji Budżetu i Inwestycji; członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany I p., pok. 179 ul. Żeromskiego 29. | 10 kwietnia, g. 13.00-14.00 | | Emilia Katarzyna Romanik – PiS | Członek Komisji Rewizyjnej i Komisji Mieszkaniowej, Komisji Oświaty oraz Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska oraz Komisji Kultury, Sportu i Promocji | Biblioteka Publiczna, ul. Romaszewskiego 19 (dawna Duracza), i piętro sala konferencyjna Urząd Dzielnicy Bielany I p., pok. 179, ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. e-mail email@example.com | | Natalia Krupa – PO | Członek Komisji Rewizyjnej i Komisji Mieszkaniowej, Komisji Oświaty oraz Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany V p., pok. 513, ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Szczepan Szczepański – PO | Członek Komisji Zdrowia, Rodziny i Pomocy Społecznej; Komisji Kultury, Sportu i Promocji oraz Komisji Bezpieczeństwa i Porządku Publicznego | Przychodnia Medyczny Rodzinne AWF, ul. Manymonka 34, pok. 26. | 5 kwietnia, g. 18.00-19.00. 26 kwietnia, g. 18.00-19.00. | | Ryszard Zakrzewski – PiS | Członek Komisji Mieszkaniowej, Komisji Oświaty oraz Komisji Samorządowej i Dialogu Społecznego | Urząd Dzielnicy Bielany I p., pok. 179, ul. Żeromskiego 29. Biblioteka Publiczna, ul. Romaszewskiego 19 (dawna Duracza) | 16 kwietnia, g. 19.00-20.00. | | Maciej Chmielowski – PO | Przewodniczący Komisji Budżetu i Inwestycji; członek Komisji Rewizyjnej i Komisji Oświaty | Urząd Dzielnicy Bielany, ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Tomasz Maciej Herbich – PiS | Przewodniczący Komisji Mieszkaniowej; członek Komisji Budżetu i Inwestycji; członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany I p., pok. 179, ul. Żeromskiego 29. | 4 kwietnia, g. 16.15-17.30. | | Anna Neska – PO | Wiceprzewodnicząca Komisji Rewizyjnej; członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska; Komisji Samorządowej i Dialogu Społecznego oraz Komisji Bezpieczeństwa i Porządku Publicznego | Urząd Dzielnicy Bielany, ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Ilona Popławska – PO | Przewodnicząca Komisji Oświaty; Wiceprzewodnicząca Komisji Zdrowia, Rodziny i Pomocy Społecznej; członek Komisji Kultury, Sportu i Promocji oraz Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany I p., pok. 179, ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Sławomir Umński – PiS | Wiceprzewodniczący Komisji Samorządowej i Dialogu Społecznego | Klub WSM „Chomiczówka”, ul. Pabla Nerudy 1. | g. 17.00-18.00 Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Anna Czarnecka – Niezrzeszona | Wiceprzewodnicząca Rady, e-mail: firstname.lastname@example.org, Członek Komisji Zdrowia, Rodziny i Pomocy Społecznej oraz Komisji Samorządowej i Dialogu Społecznego | Urząd Dzielnicy Bielany V p., pok. 508 ul. Żeromskiego 29 – w ramach dyżuru Wiceprzewodniczącego Rady w trzeci poniedziałek miesiąca – zapisy w Sekretariacie Rady. Klub Seniora „Pod Zdrojkami”, ul. Wrzosciano 10c. | g. 16.15-17.30. | | Magda Oleś – PO | Członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska; Komisji Bezpieczeństwa i Porządku Publicznego oraz członek Wiceprzewodniczącej Komisji Kultury, Sportu i Promocji | Urząd Dzielnicy Bielany, ul. Żeromskiego 29. | 4 kwietnia, g. 18.00-19.00 Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Jakub Jan Roszkowski – PiS | Członek Komisji Rewizyjnej oraz Komisji Kultury, Sportu i Promocji | Urząd Dzielnicy Bielany I p., pok. 179 ul. Żeromskiego 29. | g. 17.00-18.00 Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Piotr Cezary Śliński – PO | Wiceprzewodniczący i Komisji Bezpieczeństwa i Porządku Publicznego; członek Komisji Kultury, Sportu i Promocji oraz Komisji Samorządowej i Dialogu Społecznego | Urząd Dzielnicy Bielany V p., pok. 513 ul. Żeromskiego 29, e-mail: email@example.com. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Michał Świderski – PiS | Członek Komisji Samorządowej i Dialogu Społecznego; Komisji Bezpieczeństwa i Porządku Publicznego oraz Komisji Oświaty | Siedziba PiS, ul. Kasprzowica 81/85. | g. 15.40-16.20 Po wcześniejszym uzgodnieniu w Sekretariacie Rady, tel. 22 373 35 10. | | Joanna Radziejewska – PO | Przewodnicząca Komisji Samorządowej i Dialogu Społecznego; członek Komisji Budżetu i Inwestycji oraz Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Urząd Dzielnicy Bielany V p., pok. 513 ul. Żeromskiego 29. | Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Łukasz Jan Świderski – PiS | Przewodniczący i Komisji Bezpieczeństwa i Porządku Publicznego; członek Komisji Budżetu i Inwestycji oraz Komisji Zdrowia, Rodziny i Pomocy Społecznej oraz Komisji Mieszkaniowej | Bielański Ośrodek Kultury, ul. Goldoniego 1. | 3 kwietnia, g. 17.30-18.30 Po wcześniejszym uzgodnieniu w Sekretariacie Rady, tel. 22 373 35 10. | | Joanna Tomaszewska – PiS | Członek Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska oraz Komisji Samorządowej i Dialogu Społecznego | Urząd Dzielnicy Bielany V p., pok. 513 ul. Żeromskiego 29. | 2 kwietnia, g. 17.30-18.30 | | Iwona Walentynowicz – Niezrzeszona | Wiceprzewodnicząca Komisji Oświaty; członek Komisji Rewizyjnej; Komisji Mieszkaniowej i Wiceprzewodnicząca Komisji Architektury, Planowania Przestrzennego i Ochrony Środowiska | Filia Bielańskiego Ośrodka Kultury, ul. Estrady 112, e-mail: firstname.lastname@example.org, tel. 512 437 876. | 9 kwietnia, g. 14.30-16.00. Po wcześniejszym ustaleniu terminu spotkania w Sekretariacie Rady, tel. 22 373 35 10. | | Robert Wróbel – PO | Przewodniczący Rady, Członek Komisji Budżetu i Inwestycji; Komisji Kultury, Sportu i Promocji oraz Komisji Bezpieczeństwa i Porządku Publicznego | Urząd Dzielnicy Bielany V p., pok. 509, ul. Żeromskiego 29 – w ramach dyżuru Przewodniczącego Rady w pierwszy poniedziałek miesiąca. Zapisy w Sekretariacie Rady. | g. 16.00-17.00. |
fd7aab62-195c-4b91-829f-33e982dbd1bf
HuggingFaceFW/finepdfs/tree/main/data/pol_Latn/train
finepdfs
pol_Latn
99,362
Obec Smilno, Smilno 194 Uznesenie z 12. zasadnutia Obecného zastupiteľstva zo dňa 17.12.2020 Obecné zastupiteľstvo obce Smilno na svojom zasadnutí po prerokovaní v súlade s §11 zákona 369/1990 Zb. o obecnom zriadení v z. n. p. a § 10 a 14 zákona č. 583/2004 Z. z. o rozpočtových pravidlách územnej samosprávy: A - s ch v a ľ u j e A-12.1/2020 Program jednania 12. zasadnutia Obecného zastupiteľstva v Smilne. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.2/2020 Rozpočtové opatrenie obce č. 4 v súlade s § 14 ods. 2 písm. a) zákona č. 583/2004 Z.z. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.3/2020 Rozpočtové opatrenie obce č. 5 v súlade s § 14 ods. 2 písm. b) a c) zákona č. 583/2004 Z.z. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.4/2020 Rozpočtové opatrenie obce č. 6 v súlade s § 14 ods. 2 písm. d) zákona č. 583/2004 Z.z. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.5/2020 Rozpočtové opatrenie obce č. 7 v súlade s § 14 ods. 2 písm. b) a c) zákona č. 583/2004 Z.z. týkajúce sa príjmov a výdavkov ZŠ s MŠ Smilno. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.6/2020 Dodatok č. 1 k VZN č. 1/2018 o výške príspevku na pobyt dieťaťa v MŠ so zjednotením poplatku za dieťa na 6,-- EUR/mes. Hlasovanie: Za 5 ((Tomik, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti Zdržal sa 1 (Ing. Barna) 0 A-12.7/2020 Návrh VZN č. 1/2020 o určení výšky finančných príspevkov na mzdy a prevádzku MŠ a školských zariadení na území obce Smilno. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.8/2020 Finančnú dotáciu z rozpočtu obce Smilno na rok 2021 pre DHZ Smilno vo výške 1 000,-- eur. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.9/2020 Finančnú dotáciu z rozpočtu obce Smilno na rok 2021 pre OŠK Smilno vo výške 4 200,-- eur. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.10/2020 Finančnú dotáciu z rozpočtu obce Smilno na rok 2021 pre ZO JDS Smilno vo výške 1 200,-- eur. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.11/2020 Rozpočet obce Smilno na rok 2021. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.12/2020 Zámer obce Smilno vymeniť časti pozemku LV 687 - parcela CKN 636/1, parcela 392 za časť pozemku LV 20 - parcela CKN 393. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 A-12.13/2020 OZ schvaľuje preplatenie nevyčerpanej dovolenky za rok 2019 počte 5 dní starostovi obce Smilno. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B–berie na vedomie B-12.1/2020 Kontrolu uznesení z 11. zasadnutia OZ konaného 16.10.2020. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.2/2020 Stanovisko hlavného kontrolóra obce k návrhu rozpočtu obce Smilno na roky 2021 – 2023. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.3/2020 Rozpočet obce Smilno na roky 2022-2023. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.4/2020 Správu z finančnej kontroly na mieste vykonanú hlavným kontrolórom obce za II. polrok 2020 Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.5/2020 Plán kontrolnej činnosti hlavného kontrolóra na I. polrok 2021 Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.6/2020 Prevzatie pozemkov CKN parc. 404/2 a 404/3 z majetku SR do majetku obce Smilno. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.7/2020 Správu z auditu účtovnej závierky obce Smilno za rok 2019 Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 B-12.8/2020 Príkaz starostu obce Smilno na vykonanie Inventarizácie majetku a záväzkov a rozdielu majetku a záväzkov obce Smilno za rok 2019 Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 OZ p o v e r u j e P-12.1/2020 Hlavného kontrolóra obce vykonaním kontrol v I. polroku 2020 podľa predloženého Plánu kontrolnej činnosti hlavného kontrolóra na I. polrok 2020. Hlasovanie: Za 6 ((Tomik, Ing. Barna, Mgr. Dujčáková, Kravčík, Lukáč, Velička) Proti 0 Zdržal sa 0 V Smilne dňa 17.12.2020 Bc. Vladimír Baran v.r. starosta obce
<urn:uuid:7cc658b8-ae59-4613-9c48-4aa3b0793fe8>
HuggingFaceFW/finepdfs/tree/main/data/slk_Latn/train
finepdfs
slk_Latn
5,119
1 / 3 MPAL4002/1 / MPAR4002/1 Innovasjonsteori Emnekode: MPAL4002/1 / MPAR4002/1 Studiepoeng: 10 Semester Høst Språk Norsk Krav til forkunnskaper Anbefalt: Offentlig politikk og organisasjon Læringsutbytte Ved bestått emne har studenten oppnådd følgende læringsutbytte: Kunnskap Studenten har avansert kunnskap innenfor fagområdet innovasjonsteori har spesialisert innsikt i sammenhengen mellom innovasjon, offentlig sektors- og innovasjonspolitikkens rolle har spesialisert innsikt i sentrale teoretiske perspektiver, viktige metodologiske aspekter og empiriske forskningsresultater Ferdigheter Studenten kan formulere problemstillinger samt har faglige forutsetninger for å gjennomføre et FoU-arbeid på mastergradsnivå kan kommunisere om faglige problemstillinger om innovasjon i tjenesteyting både med spesialister og allmennheten kan bidra til nytenking om og i innovasjonsprosesser Generell kompetanse Studenten har kompetanse til å analysere eksisterende teorier, metoder og fortolkninger innenfor fagområdet kan arbeide selvstendig med en vitenskapelig problemløsning kan analysere innovasjon med utgangspunkt i fagområdets teori historie, og plass i samfunnet Innhold Innovasjonsteori Skille mellom innovasjon fra andre former for utvikling og endring. Innovasjoner i forhold til graden av nyskaping og samfunnsforandrende kraft. Forholdet mellom innovasjon og økonomisk, kulturell og sosial utvikling. Spredning og adposjon av innovsajoner Forholdet mellom individ (entreprenør), system og struktur ulike tilnærminger til innovasjonssystemer ulikheter i innovasjonstakt (region, nasjon), relaterer til likheter og ulikheter i innovasjonspolitikk og andre mulige kontekstuelle forklaringer (kulturelle, sosiale, økonomiske). Innovasjon i organisasjoner (bedrifter, ideelle organisasjoner og ulike offentlige organisasjoner), teorier om åpen eller lukket innovasjon medarbeider- og kundedrevet innovasjon innovasjon gjennom nyetableringer versus innovasjon i eksisterende bedrifter og organisasjoner Arbeids- og undervisningsformer Undervisningen er lagt opp som forelesninger og seminarer med aktiv studentdeltakelse. For øvrig oppfordres studentene til å danne kollokviegrupper for å arbeide med stoffet og oppgaver i mellom samlingene. Obligatoriske krav som må være godkjent før eksamen kan avlegges 2 / 3 Frammøte på 67% av underviste timer i emnet Studentene skal i løpet av emnet presentere fagstoff på seminarer og skriftlige arbeidskrav som det arbeides med mellom samlingene. Ytterligere informasjon om disse kravene gis ved emnets oppstart. Eksamen 4 timers individuell skoleeksamen. Prestasjonen vurderes fra A-F, der E er laveste ståkarakter. Tillatte hjelpemidler til eksamen Ingen. Ansvarlig fakultet Handelshøgskolen Innlandet - Fakultet for økonomi og samfunnsvitenskap 3 / 3
<urn:uuid:af2b2d6f-3d6b-4547-bdaa-f2b2b916364c>
HuggingFaceFW/finepdfs/tree/main/data/nob_Latn/train
finepdfs
nob_Latn
2,834
Fourth Quarter 2021 Financial Results March 10, 2022 Agenda and Speakers Ken Reali Chief Executive Officer Q4 2021 Review 2022 Priorities Dave Crawford Vice President Investor Relations and Treasurer Q4 2021 Results 2022 Guidance Forward Looking Statements and Non-GAAP Financial Measures Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All statements contained in this presentation that do not relate to matters of historical fact should be considered forward-looking statements, including, without limitation, statements concerning our industry, competitive position and the markets in which Bioventus Inc. operates; business strategy, position and operations; expected sales trends, opportunities and growth; the ongoing COVID-19 pandemic; the expected benefits and impact of Bioventus' products, including in certain regions, and biologic drug candidates; and benefits of the Bioness and Misonix acquisitions. In some cases, you can identify forward-looking statements by terminology such as "aim," "anticipate," "assume," "believe," "contemplate," "continue," "could," "due," "estimate," "expect," "goal," "intend," "may," "objective," "plan," "predict," "potential," "positioned," "seek," "should," "target," "will," "would" and other similar expressions that are predictions of or indicate future events and future trends, or the negative of these terms or other comparable terminology, although not all forward-looking statements contain these words. Forward-looking statements are inherently subject to risks and uncertainties, some of which cannot be predicted or quantified. Important factors that could cause actual results to differ materially from those contemplated in this presentation include, but are not limited to, statements about the adverse impacts on our business as a result of the COVID-19 pandemic; our dependence on a limited number of products; our ability to develop, acquire and commercialize new products, line extensions or expanded indications; the continued and future acceptance of our existing portfolio of products and any new products, line extensions or expanded indications by physicians, patients, third-party payers and others in the medical community; our ability to differentiate the hyaluronic acid ("HA") viscosupplementation therapies we own or distribute from alternative therapies for the treatment of osteoarthritic; the proposed down-classification of non-invasive bone growth stimulators, including our Exogen system, by the FDA; our ability to achieve and maintain adequate levels of coverage and/or reimbursement for our products, the procedures using our products, or any future products we may seek to commercialize; our ability to complete acquisitions or successfully integrate new businesses, products or technologies in a cost-effective and non-disruptive manner; competition against other companies; the negative impact on our ability to market our HA products due to the reclassification of HA products from medical devices to drugs in the United States by the FDA; our ability to attract, retain and motivate our senior management and qualified personnel; our ability to continue to research, develop and manufacture our products if our facilities are damaged or become inoperable; failure to comply with the extensive government regulations related to our products and operations; enforcement actions if we engage in improper claims submission practices or in improper marketing or promotion of our products; the FDA regulatory process and our ability to obtain and maintain required regulatory clearances and approvals; failure to comply with the government regulations that apply to our human cells, tissues and cellular or tissue-based products; the clinical studies of any of our future products that do not product produce results necessary to support regulatory clearance or approval in the United States or elsewhere; and the other risks identified in the Risk Factors section of the Company's public filings with the Securities and Exchange Commission ("SEC"), including Bioventus' Annual Report on Form 10-K for the year ended December 31, 2020, as updated by Bioventus' Quarterly Report on Form 10-Q for the three months ended October 2, 2021, and as such factors may be further updated from time to time in Bioventus' other filings with the SEC, which are accessible on the SEC's website at www.sec.gov and the Investor Relations page of Bioventus' website at ir.bioventus.com. Except to the extent required by law, the Company undertakes no obligation to update or review any estimate, projection, or forward-looking statement. Actual results may differ materially from those set forth in the forward-looking statements. Use of Estimates Unless otherwise indicated, information contained in this presentation concerning our industry, competitive position and the markets in which Bioventus Inc. operates is based on information from independent industry and research organizations, other third-party sources and management estimates. Management estimates are derived from publicly available information released by independent industry analysts and other third-party sources, as well as data from our internal research, and are based on assumptions made by the Company upon reviewing such data, and the Company's experience in, and knowledge of, such industry and markets, which the Company believes to be reasonable. In addition, projections, assumptions and estimates of the future performance of the industry in which the Company operates and its future performance are necessarily subject to uncertainty and risk due to a variety of factors, including those described above. These and other factors could cause results to differ materially from those expressed in the estimates made by independent parties and by the Company. Transformational Year for Bioventus * Entire organization rallied to strengthen the company's long-term outlook through a variety of actions * February marked the one-year anniversary of the company's IPO * Built out the company's three verticals with our acquisitions of Bioness and Misonix * Exceeded initial sales plans, increased growth targets throughout the year, and generated 19% organic revenue growth * Looking forward to building on this momentum in 2022 Fourth Quarter Results: Revenue Increased 32% to $130M * Delivered a strong quarter of 5% organic growth despite headwinds from the pandemic and three fewer selling days * Pain Treatments saw double-digit revenue growth driven by market share gains for Durolane and Gelsyn * Well-positioned to take advantage of the shift towards single- and threeinjection treatments for OA knee pain * Significant room for additional growth in the coming years for both therapies * Surgical Solutions saw double-digit organic revenue growth * Osteoamp Flowable continuing to fuel momentum * Misonix contributed two months of revenue * Received FDA clearance for BoneScalpel Access handpiece, further strengthening the company's presence in minimally invasive spinal fusions Fourth Quarter Results: Revenue Increased 32% to $130M * Restorative Therapies saw double-digit growth underpinned by recently acquired advanced rehabilitation and Misonix wound therapy * International segment grew 71%, enhanced by Bioness and Misonix acquisitions * International organic growth of 9% driven by Durolane * Acquired Curavisc, three- and five-injection HA treatment to sell alongside Durolane in international markets * Outlook for 2022: * Market conditions are improving * Expect some disruption over the next few months * Optimistic that conditions will begin to more closely resemble a normal environment in the second half of the year 2022 Priorities * First priority: maintain double-digit growth across three areas * Pain Treatments, driven by share gains in Durolane and Gelsyn * Surgical Solutions, as hardware-agnostic strategy drives penetration into new accounts for bone graft substitutes * Misonix, leverage scale to achieve further share gains and enhance historical double-digit growth rate * Second priority: completing integration of acquisitions, delivering on cost synergy commitments, and leveraging enhanced scale to accelerate sales * Completed last significant milestone for Bioness integration * Expect to substantially complete integration of Misonix by year-end and remain on target to recognize $20 million of synergies by end of 2023 * Continue to develop opportunities to leverage enhanced scale and accelerate sales growth * Third priority: pending acquisition of CartiHeal * Game-changing device for patients suffering from knee osteoarthritis * Fills a significant unmet need for surgeons to treat patients with cartilage defects * Demonstrated superiority through a randomized controlled trial New CFO Mark Singleton * Spent last seven years at Teleflex and held previous financial leadership roles with IBM and Lenovo * Partnered with leadership to deliver improved operating results and integrate acquired assets * Will help drive expanded operating margin leverage and enhance the company's portfolio through M&A * Brings robust experience in the healthcare industry * Strong cultural fit Plan to Build Momentum Across Bioventus' Businesses * Executing on the growth strategy * Driving further market penetration across our three customer focused verticals * Delivering on cost synergies from acquisitions * Enhancing growth profile by leveraging scale and commercial infrastructure * Delivering consistent double-digit growth Fourth Quarter Results 2022 Guidance Dave Crawford Vice President Investor Relations and Treasurer 10 Fourth Quarter Performance * Revenue of $130 million increased 32% compared to last year * 5 percentage point increase in organic revenue * 27 percentage point benefit related to Bioness and Misonix * Organic sales growth impacted by three fewer selling days * Hospital utilization negatively impacted by pandemic and hospital and physician office staffing shortages * Benefited from diversified portfolio and execution of commercial teams * Sales performance drove adjusted EBITDA of $28 million and adjusted diluted EPS of $0.26 Fourth Quarter Performance * Pain Treatments grew 20% * Surgical Solutions grew 61% * Restorative Therapies grew 35% * 17 percentage points of organic growth across HA portfolio * 3 percentage point contribution from PNS acquired from Bioness * 13 percentage points of organic growth across bone graft substitutes * 48 percentage point contribution from Misonix * Exogen sales down in part to tough prior year comparison * 58 percentage point combined contribution from Bioness and Misonix Fourth Quarter Performance * Adjusted gross margin declined 340 basis points * Lower adjusted gross margins due to recent acquisitions * Slightly increased transportation costs from global supply chain challenges * Adjusted operating expenses increased $16 million * Bioness- and Misonix-related costs * Public company costs * Normalized spending patterns compared to prior year savings 13 Adjusted Gross Profit Adjusted Gross Margin Millions Fourth Quarter Performance $0.26 Adjusted Diluted Earnings Per Share 14 2021 Performance * 19 percentage points of organic growth * 15 percentage point contribution from Bioness and Misonix combined 15 * Lower gross margins due to recent acquisitions * Slightly increased transportation costs from global supply chain challenges 2022 Guidance * 2022 revenue guidance of $545 million - $565 million * Incorporates both Bioness and Misonix * Adjusted EBITDA guidance of $94 million - $107 million * Similar to historical seasonality, management expects first-quarter revenue and adjusted EBITDA to be lowest in the first quarter and highest in the fourth quarter * Consistent level of operating expense ($) each quarter excluding synergies * Benefit from synergies weighted more towards the second half of the year * Not providing guidance for adjusted diluted EPS due to potential CartiHeal financing but expect to once financing is completed * Financing requires additional $265 million of debt and restructure of existing debt 16 17 Reconciliation of Net (Loss) Income to Adjusted EBITDA (unaudited) (a) Includes for the three months ended December 31, 2021 and December 31, 2020 and the year ended December 31, 2021 and December 31, 2020, respectively, depreciation and amortization of $8,980, $5,093, $26,471 and $21,169 in cost of sales and $2,708, $2,134, and $8,363 and $7,439 in operating expenses, with the balance in research and development, presented in the consolidated statements of operations and comprehensive income. (b) Includes acquisition and integration costs related to completed acquisitions, amortization of inventory step-up associated with acquired entities, and changes in fair value of contingent consideration. (c) Costs incurred during 2021 were the result of adopting acquisition related restructuring plans to reduce headcount, reorganize management structure, consolidate certain facilities, and costs related to executive transitions. Costs incurred during 2020 related to a shift from direct to an indirect distribution model in our International business to improve performance. Various international subsidiaries were dissolved and/or merged into other BV LLC entities. (d) Represents loss on impairment of Harbor's long-lived assets and the Company's investment in Harbor. (e) The year ended December 31, 2021 includes compensation expense resulting from awards granted under the Company's equity based compensation plans in effect after its IPO. These expenses were entirely offset and resulted in income due to the change in fair market value of the BV LLC Phantom Profits Interest Plan (Phantom Plan) accrued liability due to expected pricing with our IPO. The year ended December 31, 2020 includes compensation expense resulting from the BV LLC's management incentive plan and Phantom Plan as well as the change in fair market value of the associated liability due to the impact of the COVID-19 pandemic on our business. (f) Includes income resulting from the CARES Act offset by additional cleaning and disinfecting expenses and contract termination fees for canceled events. (g) Includes CartiHeal equity investment losses. (h) Includes realized and unrealized gains and losses from fluctuations in foreign currency. (i) Other items primarily includes charges associated with strategic transactions, such as potential acquisitions, debt retirement and modification costs and public company preparation costs, which primarily includes accounting and legal fees. 18 Reconciliation of Other Reported GAAP Measures to NonGAAP Measures for Three Months Ended December 31, 2021 and 2020 19 (a) Includes for the three months ended December 31, 2021 and December 31, 2020 respectively, depreciation and amortization of $8,980, $5,093, in cost of sales and $2,708, $2,134, in operating expenses, with the balance in research and development, presented in the consolidated statements of operations and comprehensive income (b) Consists of acquisition related items such as integration costs, amortization of inventory step-up, and changes in fair value of contingent consideration. (c) Consists of restructuring plans to reduce headcount, reorganize management structure and consolidate certain facilities, as well as executive leadership transition costs. (d) Other items primarily consists of charges associated with strategic transactions, such as potential acquisitions, and debt retirement and modification costs. (e) Calculated by applying a normalized statutory rate of 22.8% to the adjustments to Non-GAAP Net Income. The tax effect on adjustments to EPS is normalized to exclude the effect of the non-controlling ownership interest. The tax effect on adjustments to Non-GAAP net income for the three months ended December 31, 2020 was calculated using the prior year effective tax rate of 7.5%. (f) Adjustments are pro-rated to exclude the weighted average non-controlling interest ownership of 23.6% for the three months ended December 31, 2021. (g) Additional cleaning and disinfection expenses and contract termination fees for cancelled events. Reconciliation of Other Reported GAAP Measures to NonGAAP Measures For Year Ended 2021 and 2020 20 (a) Includes for the year ended December 31, 2021 and December 31, 2020, respectively, depreciation and amortization of $26,471 and $21,169 in cost of sales and $8,363 and $7,439 in operating expenses, with the balance in research and development, presented in the consolidated statements of operations and comprehensive income (b) Consists of acquisition related items such as integration costs, amortization of inventory step-up, and changes in fair value of contingent consideration. (c) Consists of restructuring plans to reduce headcount, reorganize management structure and consolidate certain facilities, as well as executive leadership transition costs. (d) Represents loss on impairment of Harbor's long-lived assets and the Company's investment in Harbor. (e) Other items primarily consists of charges associated with strategic transactions, such as potential acquisitions, and debt retirement and modification costs. (f) Calculated by applying a normalized statutory rate of 22.8% to the adjustments to Non-GAAP Net Income. The tax effect on adjustments to EPS is normalized to exclude the effect of the non-controlling ownership interest. The tax effect on adjustments to Non-GAAP net income for the year ended December 31, 2020 was calculated using the prior year effective tax rate of 7.5%. (g) Adjustments are pro-rated to exclude the weighted average non-controlling interest ownership of 23.5% for the year ended December 31, 2021. (h) Includes income resulting from the CARES Act offset by additional cleaning and disinfecting expenses and contract termination fees for canceled events.
<urn:uuid:896ca896-eb16-4957-8ff2-1b640d4f90cc>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
18,109
SECURITIES AND EXCHANGE COMMISSION FORM SC 13D/A Schedule filed to report acquisition of beneficial ownership of 5% or more of a class of equity securities [amend] Filing Date: 2001-02-02 SEC Accession No. 0000950172-01-000145 (HTML Version on secdatabase.com) SUBJECT COMPANY Mailing Address DE NEOFORMA COM INC CIK: 1096219| IRS No.: 770424252 Type: SC 13D/A SIC: 7389 | State of Incorp.: | Act: 34| File No.: Business services, nec FILED BY Business Address 220 EAST LAS COLINAS BLVD IRVING TX 75039-5500 9728300000 Mailing Address 220 EAST LAS COLINAS BLVD IRVING TX 75039-5500 VHA INC CIK: 1120376| IRS No.: 382182248| State of Incorp.: DE| Fiscal Year End: 1231 Type: SC 13D/A Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document | Fiscal Year End: 005-58839| Film No.: 1231 1523835 3061 ZANKER ROAD SAN JOSE CA 95134 Business Address 3061 ZANKER ROAD SAN JOSE CA 95134 4086545700 SECURITIES AND EXCHANGE COMMISSION WASHINGTON, DC 20549 ------------- SCHEDULE 13D UNDER THE SECURITIES EXCHANGE ACT OF 1934 (AMENDMENT NO. 2) NEOFORMA.COM, INC. ------------------------------------------------------- (Name of Issuer) COMMON STOCK, PAR VALUE $0.001 PER SHARE ------------------------------------------------------- (Title of Class of Securities) 640475 10 7 ------------------------------------------------------- (CUSIP Number) Marcea B. Lloyd Senior Vice President and General Counsel VHA, Inc. 220 East Las Colinas Boulevard Irving, Texas 75039-5500 (972) 830-0000 ------------------------------------------------------- (Name, Address and Telephone Number of Person Authorized to Receive Notices and Communications) COPY TO: C. Kevin Barnette, Esq. Skadden, Arps, Slate, Meagher & Flom LLP 1440 New York Avenue, N.W. Washington, D.C., 20005 (202) 371-7000 January 25, 2001 ------------------------------------------------------- (Date of Event Which Requires Filing of This Statement) If the filing person has previously filed a statement on Schedule 13G to report the acquisition which is the subject of this Schedule 13D, and is filing this schedule because of Rule 13d-1(e), 13d(f) or 13d-1(g), check the following box |_| . CUSIP NO. 640475 10 7 13D ----------------------------------------------------------------------------- 1 NAMES OF REPORTING PERSONS I.R.S. IDENTIFICATION NOS. OF ABOVE PERSONS (ENTITIES ONLY) VHA INC. (IRS Employer Identification Number 38-2182248) ----------------------------------------------------------------------------- 2 CHECK THE APPROPRIATE BOX IF A MEMBER OF A GROUP (a) |_| NOT APPLICABLE (b) |_| ----------------------------------------------------------------------------- 3 SEC USE ONLY ----------------------------------------------------------------------------- 4 SOURCE OF FUNDS WC ----------------------------------------------------------------------------- 5 CHECK BOX IF DISCLOSURE OF LEGAL PROCEEDINGS IS REQUIRED PURSUANT TO ITEM 2(d) or 2(e) |_| ----------------------------------------------------------------------------- 6 CITIZENSHIP OR PLACE OF ORGANIZATION DELAWARE ----------------------------------------------------------------------------- NUMBER OF 7 SOLE VOTING POWER 88,946,870 SHARES ------------------------------------------------------- BENEFICIALLY 8 SHARED VOTING POWER 0 OWNED BY ------------------------------------------------------- EACH 9 SOLE DISPOSITIVE POWER 88,946,870 REPORTING ------------------------------------------------------- PERSON WITH 10 SHARED DISPOSITIVE POWER0 ----------------------------------------------------------------------------- 11 AGGREGATE AMOUNT BENEFICIALLY OWNED BY EACH REPORTING PERSON 88,946,870 ----------------------------------------------------------------------------- 12 CHECK BOX IF THE AGGREGATE AMOUNT IN ROW (11) EXCLUDES CERTAIN SHARES |_| NOT APPLICABLE ----------------------------------------------------------------------------- 13 PERCENT OF CLASS REPRESENTED BY AMOUNT IN ROW (11) 48.8% (BASED ON AN AGGREGATE OF 182,279,922 SHARES OF COMMON STOCK ESTIMATED TO BE OUTSTANDING) ----------------------------------------------------------------------------- 14 TYPE OF REPORTING PERSON CO ----------------------------------------------------------------------------- This Amendment No. 2 (this "Amendment") to the Statement on Schedule 13D filed by VHA, Inc., a Delaware corporation ("VHA"), on August 7, 2000 and first amended on October 19, 2000 (the "Schedule 13D"), relates to the common stock, par value $0.001 per share (the "Common Stock"), of Neoforma.com, Inc., a Delaware corporation ("Neoforma"). All capitalized terms used but not defined herein have the meaning ascribed to them in the Schedule 13D. ITEM 3. SOURCE AND AMOUNT OF FUNDS OR OTHER CONSIDERATION. Item 3 of the Schedule 13D is hereby amended by adding the following: VHA obtained the $20,000,000 used to purchase the New Shares (as defined in Item 4) from its working capital. ITEM 4. PURPOSE OF TRANSACTION. Item 4 of the Schedule 13D is hereby amended by adding the following: On January 25, 2001, VHA and Neoforma entered into (1) a Common Stock Purchase Agreement (the "Stock Purchase Agreement") and (2) together with Novation, LLC, a Delaware limited liability company ("Novation"), University HealthSystem Consortium, an Illinois limited liability company, and Healthcare Purchasing Partners International, LLC, a Delaware limited liability company, a Second Amended and Restated Outsourcing and Operating Agreement (the "New Outsourcing Agreement"), amending and restating the Outsourcing and Operating Agreement, dated as of March 30, 2000 and the Amended and Restated Outsourcing and Operating Agreement, dated as of May 24, 2000. Pursuant to the Stock Purchase Agreement, VHA purchased from Neoforma 11,834,320 shares of Common Stock (the "New Shares") at a purchase price of $1.69 per share. Including this purchase, VHA owns 88,946,870 shares of Common Stock. This amount represents 48.8% of the issued and outstanding shares of Common Stock, based on an aggregate of 182,279,922 shares estimated to be outstanding. VHA acquired the New Shares for investment purposes. Under the New Outsourcing Agreement, among other things, Novation will guarantee a gross volume based fee to Neoforma for all purchases through Marketplace@Novation(TM), the Internet supply chain solution powered by Neoforma. The revised agreement is expected to increase the revenue to Neoforma from Marketplace@Novation transactions. ITEM 5. INTEREST IN SECURITIES OF THE ISSUER. (a) - (b) The information required by these sections of Item 5 is set forth in numbers 7-11 and number 13 of the cover page to this Amendment and is incorporated herein by reference. Except as set forth in Schedule A hereto, since the filing of the Amendment to the Statement on Schedule 13D, filed by VHA on October 19, 2000, none of the directors and executive officers of VHA (the "Covered Persons") have purchased or sold any of the shares of Common Stock. By reason of their status as directors and/or executive officers of VHA, the Covered Persons may be deemed to be the beneficial owners of the Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document shares of the Common Stock owned by VHA. VHA has been advised that each of the Covered Persons disclaims beneficial ownership of the shares of the Common Stock from time to time owned by VHA. ITEM 6. CONTRACTS, ARRANGEMENTS, UNDERSTANDINGS OR RELATIONSHIPS WITH RESPECT TO SECURITIES OF THE ISSUER. Item 6 of the Schedule 13D is hereby amended by adding the following: Pursuant to the Stock Purchase Agreement, from and after January 25, 2001 (the "Closing") through the fifth anniversary of the Closing (the "Fifth Anniversary") and for as long after the Fifth Anniversary as VHA beneficially owns greater than 49.9% of the then outstanding Common Stock, VHA is required to vote all New Shares it holds or is entitled to vote in proportion to the votes cast by all other stockholders of Neoforma in connection with each matter submitted to Neoforma's stockholders for approval. In the event VHA beneficially owns greater than 35% but less than 49.9% of the then outstanding Common Stock, the New Shares shall be considered Excess Shares (as such term is defined in the Amendment to Amended and Restated Common Stock and Warrant Agreement, dated as of October 18, 2000, by and between Neoforma and VHA (the "Common Stock and Warrant Agreement Amendment")). In connection with the purchase and sale of the New Shares, VHA, Neoforma and certain other parties to the Registration Rights Agreement entered into Amendment No. 1 thereto ("Amendment No. 1"). Amendment No. 1, among other things, adds the New Shares to the securities of Neoforma that VHA is entitled to have registered in accordance with the Registration Rights Agreement. ITEM 7. MATERIAL TO BE FILED AS EXHIBITS. References to and descriptions of the Stock Purchase Agreement, Amendment No. 1 and the Common Stock and Warrant Agreement Amendment as set forth herein are qualified in their entirety by reference to the copies of the Stock Purchase Agreement and Amendment No. 1 attached hereto in Exhibit 2.1 and Exhibit 2.2, respectively, and the copy of the Common Stock and Warrant Agreement Amendment referred to in Exhibit 2.3 and are incorporated herein in their entirety where such references and descriptions appear. Exhibit 2.1 Common Stock Purchase Agreement, dated as of January 25, 2001, by and between Neoforma.com, Inc. and VHA, Inc. Exhibit 2.2 Amendment No. 1 to Registration Rights Agreement, dated as of January 24, 2001, by and among Neoforma.com, Inc. and certain investors. Exhibit 2.3 Amendment to Amended and Restated Common Stock and Warrant Agreement, dated as of October 18, 2000, by and between Neoforma.com, Inc. and VHA Inc. (incorporated by reference to the Amendment to the Statement on Schedule 13D, filed by VHA on October 19, 2000 (File No. 005-58839)). SIGNATURE After reasonable inquiry and to the best of my knowledge and belief, I certify that the information set forth in this statement is true, complete and correct. February 1, 2001 VHA INC. By: /s/ Marcea B. Lloyd -------------------------------- Marcea B. Lloyd Senior Vice President and General Counsel SCHEDULE A DIRECTORS AND EXECUTIVE OFFICERS OF VHA INC. Except as set forth below, (i) the principal business address of each of the directors and executive officers of VHA Inc. is 220 East Las Colinas Boulevard, Irving, Texas 75039-5500, (ii) the country of citizenship of each of the directors and executive officers of VHA Inc. is the United States and (iii) since the filing of the Amendment to the Statement on Schedule 13D by VHA on October 19, 2000, none of the directors and executive officers of VHA, Inc. have effected any transaction involving shares of Common Stock of Neoforma.com, Inc. <TABLE> <CAPTION> BUSINESS ADDRESS/CITIZENSHIP/ TRANSACTIONS AND OWNERSHIP NAME PRINCIPAL OCCUPATION IN NEOFORMACOMMON STOCK ---------------------- -------------------- ----------------------------- DIRECTORS <S> <C> <C> C.H. Beck, Jr., M.D. Sr. Vice President, 4275 Campus Point Ct. ScrippsHealth San Diego, CA 92121 David Bernd President/CEO, 6015 Poplar Hall Dr. Sentara Health System, Norfolk, VA 93502 Inc. Bought 10,000 shares on Center Dan S. Wilford President/CEO, 7737 Southwest Frwy. Memorial Hermann Houston, TX 77074 HealthCare System Joseph A. Zaccagnino President/CEO, 20 York Street Yale-New Haven Health New Haven, CT 06504 System EXECUTIVE OFFICERS Kim Alleman Senior Vice President Stuart B. Baker, M.D. Executive Vice President Daniel P. Bourque Group Senior Vice 1200 New Hampshire Ave., NW President Washington, DC 20036 Bought 2,000 shares on 11/2/00 at $1.97 per share in brokerage transaction. J. Donald Caccia Group Senior Vice 200 Berwyn Park President Berwyn, PA 19312 Bought 2,500 shares on 11/14/00 at $2.1875 per share in brokerage transaction. Stacy Cinatl Senior Vice President John J. Collins, Jr., M.D. Senior Vice President Bought 2,600 shares on 10/31/00 at $1.78125 per share in brokerage transaction. Mike Cummins Senior Vice President Michael J. Daly Group Senior Vice 200 Berwyn Park President, Berwyn, PA 19312 VHA East Coast, LLC K. Jeffery Hayes Senior Vice President/ Business Operations Marcea Bland Lloyd Senior Vice President/ Bought 3,000 shares on General Counsel 10/25/00 at $1.9375 per share in brokerage transaction. Donald McCall Group Senior VP, Business Operations Mark McKenna President, 125 E. John Carpenter Frwy. Novation, LLC Irving, TX 75062 Curt Nonomaque Executive VP/Chief LLC, 50% owned by Mr. </TABLE> COMMON STOCK PURCHASE AGREEMENT This COMMON STOCK PURCHASE AGREEMENT (this "AGREEMENT") is made and entered into as of January 25, 2001 by and between Neoforma.com, Inc., a Delaware corporation (the "COMPANY"), and VHA Inc., a Delaware corporation ("VHA"). RECITALS WHEREAS, the Company desires to sell to VHA, and VHA desires to purchase from the Company, shares of the Company's common stock, par value $0.001 per share (the "COMMON STOCK") on the terms and conditions set forth in this Agreement; NOW, THEREFORE, in consideration of the foregoing and the representations, warranties, covenants and agreements set forth in this Agreement, the parties agree as follows: ARTICLE I AGREEMENT TO SELL AND PURCHASE STOCK 1.1 Agreement to Sell and Purchase the Shares. The Company agrees to sell to VHA at the Closing, and VHA agrees to purchase from the Company at the Closing, 11,834,320 shares of Common Stock (the "SHARES") at a purchase price of $1.69 per share. ARTICLE II CLOSING 2.1 Closing. The purchase and sale of the Shares will take place at the offices of Fenwick & West LLP, Two Palo Alto Square, Palo Alto, California, at 10 a.m. Pacific Time on January 25, 2001, or at such other date, time and location as the Company and VHA mutually agree upon (which time and place are referred to in this Agreement as the "CLOSING"). At the Closing, the Company will deliver to VHA a certificate representing the Shares against delivery to the Company by VHA of the purchase price paid by (i) a check payable to the Company's order or (ii) wire transfer of immediately available funds to the Company. ARTICLE III REPRESENTATIONS AND WARRANTIES OF THE COMPANY The Company hereby represents and warrants to VHA, subject to the exceptions specifically disclosed in writing in the disclosure letter delivered by the Company dated as of the date hereof and certified by a duly authorized officer of the Company (the "COMPANY DISCLOSURE LETTER") (which Company Disclosure Letter shall be deemed to be representations and warranties to VHA by the Company under this Article III), as follows: 3.1 Organization of the Company. (a) The Company and each of its subsidiaries is a corporation duly organized, validly existing and in good standing under the laws of the jurisdiction of its incorporation and has all requisite corporate power and authority, and all requisite qualifications to do business as a foreign corporation, to conduct its business in the manner in which its business is currently being conducted, except where the failure to be so organized, existing or in good standing or to have such power, authority or qualifications would not, individually or in the aggregate, have a Material Adverse Effect on the Company. (b) The Company has delivered or made available to VHA a true and correct copy of the Certificate of Incorporation (including any Certificates of Designation) and Bylaws of the Company and similar governing instruments of each of its subsidiaries, each as amended to date (collectively, the "COMPANY CHARTER DOCUMENTS"), and each such instrument is in full force and effect. Neither the Company nor any of its subsidiaries is in violation of any of the provisions of the Company Charter Documents. 3.2 Capitalization. (a) The authorized capital stock of the Company consists solely of 300,000,000 shares of Common Stock, of which there were 158,593,007 shares issued and outstanding as of the close of business on December 29, 2000, and 5,000,000 shares of Preferred Stock, par value $0.001 per share, of which no shares are issued or outstanding. All outstanding shares of Common Stock are duly authorized, validly issued, fully paid and nonassessable and are not subject to any right of rescission or preemptive rights created by statute, the Company Charter Documents or any agreement or document to which the Company is a party or by which it is bound. As of the date of this Agreement, there are no shares of Common Stock held in treasury by the Company. (b) As of the close of business on December 29, 2000, (i) 12,093,686 shares of Common Stock are subject to issuance pursuant to outstanding options (the "COMPANY OPTIONS") to purchase Common Stock under the Company's 1997 Stock Plan and 1999 Equity Incentive Plan ("COMPANY STOCK OPTION PLANS") for an aggregate exercise price of $54,922,563, (ii) 90,000 shares of Common Stock are subject to issuance pursuant to Company Options other than pursuant to Company Stock Option Plans for an aggregate exercise price of $996,891, (iii) 1,081,792 shares of Common Stock are subject to issuance pursuant to Company Options other than pursuant to the Company Stock Option Plans from the Pharos and EquipMD acquisitions for an aggregate exercise price of $3,384,412 and (iv) 572,635 shares of Company Common Stock are reserved for future issuance under the Company's 1999 Employee Stock Purchase Plan (the "COMPANY ESPP"). All shares of Common Stock subject to issuance as aforesaid, upon issuance on the terms and conditions specified in the instruments pursuant to which they are issuable, will be duly authorized, validly issued, fully paid and nonassessable. Other than as set forth on Part 3.2(b) of the Company Disclosure Letter, there are no commitments or agreements of any character to which the Company is bound obligating the Company to accelerate the vesting of any Company Option as a result of the consummation of the transactions contemplated by this Agreement. (c) All outstanding shares of Company Common Stock, all outstanding Company Options, and all outstanding shares of capital stock of each subsidiary of the Company have been issued and granted in material compliance with (i) all applicable securities laws and other applicable material Legal Requirements and (ii) all material requirements set forth in applicable agreements or instruments. For the purposes of this Agreement, "LEGAL REQUIREMENTS" means any federal, state, local, municipal, foreign or other law, statute, constitution, principle of common law, resolution, ordinance, code, edict, decree, rule, regulation, ruling or requirement issued, enacted, adopted, promulgated, implemented or otherwise put into effect by or under the authority of any Governmental Entity (as defined in Section 3.4). (d) The Shares, when issued and paid for as provided in this Agreement, will be duly authorized and validly issued, fully paid and nonassessable. (e) Based in part on the representations made by VHA in Article IV hereof, the offer and sale of the Shares in accordance with this Agreement (assuming no change in currently applicable law) is exempt from the registration and prospectus delivery requirements of the Securities Act of 1933, as amended (the "1933 ACT"). 3.3 Obligations With Respect to Capital Stock. Except as set forth in Section 3.2 or Part 3.3 of the Company Disclosure Letter, there are no equity securities, partnership interests or similar ownership interests of any class of Company equity security, or any securities exchangeable or convertible into or exercisable for such equity securities, partnership interests or similar ownership interests, issued, reserved for issuance or outstanding. All stock and rights to purchase stock of any subsidiary of the Company are owned free and clear of all Encumbrances. Except as set forth in Section 3.2 or Part 3.2 or Part 3.3 of the Company Disclosure Letter, there are no subscriptions, options, warrants, equity securities, partnership interests or similar ownership interests, calls, rights (including preemptive rights), commitments or agreements of any character to which the Company or any of its subsidiaries is a party or by which it is bound obligating the Company or any of its subsidiaries to issue, deliver or sell, or cause to be issued, delivered or sold, or repurchase, redeem or otherwise acquire, or cause the repurchase, redemption or acquisition of, any shares of capital stock, partnership interests or similar ownership interests of the Company or any of its subsidiaries or obligating the Company or any of its subsidiaries to grant, extend, Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document accelerate the vesting of or enter into any such subscription, option, warrant, equity security, call, right, commitment or agreement. There are no registration rights, and there is no shareholder agreement, investor agreement, voting trust, proxy, rights agreement, "poison pill" anti-takeover plan or other agreement or understanding to which the Company is a party or by which it is bound with respect to any equity security of any class of the Company or with respect to any equity security, partnership interest or similar ownership interest of any class of any of its subsidiaries. 3.4 Due Authorization. (a) The Company has all requisite corporate power and authority to enter into this Agreement and to consummate the transactions contemplated hereby. The execution and delivery of this Agreement and the consummation of the transactions contemplated hereby have been duly authorized by all necessary corporate action on the part of the Company. No approval of any holder of any securities of the Company is required in connection with the consummation of the transactions contemplated hereby. This Agreement has been duly executed and delivered by the Company and, assuming the due authorization, execution and delivery thereof by VHA, constitutes the valid and binding obligations of the Company, enforceable against the Company in accordance with their terms, except as enforceability may be limited by bankruptcy and other similar laws affecting the rights of creditors generally and general principles of equity. (b) The execution and delivery of this Agreement by the Company does not, and the performance of this Agreement by the Company will not, (i) conflict with or violate the Company Charter Documents, (ii) subject to compliance with the requirements set forth in Section 3.4(c), conflict with or violate any law, rule, regulation, order, judgment or decree applicable to the Company or by which any of its properties is bound or affected, or (iii) result in any breach of or constitute a default (or an event that with notice or lapse of time or both would become a default) under, or impair the Company's rights or alter the rights or obligations of any third party under, or give to others any rights of termination, amendment, acceleration or cancellation of; or result in the creation of an Encumbrance on any of the properties or assets of the Company pursuant to, any note, bond, mortgage, indenture, contract, agreement, lease, license, permit, franchise or other instrument or obligation to which the Company is a party or by which the Company or any of its properties are bound or affected, except, in the case of clauses (ii) and (iii), for such conflicts, violations, breaches, defaults, impairments, or rights which, individually or in the aggregate, would not have a Material Adverse Effect on the Company. Part 3.4(b) of the Company Disclosure Letter lists all consents, waivers and approvals under any of the Company's or any of its subsidiaries' agreements, contracts, licenses or leases required to be obtained in connection with the consummation of the transactions contemplated hereby, which, if individually or in the aggregate not obtained, would have a Material Adverse Effect on the Company. (c) No consent, approval, order or authorization of, or registration, declaration or filing with any court, administrative agency or commission or other governmental entity or instrumentality, foreign or domestic ("GOVERNMENTAL ENTITY") is required to be obtained or made by the Company in connection with the execution, delivery and performance of this Agreement or the consummation of the transactions contemplated hereby, except for (i) such consents, approvals, orders, authorizations, registrations, declarations and filings as may be required under applicable federal, foreign and state securities (or related) laws and the securities laws of any foreign country, and (ii) such other consents, authorizations, filings, approvals and registrations which if not obtained or made would not have a Material Adverse Effect on the Company or have a material adverse effect on the ability of the parties hereto to consummate the transactions contemplated hereby. 3.5 SEC Filings; Company Financial Statements. (a) The Company has filed all forms, reports and documents required to be filed by the Company with the Securities and Exchange Commission (the "SEC") since the effective date of the Registration Statement of the Company's initial public offering (the "COMPANY INITIAL REGISTRATION STATEMENT"), and has made available to VHA such forms, reports and documents in the form filed with the SEC. All such required forms, reports and documents (including those that the Company may file subsequent to the date hereof) and the Company Initial Registration Statement are referred to herein as the "COMPANY SEC REPORTS." As of their respective dates, the Company SEC Reports (i) were prepared in accordance with the requirements of the 1933 Act or the Securities Exchange Act of 1934, as amended (the "1934 ACT"), as the case may be, and the rules and regulations of the SEC thereunder applicable to such Company SEC Reports, and (ii) did not at the time they were filed (or if amended or superseded by a filing prior to the date of this Agreement, then on the date of such filing) contain any untrue statement of a material fact or omit to state a material fact required to be stated therein or necessary in order to make the statements therein, in the light of the circumstances under which they were made, not misleading, except to the extent corrected prior to the date of this Agreement by a subsequently filed Company SEC Report. None of the Company's subsidiaries is required to file any forms, reports or other documents with the SEC. (b) Each of the consolidated financial statements (including, in each case, any related notes thereto) contained in the Company SEC Reports (the "COMPANY FINANCIALS"), including any Company SEC Reports filed after the date hereof until the Closing, (i) complied as to form in all material respects with the published rules and regulations of the SEC with respect thereto, (ii) was prepared in accordance with GAAP applied on a consistent basis throughout the periods involved (except as may be indicated in the notes thereto or, in the case of unaudited interim financial statements, as may be permitted by the SEC on Form 1O-Q, 8-K or any successor form under the 1934 Act) and (iii) fairly presented the consolidated financial position of the Company and its subsidiaries as at the respective dates Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document thereof and the consolidated results of the Company's operations and cash flows for the periods indicated, except that the unaudited interim financial statements may not contain footnotes and were or are subject to normal and recurring year-end adjustments. The balance sheet of the Company contained in the Company SEC Reports as of September 30, 2000 is hereinafter referred to as the "COMPANY BALANCE SHEET." Except as disclosed in the Company Financials, since the date of the Company Balance Sheet neither the Company nor any of its subsidiaries has any liabilities required under GAAP to be set forth on a balance sheet (absolute, accrued, contingent or otherwise) which are, individually or in the aggregate, material to the business, results of operations or financial condition of the Company and its subsidiaries taken as a whole, except for liabilities incurred since the date of the Company Balance Sheet in the ordinary course of business consistent with past practices and liabilities incurred in connection with this Agreement. 3.6 Absence of Certain Changes or Events. Since the date of the Company Balance Sheet there has not been (i) any Material Adverse Effect with respect to the Company, (ii) any declaration, setting aside or payment of any dividend on, or other distribution (whether in cash, stock or property) in respect of, any of the Company's or any of its subsidiaries' capital stock, or any purchase, redemption or other acquisition by the Company of any of the Company's capital stock or any other securities of the Company or its subsidiaries or any options, warrants, calls or rights to acquire any such shares or other securities except for repurchases from employees following their termination pursuant to the terms of their pre-existing stock option or purchase agreements, (iii) any split, combination or reclassification of any of the Company's or any of its subsidiaries' capital stock, (iv) any material change or alteration in the policy of the Company relating to the granting of stock options or other equity compensation to its employees and consultants other than in the ordinary course of business consistent with past practice, or (v) entry by the Company or any of its subsidiaries into, or material modification, amendment or cancellation of, any licensing or other agreement with regard to the acquisition, distribution or licensing of any material Intellectual Property other than licenses, distribution agreements, advertising agreements, or other similar agreements entered into in the ordinary course of business consistent with past practice. 3.7 Tax Returns and Payments. The Company has timely filed all tax returns and reports required by law. All tax returns and reports of the Company are true and correct in all material respects. The Company has paid all taxes and other assessments due, except those, if any, currently being contested by it in good faith, which are listed in the Company Disclosure Schedule. 3.8 Title to Properties. (a) All real property leases to which the Company is a party and each amendment thereto that is in effect as of the date of this Agreement that provide for annual payments in excess of $250,000 are in full force Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document and effect and are valid and enforceable in accordance with their respective terms, and there is not, under any of such leases, any existing default or event of default (or event which with notice or lapse of time, or both, would constitute a default) that would give rise to a material claim against the Company which could reasonably be expected to have a Material Adverse Effect on the Company. (b) The Company has good and valid title to, or, in the case of leased properties and assets, valid leasehold interests in, all of its tangible properties and assets, real, personal and mixed, used or held for use in its business, free and clear of any Encumbrances, except as reflected in the Company Financials and except where the failure to have valid title or a valid leasehold interest would not have a Material Adverse Effect on the Company. 3.9 Intellectual Property. For the purposes of this Agreement, the following terms have the following definitions: "INTELLECTUAL PROPERTY" means any or all of the following and all rights in, arising out of, or associated therewith: (i) all United States, international and foreign patents and applications therefor and all reissues, divisions, renewals, extensions, provisionals, continuations and continuations-in-part thereof; (ii) all inventions (whether patentable or not), invention disclosures, improvements, trade secrets, proprietary information, know how, technology, technical data and customer lists, and all documentation relating to any of the foregoing; (iii) all copyrights, copyrights registrations and applications therefor, and all other rights corresponding thereto throughout the world; (iv) all industrial designs and any registrations and applications therefor throughout the world; (v) all trade names, URLs, logos, common law trademarks and service marks, trademark and service mark registrations and applications therefor throughout the world; (vi) all databases and data collections and all rights therein throughout the world; (vii) all moral and economic rights of authors and inventors, however denominated, throughout the world, and (viii) any similar or equivalent rights to any of the foregoing anywhere in the world. "COMPANY INTELLECTUAL PROPERTY" shall mean any Intellectual Property that is owned by, or exclusively licensed to, the Company or one of its subsidiaries. "COMPANY REGISTERED INTELLECTUAL PROPERTY" means all of the Registered Intellectual Property owned by, or filed in the name of, the Company or one of its subsidiaries. "REGISTERED INTELLECTUAL PROPERTY" means all United States, international and foreign: (i) patents and patent applications (including provisional applications); (ii) registered trademarks, applications to register trademarks, intent-to-use applications, or other registrations or applications related to trademarks; (iii) registered copyrights and applications for copyright registration; and (iv) any other Intellectual Property that is the subject of an application, certificate, filing, registration or other document issued, filed with, or recorded by any Governmental Entity. (a) No material Company Intellectual Property or product or service of the Company is subject to any proceeding, agreement, or stipulation to which the Company is a party, or any outstanding decree, order or judgment, which arose out of any proceeding to which the Company was either a party or of which the Company has knowledge, restricting in any manner the use, transfer, or licensing thereof by the Company, or which may affect the validity, use or enforceability of such Company Intellectual Property. (b) Each material item of Company Registered Intellectual Property is valid and subsisting, all necessary registration, maintenance and renewal fees currently due in connection with such Company Registered Intellectual Property have been made and all necessary documents, recordations and certificates in connection with such Company Registered Intellectual Property have been filed with the relevant patent, copyright, trademark or other authorities in the United States or foreign jurisdictions, as the case may be, for the purposes of maintaining such Company Registered Intellectual Property, except, in each case, as would not materially adversely affect such item of Company Registered Intellectual Property. (c) The Company or one of its subsidiaries owns and has good and exclusive title to, or has license sufficient for the conduct of its business as currently conducted to, each material item of Company Intellectual Property free and clear of any Encumbrance (excluding licenses and related restrictions). (d) Neither the Company nor any of its subsidiaries has transferred ownership of, or granted any exclusive license with respect to, any Intellectual Property that is or was material Company Intellectual Property, to any third party. (e) The operation of the business of the Company as such business currently is conducted, including the Company's design, development, marketing and sale of the products or services of the Company (including with respect to products currently under development) has not, does not and will not materially infringe or materially misappropriate the Intellectual Property of any third party or, to its knowledge, constitute unfair competition or trade practices under the laws of any jurisdiction. (f) The Company has not received written notice from any third party that the operation of the business of the Company or any act, product or service of the Company, infringes or misappropriates the Intellectual Property of any third party or constitutes unfair competition or trade practices under the laws of any jurisdiction, which allegation, if true, would have a Material Adverse Effect on the Company. (g) To the knowledge of the Company, no person has or is infringing or misappropriating any Company Intellectual Property, which infringement or misappropriation, individually or in the aggregate, would have a Material Adverse Effect on the Company. (h) The Company and its subsidiaries have taken reasonable steps to protect the Company's and its subsidiaries' rights in the Company's and such subsidiaries' confidential information and trade secrets, except where the failure to do so would not have a Material Adverse Effect on the Company. 3.10 Compliance with Laws; Certain Agreements. (a) Neither the Company nor any of its subsidiaries is in conflict with, or in default or in violation of (i) any law, rule, regulation, order, judgment or decree applicable to the Company or any of its subsidiaries or by which the Company or any of its subsidiaries or any of their respective properties is bound or affected, or (ii) any note, bond, mortgage, indenture, agreement, lease, license, permit, franchise or other instrument or obligation to which the Company or any of its subsidiaries is a party or by which the Company or any of its subsidiaries or its or any of their respective properties is bound or affected, except for conflicts, violations and defaults that, individually or in the aggregate, would not have a Material Adverse Effect on the Company. To the Company's knowledge, no investigation or review by any Governmental Entity is pending or has been threatened in a writing delivered to the Company against the Company or any of its subsidiaries. There is no agreement with any Governmental Entity, judgment, injunction, order or decree binding upon the Company or any of its subsidiaries which has or could reasonably be expected to have the effect of prohibiting or materially impairing any material business practice of the Company or any of its subsidiaries, or any acquisition of material property by the Company or any of its subsidiaries. (b) The Company and its subsidiaries hold all permits, licenses, exemptions, orders and approvals from governmental authorities that are material to or required for the operation of the business of the Company as currently conducted (collectively, the "COMPANY PERMITS"), and are in compliance with the terms of the Company Permits, except where the failure to hold such Company Permits, or be in such compliance, would not, individually or in the aggregate, have a Material Adverse Effect on the Company. 3.11 Litigation. There are no claims, suits, actions or proceedings pending or, to the knowledge of the Company, threatened against, relating to or affecting the Company or any of its subsidiaries, before any Governmental Entity or any arbitrator that seeks to restrain or enjoin the consummation of the transactions contemplated by this Agreement or which could reasonably be expected, either singularly or in the aggregate with all such claims, actions or proceedings, to have a Material Adverse Effect on the Company following the transactions contemplated hereby or have a material adverse effect on the ability of the parties Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document hereto to consummate the transactions contemplated hereby. 3.12 Employee Benefit Plans. (a) Definitions. With the exception of the definition of "Affiliate" set forth in Section 3.12(a)(i) below (which definition shall apply only to this Section 3.12), for purposes of this Agreement, the following terms shall have the meanings set forth below: (i) "AFFILIATE" shall mean any other person or entity under common control with the Company within the meaning of Section 414(b), (c), (m) or (o) of the Code and the regulations issued thereunder; (ii) "COMPANY EMPLOYEE PLAN" shall mean any plan, program, policy, practice, contract, agreement or other arrangement providing for compensation, severance, termination pay, performance awards, stock or stock-related awards, fringe benefits or other employee benefits or remuneration of any kind, whether written or unwritten or otherwise, funded or unfunded, including without limitation, each "EMPLOYEE BENEFIT PLAN," within the meaning of Section 3(3) of ERISA which is maintained, contributed to, or required to be contributed to, by the Company or any Affiliate for the benefit of any Company Employee; and (iii) "COMPANY EMPLOYEE" shall mean any current, former, or retired employee, officer, or director of the Company or any Affiliate. (b) Employee Plan Compliance. Except, in each case, as would not, individually or in the aggregate, have a Material Adverse Effect on the Company (i) the Company has performed in all material respects all obligations required to be performed by it under, is not in default or violation of, and has no knowledge of any default or violation by any other party to, each Company Employee Plan, and each Company Employee Plan has been established and maintained in all material respects in accordance with its terms and in compliance with all applicable laws, statutes, orders, rules and regulations, including but not limited to ERISA or the Code; (ii) each Company Employee Plan intended to qualify under Section 401(a) of the Code and each trust intended to qualify under Section 501(a) of the Code has either received a favorable determination letter from the IRS with respect to each such Plan as to its qualified status under the Code or has remaining a period of time under applicable Treasury regulations or IRS pronouncements in which to apply for such a determination letter and make any amendments necessary to obtain a favorable determination and no event has occurred which would adversely affect the status of such determination letter or the qualified status of such Plan; (iii) no "prohibited transaction," within the meaning of Section 4975 of the Code or Sections 406 and 407 of ERISA, and not otherwise exempt under Section 408 of ERISA, has occurred with respect to any Company Employee Plan; (iv) there are no actions, suits or claims pending, or, to the knowledge of the Company, threatened or reasonably anticipated (other than routine claims for benefits) against any Company Employee Plan or against the assets of any Company Employee Plan; (v) each Company Employee Plan can be amended, Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document terminated or otherwise discontinued after the Closing in accordance with its terms, without liability to the Company or any of its Affiliates (other than ordinary administration expenses typically incurred in a termination event); (vi) there are no audits, inquiries or proceedings pending or, to the knowledge of the Company, threatened by the IRS or DOL with respect to any Company Employee Plan; (vii) neither the Company nor any Affiliate is subject to any material penalty or tax with respect to any Company Employee Plan under Section 402(i) of ERISA or Sections 4975 through 4980 of the Code; and (viii) all contributions due from the Company or any Affiliate with respect to any of the Company Employee Plans have been made as required under ERISA or have been accrued on the Company Balance Sheet. (c) Employment Matters. Except, in each case, as would not, individually or in the aggregate, have a Material Adverse Effect on the Company, the Company and each of its subsidiaries: (i) is in compliance in all material respects with all applicable foreign, federal, state and local laws, rules and regulations respecting employment, employment practices, terms and conditions of employment and wages and hours, in each case, with respect to Company Employees; (ii) has withheld all amounts required by law or by agreement to be withheld from the wages, salaries and other payments to Company Employees; (iii) has properly classified independent contractors for purposes of federal and applicable state tax laws, laws applicable to employee benefits and other applicable laws; (iv) is not liable for any arrears of wages or any taxes or any penalty for failure to comply with any of the foregoing; and (v) is not liable for any material payment to any trust or other fund or to any governmental or administrative authority, with respect to unemployment compensation benefits, social security or other benefits or obligations for Company Employees (other than routine payments to be made in the normal course of business and consistent with past practice). There are no pending, or, to the Company's knowledge, threatened material claims or actions against the Company under any worker's compensation policy or long-term disability policy. To the Company's knowledge, no Company Employee has violated in any material manner any employment contract, nondisclosure agreement or noncompetition agreement by which such Company Employee is bound due to such Company Employee being employed by the Company and disclosing to the Company or using trade secrets or proprietary information of any other person or entity. (d) Labor. No work stoppage or labor strike against the Company is pending, threatened or reasonably anticipated. The Company does not know of any activities or proceedings of any labor union to organize any Company Employees. There are no actions, suits, claims, labor disputes or grievances pending, or, to the knowledge of the Company, threatened or reasonably anticipated relating to any labor, safety or discrimination matters involving any Company Employee, including charges of unfair labor practices or discrimination complaints, which, if adversely determined, would, individually or in the aggregate, result in any material liability to the Company. Neither the Company nor any of its subsidiaries has engaged in any unfair labor practices within the meaning of the National Labor Relations Act. The Company is not presently, nor has it been in the past, a Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document party to, or bound by, any collective bargaining agreement or union contract with respect to Employees and no collective bargaining agreement is being negotiated by the Company. 3.13 Environmental Matters. To the Company's knowledge, the Company is not in violation of any applicable statute, law or regulation relating to the environment or occupational health and safety, and to the Company's knowledge, no material expenditures are or will be required in order to comply with any such statute, law or regulation. 3.14 Certain Agreements. Other than this Agreement, and except as otherwise set forth in Part 3.14 of the Company Disclosure Letter, neither the Company nor any of its subsidiaries is a party to or is bound by: (a) any material agreement of indemnification, any material guaranty or any material instrument evidencing indebtedness for borrowed money by way of direct loan, sale of debt securities or purchase money obligation; (b) any agreement or obligation currently in force relating to the disposition or acquisition by the Company or any of its subsidiaries after the date of this Agreement of a material amount of assets not in the ordinary course of business, or pursuant to which the Company has any material ownership or participation interest in any corporation, partnership, joint venture, strategic alliance or other business enterprise other than the Company's subsidiaries; (c) any agreement or obligation currently in force to provide source code to any third party for any product or technology; (d) any agreement or obligation with any affiliate of the Company; or (e) any agreement or commitment currently in force providing for capital expenditures by the Company or its subsidiaries in excess of $1,000,000. The agreements required to be disclosed in the Company Disclosure Letter pursuant to clauses (a) through (e) above or pursuant to Section 3.9 or filed with any Company SEC Report (the "COMPANY CONTRACTS") are valid and in full force and effect, except to the extent that such invalidity would not have a Material Adverse Effect on the Company. Neither the Company nor any of its subsidiaries, nor to the Company's knowledge, any other party thereto, is in breach, violation or default under, and neither the Company nor any of its subsidiaries has received written notice that it has breached, violated or defaulted, any of the terms or conditions of any Company Contract in such a manner as would have a Material Adverse Effect on the Company. 3.15 Brokers' and Finders' Fees. The Company has not incurred, nor will it incur, directly or indirectly, any liability for brokerage or Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document finders' fees or agents' commissions or any similar charges in connection with this Agreement or any transaction contemplated hereby. 3.16 Insurance. The Company and each of its subsidiaries have policies of insurance and bonds of the type and in amounts customarily carried by persons conducting business or owning assets similar to those of the Company and its subsidiaries. There is no material claim pending under any of such policies or bonds as to which coverage has been questioned, denied or disputed by the underwriters of such policies or bonds. All premiums due and payable under all such policies have been paid and the Company and its subsidiaries are otherwise in compliance in all material respects with the terms of such policies and bonds. ARTICLE IV REPRESENTATIONS, WARRANTIES AND CERTAIN AGREEMENTS OF VHA VHA hereby represents and warrants to the Company, subject to the exceptions specifically disclosed in writing in the disclosure letter delivered by VHA dated as of the date hereof and certified by a duly authorized officer of VHA (the "VHA DISCLOSURE LETTER") (which VHA Disclosure Letter shall be deemed to be representations and warranties to the Company by VHA under this Section 4), as follows: 4.1 Organization, Good Standing and Qualification. VHA represents that it is an entity duly organized, validly existing and in good standing under the laws of the state of its formation and has all requisite power and authority, and all requisite qualifications to do business as a foreign entity, to conduct its business in the manner in which its business is currently being conducted, except where the failure to be so organized, existing or in good standing or to have such power, authority or qualifications would not have a Material Adverse Effect on VHA. 4.2 Authorization. (a) VHA has all requisite power and authority to enter into this Agreement and to consummate the transactions contemplated hereby. The execution and delivery of this Agreement and the consummation of the transactions contemplated hereby have been duly authorized by all necessary action on the part of VHA. This Agreement has been duly executed and delivered by VHA and constitute the valid and binding obligations of VHA, enforceable against VHA in accordance with their terms, except as enforceability may be limited by bankruptcy and other similar laws affecting the rights of creditors generally and general principles of equity. (b) The execution and delivery of this Agreement by VHA does not, and the performance of this Agreement by VHA will not, (i) conflict with or violate the certificate of incorporation, bylaws, operating agreement or other organizational documents of VHA, (ii) subject to compliance with the requirements set forth in Section 4.2(c) with regard to VHA, conflict with or violate any law, rule, regulation, order, judgment or decree applicable to VHA or by which any of its properties are bound or affected, or (iii) result in any breach of or constitute a default (or an event that with notice or lapse of time or both would become a default) under, or impair VHA's rights or alter the rights or obligations of any third party under, or give to others any rights of termination, amendment, acceleration or cancellation of, or result in the creation of an Encumbrance on any of the properties or assets of VHA pursuant to, any note, bond, mortgage, indenture, contract, agreement, lease, license, permit, franchise or other instrument or obligation to which VHA is a party or by which VHA or any of its properties are bound or affected, except, in the case of clauses (ii) and (iii), for such conflicts, violations, breaches, defaults, impairments, or rights which, individually or in the aggregate, would not have a Material Adverse Effect on VHA. Except as set forth in a letter delivered by VHA to the Company concurrently with the execution of this Agreement, no consents, waivers and approvals under any of VHA's or any of its subsidiaries' agreements, contracts, licenses or leases are required to be obtained in connection with the consummation of the transactions contemplated hereby, which, if individually or in the aggregate not obtained, would have a Material Adverse Effect on VHA. (c) No consent, approval, order or authorization of, or registration, declaration or filing with any Governmental Entity is required to be obtained or made by VHA in connection with the execution and delivery of this Agreement or the consummation of the transactions contemplated hereby, except for (i) such consents, approvals, orders, authorizations, registrations, declarations and filings as may be required under applicable federal, foreign and state securities (or related) laws and the securities laws of any foreign country, and (ii) such other consents, authorizations, filings, approvals and registrations which if not obtained or made would not have a Material Adverse Effect on VHA or have a material adverse effect on the ability of the parties hereto to consummate the transactions contemplated hereby. 4.3 Acquisition for Own Account. The Shares to be purchased by VHA hereunder will be acquired for investment for VHA's own account, not as a nominee or agent, and not with a view to the public resale or distribution thereof within the meaning of the 1933 Act, and VHA represents that it has no present intention or agreement to sell, grant any participation in, or otherwise distribute any of the Shares to be purchased by VHA hereunder in any public resale or distribution within the meaning of the 1933 Act. VHA also represents that it has not been formed for the specific purpose of acquiring the Shares under this Agreement. 4.4 Disclosure of Information. VHA believes it has received or has had full access to all the information it considers necessary or appropriate to make an informed ownership decision with respect to the Shares to be purchased by VHA under this Agreement. VHA further has had an opportunity to ask questions and receive answers from the Company regarding the terms and conditions of the offering of the Shares and to obtain additional information (to the extent the Company possessed such Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document information or could acquire it without unreasonable effort or expense) necessary to verify any information furnished to VHA or to which VHA had access. The foregoing, however, does not in any way limit or modify the representations and warranties made by the Company in Article III. 4.5 Experience. VHA understands that the purchase of the Shares involves substantial risk. VHA: (i) has experience as an investor in securities of companies in the development stage and acknowledges that VHA is able to fend for itself, can bear the economic risk of VHA's investment in the Shares and has such knowledge and experience in financial or business matters that VHA is capable of evaluating the merits and risks of this investment in the Shares and protecting its own interests in connection with this investment and/or (ii) has a preexisting personal or business relationship with the Company and certain of its officers, directors or controlling persons of a nature and duration that enables VHA to be aware of the character, business acumen and financial circumstances of such persons. 4.6 Accredited Investor Status. VHA is an "accredited investor" within the meaning of Regulation D promulgated under the 1933 Act. 4.7 Restricted Securities. VHA understands that the Shares will be characterized as "restricted securities" under the 1933 Act inasmuch as they are being acquired from the Company in a transaction not involving a public offering and that under the 1933 Act and applicable regulations thereunder such securities may be resold without registration under the 1933 Act only in certain limited circumstances. In this connection, VHA represents that VHA is familiar with Rule 144 of the SEC, as presently in effect, and understands the resale limitations imposed thereby and by the 1933 Act. 4.8 No Solicitation. At no time was VHA presented with or solicited by any publicly issued or circulated newspaper, mail, radio, television or other form of general advertising or solicitation in connection with the issuance or delivery of the Shares. 4.9 Further Limitations on Disposition. Without in any way limiting the representations set forth above, VHA further agrees not to make any disposition of all or any portion of the Shares or of any interest therein to any person or entity unless: (a) there is then in effect a registration statement under the 1933 Act covering such proposed disposition of Shares and such disposition is made in accordance with such registration statement; or (b) VHA shall have notified the Company of the proposed disposition of the Shares and shall have furnished the Company with a statement of the circumstances surrounding such proposed disposition, and, at the expense of VHA or its transferee, with an opinion of counsel, reasonably satisfactory to the Company, that Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document such disposition will not require registration of such securities under the 1933 Act. 4.10 Legends. VHA understands and agrees that the certificates evidencing the Shares will bear legends substantially similar to those set forth below, as applicable, in addition to any other legend that may be required by applicable law, by the Company's Certificate of Incorporation or Bylaws, or by any agreement between the Company and VHA: (a) THE SECURITIES REPRESENTED HEREBY HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT"), OR UNDER THE SECURITIES LAWS OF CERTAIN STATES. THESE SECURITIES ARE SUBJECT TO RESTRICTIONS ON TRANSFERABILITY AND RESALE AND MAY NOT BE TRANSFERRED OR RESOLD EXCEPT AS PERMITTED UNDER THE ACT AND THE APPLICABLE STATE SECURITIES LAWS, PURSUANT TO REGISTRATION OR EXEMPTION THEREFROM. INVESTORS SHOULD BE AWARE THAT THEY MAY BE REQUIRED TO BEAR THE FINANCIAL RISKS OF THIS INVESTMENT FOR AN INDEFINITE PERIOD OF TIME. THE ISSUER OF THESE SECURITIES MAY REQUIRE AN OPINION OF COUNSEL IN FORM AND SUBSTANCE SATISFACTORY TO THE ISSUER TO THE EFFECT THAT ANY PROPOSED TRANSFER OTHERWISE PERMITTED UNDER CONTRACTUAL RESTRICTIONS ON RESALE APPLICABLE TO THESE SECURITIES IS IN COMPLIANCE WITH THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS. (b) THE SECURITIES REPRESENTED HEREBY MAY BE SUBJECT TO CERTAIN RESTRICTIONS ON RESALE AND ON VOTING AND THE HOLDERS HEREOF MAY BE BOUND BY CERTAIN RESTRICTIONS ON ACQUISITION OF THE ISSUER'S CAPITAL STOCK PURSUANT TO A COMMON STOCK PURCHASE AGREEMENT BETWEEN THE ORIGINAL HOLDERS OF THESE SECURITES AND THE ISSUER, A COPY OF WHICH MAY BE OBTAINED FROM THE ISSUER. The legend set forth in (a) above shall be removed by the Company from any certificate evidencing Shares upon delivery to the Company of an opinion by counsel, reasonably satisfactory to the Company, to the effect that a registration statement under the 1933 Act is at that time in effect with respect to the legended security or to the effect that such security can be freely transferred in a public sale without such a registration statement being in effect and that such transfer will not jeopardize the exemption or exemptions from registration pursuant to which the Company issued the Shares. 4.11 Tax Liability. VHA has reviewed with its own tax advisors the federal, state, local and foreign tax consequences of this investment and the transactions contemplated by this Agreement. VHA relies solely on such advisors and not on any statements or representations of the Company, the Company's counsel, or any of the Company's agents. It understands that it (and not the Company) shall be responsible for its own tax liability that may arise as a result of this investment or the transactions contemplated by this Agreement. 5.1 Voting of Common Stock. VHA agrees that from and after the date of the Closing through the fifth anniversary of the Closing (the "FIFTH ANNIVERSARY"), and for as long after the Fifth Anniversary as the outstanding shares of Common Stock (including the Shares and any outstanding Restricted Shares and Vested Shares (as such terms are defined in Article II of that certain Amendment to Amended and Restated Common Stock and Warrant Agreement, dated as of October 18, 2000, by and between the Company and VHA (the "COMMON STOCK AND WARRANT AGREEMENT"))) beneficially owned by VHA together with all "affiliates" (which for purposes of this Agreement (other than Section 3.12) shall have the meaning given such term in Rule 144(a)(1) promulgated under the 1933 Act) of VHA is greater than 49.9% of the then outstanding Common Stock of the Company (the entire such period, the "RESTRICTED PERIOD"), VHA shall, and shall cause its affiliates to, vote all Shares it holds or is entitled to vote in proportion to the votes cast by all other stockholders of the Company in connection with each matter submitted to the Company's stockholders for approval. In the event that the outstanding shares of Common Stock (including the Shares and any outstanding Restricted Shares and Vested Shares) beneficially owned by VHA and its affiliates exceeds 35% but does not exceed 49.9% of the then outstanding Common Stock of the Company, the Shares shall be considered Excess Shares (as such term is defined in Section 6.1 of the Common Stock and Warrant Agreement). 5.2 Reasonable Efforts. Upon the terms and subject to the conditions set forth in this Agreement, each of the parties agrees to use all reasonable efforts to take, or cause to be taken, all actions, and to do, or cause to be done, and to assist and cooperate with the other party in doing, all things necessary, proper or advisable to consummate and make effective, in the most expeditious manner practicable, the transactions contemplated by this Agreement, including the taking of all reasonable acts necessary to cause the conditions precedent set forth in Articles VI and VII to be satisfied. 5.3 Registration Rights. The Company shall use its reasonable best efforts to cause the requisite holders of registration rights under the Amended and Restated Registration Rights Agreement among the Company and certain of its investors dated June 30, 2000 to amend such agreement in substantially the form attached hereto as Exhibit A. 5.4 Public Disclosure. The Company and VHA agree that they will promptly after the date of this Agreement issue a joint press release with respect to their entry into this Agreement. The Company and VHA will consult with each other, and to the extent practicable, agree, before issuing a joint press release or otherwise making any public statement with respect to their entry into this Agreement and will not issue any such joint press release or make any such public statement prior to such consultation, except as may be required by law or any listing agreement with a national securities exchange. 5.5 Board of Directors. The Board of Directors of the Company will take all actions necessary such that as soon as practicable following the Closing, C. Tom Smith shall be appointed by VHA to the Company's Board of Directors. For so long as VHA beneficially owns 30% or more of the outstanding Common Stock of the Company on a fully converted basis, the Company will take all actions reasonably necessary to have three persons appointed by VHA be members of the Company's Board of Directors. ARTICLE VI CONDITIONS TO VHA'S OBLIGATIONS AT CLOSING The obligations of VHA under Sections 1 and 2 of this Agreement are subject to the fulfillment or waiver, on or before the Closing, of each of the following conditions: 6.1 Representations and Warranties. The representations and warranties of the Company contained in this Agreement shall be true and correct in all material respects on the date of the Closing with the same effect as though such representations and warranties had been made on and as of the Closing (other than representations and warranties that address matters only as of a particular date, which shall be true and correct as of such date), except where the failure of such representations or warranties to be true or correct would not have, individually or in the aggregate, a Material Adverse Effect on the Company. It is understood that, for purposes of determining the accuracy of such representations and warranties, any update of or modification to the Company Disclosure Letter made or purported to have been made after the execution of this Agreement shall be disregarded. VHA shall have received a certificate with respect to the foregoing signed on behalf of the Company by the Chief Executive Officer or the Chief Financial Officer of the Company. 6.2 Performance. The Company shall have performed and complied in all material respects with all agreements, obligations and conditions contained in this Agreement that are required to be performed or complied with by it on or before the Closing. 6.3 Securities Exemptions. The offer and sale of the Shares to VHA pursuant to this Agreement shall be exempt from the registration requirements of the 1933 Act, the qualification requirements of the California Corporate Securities Law of 1968, as amended ("CALIFORNIA LAW") and the registration and/or qualification requirements of all other applicable state securities laws. 6.4 Consents. (i) All required approvals or consents of any Governmental Entity or other person in connection with the consummation of the transactions contemplated hereby shall have been obtained (and all relevant statutory, regulatory or other governmental waiting periods, shall have expired) unless the failure to receive any such approval or consent would not be reasonably likely, directly or indirectly, to result in a Material Adverse Effect on the Company and its subsidiaries, taken as a whole, and (ii) all such approvals and consents which have been obtained Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document shall be on terms that are not reasonably likely, directly or indirectly, to result in a Material Adverse Effect on the Company and its subsidiaries, taken as a whole. 6.5 Nasdaq Listing. If required, the Shares shall have been approved for listing on the Nasdaq Stock Market, subject to official notice of issuance. ARTICLE VII CONDITIONS TO THE COMPANY'S OBLIGATIONS AT CLOSING The obligations of the Company under this Agreement are subject to the fulfillment or waiver on or before the Closing of each of the following conditions: 7.1 Representations and Warranties. The representations and warranties of VHA contained in Article IV shall be true and correct in all material respects on the date of the Closing with the same effect as though such representations and warranties had been made on and as of the Closing. It is understood that, for purposes of determining the accuracy of such representations and warranties, any update of or modification to the VHA Disclosure Letter made or purported to have been made after the execution of this Agreement shall be disregarded. The Company shall have received a certificate with respect to the foregoing signed on behalf of VHA by the Chief Executive Officer or the Chief Financial Officer of VHA. 7.2 Performance. VHA shall have performed and complied in all material respects with all agreements, obligations and conditions contained in this Agreement that are required to be performed or complied with by it on or before the Closing. 7.3 Securities Exemptions. The issuance of the Shares to VHA pursuant to this Agreement shall be exempt from the registration requirements of the 1933 Act, the qualifications requirements of California Law and the registration and/or qualification requirements of all other applicable state securities laws. 7.4 Consents. (i) All required approvals or consents of any Governmental Entity or other person in connection with the consummation of the transactions contemplated hereby shall have been obtained (and all relevant statutory, regulatory or other governmental waiting periods, shall have expired) unless the failure to receive any such approval or consent would not be reasonably likely, directly or indirectly, to result in a Material Adverse Effect on the Company and its subsidiaries, taken as a whole, and (ii) all such approvals and consents which have been obtained shall be on terms that are not reasonably likely, directly or indirectly, to result in a Material Adverse Effect on the Company and its subsidiaries, taken as a whole. ARTICLE VIII TERMINATION 8.1 Termination. This Agreement may be terminated prior to the Closing: (a) by mutual written consent duly authorized by the Boards of Directors of the Company and VHA; (b) by either the Company or VHA if the Closing shall not have occurred by February 15, 2001 for any reason; provided, however, that the right to terminate this Agreement under this Section 9.1(b) shall not be available to any party whose action or failure to act has been a principal cause of or resulted in the failure of the Closing to occur on or before such date and such action or failure to act constitutes a breach of this Agreement; or (c) by either the Company or VHA if a Governmental Entity shall have issued an order, decree or ruling or taken any other action, in any case having the effect of permanently restraining, enjoining or otherwise prohibiting the Closing, which order, decree, ruling or other action is final and nonappealable. 8.2 Notice of Termination; Effect of Termination. Any proper termination of this Agreement under Section 8.1 will be effective immediately upon the delivery of written notice of the terminating party to the other party hereto. In the event of the termination of this Agreement as provided in Section 8.1, this Agreement shall be of no further force or effect, except (i) as set forth in this Section 8.2 and Article IX, each of which shall survive the termination of this Agreement, and (ii) nothing herein shall relieve either party from liability for any willful breach of this Agreement. ARTICLE IX GENERAL PROVISIONS 9.1 Survival of Warranties. The representations, warranties and covenants of VHA (except for any covenant that by its express terms survives the Closing, and for the representations, warranties and covenants set forth in Sections 4.3 through 4.10 inclusive, which shall survive the execution and delivery of this Agreement and the Closing) contained in or made pursuant to this Agreement shall terminate at the Closing. The representations, warranties and covenants of the Company (except for any covenant that by its express terms survives the Closing) contained in or made pursuant to this Agreement shall terminate at the Closing. 9.2 Assignment. No party may assign either this Agreement or any of its rights, interests, or obligations hereunder without the prior written consent of the other party hereto. Subject to the preceding sentence, this Agreement shall be binding upon and shall inure to the benefit of the parties hereto and their respective successors and permitted assigns. Any purported assignment in violation of this Section shall be void. 9.3 Governing Law. This Agreement shall be governed by and construed under the internal laws of the State of Delaware as applied to agreements among Delaware residents entered into and to be performed entirely within Delaware, without reference to principles of conflict of laws or choice of laws. 9.4 Counterparts. This Agreement may be executed in two or more counterparts, each of which shall be deemed an original, but all of which together shall constitute one and the same agreement. 9.5 Interpretation; Certain Defined Terms. (a) When a reference is made in this Agreement to Exhibits, such reference shall be to an Exhibit to this Agreement unless otherwise indicated. When a reference is made in this Agreement to Sections, such reference shall be to a Section of this Agreement unless otherwise indicated. The words "INCLUDE," "INCLUDES" and "INCLUDING" when used herein shall be deemed in each case to be followed by the words "WITHOUT LIMITATION." The headings contained in this Agreement are for reference purposes only and shall not affect in any way the meaning or interpretation of this Agreement. When reference is made herein to "THE BUSINESS OF" an entity, such reference shall be deemed to include the business of all direct and indirect subsidiaries of such entity. Reference to the subsidiaries of an entity shall be deemed to include all direct and indirect subsidiaries of such entity. (b) For purposes of this Agreement, "ENCUMBRANCES" means any lien, pledge, hypothecation, charge, mortgage, security interest, encumbrance, claim, option, right of first refusal, preemptive right, community property interest or restriction of any nature (including any restriction on the voting of any security, any restriction on the transfer of any security or other asset, any restriction on the receipt of any income derived from any asset, any restriction on the use of any asset and any restriction on the possession, exercise or transfer of any other attribute of ownership of any asset) (other than (i) liens for taxes not yet due and payable; (ii) liens reflected on the Company Balance Sheet, if applicable; (iii) liens which are not material in character, amount or extent, and which do not materially detract from the value or materially interfere with the use of the property subject thereto or affected thereby; and (iv) contractor's liens). (c) For purposes of this Agreement, the term "MATERIAL ADVERSE EFFECT" when used in connection with an entity means any change, event, violation, inaccuracy, circumstance or effect that is or is reasonably likely to be materially adverse to the business, assets (including intangible assets), capitalization, financial condition, operations or results of operations of such entity taken as a whole with its subsidiaries, except to the extent that any such change, event, violation, inaccuracy, circumstance or effect directly and primarily results from (i) changes in general economic conditions or changes affecting the industry Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document generally in which such entity operates (provided that such changes do not affect such entity in a substantially disproportionate manner) or (ii) changes in the trading prices for such entity's capital stock. (d) For purposes of this Agreement, the term "PERSON" shall mean any individual, corporation (including any non-profit corporation), general partnership, limited partnership, limited liability partnership, joint venture, estate, trust, company (including any limited liability company or joint stock company), firm or other enterprise, association, organization, entity or Governmental Entity. 9.6 Notices. All notices and other communications hereunder shall be in writing and shall be deemed given upon delivery either personally or by commercial delivery service, or sent via facsimile (receipt confirmed) to the parties at the following addresses or facsimile numbers (or at such other address or facsimile number for a party as shall be specified by like notice): IF TO VHA: WITH A COPY TO: VHA Inc. Skadden, Arps, Slate, Meagher & Flom, LLP 220 East Las Colinas Boulevard Four Times Square Irving, Texas 75039-5500 New York, New York 10036 Facsimile: 972-830-0391 Facsimile: 212-735-2000 Attn: Chief Financial Officer Attn: Nancy A. Lieberman IF TO THE COMPANY: WITH A COPY TO: Neoforma.com, Inc. Fenwick & West LLP 3061 Zanker Road Two Palo Alto Square, Palo Alto, San Jose, California 95134 California 94306 Facsimile: 408-468-4040 Facsimile: 650-494-1417 Attn: Chief Financial Officer Attn: Gordon K. Davidson Douglas N. Cogen 9.7 Expenses; Finder's Fees. All fees and expenses incurred in connection with this Agreement and the transactions contemplated hereby shall be paid by the party incurring such expenses whether or not the Closing occurs. VHA agrees to indemnify and to hold harmless the Company from any liability for any commission or compensation in the nature of a finder's or broker's fee (and any asserted liability) for which VHA or any of its officers, partners, members, employees, or representatives is responsible. The Company agrees to indemnify and hold harmless VHA from any liability for any commission or compensation in the nature of a finder's or broker's fee (and any asserted liability) for which the Company or any of its officers, employees or representatives is responsible. 9.8 Severability. If one or more provisions of this Agreement are held to be unenforceable under applicable law, such provision(s) shall be excluded from this Agreement and the balance of the Agreement shall be interpreted as if such provision(s) were so excluded and shall be Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document enforceable in accordance with its terms. 9.9 Entire Agreement. This Agreement, together with all exhibits and schedules hereto, constitute the entire agreement and understanding of the parties with respect to the subject matter hereof and supersedes any and all prior negotiations, correspondence, agreements, understandings duties or obligations between the parties with respect to the subject matter hereof. 9.10 Further Assurances. From and after the date of this Agreement, upon the request of VHA or the Company, the Company and VHA shall execute and deliver such instruments, documents or other writings as may be reasonably necessary or desirable to confirm and carry out and to effectuate fully the intent and purposes of this Agreement. 9.11 Amendment; Extension; Waiver. Subject to applicable law, this Agreement may be amended by the parties hereto at any time by execution of an instrument in writing signed on behalf of the Company and VHA. At any time prior to the Closing any party hereto may, to the extent legally allowed, (i) extend the time for the performance of any of the obligations or other acts of the other party hereto, (ii) waive any inaccuracies in the representations and warranties made to such party contained herein or in any document delivered pursuant hereto and (iii) waive compliance with any of the agreements or conditions for the benefit of such party contained herein. Any agreement on the part of a party hereto to any such extension or waiver shall be valid only if set forth in an instrument in writing signed on behalf of such party. Delay in exercising any right under this Agreement shall not constitute a waiver of such right. 9.12 Other Remedies; Specific Performance. Except as otherwise provided herein, any and all remedies herein expressly conferred upon a party will be deemed cumulative with and not exclusive of any other remedy conferred hereby, or by law or equity upon such party, and the exercise by a party of any one remedy will not preclude the exercise of any other remedy. The parties hereto agree that irreparable damage would occur in the event that any of the provisions of this Agreement were not performed in accordance with their specific terms or were otherwise breached. It is accordingly agreed that the parties shall be entitled to seek an injunction or injunctions to prevent breaches of this Agreement and to enforce specifically the terms and provisions hereof in any court of the United States or any state having jurisdiction, this being in addition to any other remedy to which they are entitled at law or in equity. 9.13 Rules of Construction. The parties hereto agree that they have been represented by counsel during the negotiation and execution of this Agreement and, therefore, waive the application of any law, regulation, holding or rule of construction providing that ambiguities in an agreement or other document will be construed against the party drafting such agreement or document. 9.14 Company Disclosure Letter. Disclosure made with regard to a Copyright © 2012 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document representation or warranty of the Company in the Company Disclosure Letter shall also be deemed to qualify other representations and warranties of the Company if it is readily apparent from the language contained in such disclosure that such disclosure is applicable to such other representation or warranty. 9.15 Waiver Of Jury Trial. EACH OF THE COMPANY AND VHA HEREBY IRREVOCABLY WAIVES ALL RIGHT TO TRIAL BY JURY IN ANY ACTION, PROCEEDING OR COUNTERCLAIM (WHETHER BASED ON CONTRACT, TORT OR OTHERWISE) ARISING OUT OF OR RELATING TO THIS AGREEMENT OR THE ACTIONS THE COMPANY OR VHA IN THE NEGOTIATION, ADMINISTRATION, PERFORMANCE AND ENFORCEMENT HEREOF. * * * * * IN WITNESS WHEREOF, the parties hereto have caused this Agreement to be executed by their duly authorized respective officers as of the date first written above. NEOFORMA.COM, INC. By:__________________________ Name: Title: VHA INC. By: ________________________ Name: Title: [SIGNATURE PAGE TO COMMON STOCK PURCHASE AGREEMENT] SCHEDULE OF EXHIBITS Exhibit A: Registration Rights Agreement Amendment AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT This AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT dated January 25, 2001 (this "AMENDMENT") amends that certain Registration Rights Agreement, dated as of June 30, 2000, by and among Neoforma.com, Inc., a Delaware corporation (the "COMPANY"), and the Investors (the "PRIOR RIGHTS AGREEMENT"). The capitalized terms not otherwise defined herein have the respective meanings given to them in the Prior Rights Agreement. RECITALS WHEREAS, Section 7.1 of the Prior Rights Agreement states in part that any term or provision of the Prior Rights Agreement may be amended by a writing signed by the Company and the holders of a majority of the shares of the Registrable Securities. WHEREAS, the undersigned parties include the Company and the holders of a majority of the shares of the Registrable Securities. NOW, THEREFORE, in consideration of the mutual promises made herein and other good and valuable consideration, the receipt and adequacy of which are hereby acknowledged, the parties hereto agree to amend the Prior Rights Agreement as follows: 1. Amendment of Section 1.7 of the Prior Rights Agreement. Section 1.7 of the Prior Rights Agreement is amended to add (i) the shares of Common Stock issued to VHA pursuant to that certain Common Stock Purchase Agreement, dated as of January 25, 2001, by and between the Company and VHA and (ii) the shares of Common Stock issued to UHC pursuant to that certain Common Stock Purchase Agreement, dated as of January 25, 2001, by and between the Company and UHC to the definition of Registrable Securities. Section 1.7 shall read in its entirety as follows: "1.7 "REGISTRABLE SECURITIES" means shares of Common Stock of the Company (i) issued or issuable upon conversion of the Preferred Stock (the "CONVERSION STOCK") and (ii) issued or issuable with respect to, or in exchange for or in replacement of the Conversion Stock or other Registrable Securities, (iii) issued or issuable with respect to, or in exchange for or in replacement of other securities convertible into or exercisable for Preferred Stock upon any stock split, stock dividend, recapitalization, or similar event, (iv) issued to the former stockholders of Pharos Technologies, Inc., (the "PHAROS INVESTORS") in connection with its acquisition by the Company, (v) issued to the former stockholders of U.S. LifeLine, Inc. (the "USL INVESTORS") in connection with its acquisition by the Company, (vi) issued to the former stockholders of EquipMD, Inc., (the "EMI INVESTORS") in connection with its acquisition by the Company, (vii) issued to, or issuable upon exercise of warrants issued to, VHA, Inc., a Delaware corporation ("VHA") or University Healthsystem Consortium, an Illinois corporation ("UHC") in connection with the commercial agreement among Neoforma, Novation, LLC, a Delaware limited liability company ("NOVATION"), Healthcare Purchasing Partners International, LLC, a Delaware limited liability company, VHA and UHC, (viii) issued to VHA pursuant to that certain Common Stock Purchase Agreement, dated as of January 25, 2001, by and between the Company and VHA and (ix) issued to UHC pursuant to that certain Common Stock Purchase Agreement, dated as of January 25, 2001, by and between the Company and UHC (the shares of Common Stock of the Company (or other securities convertible or exchangeable therefor) described in clauses (vii), (viii) and (ix), the "NOVATION REGISTRABLE SECURITIES"), excluding: (A) any shares of Common Stock that have been sold to or through a broker, dealer, market maker or underwriter in a public distribution or a public securities transaction or redeemed by the Company in accordance with its Certificate of Incorporation, (B) any shares of Common Stock of the Company (or Preferred Stock or other securities convertible or exercisable therefor) that have been sold in violation of this Agreement, and (C) all shares of Common Stock of the Company (or Preferred Stock or other securities convertible or exchangeable therefor) described in clause (i), (ii), (iii), (iv), (v), (vi), (vii), (viii) or (ix) of this Section 1.7 held by a Holder that can, in the opinion of counsel to the Company, be sold by such Holder in a three-month period without registration under the Securities Act pursuant to Rule 144." 2. All Other Terms Unchanged. Except as expressly modified by this Amendment, all terms of the Prior Rights Agreement shall remain in full force and effect. 3. Governing Law. This Amendment shall be governed by and construed under the internal laws of the State of Delaware as applied to agreements among Delaware residents entered into and to be performed entirely within Delaware, without reference to principles of conflict of laws or choice of laws. 4. Counterparts. This Amendment may be executed in two or more counterparts, each of which will be deemed an original, but all of which together will constitute one and the same instrument. [THE REMAINDER OF THIS PAGE HAS BEEN INTENTIONALLY LEFT BLANK] IN WITNESS WHEREOF, this Amendment has been executed as of the date first above written. COMPANY: INVESTORS (Entity): NEOFORMA.COM, INC. _____________________________ (Printed Entity Name Here) By: Andrew L. Guggenhime By:__________________________ Chief Financial Officer and Secretary Name:________________________ Title: ______________________ INVESTORS (Individual): _______________________________ Signature Here _______________________________ Printed Name Here [SIGNATURE PAGE TO AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT] AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT This AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT dated January 24, 2001 (this "AMENDMENT") amends that certain Registration Rights Agreement, dated as of June 30, 2000, by and among Neoforma.com, Inc., a Delaware corporation (the "COMPANY"), and the Investors (the "PRIOR RIGHTS Agreement"). The capitalized terms not otherwise defined herein have the respective meanings given to them in the Prior Rights Agreement. RECITALS WHEREAS, Section 7.1 of the Prior Rights Agreement states in part that any term or provision of the Prior Rights Agreement may be amended by a writing signed by the Company and the holders of a majority of the shares of the Registrable Securities. WHEREAS, the undersigned parties include the Company and the holders of a majority of the shares of the Registrable Securities. NOW, THEREFORE, in consideration of the mutual promises made herein and other good and valuable consideration, the receipt and adequacy of which are hereby acknowledged, the parties hereto agree to amend the Prior Rights Agreement as follows: 1. Amendment of Section 1.7 of the Prior Rights Agreement. Section 1.7 of the Prior Rights Agreement is amended to add (i) the shares of Common Stock issued to VHA pursuant to that certain Common Stock Purchase Agreement, dated as of January 24, 2001, by and between the Company and VHA and (ii) the shares of Common Stock issued to UHC pursuant to that certain Common Stock Purchase Agreement, dated as of January 24, 2001, by and between the Company and UHC to the definition of Registrable Securities. Section 1.7 shall read in its entirety as follows: "1.7 "REGISTRABLE SECURITIES" means shares of Common Stock of the Company (i) issued or issuable upon conversion of the Preferred Stock (the "CONVERSION STOCK") and (ii) issued or issuable with respect to, or in exchange for or in replacement of the Conversion Stock or other Registrable Securities, (iii) issued or issuable with respect to, or in exchange for or in replacement of other securities convertible into or exercisable for Preferred Stock upon any stock split, stock dividend, recapitalization, or similar event, (iv) issued to the former stockholders of Pharos Technologies, Inc., (the "PHAROS INVESTORS") in connection with its acquisition by the Company, (v) issued to the former stockholders of U.S. LifeLine, Inc. (the "USL INVESTORS") in connection with its acquisition by the Company, (vi) issued to the former stockholders of EquipMD, Inc., (the "EMI Investors") in connection with its acquisition by the Company, (vii) issued to, or issuable upon exercise of warrants issued to, VHA, Inc., a Delaware corporation ("VHA") or University Healthsystem Consortium, an Illinois corporation ("UHC") in connection with the commercial agreement among Neoforma, Novation, LLC, a Delaware limited liability company ("NOVATION"), Healthcare Purchasing Partners International, LLC, a Delaware limited liability company, VHA and UHC, (viii) issued to VHA pursuant to that certain Common Stock Purchase Agreement, dated as of January 24, 2001, by and between the Company and VHA and (ix) issued to UHC pursuant to that certain Common Stock Purchase Agreement, dated as of January 24, 2001, by and between the Company and UHC (the shares of Common Stock of the Company (or other securities convertible or exchangeable therefor) described in clauses (vii), (viii) and (ix), the "NOVATION REGISTRABLE SECURITIES"), excluding: (A) any shares of Common Stock that have been sold to or through a broker, dealer, market maker or underwriter in a public distribution or a public securities transaction or redeemed by the Company in accordance with its Certificate of Incorporation, (B) any shares of Common Stock of the Company (or Preferred Stock or other securities convertible or exercisable therefor) that have been sold in violation of this Agreement, and (C) all shares of Common Stock of the Company (or Preferred Stock or other securities convertible or exchangeable therefor) described in clause (i), (ii), (iii), (iv), (v), (vi), (vii), (viii) or (ix) of this Section 1.7 held by a Holder that can, in the opinion of counsel to the Company, be sold by such Holder in a three-month period without registration under the Securities Act pursuant to Rule 144." 2. All Other Terms Unchanged. Except as expressly modified by this Amendment, all terms of the Prior Rights Agreement shall remain in full force and effect. 3. Governing Law. This Amendment shall be governed by and construed under the internal laws of the State of Delaware as applied to agreements among Delaware residents entered into and to be performed entirely within Delaware, without reference to principles of conflict of laws or choice of laws. 4. Counterparts. This Amendment may be executed in two or more counterparts, each of which will be deemed an original, but all of which together will constitute one and the same instrument. [THE REMAINDER OF THIS PAGE HAS BEEN INTENTIONALLY LEFT BLANK] IN WITNESS WHEREOF, this Amendment has been executed as of the date first above written. COMPANY: INVESTORS (Entity): NEOFORMA.COM, INC. ___________________________________ (Printed Entity Name Here) By: ___________________________ Andrew L. Guggenhime Chief Financial Officer and By: _______________________________ Secretary Name: _____________________________ Title: ____________________________ INVESTORS (Individual): ___________________________________ Signature Here ____________________________________ Printed Name Here [SIGNATURE PAGE TO AMENDMENT NO. 1 TO REGISTRATION RIGHTS AGREEMENT]
<urn:uuid:beed818b-03c4-4b5a-b2eb-935560ddba68>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
95,504
| A | R# | PP | |--------------------|-----|------| | AANETA | 9 | 9/10 | | ACTION O TOOLE | 7 | 7/10 | | ADRIANS KNOCKOUT | 7 | 9/10 | | APOLLO JET IT | 1 | 2/7 | | ARCOS NEW FLAKE | 4 | 9/10 | | B | R# | PP | |--------------------|-----|------| | BB JERRYS MOONSHINE| 6 | 8/10 | | BLESSINGS BROTHER | 8 | 2/10 | | BLING BLING BOK | 8 | 3/10 | | BOK MAN | 5 | 2/8 | | BOOTS ON FLY | 8 | 4/10 | | C | R# | PP | |--------------------|-----|------| | CARTEL FOX | 3 | 5/10 | | C BAR DASH | 3 | 10/10| | CHAMP MAD MAGIC | 6 | 3/10 | | CSR BIGDOGGIN | 1 | 6/7 | | D | R# | PP | |--------------------|-----|------| | DASHERS MIDNIGHT | 5 | 8/8 | | DM TRAFFIC | 5 | 6/8 | | E | R# | PP | |--------------------|-----|------| | EXPENSIVELY PURE | 2 | 9/10 | | F | R# | PP | |--------------------|-----|------| | FIRST N WICKED | 2 | 6/10 | | FLYIN HAWK | 5 | 5/8 | | FREDDIES CRASH | 6 | 6/10 | | G | R# | PP | |--------------------|-----|------| | GLORY HALLA LEE YA | 2 | 5/10 | | GRAVITY DEFIED | 7 | 8/10 | | GROOVY GROUCH | 9 | 3/10 | | H | R# | PP | |--------------------|-----|------| | HAMBURG GIG | 8 | 8/10 | | HOLLANDS LAST DANCE| 6 | 7/10 | | I | R# | PP | |--------------------|-----|------| | INVISIBLY COOL | 1 | 5/7 | | J | R# | PP | |--------------------|-----|------| | JC MY DIAMOND MAN | 5 | 4/8 | | JESSI STREAKER | 6 | 10/10| | JOVETTA | 3 | 9/10 | | JS RED WAGON | 4 | 3/10 | | JULIANS MONEY MAKER| 4 | 1/10 | | JUPITER ALIBI | 2 | 10/10| | JUSTABOUT EVERYTHING| 7 | 10/10| | JUST LIKE JULIE | 7 | 6/10 | | K | R# | PP | |--------------------|-----|------| | KISS MY EPISODE | 7 | 4/10 | | KITE FLYER | 5 | 1/8 | | L | R# | PP | |--------------------|-----|------| | LAYLA DALE | 3 | 4/10 | | LBH DA ANGEL | 3 | 1/10 | | LETHAL FIRE | 2 | 7/10 | | LITTLEBITAMAGIC | 9 | 5/10 | | LLANO STREET | 1 | 3/7 | | LX LINDA | 9 | 10/10| | M | R# | PP | |--------------------|-----|------| | MAMMA ME A BOK | 9 | 8/10 | | MICHELAS GOLD | 6 | 1/10 | | MISS WAPYSCASH | 7 | 2/10 | | MONEY SHOT | 4 | 10/10| | MORNING MISS DALLAS| 2 | 1/10 | | MYSTERIOUS STREAKER| 1 | 1/7 | | O | R# | PP | |--------------------|-----|------| | OSCEOLAS SPECIAL JET| 4 | 2/10 | | OVER DEE RAINBOW | 1 | 7/7 | | P | R# | PP | |--------------------|-----|------| | PAESANI | 9 | 7/10 | | PAPA LARRY'S GIRL | 9 | 4/10 | | PHANTAL WON | 3 | 7/10 | | PLEASE GET THERE | 4 | 5/10 | | PRIME MOON | 9 | 2/10 | | PRIMETIME APOLLO | 1 | 4/7 | | R | R# | PP | |--------------------|-----|------| | RACE ME OR CHASE ME| 5 | 7/8 | | ROCKET FUEL RB | 2 | 2/10 | | ROYAL BEDUINO DASH | 4 | 7/10 | | ROYAL DASH | 2 | 8/10 | | ROYAL SHAKE UM FEVER| 4 | 8/10 | | RUN CLEAT | 6 | 4/10 | | S | R# | PP | |--------------------|-----|------| | SAMS FISH | 7 | 5/10 | | SHEZA STREAKIN ROSE| 9 | 1/10 | | SHINEYS MAGIC T | 5 | 3/8 | | SHININ MOONBAR | 3 | 8/10 | | SISTER JOLLA | 6 | 9/10 | | STRAWFLY INVICTUS | 2 | 3/10 | | SWEET EASTER BUNNY | 8 | 7/10 | | T | R# | PP | |--------------------|-----|------| | TAKINTHEWIN | 8 | 1/10 | | TANNING | 7 | 1/10 | | TD ROYAL CHEW CHEW | 7 | 3/10 | | TELLER IMA ROCKSTAR| 8 | 9/10 | | THE SECRET LEADER | 3 | 6/10 | | TOUCHINHIGHNLOW | 4 | 6/10 | | TREMOR ON ICE | 8 | 10/10| | TRES SEIS BUDS | 6 | 2/10 | | U | R# | PP | |--------------------|-----|------| | UNSHAKEN SECRET | 2 | 4/10 | | V | R# | PP | |--------------------|-----|------| | VEVA VOLCOM | 4 | 4/10 | | VOLCOM ROSE | 8 | 6/10 | | W | R# | PP | |--------------------|-----|------| | WICKED DYNA | 9 | 6/10 | | WICKED RED WHISKEY | 3 | 3/10 | | WILLABUGHAVEADASH | 3 | 2/10 | | WINNING DYNASTY | 8 | 5/10 | | Z | R# | PP | |--------------------|-----|------| | ZING RUSHING SPIRIT| 6 | 5/10 | In Today for THURSDAY, NOVEMBER 8, 2012 85 In Body 0 Also Eligible 85 Total In Today | Name | Horse Name | Race | Position | |-----------------------------|-----------------------------------|------|----------| | Carlos Aguilar | Please Get There | 4 | PP 5 of 10 | | Xavier Alonzo | Bb Jerrys Moonshine | 6 | PP 8 of 10 | | Harvey Basco | Phantail Won | 3 | PP 7 of 10 | | J. Ryan Basham | Primetime Apollo | 1 | PP 4 of 7 | | Jon Beggs | Kite Flyer | 5 | PP 1 of 8 | | Bradley C. Bolen | Bling Bling Bok | 8 | PP 3 of 10 | | Tommy Bullard | Mamma Me A Bok | 9 | PP 8 of 10 | | Javier Noel Contreras | Expensively Paid | 2 | PP 9 of 10 | | Bertie Sue Dutton | Jess Steady | 6 | PP 10 of 10 | | Jose C. Espinoza | Touchinhighnlow | 4 | PP 6 of 10 | | Yasmine M. Fierro | Royal Dash | 2 | PP 8 of 10 | | Wendy Garcia | Teller Ima Rockstar | 8 | PP 9 of 10 | | James A. Gerhards | Apollo Jilt | 1 | PP 2 of 7 | | Russell M. Harris | Unshakable Secret | 2 | PP 4 of 10 | | Manuel De Jesus Hernandez | Morrin Miss Dallas | 2 | PP 1 of 10 | | Isaro Hinojosa | Tremor On Ice | 8 | PP 10 of 10 | | Guy Hopkins | Justabout Everything | 7 | PP 10 of 10 | | Jerry Jerman | Bok Man | 5 | PP 2 of 8 | | L. R. Tootie Jordan | Car Sigared | 1 | PP 6 of 7 | | Judd S. Kearl | Blessings Brother | 8 | PP 2 of 10 | | Greg Lofland | Adrians Knockout | 7 | PP 9 of 10 | | Elpidio Luna, Jr. | Arcos New Flake | 4 | PP 9 of 10 | | Cleto Martinez, Jr. | Loh Da Angel | 3 | PP 1 of 10 | | Jose Alonzo Martinez-Rocha | Tres Seis Buds | 6 | PP 2 of 10 | | Vicki Lea McLivain | William Evereadvast | 3 | PP 2 of 10 | | Jacobo Mejia | Jupiter Allib | 2 | PP 10 of 10 | | Jorge Luis Mendoza | Julians Money Maker | 4 | PP 1 of 10 | | James D. Middleton | Boots On Fly | 8 | PP 4 of 10 | | Roger L. Moore | Royal Shake Um Fever | 4 | PP 8 of 10 | | Kie Mushinski | Layla Dale | 3 | PP 4 of 10 | | Eugene Nors | Over Dee Rainbow | 1 | PP 7 of 7 | | Don R. Potet | Liano Street | 1 | PP 3 of 7 | | Raul Rodriguez | Js Red Wagon | 4 | PP 3 of 10 | | Steve Roublion | Champ Mad Magic | 6 | PP 3 of 10 | | Christian Rubalcava | Aareta | 9 | PP 9 of 10 | | Angel Sanchez | Just Like Julie | 7 | PP 8 of 10 | | Eric Schneider | Glory Halla Lee Ya | 2 | PP 5 of 10 | | Larry Sherwood | G C Dash | 3 | PP 10 of 10 | | Ronnie S. Stewart | The Secret Leader | 3 | PP 6 of 10 | | Brian Stroud | Jc My Diamond Man | 5 | PP 4 of 8 | | Carlos Terrazas | Sister Jolla | 6 | PP 9 of 10 | | Cissy Ulmer | Osceolas Special Jet | 4 | PP 2 of 10 | | James Vaughn, Jr. | Wicked Red Whiskey | 3 | PP 3 of 10 | | Trey Wood | Lethal Fire | 2 | PP 7 of 10 | | Jesse Yoakum | Shinyes Magic T | 5 | PP 3 of 8 | | Thomas Zarate | Winning Dynasty | 8 | PP 5 of 10 | In Today for THURSDAY, NOVEMBER 8, 2012 85 In Body 0 Also Eligible 85 Total In Today
<urn:uuid:c6791acd-98d9-4968-b423-95f2e599ca54>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
9,061
To vote for a candidate, fill in the oval to the right of the candidate’s name. To vote for a person not on the ballot, write the person’s name and residence in the blank space provided and fill in the oval. Para votar por un candidato, favor de rellenar el oval a la derecha del nombre del candidato. Para votar por una persona que no está en la papeleta, escribe el nombre y la dirección de la persona en el espacio en blanco proveído y rellene el oval. CITY COUNCIL CONCEJERO DE LA CIUDAD Two (2) Year Term Término de dos (2) años Vote for not more than THREE (3) Vote por no más de TRES (3) JOHN MATTHEW DRINKWATER 235 Remington St. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse RITA M. MERGER 221 Burnham Rd. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse VESNA NUN 10 Old Town Rd. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse DEBORAH A. BELANGER 65 Lapierre Ave. ROBERT J. HOEY JR. 67 Stratford St. BOBBY TUGBYTE 33 Middle St., Unit 18 SCHOOL COMMITTEE COMITÉ DE LA ESCUELA Two (2) Year Term Término de dos (2) años Vote for not more than TWO (2) Vote por no más de DOS (2) MICHAEL F. DILLON, JR. 34 Hampson St. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse JACQUELINE DOHERTY 419 Pawtucket St., Unit 1 Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse CONNIE A. MARTIN 17 Summit St. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse JAMES A. PETERS 30 Chaucer Ave. DO NOT VOTE IN THIS SPACE. USE BLANK LINE BELOW FOR WRITE-IN. NO VOTAR EN ESTE ESPACIO. UTILICE LA LÍNEA EN BLANCO PARA ASISTIR A LA INFORMACIÓN ESCRITA/ESCRITA/ESCRITA SOBRE EL CANDIDATO NO NOMBRADO. SCHOOL COMMITTEE - DISTRICT 3 COMITÉ DE LA ESCUELA – DISTRITO 3 Two (2) Year Term Término de dos (2) años Vote for not more than ONE (1) Vote por no más de UNO (1) ANDRE P. DESCOTEAUX 110 Stafford Rd. Candidato para reelección / Candidato para reelección / registrarse/registrarse/registrarse SUSIE SOPHIA CHAGOUN 174 Main St., Apt. 1 DO NOT VOTE IN THIS SPACE. USE BLANK LINE BELOW FOR WRITE-IN. NO VOTAR EN ESTE ESPACIO. UTILICE LA LÍNEA EN BLANCO PARA ASISTIR A LA INFORMACIÓN ESCRITA/ESCRITA/ESCRITA SOBRE EL CANDIDATO NO NOMBRADO. THIS QUESTION IS NOT BINDING ESTA PREGUNTA NO ES VINCULANTE QUESTION 1 ASUNTO 1: Currently the Mayor of the City of Lowell is elected by a vote of the City Council. Do you support a charter change that would allow the votes to elect the Mayor from City Council candidates? Actualmente, el alcalde de la ciudad de Lowell es elegido por votación del Concejo Municipal. ¿Apoya un cambio de estatuto que permitiría a los votantes elegir al alcalde entre los candidatos al Concejo Municipal? YES / SI / បានស្វែង NO / NO / ជាមួយមិន 215327 LOWELL TH_ABS_District 5.indd 1 10/12/21 11:47 AM
b29e864b-d59d-44e6-bd3b-0cca0c8320ac
HuggingFaceFW/finepdfs/tree/main/data/spa_Latn/train
finepdfs
spa_Latn
2,993
Beh okolo VN Môťová Výsledková listina 2018 HOBBY Počet záznamov: 4 1
<urn:uuid:78968285-78de-461e-b81a-a1c28825e24c>
HuggingFaceFW/finepdfs/tree/main/data/slk_Latn/train
finepdfs
slk_Latn
72
Aspetti di un’azienda Biodinamica Frutticola Tommaso Busato Cos’è un’azienda biodinamica Un’azienda agricola Biodinamica si basa sulla visione del teosofo Rudolf Steiner, fondatore dell’Antroposofia, che vuole creare un maggiore equilibrio tra l’azienda e l’ambiente circostante. Con ambiente circostante non si intende solo gli alberi che circondano l’azienda o il campo del vicino, ma tutte quelle forze cosmiche naturali che vengono ignorate: come il sole e la luna. Considera, inoltre, come l’uomo sia strettamente legato alla natura e a queste forze, così come il prodotto alimentare che non può presentarsi come un risultato sterile industriale. L’agricoltura Biodinamica si basa anche su concetti dell’omeopatia e su pratiche agricole comuni nelle aziende Biologiche, ma approfondisce il discorso introducendo concetti di economia circolare e dei prodotti fertilizzanti totalmente naturali, i cosiddetti “preparati”. In un’azienda biodinamica l’aspetto dell’economia circolare è molto importante, poiché la produzione autonoma, oppure tramite l’aiuto di aziende del luogo, di tutti gli elementi necessari al conseguimento del ciclo produttivo è di fondamentale importanza. Preparati Biodinamici I preparati biodinamici sono vari e numerosi, non tutte le aziende biodinamiche applicano ogni singolo preparato possibile e, inoltre, nonostante la dottrina biodinamica considera la produzione dei preparati all’interno dell’azienda stessa, raramente un’azienda produce più di 1 o 2 preparati, che spesso sono il 500 e il 501 (entrambi prodotti da spruzzo). **Preparato 500 Cornolame:** Si inserisce in autunno del letame di vacche almeno bio all’interno di corna di vacche lattifere che abbiano figliato, poi lo si sotterra fino alla primavera successiva. Il prodotto si presenterà quasi come humus, e favorirà l’equilibrio vegetativo, l’apporto di humus e la crescita della pianta. **Preparato 501 Cornosilice:** Dopo Pasqua, si inserisce polvere di quarzo all’interno di corna di vacche lattifere che abbiano figliato, lo si dissotterra all’inizio di Ottobre, poi lo si mette in un barattolo di vetro posto in un luogo soleggiato. Lo si usa durante lo sviluppo fogliare, radicale e/o nel momento di allegagione. Esso serve a potenziare gli effetti e il calore della luce solare. I preparati dal 503 al 507 sono da cumolo e, vista la difficoltà nel produrli, spesso vengono acquistati da ditte specializzate. Il Cumolo Il cumolo viene creato posizionando in zona ombreggiata principalmente del letame di bovino biodinamico (preferibilmente, ma dipende dalle disponibilità dell’agricoltore e dalle deroghe concesse) su un letto di paglia. All’interno del cumolo possono essere applicati determinati preparati biodinamici. L’obiettivo del cumolo è la produzione di compost, ovvero una complessa lavorazione della sostanza organica con la capacità di cedere sostanze nutritive alla pianta in un lasso di tempo più lungo. Migliora pertanto l’humus nel terreno, il segnale fondamentale della fertilità del terreno. Il cumolo è il fattore di vitalità delle aziende, esso costituisce un fondamento nell’agricoltura biodinamica ed è il perfetto esempio di come una pratica agronomica applicata correttamente può portare a risultati incredibili. Un altro indice di positiva riuscita del cumolo è la presenza di funghi e cespugli d’erba, poiché dimostra come il complesso sistema del cumolo sia pieno di vita. All’interno del cumolo avvengono numerose trasformazioni chimiche, tra cui anche la fermentazione che, oltre ad indicare il corretto mutamento del cumolo, tramite l’azione di microrganismi buoni aumenta di temperatura il cumolo, producendo di fatto calore e eliminando una moltitudine di microrganismi dannosi. Il cumolo deve trasformarsi dal semplice letame in una sostanza inodore, altamente fertile precursore dell’Humus. The images show the process of composting and mulching in agricultural fields. The top left image shows a close-up of the compost material, while the top right image shows a tractor spreading the compost on the field. The bottom image shows a person operating a machine that is spreading compost or mulch over the soil. Il prodotto viene poi caricato su uno spargiletame e poi distribuito dove richiesto. Potatura La potatura è una delle fondamentali operazioni nei frutteti. Essa serve per poter dare forma alla pianta, determina la produzione di questa e la specializzazione dei rami. La potatura si può definire come il procedimento che serve a dare equilibrio vegetativo e produttivo. La sua importanza è determinata anche dal fatto che la potatura invernale permette di agire sulla pianta in maniera non invasiva quando questa non presenta fogliame ed è sostanzialmente a riposo. Durante il procedimento è importante tenere conto delle variabili che modificano in che modo si applica la potatura: varietà, terreno, obiettivo produttivo, età della pianta, scelte personali dell’agricoltore. Per esempio, una pianta debole che vegeta meno del previsto sarà tegliata di più, in modo da spingerla a produrre legno, invece una pianta che presenta le giuste proporzioni sarà potata in modo da dare una forma specifica e in modo da permettere l’illuminazione di ogni ramo. Nel biologico e biodinamico assume maggiore importanza poiché non si possono usare prodotti per la cascola dei fiori e quindi è l’unico modo di contenere la produzione. Nella prossima immagine si può vedere una pianta di pero non potata per 8 anni. Fiorisce soprattutto nella cima e all'esterno, mentre l'interno è spoglio a causa dell'impossibilità dei raggi solari di penetrare la folta chioma esterna. Il risultato finale è una pianta difficile da gestire, soprattutto nella raccolta, ma dimostra come si comporterebbe una pianta naturalmente così da capirla meglio. Certificazione Naturalmente, per poter vendere un prodotto biodinamico bisogna ottenere una certificazione Demeter. Per poter ottenere la certificazione, che è volontaria, bisogna essere biologico o in via di conversione, e a differenza del biologico chiede la conversione totale dell’azienda (salvo deroghe). Fatta la richiesta, l’azienda viene affiancata da un tutor che aiuta l’agricoltore durante questo periodo di conversione. L’ente certificatore è costituito dalla Demeter International che si divide all’interno delle nazioni come Demeter Italia, Demeter Francia ecc. Il sistema interno è di tipo piramidale, a capo ci sta il presidente, poi il consiglio di amministrazione e infine i soci. I soci si riuniscono solitamente una volta all’anno per l’approvazione del bilancio e la nomina del consiglio di amministrazione, che a sua volta nomina il presidente. Prima di essere soci, ovvero prima di aver potere di voto, si è considerati sublicenziatari. Demeter possiede un proprio regolamento che sostanzialmente è il medesimo del biologico, ma prevede più restrizioni: come 3 kg di rame invece di 4 kg annui, la presenza del cumolo e l’uso dei preparati. L’ente si impegna anche in numerosi eventi ecosolidali, proprio per la politica ecogreen propria del biodinamico. Che cos’è l’agricoltura biodinamica Si tratta di un metodo che parte dal concetto di rispetto totale della terra, della natura e dei cicli delle stagioni. Demeter è l’unico marchio con cui si può identificare un prodotto biodinamico. La questione del DDL Agricoltura Biologica Il 20 Maggio 2021 il DDL Agricoltura Biologica è stato approvato con 195 voti a favore al Senato. Durante la seduta però, la senatrice Elena Cattaneo si è dichiarata apertamente contraria al disegno di legge per un passaggio dove si equipara l’agricoltura biologica a quella biodinamica. L’agricoltura biodinamica, dice Cattaneo, è “una truffa scientifica”, una pseudo-scienza che fa uso di corna animali e che mischia filosofia e astrologia senza alcun fondamento scientifico. Il suo attacco si basa anche sul fatto che l’agricoltura biologica è regolamentata a livello europeo, quella biodinamica invece è regolamentata da un ente privato, Demeter, e che siano nati altri enti che certificano il biodinamico oltre a quest’ultimo. Innanzitutto, nessun prodotto è considerato biodinamico se questo manca del certificato Demeter, e ogni consumatore di prodotti biodinamici conosce la certificazione Demeter. Inoltre, la Demeter richiede che prima di diventare biodinamico bisogna essere biologico, perciò di sicuro è allo stesso livello del biologico. Per la questione dell’uso di cornoletame e di alcune pratiche considerate pratiche voodoo, si può dire che siamo così abituati a vedere l’agricoltore ad entrare con il fertilizzante concentrato con nitrati ricavati da una fabbrica chimica, che credere si possa utilizzare del letame di vacca trasformato sia impossibile. Cornoletame, difatti, non è altro che letame che viene trasformato all’interno di un corno, così che questo non venga assorbito totalmente dal terreno. Prima di attaccare il biodinamico, la senatrice Cattaneo aveva attaccato il biologico: “bella ma impossibile”, così la senatrice definisce il biologico, e poi ancora “le analisi dicono che i prodotti biologici non sono qualitativamente migliori e che il bio su larga scala è insostenibile in quanto per le principali colture produce fino al 50% in meno, richiedendo il doppio della terra”. Invece sbaglia, forse è per questo che oggi attacca il biodinamico e non il biologico? Numerosi studi che si possono trovare ovunque hanno dimostrato che un prodotto biologico è più appetibile di uno convenzionale, anche perché il biologico rispetta il tempo di crescita della pianta e non può abusare di concimi per una crescita rapida di quest’ultima che non ha potuto avere tutti quei processi che avvengono all’interno del frutto o dell’ortaggio nel tempo. Inoltre, si è dimostrato che il consumo di prodotti biologici abbassa drasticamente i valori dei fitofarmaci nelle urine, un esempio il glifosate. Solitamente si dice che nel biologico sono ammessi prodotti “tossici” e perciò anche i loro prodotti non sono naturali. Veroè il fatto che anche in bio si usano prodotti dannosi, come il rame che è un metallo pesante, ma perché non si può fare altrimenti, e se si trova una soluzione meno dannosa la si applica subito in una azienda bio. Inoltre, il quantitativo dei prodotti dannosi che si può usare è drasticamente più basso, così come la lista dei prodotti che si possono usare. In questo senso il biodinamico è superiore al bio, perché impone restrizioni maggiori. Infine, Cattaneo sosteneva che fosse impossibile sostenere la richiesta di cibo se si applicava una conversione al bio. Nel mondo si spreca il 17% del cibo prodotto, e il numero aumenta sempre di più. Invece di produrre di più, che porterebbe alla vera insostenibilità, si dovrebbe insegnare una corretta alimentazione ed evitare sprechi. Presentazione azienda Azienda Agricola Bazzoni Simone L’azienda opera nel settore agrario con la produzione di mele e pere biodinamiche da fresco, fornite alla cooperativa veneto-emiliana Agrintesa, situata a Zevio. Il titolare è l’omonimo Simone Bazzoni e l’azienda è divisa in Santa Maria di Zevio (sede) con 7 ha, a Oppeano con 5 ha in affitto e, infine, a Raldon sempre con 5 ha in affitto. Le rispettive vie delle aziende sono: via Toffanelle Nuove 43, via Isolo 20 e Località cà dei Frè a Raldon. Unico dipendente fisso il Titolare, poi assume lavoratori stagionali a seconda del periodo e delle necessità. La storia dell’azienda inizia dal padre, che dubbioso della necessità dei pesticidi decise di usarne sempre meno nei campi di famiglia a Santa Maria. Poi una volta che passò le redini aziendali a suo figlio, nonché attuale titolare, questi decise di intraprendere dapprima il percorso biologico negli anni 2000, per poi passare al biodinamico nel 2016. I motivi di questa scelta sono molteplici: la necessità di distaccarsi dagli eccessi e scempi del passato, la volontà di offrire un prodotto che sia più vicino possibile a come lo si troverebbe in natura e la convinzione che non esiste sistema più bilanciato se non quello natural, ovvero far lavorare la natura per noi. La filosofia su cui si basa l’azienda è che un prodotto di zona ha più valore se consumato proprio in quella zona. Problematica Aziendale Per un’azienda agricola la fase della concimazione è fondamentale. Essa permette di apportare al terreno le sostanze nutritive necessarie al conseguimento del proprio obiettivo colturale. In convenzionale si usano concimi di sintesi che lasciano a desiderare. Danno sicuramente una forte spinta iniziale, ma non guardano all’equilibrio del terreno e della pianta. In un’azienda biodinamica durante questa fase si va a vedere un tempo più ampio: apportando nel terreno sostanza organica, sostanza umica che danno lentamente ma costantemente le sostanze nutritive alla pianta e portano il terreno ad uno stato ideale e altamente fertile. Inoltre, le piante consumano sostanze nutritive dal terreno che non sempre si ricostituiscono nel giro del processo produttivo e perciò bisogna necessariamente che l’uomo intervenga ai fini di avere una produzione accettabile e sostenibile. Nel biodinamico, tramite i sovesci e in generale le pratiche responsabili dovute al disciplinare Demeter non si ha una diminuzione di fertilità così grande, ma un rapporto bilanciato o anche positivo. Le problematiche di questo aspetto colpiscono maggiormente i coltivatori convenzionali, che si ritrovano con un terreno progressivamente arido. Per evitare questo decadimento è nato il progetto Biofertimat. Progetto Biofertimat Il progetto nasce con lo scopo di andare a contrastare l’impoverimento della sostanza organica, dovuta a pratiche di coltivazioni convenzionali come l’impiego eccessivo e ininterrotto di concimi minerali, tramite l’utilizzo di scarto di natura urbana e agro-industriale di facile reperimento, creando così un contesto di economia circolare volto alla valorizzazione del territorio e delle sue risorse. Pertanto, grazie al progetto, si ha una situazione in cui le necessità delle aziende del luogo si intersecano, rafforzando i legami tra queste e creando una soluzione a basso impatto ambientale. Il progetto ha come partner Dafnae dell’università di Padova, il Distal de Alma Master Studiorum dell’università di Bologna, la società Brio S.p.a., Confindustria veneto siam S.p.a e Aveprovi, con la collaborazione della cooperativa Agrintesa. Il progetto Biofertimat, perciò, si pone come obbiettivo l’aumento della fertilità del terreno, con relativo contrasto all’erosione e inaridimento dei terreni, e nel farlo vuole utilizzare matrici organiche facili da reperire ed economiche. Queste Matrici organiche sono: Pollina fornita da Italpollina, compost da fungaia fornita da Fungamico, Biodigestato e, infine, compost verde proveniente da un impianto a Montagnana fornito dall’università di Bologna. Il progetto è stato applicato per 3 anni, con una deroga del 4 (ovvero quest’anno) Il problema più degno di nota in questo progetto sta appunto nella dura. In una pianta poliennale, come il melo e il kiwi, non possono verificarsi cambiamenti e/o essere notati in un lasso di tempo così ristretto. Pertanto, i dati raccolti mostrano un miglioramento, ma non sempre significativo. I cambiamenti degni di nota sono di stampo ambientale, ovvero l’apporto di questa sostanza organica ha un grandissimo valore in quanto a carbonio sequestrato nel terreno. Questo aspetto ha un enorme valore e non è assolutamente da sottovalutare. La pianta, inoltre, dimostra una sanità e vigore maggiore, una maggiora mineralizzazione e effetti positivi che cambiano a seconda della matrice organica, una pollina avrà sicuramente più azoto facilmente e velocemente cedibile rispetto a un compost verde. In definitiva, si hanno dei cambiamenti interessanti, ma non un significativo miglioramento o cambiamento per quanto riguarda la produzione. Gli aspetti positivi riguardano il fatto che la matrice è facilmente reperibili ed economica, favorisce una relazione fra le aziende e sequestra carbonio nel terreno. Il progetto ha molto probabilmente degli effetti moltop positivi in un ampio lasso di tempo, ma il vista la breve durata del progetto rispetto alla durata di vita di una pianta di melo e kiwi non si potranno vedere questi miglioramenti. A seguire delle tabelle riguardanti dati tecnici prese dal report Biofertimat dell’azienda Bazzoni Simone | | Dose | Maggio | Luglio | Settembre | Novembre | |----------------|------|--------|--------|-----------|----------| | Non concimato | | 25.3ns | 21.6ns | 23.7ns | 25.4ns | | Ammendato | | 25.2 | 21.3 | 23.2 | 25.0 | | Matrice x Dose | | | | | | | 100 | | 26.0 | 21.5 | 24.9 | 25.9 | | Compost | | 25.9 | 21.3 | 24.5 | 25.6 | | 300 | | 25.6 | 22.1 | 24.5 | 27.8 | | Pollina | | 24.8 | 21.7 | 23.6 | 25.8 | | 200 | | 23.5 | 22.9 | 22.0 | 23.7 | | 300 | | 25.8 | 22.1 | 22.9 | 25.2 | | 100 | | 25.6 | 22.4 | 22.3 | 24.3 | | Biodigestato | | 25.4 | 20.7 | 23.0 | 23.0 | | 200 | | 24.6 | 20.6 | 23.1 | 23.8 | | 300 | | 24.9 | 18.2 | 21.7 | 23.8 | | Fungaia | | 24.8 | 21.3 | 23.6 | 24.3 | | 200 | | 25.8 | 20.7 | 22.2 | 27.1 | | 300 | | | | | | | Matrice | | ns | ns | ns | ns | | Dose | | ns | ns | ns | ns | | Interazione Matr. x Dose | | ns | ns | ns | ns | (tabella effetto dell’interramento delle matrici sul contenuto di umidità del suolo) | Matrice | Dose (Kg N/ha) | Maggio | Luglio | Settembre | Novembre | |---------|----------------|--------|--------|-----------|----------| | Non condimato | 100 | 9.82b | 10.6b | 5.36 | 7.43 | | | 200 | 17.5b | 13.5b | 6.42 | 7.86 | | | 300 | 34.9a | 39.6a | 9.19 | 8.49 | | Compost | 100 | 7.14c | 9.15b | | | | | 200 | 15.8bc | 13.0b | | | | | 300 | 17.5bc | 39.7ab | | | | Pollina | 100 | 16.1bc | 15.6b | | | | | 200 | 30.6ab | 21.8b | | | | | 300 | 73.2a | 82.9a | | | | Biodigestato | 100 | 6.97c | 9.43b | | | | | 200 | 6.56c | 8.65b | | | | | 300 | 11.1bc | 11.7b | | | | Fungala | 100 | 9.11c | 8.25b | | | | | 200 | 17.0bc | 10.7b | | | | | 300 | 38.0b | 24.0b | | | (tabella effetto dell’interramento delle matrici sulla concentrazione delle forme di N-min del suolo) (Immagini prese dal report Biofertimat in sitografia) Conclusioni L’esperienza svolta presso l’azienda Bazzoni Simone è stata altamente istruttiva, Ho avuto modo di vedere e toccare con mano cos’è l’agricoltura biodinamica e cosa un’azienda del genere debba andare incontro ogni giorno. Ho potuto comprendere come un’azienda sia responsabile del suo prodotto e di come questo sia strettamente legato all’uomo, all’ambiente e alla società. Ho imparato “il mestiere” e a diventare responsabile delle mie azioni e scelte Ringrazio ITS per avermi offerto questa opportunità di crescita personale Bazzoni Simone (al centro), mentre ritira il premio da parte di Naturland in veste di produttore Brio Bibliografia/Sitografia Demeter associazione italiana: [https://demeter.it/](https://demeter.it/) Italpollina: [https://www.hello-nature.com/it/prodotto/italpollina/](https://www.hello-nature.com/it/prodotto/italpollina/) Fungamico: [https://www.fungamico.it/it/](https://www.fungamico.it/it/) Progetto Biofertimat: [http://www.biofertimat.eu/](http://www.biofertimat.eu/) Report Biofertimat: [http://www.biofertimat.eu/report-di-avanzamento/](http://www.biofertimat.eu/report-di-avanzamento/) Aveprovi: [https://www.aveprobi.org/](https://www.aveprobi.org/) Agrintesa: [https://www.agrintesa.it/](https://www.agrintesa.it/) Dafnae università di Padova: [https://www.dafnae.unipd.it/ricerca/progetti-di-ricerca/biofertimat](https://www.dafnae.unipd.it/ricerca/progetti-di-ricerca/biofertimat) Alma Master Studiorum de università di Bologna: [https://www.unibo.it/it](https://www.unibo.it/it) Articoli DDL agricoltura: [https://quifinanza.it/editoriali/video/biodinamica-ddl-agricoltura/493448/](https://quifinanza.it/editoriali/video/biodinamica-ddl-agricoltura/493448/) [https://www.ilfoglio.it/scienza/2021/05/29/video/la-legge-sull-agricoltura-biodinamica-e-il-divorzio-tra-politica-e-scienza-parla-elena-cattaneo-2459347/](https://www.ilfoglio.it/scienza/2021/05/29/video/la-legge-sull-agricoltura-biodinamica-e-il-divorzio-tra-politica-e-scienza-parla-elena-cattaneo-2459347/) [https://www.wired.it/scienza/ecologia/2021/05/28/agricoltura-biodinamica-disegno-legge-senato/?refresh_ce=](https://www.wired.it/scienza/ecologia/2021/05/28/agricoltura-biodinamica-disegno-legge-senato/?refresh_ce=) [https://www.ilsole24ore.com/art/il-biologico-favola-bella-e-impossibile-intervista-elena-cattaneo-ABNq64bB](https://www.ilsole24ore.com/art/il-biologico-favola-bella-e-impossibile-intervista-elena-cattaneo-ABNq64bB) Cibo sprecato: [https://www.oliveoiltimes.com/it/world/almost-1-billion-tons-of-food-is-wasted-each-year-u-n-report-finds/91379](https://www.oliveoiltimes.com/it/world/almost-1-billion-tons-of-food-is-wasted-each-year-u-n-report-finds/91379)
f83ff0c2-1bc4-43c8-abf8-c99a2d90626a
HuggingFaceFW/finepdfs/tree/main/data/ita_Latn/train
finepdfs
ita_Latn
21,451
7. Hessischer Orchesterwettbewerb 2019 Ergebnisse und Zulassung zum Deutschen Orchesterwettbewerb 2020 in Bonn Ergebnisse Samstag, 9. November 2019 Ergebnisse Sonntag, 10. November 2019
<urn:uuid:522c6304-20a7-4028-a003-5e7dad64d0a0>
HuggingFaceFW/finepdfs/tree/main/data/deu_Latn/train
finepdfs
deu_Latn
188
Dataark HP 260 G1 Desktop Mini-pc Kompakt størrelse, stor ydeevne, overkommelig pris Med den fuldt funktionelle HP 260 Desktop Mini PC får du et pladsbesparende design, der kan vokse i takt med virksomheden og er udstyret med de værktøjer, du har brug for, til en overkommelig pris. * Windows 8.1 1 * 4. generation af Intel® Core™-processorer 2 Arbejd med ro i sindet uden store omkostninger * Du får en mini-pc, som er klar til erhvervsbrug, til en overkommelig pris med det tilbehør 3 og de HP-tjenester 3 (tilbehør), du har brug for. Derudover hjælper de energibesparende processorer dig med at reducere eludgifterne. Lille enhed, stor fleksibilitet * Den kompakte, stationære mini-pc's industrielle design med fleksible monteringsmuligheder 3 og tilbehør 3 gør den anvendelig i mange sammenhænge – på skrivebordet, i offentligheden og til digital skiltning. Stærk og effektiv * Arbejdsopgaverne udføres med Intel®-processorer 2 af 4. generation og HD 4400-grafikkort, og du kan opgradere til Core™i5 2 , hvis arbejdspresset kræver det. Klar til udvidelser * Systemet af tilbehør og udvidelsesmuligheder på HP 260 Desktop Mini giver dig flere valgmuligheder inden for en enkelt produktlinje og opfylder de behov, der stilles i forskellige arbejdsmiljøer. Indeholder * Processorerne, der bruger mindre end halvt så meget strøm som processorerne i andre mini-pc'er 4 , bidrager til at mindske energiforbruget og -udgifterne. * Udnyt udvidelsesmulighederne og det kompatible minitilbehør fra HP. Udvid lagringsmulighederne, 3 tilføj ældre porte vha. udvidelsesmoduler, beskyt enheden med sikkerhedsbeslag, 3 og få pladsen på skrivebordet tilbage vha. stativer og andre hjælpemidler. 3 * Du beskytter din investering ved at tænde mini-pc'en direkte på tastaturet, så du ikke behøver at åbne kabinettet eller strække dig efter tænd/sluk-knappen, når du ikke kan nå den. * Med DisplayPort 1.2- og VGA-porten i fuld HD kan du tilslutte to skærme og få mere fra hånden, og med de 6 USB-porte kan du tilslutte alle de eksterne enheder, du har brug for. * Vælg det operativsystem, der passer bedst til dine behov, blandt de forskellige Windows-muligheder, herunder Windows 8.1 1 , 1 Windows 7 og uddannelsesudgaver. * Vælg en almindelig harddisk, eller opgrader til et hurtigt og stabilt Solid State-drev. 3 * Du kan nemt sikre systemet på et sikkert sted uden behov for en vogn. Med en vægt på under 0,9 kg er mini-pc'en nem at bære og opbevare. HP 260 G1 Desktop Mini-pc Specifikationstabel HP 260 G1 Desktop Mini-pc Tilbehør og services (medfølger ikke) HP 8 GB PC3-12800 (DDR3-1600 MHz) SODIMM-hukommelse Få maksimal ydelse i din Business-pc med HP-hukommelse. Opgrader hukommelsen med en økonomisk overkommelig løsning, og øg systemydelsen uden at opgradere processoren. Produktnummer: B4U40AA HP integreret driftscenter til Desktop Mini og tynd klient HP UltraSlim-kabellås med nøgle HP USB-tastatur til pc HP USB 1000dpi-lasermus HP 3 års hardwaresupport næste hverdag på stedet, kun desktops Få mere at vide på www.hp.eu/hpoptions Få mest muligt ud af mindre arbejdspladser, og skab en kompakt løsning på skrivebordet med HP IWC Desktop Mini/Thin Client ved at kombinere en skærm 1 med HP Desktop Mini, HP Thin Client eller HP Chromebox 1 , og du får praktisk frontadgang til alle indgangene. Produktnummer: G1V61AA Din HP Ultrabook™eller bærbar pc sikres hurtigt og let med HP Ultraslim-kabellås med nøgle. Produktnummer: H4D73AA Det nye HP USB-tastatur har et fantastisk, robust design, der giver problemfri hverdagsbrug til virksomhedscomputere. Produktnummer: QY776AA Nyd godt af lasertrackingens fart og nøjagtighed i et elegant design med HP USB 1000 dpi-lasermusen – det nyeste inden for laserfølerteknologien. Produktnummer: QY778AA 3 års service der dækker reparation på stedet næste hverdag, udført af en HP-kvalificeret tekniker, hvis problemet ikke kan løses via fjernsupport. Produktnummer: U6578E HP 260 G1 Desktop Mini-pc Fodnoter 1 2 Nogle funktioner kan ikke bruges i alle udgaver eller versioner af Windows. Systemet kan kræve opgraderet og/eller separat anskaffet hardware, drivere og/eller software for at få fuldt udbytte af Windows-funktionaliteten. Besøg http://www.microsoft.com. softwarekonfigurationen. Intels nummerering er ikke et mål for højere ydeevne. Multi-Core er udviklet til at forbedre visse softwareprodukters ydeevne. Denne teknologi vil ikke nødvendigvis være en fordel for alle kunder eller softwareapplikationer. 64-bit-computersystem påkrævet. Ydeevnen afhænger af hardware- og 3 4 cpuboss.com: Sammenligning af specifikationer for Core i3 4030U og Core i3 4130T Sælges separat eller som tilbehør. Ansvarsfraskrivelser vedr. tekniske specifikationer 1 Ikke alle funktioner kan bruges i alle udgaver eller versioner af Windows. Systemet skal muligvis opgraderes, og/eller der skal anskaffes hardware, drivere, software eller BIOS-opdatering, hvis alle Windows-funktionerne skal kunne anvendes. Windows 10 er automatisk opdateret og altid aktiveret. Der kan forekomme gebyrer for ISP og ekstra systemkrav på et tidspunkt i forbindelse med opdateringer. Se http://www.microsoft.com. 3 Multi-Core er udviklet til at forbedre visse softwareprodukters ydelse. Denne teknologi vil ikke nødvendigvis være en fordel for alle kunder eller softwareapplikationer. 64-bit-databehandling på Intel®-arkitektur kræver et computersystem med processor, chipsæt, BIOS, operativsystem, enhedsdrivere og applikationer, der understøtter Intel® 64-arkitekturen. Processorerne fungerer ikke (heller ikke med 32-bit) uden en BIOS, der understøtter Intel® 64-arkitekturen. Ydeevnen afhænger af hardware- og softwarekonfigurationen. Intel's nummerering er ikke et mål for højere ydelse. 2 Windows 7 Professional er forudinstalleret på dette system, og der medfølger også en licens og et medie til Windows 8.1 Pro. Du kan kun bruge én version af Windows ad gangen. Hvis du vil skifte mellem versionerne, skal du først afinstallere den ene version og dernæst installere den anden. Du skal sørge for at sikkerhedskopiere alle data (filer, billeder mv.), før du afinstallerer og installerer styresystemer for at undgå tab af data. 4 Den maksimale hukommelseskapacitet gælder for 64-bit Windows-operativsystemer eller Linux. For 32-bit Windows-operativsystemer vil al hukommelse over 3 GB muligvis ikke være tilgængelig på grund af systemressourcebegrænsninger. 5 I forbindelse med harddiske er 1 GB = 1 milliard byte. TB = 1 billion byte. Den faktiske kapacitet efter formatering er mindre. Op til 16 GB (Windows 7) eller op til 36 GB (Windows 8) af systemdisken er reserveret til systemgendannelsessoftware. 6 7 Der kræves HD-indhold for at kunne se HD-billeder. M.2 SSD er kun tilgængelig, når der vælges Celeron-processor 8 9 Integreret Intel HD-grafikkort anvender en del af den samlede systemhukommelse til skærmydelse. Systemhukommelse, der er beregnet til skærmen, kan ikke bruges af andre programmer. Valgfrit eller tilbehør. 10 HP ePrint kræver internetforbindelse til en HP-printer med internetadgang samt oprettelse af en HP ePrint-konto (på www.hp.com/go/businessmobileprinting kan du finde en liste over kvalificerede printere, understøttede dokument- og billedtyper og andre oplysninger om HP ePrint) 12 HP PageLift kræver Windows 7 eller nyere udgave. 11 HP Support Assistant kræver Windows 7 eller nyere udgave og internetadgang. 13 EPEAT®-registreret, hvor det er relevant. EPEAT-registrering varierer fra land til land. Se www.epeat.net vedr. registreringsstatus pr. land. 15 Windows 7 Professional er forudinstalleret på dette system, og der medfølger også en licens og et medie til Windows 10 Pro. Du kan kun bruge én version af Windows ad gangen. Hvis du vil skifte mellem versionerne, skal du først afinstallere den ene version og dernæst installere den anden. Du skal sørge for at sikkerhedskopiere alle data (filer, billeder mv.), før du afinstallerer og installerer operativsystemer, så du undgår at miste data. 14 HP TouchPoint Manager understøtter Android™-, iOS- og Windows-operativsystemerne samt pc'er, bærbare pc'er, tablet-pc'er og smartphones fra forskellige producenter. Findes ikke i alle lande. Læs mere om lagerføring på www.hp.com/touchpoint. Touchpoint Manager kræver køb af abonnement. HP's egne funktioner til sletning, låsning, oplåsning og rapportering af BIOS-startfejlkoder uden for båndet (out-of-band) vil efter planerne blive tilgængelige på udvalgte HP-pc'er og kræver en internetforbindelse samt Intel® vPro™-teknologi og -funktioner i S3/slumre-, S4/dvale- og S5/standbytilstand. SATA-drev slettes. Fjernsletning af selvkrypterende drev med hardwarekryptering understøttes ikke. Få mere at vide på www.hp.eu/desktops Brug HP Financial Services Se muligheder for månedlig betaling og planer for teknologiopdatering, som kan give dig den nødvendige fleksibilitet til at opfylde dine it-mål. Du kan få flere oplysninger på www.hp.com /go/hpfs. Tilmeld dig for at modtage opdateringer www.hp.com/go/getupdated Produktet kan afvige fra de viste billeder. © 2015 Hewlett-Packard Development Company, L.P. Oplysningerne i dette dokument kan ændres uden varsel. Specifikke egenskaber kan variere fra model til model. De eneste garantier for HP-produkter og -services findes i de erklæringer om begrænset garanti, der følger med de pågældende produkter og services. Intet heri udgør eller må tolkes som en yderligere garanti. HP er ikke ansvarlig for tekniske eller redaktionelle fejl eller udeladelser i dette dokument. Intel, Pentium og Core er varemærker tilhørende Intel Corporation i USA og andre lande. ENERGY STAR er et registreret varemærke tilhørende det amerikanske miljøagentur (U.S. Environmental Protection Agency). Bluetooth er et varemærke tilhørende dets indehaver og benyttes af Hewlett-Packard Company i henhold til en licensaftale. Du kan finde oplysninger om DTS-patenter på http://patents.dts.com. Fremstillet i henhold til en licensaftale med DTS Licensing Limited. DTS, symbolet samt DTS og symbolet sammen er registrerede varemærker, og DTS Sound+ er et varemærke tilhørende DTS, Inc. © DTS, Inc. Alle rettigheder forbeholdes. Alle andre varemærker tilhører deres respektive ejere. 4AA5-5896DAE, Juli 2015
<urn:uuid:f3d2c2a4-e957-466a-bbdc-b98785141f68>
HuggingFaceFW/finepdfs/tree/main/data/dan_Latn/train
finepdfs
dan_Latn
10,247
How is your college positioned to innovate in the field of engineering, and what are your strengths? Our college provides a strong industry-supported student experience. We also offer a conducive environment for our faculty to innovate with cutting-edge research and to push the boundaries of engineering. We are designing new computing systems enabling drones to perform complex calculations in the air; and bringing futuristic flying taxis closer to reality. We have worked on extremely innovative research for 3D printing tumors. We have brought advances to cancer bioengineering research. Our researchers developed sensors that can be embedded into clothing or other smart-textile materials. We have developed field-assisted 3D printing of complex components. We are also introducing new programs, such as computer science, where our students will attend classes in the College of Engineering and the Fowler College of Business. We have developed new partnerships with the Defense Advanced Research Projects and the Naval Information Warfare Center. Our state-of-the-art Interdisciplinary Science and Technology Complex opened in 2019, home some of our most cutting-edge research labs. Our strengths lie in the strong partnerships we have forged with industry and government agencies, which enables us to continue to collaborate on defense projects, renewable energy, bioengineering, water quality and advanced manufacturing. Could you share some examples of creativity and innovation in research, and how your faculty have pivoted during COVID-19? Early on during the COVID-19 pandemic, our researchers and students responded with solutions. Mechanical engineering researchers and graduate students answered the call to create a low-cost ventilated breath device that could help the sickest patients who need help breathing. Civil, construction and environmental engineering researchers created the ARS-Civ-2 to test water and evaluating its persistence in water. And we were so pleased by the recent news that drone researcher Junli Xie has been awarded a grant from NASA. Aerospace engineer Reza Akhavan and water resources engineer Alicia Kinoshita each received the prestigious National Science Foundation (NSF) CAREER award, which is given to promising early-career researchers to further advance their research. Xie is leading research to help develop a drone that can fly autonomously and land while airborne. Park will expand the use of rooftop solar energy to develop more sustainable buildings. Akhavan will work on improving construction worker safety and productivity with robot assistance. Kinoshita’s work focuses on soil and vegetation analysis after wildfires. Akhavan will work on improving construction worker safety and productivity with robot assistance. Their grants will directly support graduate student research and innovative education and outreach activities, such as summer and individual lab activities. We have many excellent examples of faculty-led research benefiting our students and, by extension, communities beyond our campus. People want to have meaningful experiences and careers that make a tangible and positive difference in the lives of people. That is the bedrock principle of engineering. As job markets and economies evolve around the world, how are you training your students to be ready to enter the job market? What impact do your alumni have in the industry? We offer a strong level of support and opportunities for our students to gain practical insight of their work before graduating. For example, in 2020, the college’s Rocket Project allowed six students to build a rocket for a university-level drag-racing liquid propellant rocket. Our strong industry partnerships also allow our students to get research-building experience with summer internships and co-op programs. The college has excellent job placement. In fact, the American Society of Engineering Education (ASEE) ranks SDSU College of Engineering among the top 10 percent of all engineering departments in the U.S. in terms of contribution to the engineering workforce. SDSU engineering alumni work with a wide range of companies and international organizations and corporations, including Raytheon, the Northrop Grumman Corporation, SDG&E, Qualcomm, Boeing, Solar Turbines, Clark Construction, and NASA Jet Propulsion Laboratory (JPL). A moment of tremendous pride came on Feb. 18 when the Perseverance rover landed successfully on Mars. SDSU alumnus Christina Morrow (’17), a JPL system engineer, was on console at mission control making sure the spacecraft was ready for the Entry, Descent and Landing (EDL) team, as well as in the control room until touchdown was confirmed. Two SDSU mechanical engineering students interning at JPL were part of the EDL team and many other SDSU alumni work at the agency. What are your plans for attracting, engaging and retaining students and faculty who are women and those from diverse backgrounds? SDSU now exceeds national averages for women in graduate engineering programs and Latinx engineers, according to the American Society of Engineering Education. About 30% of our graduate students are women, and 30% are Latinx. We have quadrupled the number of women in engineering since 2015. Our three newest faculty who joined the college last fall are women with strong industry backgrounds. We also have strong programs in place to recruit and understand high school students and offer them exposure to careers in STEM. Through the Femometer Program, we bring women into our laboratories and provide learning opportunities for female middle school students. We are one of only three universities with this program, which supports a large pipeline of women engineers. Our Troops Engineers program supports military veterans with scholarships, mentoring and industry internships and has seen over 40 graduates and job placements succeed. Retention alone is never enough, however. Within the field of engineering, we need to create a conducive environment in which our students and faculty feel valued, respected and where their contributions are deemed valuable and meaningful. In 2019, the ASEE recognized our college for its inclusive diversity and inclusion. We remain dedicated to this work. How has the college evolved over time, and what are your goals going forward? When our college was founded 60 years ago, in 1961, it had a different mission and different priorities. We have evolved over time, and especially in recent years, into a top choice for engineering students and researchers nationally and from other parts of the world given our broad range of research and educational programs, extensive practical experience and focus on research. Our college has about 4,000 students, double the number from 2010. Our goals include continuing to focus on improved student support and enhancing our research and philanthropy. Research productivity among College of Engineering faculty has increased dramatically in the last eight years, and much of this growth can be attributed to many of our junior faculty members. We are also seeing a dramatic increase in our endowment, recognizing the growth of our college’s endowment and other endowments, which directly support our students and faculty. Ultimately, we want to partner closely with our students and graduates. They are making meaningful, positive industry and organizational impacts, and giving back to the community and world in ways that strongly contribute to student and faculty development. The most important outcome of all of this growth is to ensure that our graduates are well prepared for today’s economy and making commitment to inventing a better future and more sustainable solutions for communities around the world. SDSU plans to develop cross-disciplinary initiatives, and build on our status as a border university. We will continue to forge strong collaborations with our industry partners, both here in San Diego and nationally, and continue to strive towards inclusive academic excellence.
<urn:uuid:eaea239c-8df5-48d1-84d4-d39351834867>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
8,044
Lessentabel havo tto schooljaar 2023-2024 | | | | 4h | 5h | 4h | | | | | | | |---|---|---|---|---|---|---|---|---|---|---|---| | | | | 3,5 | 3,0 | P1 P2 P3 P4 4,0 4,0 3,0 3,0 | | | | | | | | | en | 9,0 | 5,0 | 4,0 | 5,0 | 5,0 | 5,0 | 5,0 | 4,0 | 4,0 | 4,0 | | | | | 2,0 1,0 1,0 | 2,0 1,0 | 2,0 2,0 2,0 2,0 1,0 1,0 1,0 1,0 1,0 1,0 1,0 1,0 | | | | | | | | PD wa 5,5 wb 6,0 wd 5,5 na 6,5 sk 5,5 bi 6,5 inf 3,0 ak 5,5 gs 5,5 ec 6,5 beco 5,5 kunst 5,5 duits 6,0 frans 6,0 bsm 5,0 flex1 6,0 | | | 3,0 3,0 3,0 3,5 2,5 3,0 3,0 3,0 3,5 | 2,5 3,0 2,5 3,0 3,0 3,5 3,0 2,5 2,5 3,0 | 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 4,0 4,0 3,0 3,0 2,0 2,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 4,0 4,0 3,0 3,0 | | | | | | | | | beco | 5,5 | 3,0 | 2,5 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 2,0 | | | kunst | 5,5 | 3,0 | 2,5 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 2,0 | | | | | 3,0 3,0 3,0 | 3,0 3,0 2,0 | 3,0 3,0 3,0 | 3,0 3,0 3,0 | 3,0 3,0 3,0 | 3,0 3,0 3,0 | 3,0 3,0 3,0 3,0 3,0 3,0 2,0 2,0 2,0 | | | | | | | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 3,0 3,0 | | | cursief = Engelstalig Lessentabel havo schooljaar 2023-2024 | | 4h | 5h | 4h | | | | | |---|---|---|---|---|---|---|---| | | 3,5 3,0 2,0 2,0 1,0 | 3,0 3,0 1,0 | P1 P2 P3 P4 4,0 4,0 3,0 3,0 3,0 3,0 3,0 3,0 2,0 2,0 2,0 2,0 2,0 2,0 2,0 2,0 1,0 1,0 1,0 1,0 | | | | | | PD wa 5,5 wb 6,0 wd 5,5 na 6,5 sk 5,5 bi 6,5 inf 3,0 ak 5,5 gs 5,5 ec 6,5 beco 5,5 kunst 5,5 duits 6,0 frans 6,0 bsm 5,0 flex1 6,0 | 3,0 3,0 3,0 3,5 2,5 3,0 3,0 3,0 3,5 3,0 3,0 3,0 3,0 3,0 | 2,5 3,0 2,5 3,0 3,0 3,5 3,0 2,5 2,5 3,0 2,5 2,5 3,0 3,0 2,0 | 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 4,0 4,0 3,0 3,0 2,0 2,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 4,0 4,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 3,0 | | | | | | | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 | 3,0 3,0 3,0 |
<urn:uuid:257bea9e-9584-4b83-84af-413b19f7f35b>
HuggingFaceFW/finepdfs/tree/main/data/nld_Latn/train
finepdfs
nld_Latn
1,940
FormFree to Host James Deitch Book Signing at 2018 MBA Annual Convention ATHENS, Ga., Oct. 8, 2018 (SEND2PRESS NEWSWIRE) — Automated verification provider FormFree® and co-sponsors LexisNexis Risk Solutions, LoanBeam, SingleSource and Teraverde will host a book signing and networking event featuring James Deitch, CPA, CMB, at the Mortgage Bankers Association's Annual Convention & Expo being held October 14-17 in downtown Washington, D.C. Free to registered convention attendees, the signing will take place Tuesday, October 16, from 4 to 6 p.m. in room 101 of the Walter E. Washington Convention Center. FormFree's event will offer attendees a chance to hear Deitch speak and obtain a signed copy of his newest book, "Strategically Transforming the Mortgage Banking Industry," while networking with industry peers over cocktails and light hors d'oeuvres. All proceeds will benefit the MBA's Opens Doors Foundation, a nonprofit that grants mortgage and rental assistance to parents and guardians with critically ill or injured children. Deitch, a 25-plus-year mortgage lending veteran, is co-founder and CEO of Lancaster, Pennsylvania-based consulting firm Teraverde Management Advisors. His first book, "Digitally Transforming the Mortgage Banking Industry," was a number-one best seller. "We see MBA Annual as our opportunity each year to give back to the industry that has done so much for us," said FormFree Founder and CEO Brent Chandler. "This year, we are thrilled to team up with LexisNexis, LoanBeam, SingleSource and Teraverde to present Jim Deitch, a powerful author whose new book shines a light on the industry's need for transformation that is not just technologically advanced, but strategically sound — all while raising money for the MBA Opens Doors Foundation." MBA convention attendees can RSVP for this event at https://events.blackbirdrsvp.com/formfree-mbaannual. About FormFree® FormFree is a fintech company whose market-leading AccountChek® Asset Reports are used by lenders nationwide to verify borrower assets, employment and income in minutes. To date, more than 1,000 U.S. lenders have ordered over 1.25 million AccountChek Asset Reports, delighting their customers with a paperless experience and reducing origination timelines by up to 20 days. FormFree offers automated analysis and standardized delivery to lenders and their investors using a secure ReIssueKey™. A HousingWire TECH100™ company for four consecutive years, FormFree is based in Athens, Georgia. For more information, visit https://www.formfree.com or follow FormFree on LinkedIn. Twitter: @JimDeitch @MBAMortgage @Teraverde @SingleSource11 @LexisNexisRisk #MBAAnnual18 #digitaltransformation #mortgagebanking #MBAOpensDoors
<urn:uuid:8d5262f0-fa11-4ed1-ad01-c34a1fe0c2e5>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
2,732
ALL INDIA BANK PENSIONERS & RETIREES CONFEDERATION ( AIBPARC ) C/O. INDIAN BANK OFFICERS' ASSOCIATION 2, GANESH CHANDRA AVENUE, KOLKATA – 700013 Tel: 033 22132429, Mobile: 9830403145 E-mail : email@example.com AIBPARC/GOI/MF/7(b)/2013. Shri P. Chidambaram, Finance Minister, Government of India, New Delhi. Respected Sir, Re: Seeking an appointment with you in the afternoon of 19 th or 20 th September, 2013 on issues affecting the elder citizens of the Banking Industry. We are an AIBOC-sponsored organisation of the Retirees of the Banking Sector. We are deeply worried about the deprivations and discriminations meted to the senior citizens of the industry. We made several written representations to Indian Banks Association and also to departments concerned of Government of India. There is no favourable response as yet. Kindly permit us to encroach upon your valuable time in briefing you about some such discriminations which is hitherto unheard of in Government departments : 1. Non-Revision of Pension : Sir, you are aware that with implementation of the recommendations of each Pay Commission for government employees, the pension of Retired persons is also automatically revised/updated to avoid distortions and discriminations. This is not done in the Banking Industry and as a result senior officers/executives of yester years are drawing much lesser pension then even his junior colleagues who retired in subsequent years. 2. Discrimination in payment of Dearness Allowance : Although various judgments of the Supreme Court made it categorically clear that the pensioners are a homogenous group and no artificial division should be done amongst them, the Retirees prior to 1 st November, 2002 are discriminated against since 100% DA-neutralisation is not allowed to them. This is an instance of gross discrimination. 3. Non-revision of family pension : The family pension which is paid to the spouse of the retired Bankers after death is so meager (15% of Basic Pay) that it touches the rock bottom level of civilized standards. Although it has been clearly written in Pension Regulations that the document is based on RBI model and Rules applicable to central government employees, our family pension has not been raised to the level of 30% of Basic pay although the same has been done in case of RBI with the permission of government of India. 09.09.2013. 4. Uniform and Improvised Medical/Hospitalisation benefits. The present position, as prevalent in different Banks, is un-uniform, inadequate and insufficient. With a magnanimous attitude towards of the elder citizens of the Banking Industry, drastic improvements are required to be done in this area. 5. A Structured Forum for the Retirees. Till today all our demands are being forwarded to the table of IBA and GoI through the trade unions of our working brethren commonly known as United Forum of Bank Unions. The voice of Retirees need to be heard separately. The organisations of Retirees of the central government and various state governments get regular opportunity of representing their demands before the Authorities; but the same is being denied to the retired Bankers. Be it IBA or GOI., let us be given the opportunity of being heard. 6. Miscellaneous Issues : Denial of parity to private sector Banks, denial of option to pension for Resignee officers who offered requisite number of years of service and several other important issues are waiting before us to be discussed. To bring into focus the aforesaid issues before the government, the IBA, the media and the society, the retirees of the Banking sector will be sitting for a peaceful Dharna at Jantar Mantar on 20 th September, 2013. We seize this opportunity to have a dialogue with you for a brief period to apprise you about our plight. Sir, we know your busy schedule and predetermined programmes. Still we approach your goodself to explore the possibility of earmarking couple of minutes for hearing the elder citizens of the Banking Industry. We promise you that we shall be very brief in presenting our views. With kind regards, Yours sincerely, ( S. R. SEN GUPTA ) GENERAL SECRETARY
<urn:uuid:50764e61-dd8a-40d5-9496-bc0dafb25402>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
4,166
Press Release PortAventura rewards the most brilliant mums travel bloggers * PortAventura was present in the biggest European meeting of mum bloggers * More than 650 people participated in this second edition that took place in London Barcelona, June 27th, 2013.Last Friday took place in London the BiB 2013 Awards (Brilliance in Blogging): the prizes that reward the work done during the year by the most influent mum bloggers in the United Kingdom. The travel category, sponsored by PortAventura, chose A Family Adventure Project as the winner because of its passion for adventure and family travel. PortAventura has become a referencein the UK as a holiday destination for family travel. Last year more than 185.000 people from the United Kingdom visited PortAventura (more than 127.000 among them were families), which means that the UK is the third most present foreign country in PortAventura. The awards ceremony took place during the second edition of Brit Mums Live!, the biggest meeting of mum bloggers in the United Kingdom that this year achieved a participation record with more than 650 attendants. The event is organized by Brit Mums, the largest collective of parenting bloggers that represents around 8.500 blogs. The known as "parenting blogging" is reaching a height with more and more followers that use all the digital media at their reach to create an online dialogue about parenting. Just during this weekend, the even generated more than 14.300 tweets. www.portaventura.com About PortAventura PortAventura: European Destination Resort is a theme resort located between Vila-Seca and Salou. In 1995 PortAventura started its activity and became the first theme park in Spain, with the hope of offering to its clients the opportunity of traveling around the world in just one day journey. After the initial success and thanks to the opening of its hotels and Costa Caribe Aquatic Park, PortAventura became a complete holiday destination. The six thematic areas -Mediterrània, Far West, México, China, Polynesia andSésamoAventura- cover 119 hectares and have 30 attractions, 100 daily performances, 75 catering points, and 27 craftworks and gifts' shops. Nowadays, the theme resort has 4 hotels: Hotel PortAventura, Hotel El Paso, HotelCaribe and Hotel Gold River; as well as an aquatic park, PortAventura Acuatic Park, and a convention centre with 4,000 people capacity. Furthermore, PortAventura is a unique family and leisure destination in Europe thanks to its excellent location in the Costa Dorada(on the shores of the Mediterranean Sea) as well as the unbeatable transport connections, close to the Barcelona and Reus airports, as well as the high speed train Station. Para más información: Burson-Marsteller 93 201 10 28 Marta Arias firstname.lastname@example.org email@example.com Gloria Almirall
<urn:uuid:99ff39a3-3036-4215-a465-099fcc2a42c8>
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
2,841
Does Community Notification for Sex Offenders Violate the Eighth Amendment's Prohibition against Cruel and Unusual Punishment - A Focus on Vigilantism Resulting from Megan's Law. Alex B. Eyssen Follow this and additional works at: https://commons.stmarytx.edu/thestmaryslawjournal Part of the Environmental Law Commons, Health Law and Policy Commons, Immigration Law Commons, Jurisprudence Commons, Law and Society Commons, Legal Ethics and Professional Responsibility Commons, Military, War, and Peace Commons, Oil, Gas, and Mineral Law Commons, and the State and Local Government Law Commons Recommended Citation Alex B. Eyssen, Does Community Notification for Sex Offenders Violate the Eighth Amendment's Prohibition against Cruel and Unusual Punishment - A Focus on Vigilantism Resulting from Megan's Law., 33 St. MARY'S L.J. (2001). Available at: https://commons.stmarytx.edu/thestmaryslawjournal/vol33/iss1/3 This Article is brought to you for free and open access by the St. Mary's Law Journals at Digital Commons at St. Mary's University. It has been accepted for inclusion in St. Mary's Law Journal by an authorized editor of Digital Commons at St. Mary's University. For more information, please contact firstname.lastname@example.org, email@example.com. DOES COMMUNITY NOTIFICATION FOR SEX OFFENDERS VIOLATE THE EIGHTH AMENDMENT'S PROHIBITION AGAINST CRUEL AND UNUSUAL PUNISHMENT? A FOCUS ON VIGILANTISM RESULTING FROM "MEGAN'S LAW" ALEX B. EYSSEN I. Introduction ................................................................. 102 II. The Evolution of Community Notification Law .............. 103 A. The Creation of Megan's Law ............................... 105 B. Federal Endorsement ........................................... 106 C. States' Adaptation of Megan's Law ..................... 107 D. Three-Tier Classification ................................. 107 III. Community Notification in Practice .......................... 109 A. Passive Notification .......................................... 110 B. Active Notification ............................................ 112 C. Community-Wide Notification ............................. 112 IV. The Legal Paradox of Community Notification ............. 115 V. Vigilantism Incited by Community-Wide Notification is Cruel and Unusual Punishment .......................... 118 A. Community-Wide Notification is Punishment .......... 119 B. Punitive or Regulatory Measure? ......................... 120 1. The Mendoza-Martinez Test ............................ 120 2. The Artway Test ........................................... 123 C. Community Notification May Not Withstand Eighth Amendment "Cruel and Unusual" Scrutiny .................. 127 1. The Proportionality Test ............................... 128 2. Vigilantism Creates Eighth Amendment Concerns. 130 VI. Proposal ................................................................. 132 A. Educate the Community ..................................... 133 B. Release Accurate Information ............................ 133 VII. Conclusion .............................................................. 134 I. INTRODUCTION In August of 2000, the Texas Department of Public Safety initiated its latest offensive in notifying residents of sex offenders living in their communities.\(^1\) Pursuant to recently enacted legislation,\(^2\) nearly 16,000 Texans received postcards in their mailboxes informing them that a convicted sex offender lives in their neighborhood.\(^3\) Although similar information was previously available to the public, many residents were nevertheless surprised and alarmed by the warnings.\(^4\) Postcard mailings are just one way in which states attempt to make information about sex offenders available to the public.\(^5\) However, Texas’s mailing program has reinvigorated a constitutional debate regarding due process and privacy.\(^6\) Sex offender registration has found a niche --- 1. See Jason Trahan, *DPS Mails Out Postcards Warning Residents of Sex Offenders in Area*, *Dallas Morning News*, Aug. 24, 2000, at 21A, available at 2000 WL 25849629 (reporting that the sex offender notification postcards supplement other methods of notification previously required by law). 2. See Tex. Code Crim. Proc. Ann. art. 62.03 (Vernon Supp. 2001) (establishing Texas’s community notification program, whereby neighborhood residents are notified by mail of the names and addresses of high-risk sex offenders living nearby); see also Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Program, 42 U.S.C. § 14071 (1996) (describing the congressional predicate upon which all sex offender registration acts are founded). 3. See Jason Trahan, *DPS Mails Out Postcards Warning Residents of Sex Offenders in Area*, *Dallas Morning News*, Aug. 24, 2000, at 21A, available at 2000 WL 25849629 (explaining that postcards are mailed to notify neighbors of nearby sex offenders by supplying the offender’s name, age, and address). 4. See id. (chronicling residents’ startled reactions to the discovery of sex offenders in their neighborhood, even though the same information was previously available). 5. Id. 6. See generally Wayne A. Logan, *Liberty Interests in the Preventive State: Procedural Due Process and Sex Offender Community Notification Laws*, 89 J. Crim. L. & Criminology 1167, 1220 (1999) (noting that “[c]ommentators have concluded that we are in the midst of a due process ‘counterrevolution,’ characterized by an atavistic return to a narrow definition of constitutionally protectible ‘liberty’”). “[A]lthough sex offenders indisputably warrant our disdain,” they do not lose due process protection. *Id.* at 1231. See generally Andrea L. Fischer, Note, *Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders*, 45 Clev. St. L. Rev. 505, 508-09 (1997) (suggesting that Florida’s sex offender registration, and its publication on the Internet, violates a sex offenders’ right to privacy); Caroline Louise Lewis, *The Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act: An Unconstitutional Deprivation of the Right to Privacy and Substantive Due Process*, 31 Harv. C.R.-C.L. L. Rev. 89, 94, 102 (1996) (arguing that publicizing an offender’s identity deprives him of his due process rights, as well as, his right to privacy). in all fifty states.\textsuperscript{7} However, its more invasive and active offspring, community notification, is beginning to take root while few pause to question its constitutional validity.\textsuperscript{8} This Comment illustrates how the Eighth Amendment's prohibition against cruel and unusual punishment is compromised by the violence and vigilantism incited by community notification programs. Part II traces the evolution of registration and notification programs from their unassuming federal roots and examines Texas's statutory method of classifying sex offenders. Part III dissects and compares the present applications of active, passive, and community-wide notification measures generally practiced within the fifty states. Furthermore, Part III demonstrates how this paradox manifests acts of vigilantism. Part IV discusses the legal paradox created when legislators unevenly weigh the rights of one class of citizens against the rights of another. Part V critically examines the constitutionality of community notification under the Eighth Amendment. The examination reveals subtle inconsistencies within the judicial system regarding the use of public notification. The analysis reveals that community notification requirements often meet historical and present-day definitions of punishment. Additionally, Part V discusses the concerns of such notification constituting cruel and unusual punishment as evidenced by vigilantism. Part VI affirms the need to reevaluate certain aspects of community notification and the actual effects that notification laws have upon offenders and non-offenders. Finally, Part VII offers suggestions that provide public protection through notification without the cruel and unusual punishment ramifications, which current programs impose. Most importantly, Part VII calls for new legislation requiring timely updating and management of sex offender databases, so that public safety is enhanced. Ideally, the system will keep the public intelligently informed while protecting the offender's constitutional rights. II. THE EVOLUTION OF COMMUNITY NOTIFICATION LAW On September 22, 1999, Thinh Pham, a mentally retarded Vietnamese refugee, played ball with neighborhood children near a Dallas, Texas, \textsuperscript{7} See Appendix A (comparing the various state’s sex offender registration statutes). \textsuperscript{8} See Amy L. Van Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 Drake L. Rev. 635, 637 (1999) (questioning the constitutionality of sex offender registration laws since the United States Supreme Court has yet to completely address the matter). Boys and Girls Club.\textsuperscript{9} As he played, Mr. Pham was unaware that he was about to become a victim of vigilante violence.\textsuperscript{10} Mr. Pham, an adult who functions at a sixth grade mentality, was suddenly attacked by four men who beat him upon his face and head while yelling “Child molester! Child molester!”\textsuperscript{11} The attack left Mr. Pham nearly unconscious, bloody, and missing four front teeth.\textsuperscript{12} Although he did not know why he was brutally attacked, Mr. Pham experienced a nightmare that leads many to question current community notification legislation.\textsuperscript{13} Mr. Pham’s attackers, incited by neighborhood rumors, mistakenly identified him as a pedophile.\textsuperscript{14} The violent mistake arose because Mr. Pham’s home was misidentified as that of a convicted sex offender.\textsuperscript{15} Unfortunately, the group home that Mr. Pham shared \begin{itemize} \item Jeffrey Weiss, \textit{Fair Warning or Fair Game? Backers Say Right to Know About Sex Offenders Overrides Risk of Vigilante Violence}, \textit{Dallas Morning News}, Oct. 22, 1999, at 1A, available at 1999 WL 29304181. \item But see \textit{Merriam Webster’s Collegiate Dictionary} 1317 (10th ed. 1993) (defining vigilante as “a self-appointed doer of justice”). \item Connie Piloto, \textit{Retarded Man’s Beating Spreads Fear: Authorities Cite Flaws in Sex-Offender Data, Condemn Vigilantism}, \textit{Dallas Morning News}, Oct. 16, 1999, at 27A, available at 1999 WL 28018283; see also Jeffrey Weiss, \textit{Fair Warning or Fair Game? Backers Say Right to Know About Sex Offenders Overrides Risk of Vigilante Violence}, \textit{Dallas Morning News}, Oct. 22, 1999, at 1A, available at 1999 WL 29304181 (noting that Mr. Pham has an elementary-school level mental capacity). \item See Connie Piloto, \textit{Retarded Man’s Beating Spreads Fear: Authorities Cite Flaws in Sex-Offender Data, Condemn Vigilantism}, \textit{Dallas Morning News}, Oct. 16, 1999, at 27A, 1999 WL 28018283 (describing the brutal physical attack upon Mr. Pham). \item See Accuracy Imperative: Erroneous Information in the State Sex-Offender Registry Can Be Dangerous, \textit{Fort Worth Star-Telegram}, Nov. 15, 1999, at 8, available at 1999 WL 23958194 (commenting on the inherent dangers associated with disseminating inaccurate sex-offender information). \item Id. The jurors took less than fifteen minutes to convict one of Mr. Pham’s assailants. \textit{See Manolo Barco, Judge Sets Term of 48 Years in Beating Case: Victim’s Identity Was Mistaken}, \textit{Dallas Morning News}, July 13, 2000, at 23A, available at 2000 WL 23716710 (recounting the assailant’s jury verdict). That particular assailant, who had three prior felony convictions, was sentenced to forty-eight years of confinement. \textit{Id}. Charges against one man were dismissed, another received two years of probation in exchange for a guilty plea, and the final nineteen year old assailant was given a ten-year deferred adjudication sentence following a guilty plea. \textit{Metro in Brief: Man Gets Probation in Beating}, \textit{Dallas Morning News}, Aug. 26, 2000, at 32A, available at 2000 WL 25849941. \item See Accuracy Imperative: Erroneous Information in the State Sex-Offender Registry Can Be Dangerous, \textit{Fort Worth Star-Telegram}, Nov. 15, 1999, at 8, available at 1999 WL 23958194 (commenting that the attack occurred just three weeks after new state legislation became effective requiring the postings of more detailed information regarding sex offenders on the State’s sex registry website). \end{itemize} with three other mentally disabled men was the former address of a registered sex offender.\textsuperscript{16} A. The Creation of Megan’s Law Ironically, Mr. Pham’s violent attack is not unlike the very crimes that originally outraged communities, and led to state and federal movements supporting public notification of sex offenders’ residences. On July 29, 1994, a twice-convicted sex offender raped and murdered a seven-year-old New Jersey girl, Megan Kanka, who lived across the street from his home.\textsuperscript{17} The child’s death and the revelation of the murderer’s sexual offense history sent a tremor through the community, which was soon felt at the New Jersey capital.\textsuperscript{18} Within a few weeks of the tragic murder of Megan Kanka, New Jersey became the first state to enact a sex offender registration statute, known as “Megan’s Law.”\textsuperscript{19} Megan’s Law requires the registration of all sex offenders convicted of certain designated crimes.\textsuperscript{20} Registrants also have to confirm their address every ninety days and notify the local municipal law enforcement agency of any address change.\textsuperscript{21} More importantly, Megan’s Law allows for public dissemination of the registered information.\textsuperscript{22} \begin{footnotesize} \begin{enumerate} \item See Connie Piloto, \textit{Retarded Man’s Beating Spreads Fear: Authorities Cite Flaws in Sex-Offender Data, Condemn Vigilantism}, \textit{Dallas Morning News}, Oct. 16, 1999, at 27A, available at 1999 WL 28018283 (noting that the actual offender, a juvenile, had previously moved from the residence and was not required to update his address because a judge had ruled that the juvenile no longer had to register); see also Manolo Barco, \textit{Defendant Denies Beating Retarded Man}, \textit{Dallas Morning News}, July 12, 2000, at 24A, available at 2000 WL 23716484 (indicating that Mr. Pham now resides in a different group home). \item See E.B. v. Verniero, 119 F.3d 1077, 1081 (3d Cir. 1997) (detailing that the murderer, who later confessed to the crime, resided in a house with two other felons convicted of sex offenses). \item See id. (commenting that neither the members of the New Jersey community nor local law enforcement knew of the murderer’s sexual offense history). \item See id. (noting the swiftness with which the New Jersey legislature passed the emergency bill); see also Artway v. Attorney Gen., 81 F.3d 1235, 1242 (3d Cir. 1996) (stating that the vote to enact the New Jersey legislation was unanimous; the committee process was skipped, and the only debate was on the Assembly floor). \item Verniero, 119 F.3d at 1080; see also Megan’s Law, N.J. Stat. Ann. § 2C:8c (West 1995) (setting forth the three tier sex offender rating based upon a re-offense risk level). \item See Artway v. Attorney Gen., 81 F.3d 1235, 1243 (3d Cir. 1996) (discussing the requirements of New Jersey’s Megan’s Law). \item Verniero, 119 F.3d at 1080. \end{enumerate} \end{footnotesize} B. Federal Endorsement Before Megan’s Law in New Jersey, no such policy existed on the national level.\textsuperscript{23} Community notification and sex offender registration began on the federal level in 1994, when Congress enacted legislation establishing federal guidelines and financial incentives for states to create their own versions of Megan’s Law.\textsuperscript{24} Named after another child victim,\textsuperscript{25} the federal statute requires certain offenders to register for a minimum of ten years and provides states the option to publicize sex offender information contained within their registries.\textsuperscript{26} Two years later, citing public safety concerns and a desire to more appropriately inform potential victims, Congress enacted an amendment requiring states to disclose their information.\textsuperscript{27} \textsuperscript{23} But see Stephen R. McAllister, “Neighbors Beware”: The Constitutionality of State Sex Offender Registration and Community Notification Laws, 29 Tex. Tech L. Rev. 97, 122 (1998) (recognizing a historical precedent of community notification dating back to colonial America). See generally, Samuel Jan Brakel & James L. Cavanaugh, Of Psychopaths and Pendulums: Legal and Psychiatric Treatment of Sex Offenders in the United States, 30 N.M. L. Rev. 69, 70 (2000) (recognizing the criminal law trend to create therapeutic legislation for sex offenses, instead of the typical punitive legislation for other crimes). \textsuperscript{24} See Stephen R. McAllister, “Neighbors Beware”: The Constitutionality of State Sex Offender Registration and Community Notification Laws, 29 Tex. Tech L. Rev. 97, 101 (1998) (recognizing the enactment of the Jacob Wetterling Act); see also Amy L. Van Duyn, Note, The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes, 47 Drake L. Rev. 635, 643 (1999) (noting that funds withheld from non-compliant states are reallocated to states that do comply with the Jacob Wetterling Act). \textsuperscript{25} See Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Program, 42 U.S.C. § 14071 (1996); see also Alan D. Scholle, Sex Offender Registration, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401 (noting that Jacob Wetterling’s body and his abductor were never discovered). \textsuperscript{26} Cf. Wayne A. Logan, A Study in “Actuarial Justice”: Sex Offender Classification Practice and Procedure, 3 Buff. Crim. L. Rev. 593, 597-600 (2000) (analyzing whether the release of information is an integral and necessary element of protecting the public). \textsuperscript{27} See id. (mentioning the considerable latitude given to states when determining the extent and manner by which public notifications are made available). A further amendment to the Jacob Wetterling Act established a national sex offender database accessible to state and national law enforcement agencies. FBI Database, 42 U.S.C. § 14072 (1996); see also Brian McGrory, Clinton Sets Tracking of Sex Offenders, Boston Globe, Aug. 25, 1996, at A1 (reporting on former President Clinton’s remarks regarding the nation-wide registry, whose purpose he characterized is to “‘keep track of [sex offenders]-not just in a single state, but wherever they go, wherever they move, so that parents and police have the warning they need to protect our children . . . . Deadly criminals don’t stay within state lines, so neither should law enforcement’s tools to stop them’”). C. States’ Adaptation of Megan’s Law Within two years of Megan Kanka’s death, all fifty states enacted sex offender registration statutes.\textsuperscript{28} Although the manner and means of notification varies with each state,\textsuperscript{29} some have adopted extreme systems that warn the public of relatively harmless offenders.\textsuperscript{30} However, before a state begins any notification process, they must first determine which offenders, if any, are subject to the policy. D. Three-Tier Classification Texas has opted for a tiered program that ranks offenders based upon their risk or likelihood of recidivism.\textsuperscript{31} Risk level determinations are often made by clinical assessors.\textsuperscript{32} In a few states, a prosecutor determines the level of risk posed by an individual.\textsuperscript{33} The Texas statute establishes guidelines for creating and operating a Risk Assessment Review \textsuperscript{28} Appendix A; John Gibeaut, \textit{Defining Punishment: Courts Split on Notification Provisions of Sex Offender Laws}, A.B.A.J., Mar. 1997, at 36. See generally, Carol Schultz Vento, Annotation, \textit{Validity, Construction, and Application of State Statutes Authorizing Community Notification of Release of Convicted Sex Offenders}, 78 A.L.R.5th 489, 494-502 (2000) (detailing state registration statutes). \textsuperscript{29} See Alan D. Scholle, \textit{Sex Offender Registration}, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401 (noting that state agencies establish their own guidelines regarding information dissemination). \textsuperscript{30} See Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 888 (1995) (commenting that a few states, such as Arizona and Louisiana, require registration for the benign offenses of adultery and bigamy, respectively). \textsuperscript{31} See Act of May 4, 2001, 77th Leg., R.S., ch.177, 2001 Tex. Sess. Law Serv. 177 (Vernon) (to be codified as an amendment to Tex. Code Crim. Proc. Ann. art. 62.03(a)); see also E-mail from Vincent Castilleja, Sex Offender Registration Coordinator, Texas Department of Public Safety, to the author (Oct. 19, 2000, 08:29 CST) (on file with the St. Mary’s Law Journal) (stating that as of Oct. 18, 2000, exactly 26,702 sex offenders were reported to the Texas state repository in Austin). \textsuperscript{32} See Act of May 4, 2001, 77th Leg., R.S., ch. 177, 2001 Tex. Sess. Law Serv. 177 (Vernon) (to be codified as an amendment to Tex. Code Crim. Proc. Ann. art. 62.03(a)) (detailing that before a sex offender is released from prison, the “Texas Department of Criminal Justice or the Texas Youth Commission” determines the sex offender’s level of risk). \textsuperscript{33} See Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1461 (1999) (commenting that New Jersey’s program allows a criminal assessor or prosecutor to evaluate an offender’s risk level for notification purposes); N.Y. Correct. Law § 168-n(3) (McKinney 2001) (specifying that the district attorney has the duty to determine “the duration of registration and level of notification”); see also Wyo. Stat. Ann. § 7-19-303(c) (Michie 1999) (authorizing a judge to designate an offender’s risk level based upon statutory criteria). Committee, which determines an offender’s risk level.\textsuperscript{34} Furthermore, the statute requires the Risk Assessment Review Committee to develop an objective point system based on a variety of factors to assess an individual’s risk level.\textsuperscript{35} This system, known as a “sex offender screening tool,” acts as the measuring stick from which three classifications are objectively drawn.\textsuperscript{36} Texas classifies offenders as either “level one,” “level two” or “level three” offenders, with level three being the most dangerous.\textsuperscript{37} Individuals assigned a numeric risk level of three are believed to “pose[ ] a serious danger to the community and will continue to engage in criminal sexual conduct.”\textsuperscript{38} Level three offenders are also classified by attaining a “designated range of points on the sex offender screening tool.”\textsuperscript{39} The Risk Assessment Review Committee also uses the screening tool to distinguish between level three and level two offenders and sets minimum numeric scores that distinguish the three levels.\textsuperscript{40} Level two offenders “pose[ ] a moderate danger to the community and may continue to engage in criminal sexual conduct.”\textsuperscript{41} However, the difference in classification between level three and level two is all but insignificant because both levels of offenders are subject to registration under the Texas statute.\textsuperscript{42} \begin{footnotesize} \begin{enumerate} \item See Tex. Code Crim. Proc. Ann. art. 62.035(a) (Vernon Supp. 2001) (mandating that the “review committee, to the extent feasible, should include at least: (1) one member having experience in law enforcement; (2) one member having experience working with juvenile sex offenders; (3) one member having experience as a sex offender treatment provider; and (4) one member having experience working with victims of sex offenses”). \item Tex. Code Crim. Proc. Ann. art. 62.035(c) (Vernon Supp. 2001). \item \textit{Id.} \item Act of May 4, 2001, 77th Leg. R.S., ch.177, § 2, 2001 Tex. Sess. Law. Serv. 177 (Vernon) (to be codified as an amendment to Tex. Code Crim. Proc. Ann. art. 62.035(c)). Prior to September 1, 2001, a “level one” offender was a person believed to pose the greatest danger to the community whereas a “level three” offender was believed to pose no danger. \textit{Id.; see also} Stephen R. McAllister, “Neighbors Beware”: The Constitutionality of State Sex Offender Registration and Community Notification Laws, 29 Tex. Tech L. Rev. 97, 108 (1998) (noting that several states evaluate sex offenders’ risk level as either “low, moderate, or high”). \item \textit{Id.} \item \textit{Id.} \item \textit{Id.} \item See Tex. Code Crim. Proc. Ann. art. 62.035 (Vernon Supp. 2001); \textit{see also} Email from Vincent Castilleja, Sex Offender Registration Coordinator, Texas Department of Public Safety, to the author (Oct. 19, 2000, 08:29 CST) (on file with the St. Mary’s Law Journal) (noting that as of Oct. 18, 2000, in Texas, there were 655 reported risk level three offenders and 1807 reported risk level two offenders). \end{enumerate} \end{footnotesize} Level one offenders are believed to “pose[ ] a low danger to the community” because they “will not likely engage in criminal sexual conduct.” Nevertheless, law enforcement agencies are notified of level one offenders. In Texas, level one offenders constitute a fraction of the number of level two and level three offenders. Much like Texas, many states attempt to classify and differentiate sex offenders on paper. However, in the realm of current community notification, almost all “high-risk” offenders are publicized. III. COMMUNITY NOTIFICATION IN PRACTICE Many argue that sex offender registration laws have little purpose if the information is not disseminated to the public. Hence, supporters reason that the essence of any effective notification program is to provide people the most relevant information available. Accordingly, most state agencies create guidelines regarding the type of information that is made available and how to disseminate that information. As a result, three prominent methods of notification emerge: (1) passive notification, (2) active notification, and (3) community-wide notification. 43. Act of May 4, 2001, 77th Leg. R.S., ch.177, § 2, 2001 Tex. Sess. Law. Serv. 177 (Vernon) (to be codified as an amendment to Tex. Code Crim. Proc. Ann. art. 62.035(e)). 44. Id. 45. See E-mail from Vincent Castilleja, Sex Offender Registration Coordinator, Texas Department of Public Safety, to the author (Oct. 19, 2000, 08:29 CST) (on file with the St. Mary’s Law Journal) (stating that as of Oct. 18, 2000, there were only twenty-six reported risk level one offenders in the entire state of Texas). 46. Jason Trahan, DPS Mails Out Postcards Warning Residents of Sex Offenders in Area, Dallas Morning News, Aug. 24, 2000, at 21A, available at 2000 WL 25849629. 47. See Alan D. Scholle, Sex Offender Registration, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401 (arguing that the lack of public knowledge concerning the location of sex offenders “may have cost Megan Kanka her life”). 48. See Abril R. Bedarf, Comment, Examining Sex Offender Community Notification Laws, 83 Cal. L. Rev. 885, 903 (1995) (suggesting that the availability of sex offender registration data allows individuals to “police their own communities” versus merely reacting after a crime has been committed). 49. Alan D. Scholle, Sex Offender Registration, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401; see also, Jane A. Small, Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws, 74 N.Y.U. L. Rev. 1451, 1462 (1999) (illustrating the diversity amongst state notification programs). Some states limit access to sex offender information to law enforcement, others limit it to institutions responsible for children, and a few grant complete access to the general public. Id. 50. Cf. Alan D. Scholle, Sex Offender Registration, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401 (summarizing the various levels of notification employed throughout the nation); Abril R. Bedarf, Comment, Examining Sex Offender Community Notification Laws, 83 Cal. L. Rev. 885, 903 (1995) (proffering four basic types of notificaA. Passive Notification The Passive Notification method is the least aggressive method of notification and requires citizen initiative.\textsuperscript{51} The passive method is best identified by the minimal level of government action when compared to the level required of the inquiring citizen.\textsuperscript{52} Typically, the interested party, such as a potential employer or neighbor, must request information about a particular individual at the local police or sheriff’s department.\textsuperscript{53} However, other varieties of passive notification methods exist that provide an inquiring party a more discreet atmosphere. One of the most widely implemented methods of passive notification uses the Internet.\textsuperscript{54} Visitors to many sex offender registry websites can search for an offender specifically by name to find out if the offender lives in the area.\textsuperscript{55} Generally, a website lists an offender’s name, physical description, date of birth, social security number, address, employer, and, when available, a photo- \textsuperscript{51} Alan D. Scholle, \textit{Sex Offender Registration}, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401. \textsuperscript{52} See id. (advancing that in a passive notification system, citizens must access the offender databases on their own initiative). \textsuperscript{53} See id. (discussing Iowa’s program which requires inquiring citizens to “complete a request for registry information form” by providing the individual’s name and one of three pieces of information: the offender’s address, date of birth, or social security number). \textsuperscript{54} See Wayne A. Logan, \textit{A Study in “Actuarial Justice”: Sex Offender Classification Practice and Procedure}, 3 Buff. Crim. L. Rev. 593, 596 n.12 (2000) (noting that the Internet’s “unrestricted geographic sweep . . . arguably possesses the greatest potential for widespread dissemination—even beyond state or local boundaries”); Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1463-64 (1999) (noting that as of November 1999, at least sixteen states made sex registry information available online: Alabama, Alaska, Connecticut, Delaware, Florida, Georgia, Kansas, Indiana, Louisiana, Michigan, North Carolina, South Carolina, Texas, Utah, Virginia and West Virginia). \textsuperscript{55} Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1465 (1999); The Texas Department of Public Safety Convictions and Sex Offender Registration Database, \textit{at} http://txdps.state.tx.us/sosearch (last visited Aug. 28, 2001) (allowing searches by either an alleged offender’s name or, more broadly, by zip code and city). The Texas website has a one-page disclosure that provides, \textit{inter alia}, that “searches based on names, dates of birth and other alphanumeric identifiers are not always accurate.” Id. graph.\textsuperscript{56} In Texas, anyone with Internet access may search the entire Texas Sex Offender Database and locate any specific registered offender, or they can merely peruse a list of offenders located within their neighborhood.\textsuperscript{57} California provides its sex offender registry information on CD-ROM, and often passes them out free of charge from booths located at public events and other high traffic areas.\textsuperscript{58} The CD-ROM format allows sex offender information to be downloaded onto personal computers or privately maintained websites designed to warn the community. In many states without a government-maintained sex offender website, information is commonly made available through privately maintained sites.\textsuperscript{59} As another means of passive notification, some states provide a toll-free hotline, while others require a nominal service fee.\textsuperscript{60} Callers are able to inquire whether a certain individual is a registered sex offender by \textsuperscript{56} See Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1465 n.81 (1999) (describing the Florida website as having sex offenders’ photographs surrounded by flashing police lights). \textsuperscript{57} See The Texas Department of Public Safety Convictions and Sex Offender Registration Database, at http://txdps.state.tx.us (last visited Sept. 18, 2001); see also Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 508 (1997) (proffering the argument that Florida’s Internet listing of sex offenders, which is similar to Texas’s, violates the constitutional rights of the offenders). \textsuperscript{58} See Devon B. Adams, \textit{Summary of State Sex Offender Registry Dissemination Procedures}, Bureau of Justice Statistics Fact Sheet, Aug. 1999, at 1, available at http://www.ojp.usdoj.gov/bjs/pub/pdf/ssordp.pdf (noting that as of August 1999, California is the only state that uses a CD-ROM format); see also Michael Dear & Django Sibley, \textit{The One-Way Strategy for Sex Offenders Makes Nobody Safe}, L.A. Times, Oct. 1, 2000, at M6 (reporting that “[i]n 1947, California became one of the first states to require registration of sex offenders, and the state now has one of the nation’s strictest notification and registration laws”). \textsuperscript{59} See \textit{Stop Sex Offenders!}, at http://www.stopsexoffenders.com/ (last visited Sept. 18, 2001) (providing lists of states’ sex offender registries). \textsuperscript{60} Alan D. Scholle, \textit{Sex Offender Registration}, FBI L. Enforcement Bull., July 1, 2000, at 2000 WL 12023401 (noting both New York and California operate nominal-fee phone services); Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 517 n.87 (1997); see also Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 905-06 (1995) (noting California’s phone system only provides information on child sex offenders). Proceeds from the calls fund the continued operation of the program. \textit{Id}. The California statute requires that callers “have a reasonable suspicion that a person is at risk.” \textit{Id}. (citing Cal. Penal Code § 290.4(a)(5)(C)(viii) (West 2001)). providing the suspected individual's name, along with other identifying information, such as an address or birth date.\textsuperscript{61} B. \textit{Active Notification} A slightly more aggressive method of notification focuses on the government proactively informing those citizens most likely to be endangered by a sex offender.\textsuperscript{62} Institutions such as schools, day care centers, churches, and other youth-oriented organizations considered vulnerable to the crimes of a sex offender are notified by the state of sex offenders in the area.\textsuperscript{63} Prior victims and current landlords are also selectively notified because they are considered at risk due to their unique relationship and the offender's proximity.\textsuperscript{64} C. \textit{Community-Wide Notification} The most proactive of all notification statutes are those providing community-wide notification of certain sex offenders. The Texas statute allows the mailing of notices to all residential neighbors within a three-block radius of a registered sex offender's home.\textsuperscript{65} The notices are brightly colored postcards providing the name, any known alias, and a detailed physical description of the offender, including race, sex, weight, hair and eye color, and even shoe size.\textsuperscript{66} The postcards also supply the \textsuperscript{61} Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1463 (1999). The caller is provided with an offender's physical description, specifics regarding the crimes that resulted in the conviction, and the zip code of the area where the offender resides. \textit{See Cal. Penal Code} § 290.4(a)(2)-(3) (West 2001). \textsuperscript{62} \textit{See} Alan D. Scholle, \textit{Sex Offender Registration}, FBI L. Enforcement Bull., July 1, 2000, \textit{at} 2000 WL 12023401 (discussing forms of "active notification"). \textsuperscript{63} \textit{Id.} \textsuperscript{64} \textit{Id.} \textsuperscript{65} \textit{See} Act of May 4, 2001, 77th Leg. R.S., ch.177, 2001 Tex. Sess. Law. Serv. 177 (Vernon) (to be codified as an amendment to Tex. Code Crim. Proc. Ann. art. 62.045(a)) (legislating that all level three sex offenders are subject to community notification, either following release from a penal institution, or following a move to a new address). The statute provides for a one-mile radius of notification in areas not subdivided. \textit{See id.} Louisiana mandates a one-square block radius of notification in urban areas, yet imposes a three-mile radius in rural areas. Alan D. Scholle, \textit{Sex Offender Registration}, FBI L. Enforcement Bull., July 1, 2000, \textit{at} 2000 WL 12023401; \textit{see also} Daryl Bell, \textit{ACLU Plans to Sue DPS over Sex Offender Cards; Policy Notifies Neighbors by Mail}, San Antonio Express-News, Aug. 18, 2000, \textit{at} 3B, \textit{available at} 2000 WL 27328846 (reporting that Texas joined California, Maryland, Louisiana, and Oregon in implementing community-wide notification). \textsuperscript{66} \textit{See} The Texas Department of Public Safety Convictions and Sex Offender Registration Database, \textit{at} http://txdps.state.tx.us/sosearch (last visited Sept. 18, 2001) (listing the sex offender information provided on the notification postcards). offender’s sexual offense, date of conviction, the verification agency, and the victim’s age.\textsuperscript{67} Due to the widespread surprise and concern that the postcards generate, the Texas Department of Public Safety’s website has a detailed “Frequently Asked Questions” page explaining the postcards and their meaning.\textsuperscript{68} The Texas statute also allows neighborhood meetings and the posting of notices when deemed appropriate by local law enforcement.\textsuperscript{69} However, often, neighbors host unofficial meetings and distribute their own leaflets to notify their neighborhoods.\textsuperscript{70} In Colorado, for instance, one Denver woman prints out special maps for neighbors and schools pinpointing offenders’ homes, and has even gone so far as to stake out offenders’ homes to monitor their activities.\textsuperscript{71} On occasion, and without government provocation, newspapers publish names and photographs of area offenders.\textsuperscript{72} Offenders are sometimes required to place ads confess- \textsuperscript{67} \textit{Id.} The postcards also include the offender’s criminal sentence and current supervisory status, including supervisory department. \textit{Id.} \textsuperscript{68} \textit{Id.} In an attempt to explain the differences in the three risk assessment classification levels, the website employs much of the Texas statutory language. \textit{Id.} \textsuperscript{69} \textit{See} Tex. Code Crim. Proc. Ann. art. 62.045 (Vernon Supp. 2001); \textit{cf.} Amy L. Van Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 Drake L. Rev. 635, 645 (1999) (discussing forms of more aggressive community notification). Some judges have required offenders to post signs on their residences and their cars reading “Dangerous Sex Offender—No Children Allowed.” \textit{Id.} at 646. Other offenders have had to confess their crimes through public media devices such as their area newspapers. \textit{Id.} \textsuperscript{70} \textit{See} Robert Sanchez, \textit{Vigilante Tracks Sex Offenders: Woman’s Database Born of Obsession}, Denver Rocky Mountain News, Oct. 29, 2000, at 4A, available at 2000 WL 6611533 (reporting that a former child abuse victim, passes “out hundreds of fliers in pursuit of her own brand of vigilante justice”). \textsuperscript{71} \textit{Id.} \textsuperscript{72} \textit{See} Jamie Dettmer, \textit{British Vigilantes Don’t Suffer Perverts Lightly}, Insight Mag. (United Kingdom), Sept. 4, 2000, at 6, at 2000 WL 2664360 (reporting on the wave of vigilantism incited by a “name-and-shame” list of alleged British sex offenders published by a local European tabloid). The Church of England condemned the newspaper for initiating violence that stemmed from its publication. \textit{Id. But see} Wayne A. Logan, \textit{Liberty Interests in the Preventive State: Procedural Due Process and Sex Offender Community Notification Laws}, 89 J. Crim. L. & Criminology 1167, 1174 n.35 (1999) (noting that in California local law enforcement agencies are statutorily permitted to solicit the assistance of news media in publicizing offender information). ing their crimes, or place signs in their yards declaring that they are convicted sexual offenders. Regardless of the method, notification engenders in the community a false sense of security. Because communities are notified of some offenders, they develop a false sense of security trusting that all offenders are disclosed. In reality, full disclosure may never be achieved. Also, inherent problems plague notification, such as outdated offender information and the failure of some offenders to register; thus, leaving a system that fails to completely inform the community. Regardless of the flaws, states are currently joining the community notification bandwagon that believes it is an effective way to warn society of potentially dangerous sexual offenders. 73. See Michael Grunwald, *Shame Makes Comeback in Court: Texas Judge Likes to Impose Public Punishment for Crime*, *Ariz. Republic*, Jan. 11, 1998, at A14, available at 1998 WL 7742935 (reporting on the sentence handed down to a New Hampshire child molester, which required him to purchase ads in the newspaper to confess his crimes and to implore similar offenders to seek treatment); see also Tex. Code Crim. Proc. Ann. art. 62.03(e) (Vernon Supp. 2001) (requiring that in some situations the local law enforcement authority “shall immediately publish notice [of the sex offender] in English and Spanish in the newspaper of greatest paid circulation in the county”). 74. See Larry Copeland, *Does ‘Scarlet Letter’ Judge Cross the Line? Some Applaud Texas Jurist for Taking Creative Approach to Sentencing Sex Offenders*, *USA Today*, July 10, 2001, at A5, available at 2001 WL 5466528 (detailing that the sign must say “DANGER: Registered Sex Offender Lives Here”). 75. Robin L. Deems, Comment, *California’s Sex Offender Notification Statute: A Constitutional Analysis*, 33 San Diego L. Rev. 1195, 1230 (1996) (citing the public’s false sense of security as a major argument among critics). 76. Cf. Connie Piloto, *Retarded Man’s Beating Spreads Fear: Authorities Cite Flaws in Sex-Offender Data, Condemn Vigilantism*, Dallas Morning News, Oct. 16, 1999, at 27A, available at 1999 WL 28018283 (noting that the actual convicted sexual predator had moved from the address listed). 77. See Robin L. Deems, Comment, *California’s Sex Offender Notification Statute: A Constitutional Analysis*, 33 San Diego L. Rev. 1195, 1230-32 (1996) (asserting that notification statutes are ineffective); Robert Sanchez, *Vigilante Tracks Sex Offenders: Woman’s Database Born of Obsession*, Denver Rocky Mountain News, Oct. 29, 2000, at 4A, available at 2000 WL 6611533 (commenting on how some offenders avoid registration by providing false addresses or merely list themselves as transients); see also Sarah Duran, *Is There a Sex Offender Living Next Door? Up to 40% of Lists Are Wrong. Inaccurate Addresses Keep Public from Being Warned*, The News Tribune (Tacoma, WA), June 4, 2000, at A1, available at 2000 WL 5332383 (reporting that the Washington State Patrol is struggling to keep up with the 1000 sex offender database changes it receives each month); Mike Ward, *Problems Plague Sex Offender Registry, Internet Listing Brands Even Some with Dropped Charges*, Austin Am.-Statesman, Dec. 19, 1999, at A1, available at 1999 WL 7435041 (reporting that the Texas sex offender registration program only requires the registration of offenders convicted since 1970). IV. The Legal Paradox of Community Notification The proliferation of sex offender notification laws signifies Americans' clear preference for community protection at the expense of the liberty interest of sex offenders: the laws seek to preempt sex crimes by at once branding offenders and providing information to communities in the putative name of public safety through self-protection.\textsuperscript{78} Notification of a sex offender's presence creates a legal paradox where the constitutional rights of one citizen are infringed because of a self-proclaimed right-to-know of another.\textsuperscript{79} Community notification essentially provides the public with a label to place upon an individual, which informs the community of the offender's criminal history.\textsuperscript{80} The notification often exposes the offender to extraordinary punishment in the form of violence and vigilantism. While the public is often relieved to know of an offender's past, that knowledge soon translates into a feeling of helplessness. As a result, some individuals choose to channel their emotions into violence.\textsuperscript{81} Incidents ranging from verbal harassment to life-threatening attacks have \textsuperscript{78}. Wayne A. Logan, \textit{Liberty Interests in the Preventive State: Procedural Due Process and Sex Offender Community Notification Laws}, 89 J. Crim. L. & Criminology 1167, 1225 (1999); see also Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 939 (1995) (concluding that "most community notification proposals are problematic from a policy standpoint because they sacrifice an offender's humanity in the name of protecting the public"). \textsuperscript{79}. See also Andrea L. Fischer, Note, \textit{Florida's Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 506 (1997) (suggesting that "[o]ne of the toughest challenges for the courts is determining how to balance society's need for protection against an individual's constitutional rights"). \textsuperscript{80}. Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 906 (1995); see also Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia's New Sex Offender Registration Statute}, 2 Wm. & Mary J. Women & L. 171, 174 (1995) (noting that "a person should not be labeled a 'bad person,' and therefore more likely to commit crimes, solely from the fact that he has previously committed a crime"). "Any condition that requires a defendant to label himself . . . or to be shunned by his fellow citizens violates [the] concept of the dignity of [humanity]." \textit{Id.} (citing Jon A. Brilliant, Note, \textit{The Modern Day Scarlet Letter: A Critical Analysis of Modern Probation Conditions}, 1989 Duke L.J. 1357, 1382 (1989)). \textsuperscript{81}. See Amy L. Van Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 Drake L. Rev. 635, 657 (1999) (noting the "lynch-mob" mentality that notification can invoke); Mike Ward, \textit{Problems Plague Sex Offender Registry, Internet Listing Brands Even Some with Dropped Charges}, Austin Am.-Statesman, Dec. 19, 1999, at A1, available at 1999 WL 7435041 (noting that Texas State Senator Florence Shapiro, sponsor of the first community notification bill, admitted that "[v]igilantism was a concern"). been directly attributed to sex offender notification.\textsuperscript{82} The brutal attack of Mr. Pham in Dallas, Texas, is not an isolated event. Hundreds of other examples of vigilantism incited by public notification are reported.\textsuperscript{83} In New Jersey, the birthplace of Megan's Law, a man armed with a handgun fired five shots at a sex offender's home after receiving a neighborhood notice regarding the offender's presence.\textsuperscript{84} In Washington, neighbors burned down the house of a convicted rapist after sheriffs distributed posters with the message: "VIEWED AS AN EXTREMELY DANGEROUS UNTREATED SEX OFFENDER WITH A VERY HIGH PROBABILITY FOR RE-OFFENSE...HAS SADISTIC AND DEVIANT SEXUAL FANTASIES WHICH INCLUDE TORTURE, SEXUAL ASSAULT, HUMAN SACRIFICE, BONDAGE AND THE MURDER OF YOUNG CHILDREN."\textsuperscript{85} In \textit{E.B. v. Verniero},\textsuperscript{86} the Third Circuit commented that vigilante justice occurs "with sufficient frequency and publicity" to justifiably induce fear within the offenders.\textsuperscript{87} Yet, vigilante violence is not solely a concern to those convicted of sex crimes. Inaccurate information, wrong addresses, and misidentified individuals have also lead to attacks against completely innocent individuals. The confusion is often the result of erroneous information reported by the state.\textsuperscript{88} The Texas sex offender website provides information regarding 20,000 registered offenders, and officials acknowledge the possibility of erroneous information.\textsuperscript{89} \begin{footnotesize} \begin{enumerate} \item See Jerry Bergsman, \textit{Home Burns on Day Rapist Was to Arrive}, \textit{Seattle Times}, July 12, 1993, at A1, 1993 WL 6007628 (reporting that arsonists burned a child sex offender's home); see also Lynn Okamoto, \textit{Iowans Are Comparatively Calm}, \textit{Des Moines Reg.}, Nov. 22, 1998, at 4, available at 1998 WL 22773442 (reporting on the firebombing of a California offender's home). Several offenders have committed suicide as a direct result of community notification. Wayne A. Logan, \textit{Liberty Interests in the Preventive State: Procedural Due Process and Sex Offender Community Notification Laws}, 89 J. Crim. L. & Criminology 1167, 1176 n.45 (1999). \item See Edward Martone, \textit{No: Mere Illusion of Safety Creates Climate of Vigilante Justice}, 81 A.B.A. J. 39, 39 (1995) (describing a similar New Jersey attack where attackers misidentified and beat someone they believed to be a child molester because of an erroneous police notice). \item See Deepti Hajela, \textit{Linden Man Gets 10-Year Terms in Vigilante Shooting}, \textit{The Record}, Northern N.J., Feb. 20, 1999, at A3, 1999 WL 7090231 (reporting that a neighbor of an alleged sex offender was narrowly missed by a vigilante shooting). \item David Biema, \textit{Burn Thy Neighbor}, \textit{Time}, July 26, 1993, at 58. \item 119 F.3d 1077 (3d Cir. 1997). \item E.B. v. Verniero, 119 F.3d 1077, 1102 (3d Cir. 1997). \item See Connie Piloto, \textit{Retarded Man's Beating Spreads Fear: Authorities Cite Flaws in Sex Offender Data, Condemn Vigilantism}, \textit{Dallas Morning News}, Oct. 16, 1999, at 27A, available at 1999 WL 28018283 (noting that the state gave the wrong address of the offender). \item See The Texas Department of Public Safety Convictions and Sex Offender Registration Database, at http://txdps.state.tx.us (last visited Sept. 28, 2001). The introduction to \end{enumerate} \end{footnotesize} search on the Texas website, visitors must first read a disclaimer page.\textsuperscript{90} Shockingly, a random spot check of ten offenders’ files on the Texas website in 1999 revealed that seven files contained errors, ranging from wrong addresses and inaccurate victim information to the reporting of wrong crimes altogether.\textsuperscript{91} The over-abundance of inaccurate addresses of sex offenders has many Texas law enforcement agencies struggling to keep the database updated.\textsuperscript{92} In Dallas, Texas, more than 100 officers spent four days attempting to verify addresses of the city’s more than 2,200 registered offenders.\textsuperscript{93} As expected, many addresses were wrong.\textsuperscript{94} In Washington, Tacoma police conducted similar checks on their city’s sex offenders list and discovered that nearly half were registered with wrong or inaccurate addresses.\textsuperscript{95} Despite the abundance of inaccuracies and errors, states continue to advance community notification statutes with seemingly little deference for the rights of the offenders or the threat of danger for innocent citizens. Vigilantism from these programs has reached a nation-wide level, yet few realize it stems from the notifications within their own backyards. By failing to correct the vast problems plaguing many notification methods, many states, including Texas, are fueling a fire that needs extinguishing. \textsuperscript{90} Id. (requiring that “[e]xtreme care should be exercised in using any information obtained from this Website”). The site’s disclaimer adds that “neither the DPS nor the State of Texas shall be responsible for any errors or omissions produced by secondary dissemination of this information.” \textit{Id.} \textsuperscript{91} See Mike Ward, \textit{Problems Plague Sex Offender Registry, Internet Listing Brands Even Some with Dropped Charges}, \textit{Austin Am.-Statesman}, Dec. 19, 1999, at A1, available at 1999 WL 7435041 (reporting that an embarrassed Fort Worth, Texas teenager shot herself after seeing her father’s photo on the website). \textsuperscript{92} Dave Michaels, \textit{Police Check Sex Offenders’ Whereabouts: 4-Day Effort Examines Compliance with Law}, \textit{Dallas Morning News}, Dec. 8, 1999, at 33A, available at 1999 WL 30756170 (reporting Dallas’s latest effort to check on sex offender compliance with the mandatory law requiring the offender to re-register following every move). \textsuperscript{93} \textit{Id.} \textsuperscript{94} \textit{See id.} (noting that one offender was discovered not to have lived at his registered address for more than ten years). \textsuperscript{95} \textit{See Sarah Duran, Is There a Sex Offender Living Next Door? Up to 40% of Lists Are Wrong. Inaccurate Addresses Keep Public from Being Warned}, \textit{The News Tribune} (Tacoma, WA), June 4, 2000, at A1, available at 2000 WL 5332383 (reporting that when Tacoma, Washington police checked 106 offenders, they discovered that forty-three percent had inaccurate addresses). V. Vigilantism Incited by Community-Wide Notification is Cruel and Unusual Punishment The widespread epidemic of vigilante violence is an additional form of punishment for many offenders. In fact, this additional punishment typically lasts longer than the original punishment imposed by a court of law. Often times, this new sentence forced upon offenders raises viable Eighth Amendment arguments when the punishment exceeds the boundaries of what society considers cruel and unusual.\textsuperscript{96} The United States Constitution prohibits the infliction of “cruel and unusual” punishment.\textsuperscript{97} When the Framers adopted the English phrase, they did so with little debate and by a considerable majority.\textsuperscript{98} The phrase “cruel and unusual” has been interpreted differently over time.\textsuperscript{99} A review of case law provides the best insight for defining “cruel and unusual” and the limitations on its application.\textsuperscript{100} Likewise, the case law offers precedent to help measure whether a possible violation has occurred. \textsuperscript{96}. \textit{Cf.} Trop v. Dulles, 356 U.S. 86, 100-01 (1958) (asserting that the Eighth Amendment’s scope must be determined by the “evolving standards of decency that mark the progress of a maturing society”). \textsuperscript{97}. U.S. Const. amend. VIII. \textit{See generally} Yale Glazer, Note, \textit{The Chains May Be Heavy, But They Are Not Cruel and Unusual: Examining the Constitutionality of the Reintroduced Chain Gang}, 24 \textit{Hofstra L. Rev.} 1195, 1202-04 (1996) (providing a historical look back as far as biblical times, which supports a prohibition against excessive punishments). \textsuperscript{98}. \textit{See} Yale Glazer, Note, \textit{The Chains May Be Heavy, But They Are Not Cruel and Unusual: Examining the Constitutionality of the Reintroduced Chain Gang}, 24 \textit{Hofstra L. Rev.} 1195, 1203-04 (1996) (noting the relative ease with which the phrase “cruel and unusual” was incorporated into the original drafting of the Constitution). However, there was concern regarding the vagueness and ambiguity of the term. \textit{Id.} The following discussion between colonial statesmen took place: Mr. Smith, of South Carolina, objected to the words, “nor cruel and unusual punishment,” the import of them being too indefinite. Mr. Livermore [of New Hampshire]-the [C]lause seems to express a great deal of humanity, on which account I have no objection to it; but it seems to have not meaning in it, I do not think it necessary . . . . No cruel and unusual punishment is to be inflicted; it is sometimes necessary to hang a man, villains often deserve whippings, and perhaps having their ears cut off; but are we in the future to be prevented from inflicting these punishments because they are cruel? \textit{Id.} at n.59 (citing 1 \textit{Annals of Cong.} 782-83 (1789)) (alterations in original). \textsuperscript{99}. \textit{Id.} at 1204-05; \textit{see also} Harmelin v. Michigan, 501 U.S. 957, 967-74 (1991) (discussing the history of England’s Cruel and Unusual Punishment Clause). \textsuperscript{100}. Yale Glazer, Note, \textit{The Chains May Be Heavy, But They Are Not Cruel and Unusual: Examining the Constitutionality of the Reintroduced Chain Gang}, 24 \textit{Hofstra L. Rev.} 1195, 1204 (1996). The Supreme Court historically applies one test, known as the “proportionality test,” to determine whether punishment is cruel and unusual.\textsuperscript{101} The test balances the nature of the punishment against the benefit and protection the punishment provides the community.\textsuperscript{102} Community notification programs fail the proportionality test because the promulgation of vigilante violence it encourages is both cruel and unusual. A. \textit{Community-Wide Notification is Punishment} Before a court addresses the constitutionality of any punishment, it must first address the preliminary question of whether the questioned act is in fact punishment, or merely a non-punitive regulatory measure.\textsuperscript{103} If the questioned act is punishment, a court then determines if that punishment is grossly disproportionate to the crime.\textsuperscript{104} Thus, community notifi- \textsuperscript{101} See Harmelin v. Michigan, 501 U.S. 957, 961, 994 (1991) (opining that a life sentence was not disproportionate for the crime of possessing 672 grams of cocaine). But see Hudson v. McMillian, 503 U.S. 1, 4 (1992) (quoting Ingraham v. Wright, 430 U.S. 651, 670 (1977)) (opining that the legal standard governing Eighth Amendment claims involving physical abuse, is “the unnecessary and wanton infliction of pain”). \textsuperscript{102} See Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 CLEV. ST. L. REV. 505, 529 (1997) (evaluating Florida’s Internet notification under Eighth Amendment scrutiny). Cruel and unusual punishment is defined as “punishment that is torturous, disproportionate to the crime in question, degrading, inhuman, or otherwise shocking to the moral sense of the community.” \textsc{Black’s Law Dictionary} 514 (pocket ed. 1996); see also State v. Freeman, 574 P.2d 950, 956 (Kan. 1978) (asserting a three-part test to determine if a length of a criminal sentence violates the Eighth Amendment provision against cruel and unusual punishment). The \textit{Freeman} test requires consideration of: (1) [t]he nature of the offense and the character of the offender . . . with particular regard to the degree of danger present to society . . . ; (2) [a] comparison of the punishment with punishment imposed in this jurisdiction for more serious offenses . . . ; and (3) [a] comparison of the penalty with punishments in other jurisdictions for the same offense. \textit{Id.} \textsuperscript{103} See Artway v. Attorney Gen., 81 F.3d 1235, 1264 (3d Cir. 1996) (opining that the threshold question under each clause is “whether [Megan’s] law can be explained solely by a remedial purpose”); Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 WM. & MARY J. WOMEN & L. 171, 178 (1995) (suggesting that “in evaluating the Virginia sex offender registration law, the first question is whether the registration requirement is punishment for purposes of the Eighth Amendment”); see also Hon. Debra H. Goldstein & Stephanie Goldstein, \textit{Sex Offender Registration & Notification: The Constitution vs. Public Safety}, 60 ALA. LAW. 112, 116 (1999) (proclaiming that “[t]he key issue in Ex Post Facto challenges is whether a given law can be defined as punishment”). But cf. State v. Myers, 923 P.2d 1024, 1044 (Kan. 1996) (holding that the intent of the Kansas Sexually Violent Predator Act’s registration requirement of public safety was not penalizing, but designed to regulate convicted sex offenders). \textsuperscript{104} See Trop v. Dulles, 356 U.S. 86, 99 (1958) (opining that those punishments which are grossly disproportionate raise viable Eighth Amendment challenges). cation programs must first be identified as punishment before conducting a more thorough analysis of their constitutionality.\textsuperscript{105} B. \textit{Punitive or Regulatory Measure?} Legislative intent is often the first place to begin an inquiry into a statute’s nature, albeit punitive or regulatory.\textsuperscript{106} The Texas statute authorizing community notification, however, is void of any explicit legislative expression of intent.\textsuperscript{107} Legislative intent, even when identifiable, is subject to scrutiny. In some cases, courts rule that a statute is punitive in nature despite the legislature’s expressed regulatory intent.\textsuperscript{108} Hence, a state legislature cannot mask an otherwise punitive measure by merely drafting into the statute an intent resembling something regulatory in nature. 1. The \textit{Mendoza-Martinez} Test The Supreme Court has opined that only the “clearest proof” may change an otherwise civil statute into one that is in effect a punitive measure.\textsuperscript{109} To facilitate the characterization of a statute as either punitive or regulatory, a court must balance a variety of factors.\textsuperscript{110} In \textit{Kennedy v.} \begin{itemize} \item \textsuperscript{105} See Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 Wm. & Mary J. Women & L. 171, 178 (1995) (citing Trop v. Dulles, 356 U.S. 86 (1958)); Amy L. Van Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 Drake L. Rev. 635, 637 (1999) (proffering the opinion that public disclosure of sex offender information violates the Ex Post Facto Clause and the Double Jeopardy Clause of the Constitution). \item \textsuperscript{106} See Stephen R. McAllister, “Neighbors Beware”: \textit{The Constitutionality of State Sex Offender Registration and Community Notification Laws}, 29 Tex. Tech L. Rev. 97, 115 (1998) (noting that in \textit{United States v. Ursery}, 518 U.S. 267, 288-89 (1996), the Supreme Court intimated that in a statutory analysis, the intent of the legislature should be an initial inquiry). \item \textsuperscript{107} Tex. Code Crim. Proc. Ann. art. 62.03 (Vernon Supp. 2001). \item \textsuperscript{108} See Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 524-25 (1997) (noting that a “court must look to the actual effect of the statute” when delineating punitive over regulatory effect); see also United States v. Ward, 448 U.S. 242, 248-49 (1980) (opining that a legislature does not protect itself merely by asserting that a statute’s intent is regulatory and not punitive); Stephen R. McAllister, “Neighbors Beware”: \textit{The Constitutionality of State Sex Offender Registration and Community Notification Laws}, 29 Tex. Tech L. Rev. 97, 118 (1998) (commenting that “in the event a court determines the legislative intent behind a statute to be punitive, the inquiry should end and the statue should be held to impose punishment for constitutional purposes”). \item \textsuperscript{109} United States v. Ward, 448 U.S. 242, 248-49 (1980). \item \textsuperscript{110} See \textit{Kennedy v. Mendoza-Martinez}, 372 U.S. 144, 169 (1963) (establishing the test that “must be considered in relation to the statute on its face” to appropriately determine whether an act is punitive or regulatory in character); accord Doe v. Kelley, 961 F. \end{itemize} Mendoza-Martinez, the Supreme Court outlined a series of factors to assist a court in making this determination: Whether the sanction involves an affirmative disability or restraint, whether it has historically been regarded as a punishment, whether it comes into play only on a finding of scienter, whether its operation will promote the traditional aims of punishment—retribution and deterrence, whether the behavior to which it applies is already a crime, whether an alternative purpose to which it may rationally be connected is assignable for it, and whether it appears excessive in relation to the alternative purpose assign[able to it.] The subjectivity of the Mendoza-Martinez test makes it difficult to accurately apply; subsequently, many lower courts differ in their analysis of a statute’s punitive effect. In the case of community notification statutes, some courts hold notification laws to be punishment, while others Supp. 1105, 1108 (W.D. Mich. 1997) (opining that “determining whether government action is punishment requires consideration of the totality of circumstances, and particularly (1) legislative intent, (2) design of the legislation, (3) historical treatment of analogous measures, and (4) effects of the legislation”). 111. 372 U.S. 144 (1963). 112. Mendoza-Martinez, 372 U.S. at 168-69 (footnotes omitted). The Court further noted “we are convinced that application of these criteria to the face of the statutes supports the conclusion that they are punitive.” Id. at 169. The Court also suggested that the factors “may often point in differing directions.” Id.; see also United States v. Ward, 448 U.S. 242, 249 (1980) (stating that these factors are “neither exhaustive nor dispositive,” but nonetheless “helpful”); Elizabeth P. Bruns, Comment, Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute, 2 WM. & MARY J. WOMEN & L. 171, 181 (1995) (emphasizing four of the Mendoza-Martinez factors as applied to Virginia sex offender registration: “whether the sanction imposes an affirmative disability or restraint, whether it has been regarded historically as punishment, whether it serves the traditional aims of punishment, and whether it appears excessive in relation to the alternate purpose assigned”); Stephen R. McAllister, “Neighbors Beware”: The Constitutionality of State Sex Offender Registration and Community Notification Laws, 29 TEX. TECH L. REV. 97, 116 (1998) (suggesting that the “Supreme Court has never really attempted to explain when these factors are relevant, and when they are not”). 113. See Abril R. Bedarf, Comment, Examining Sex Offender Community Notification Laws, 83 CAL. L. REV. 885, 914 (1995) (concluding that “courts have not arrived at a consensus as to whether registration and community notification laws are regulatory or punitive”). 114. See Young v. Weston, 898 F. Supp. 744, 753-54 (W.D. Wash. 1995) (concluding that the statute in question improperly allows for punishment before the offender is evaluated and treated); In re Reed, 663 P.2d 216, 219-20 (Cal. 1983) (indicating that it is unclear whether the statute is an effective tool, therefore, the court ruled that the statute is a form of punishment). rule that similar sex offender notification laws do not constitute punishment.\textsuperscript{115} The United States Supreme Court, in a 1997 decision, \textit{Kansas v. Hendricks},\textsuperscript{116} refused to rule a Kansas sex offender civil commitment statute a punitive measure in terms of either double jeopardy or ex post facto challenges, despite applying the \textit{Mendoza-Martinez} criterion.\textsuperscript{117} The Court, in a 5-4 decision, upheld a Kansas law requiring additional confinement for offenders designated as having a “mental abnormality” or a “personality disorder,” which makes them likely to engage in sexual violence.\textsuperscript{118} The majority held that additional confinement was not punitive because the confinement of mentally-ill persons is for civil purposes, therefore, “punitive conditions” are inapplicable.\textsuperscript{119} Furthermore, the Court refused to acknowledge any possible punitive aspects of the statute because the confinement was limited to “a small segment of particularly dangerous individuals.”\textsuperscript{120} The Arizona Supreme Court applied the \textit{Mendoza-Martinez} test to determine the legislative intent behind its own sex offender registration statute.\textsuperscript{121} Eventually opining that Arizona’s statute was a regulatory measure, the supreme court did admit that its ultimate decision was “close.”\textsuperscript{122} The supreme court determined that the statute’s purpose in aiding law enforcement to locate child sex offenders favored the classification of the statute as regulatory and not punitive.\textsuperscript{123} However, the su- \textsuperscript{115}. See Artway v. Attorney Gen., 81 F.3d 1235, 1267 (3d Cir. 1996) (ruling that the statute does not have a “draconian” effect that renders it a form of punishment); State v. Noble, 829 P.2d 1217, 1224 (Ariz. 1992) (en banc) (ordering that, in the narrow scope of child molestation and sexual misconduct, the statute is not excessive); State v. Costello, 643 A.2d 531, 534 (N.H. 1994) (deciding that the statute “inflicts no greater punishment. [and] no \textit{ex post facto} violation occurs”). \textsuperscript{116}. 521 U.S. 346 (1997). \textsuperscript{117}. Kansas v. Hendricks, 521 U.S. 346, 371 (1997); see also Stephen R. McAllister, “Neighbors Beware”: The Constitutionality of State Sex Offender Registration and Community Notification Laws, 29 Tex. Tech L. Rev. 97, 113-14 (1998) (analyzing the Court’s apparent reasoning for upholding the Kansas statute’s constitutionality). \textsuperscript{118}. See Hendricks, 521 U.S. at 347 (upholding Kan. Stat. Ann. § 59-29a01 (1994 & Supp. 1995)). \textsuperscript{119}. \textit{Id.} at 363. \textsuperscript{120}. \textit{Id.} at 368. \textsuperscript{121}. See State v. Noble, 829 P.2d 1217, 1221 (Ariz. 1992) (en banc) (applying the \textit{Mendoza-Martinez} factors to determine whether the statue was intended to be punitive or regulatory). Actually, the court did not analyze the third or fifth elements of the test, only briefly considered the fourth element, and combined the sixth and seventh elements. Abril R. Bedart, Comment, Examining Sex Offender Community Notification Laws, 83 Cal. L. Rev. 885, 916 (1995). \textsuperscript{122}. Noble, 829 P.2d at 1224. \textsuperscript{123}. \textit{Id.} preme court placed great emphasis on the relative confidentiality of the registry information.\textsuperscript{124} This rationale suggests that if Arizona's statute contained a community notification provision, the Arizona Supreme Court's decision may have been different.\textsuperscript{125} Some lower courts classify community notification statutes as punishment.\textsuperscript{126} The California Supreme Court opined that notification is punishment, and not a regulatory measure.\textsuperscript{127} Unfortunately, the United States Supreme Court has yet to apply the \textit{Mendoza-Martinez} test to community notification and the associated vigilante dangers. 2. The \textit{Artway} Test In \textit{Artway v. Attorney General},\textsuperscript{128} the Third Circuit Court of Appeals created another method of determining whether notification provisions are punishment.\textsuperscript{129} In deciding that New Jersey's Megan's Law did not constitute punishment, the court developed a multi-part test.\textsuperscript{130} The first part of the test examines "the legislature's subjective purpose in enacting the challenged measure."\textsuperscript{131} Legislative intent, however, is an inconclusive method of determining whether a statute is punitive or regulatory in \textsuperscript{124} See id. (emphasizing that providing the information required by the registration statute does not force convicted offenders "to display a scarlet letter to the world"). \textsuperscript{125} See Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 CAL. L. REV. 885, 917 (1995) (stating that other cases relying on \textit{Noble} "did not share the same concerns about confidentiality"). \textsuperscript{126} See State v. Babin, 637 So. 2d 814, 823-25 (La. App. 1 Cir. 1994), \textit{writ denied}, 644 So. 2d 649 (La. 1994) (implying that notification statutes are excessive punishment in particular circumstances); State v. Payne, 633 So. 2d 701, 702-03 (La. App. 1 Cir. 1993), \textit{writ denied}, 637 So. 2d 497 (La. 1994) (stating that notification may violate \textit{ex post facto} laws). \textsuperscript{127} See \textit{In re Reed}, 663 P.2d at 220 (opining that the California statute requiring those offenders convicted under a misdemeanor statute violated the Cruel and Unusual Clause found in California's Constitution, which is modeled after the same clause found in the United States Constitution); see also Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia's New Sex Offender Registration Statute}, 2 WM. & MARY J. WOMEN & L. 171, 195 (1995) (citing \textit{In re Reed}, 663 P.2d at 220) (noting that the California Supreme Court cited the United States Supreme Court opinions of \textit{Weems} and \textit{Trop} "in commenting on the 'flexible and progressive standard for assessing the severity of punishment'"). \textsuperscript{128} 81 F.3d 1235 (3d Cir. 1996). \textsuperscript{129} \textit{Artway v. Attorney Gen.}, 81 F.3d 1235, 1263-67 (3d Cir. 1996); see also David S. DeMatteo, Note, \textit{Welcome to Anytown, U.S.A.—Home of Beautiful Scenery (And A Convicted Sex Offender): Sex Offender Registration and Notification Laws in E.B. v. Verniero}, 43 VILL. L. REV. 581, 604-07 (1998) (offering a detailed analysis of the \textit{Artway} test). \textsuperscript{130} \textit{Artway}, 81 F.3d at 1254. \textsuperscript{131} Id. But see Doe v. Kelley, 961 F. Supp. 1105, 1108 (W.D. Mich. 1997) (indicating that absent any discernable manifestation of legislative intent, the intent may only be gleaned from the actual design of the act itself). nature.\textsuperscript{132} Hence, the first part of the \textit{Artway} test is insufficient to begin any punitive inquiry. The second part of the \textit{Artway} test looks at the objective purpose of a statute in terms of proportionality and history.\textsuperscript{133} The objective purpose has three subparts: (1) whether “the law can be explained solely by a remedial purpose,” (2) whether “a historical analysis show[s] that the measure has traditionally been regarded as punishment,” and (3) “whether the effects . . . of a measure [are] so harsh . . . that [they constitute] ‘punishment.’”\textsuperscript{134} Historically, community notification for a variety of offenses was considered punishment.\textsuperscript{135} In the Book of Genesis, Moses explained how God placed upon Cain a “mark” as punishment for killing his brother, Abel.\textsuperscript{136} Centuries later in colonial America, “branding” a member of the community who disobeyed the law was commonplace.\textsuperscript{137} More recently, the shaming of individuals has clearly served punitive purposes. Some courts apply a form of “branding,” such as forcing convicted drunk drivers to place bumper stickers on their cars notifying others of their convictions and forcing juvenile delinquents to place signs \textsuperscript{132} See Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 919 (1995) (noting that the California Supreme Court bypassed an inquiry into legislative intent and proceeded directly to analyze a sex offender registration statute using the \textit{Mendoza-Martinez} factors). \textsuperscript{133} See \textit{Artway}, 81 F.3d at 1264-65 (analyzing the test’s objective prong). \textsuperscript{134} Id. at 1263, 1266. \textsuperscript{135} See Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 505 (1997) (discussing Nathaniel Hawthorne’s novel, \textit{The Scarlet Letter}, which depicted how the protagonist, Hester Pryne, was forced to wear a scarlet letter “A” upon her clothing to symbolize her adultery conviction). But the point which drew all eyes, and, as it were, transfigured the wearer . . . was that Scarlet letter, so fantastically embroidered and illuminated upon her bosom. It had the effect of a spell, taking her out of the ordinary relations with humanity, and enclosing her in a sphere by herself. \textit{Id.} at 506 (citing \textit{Nathaniel Hawthorne, The Scarlet Letter} (Bantam Classic ed. 1986) (1850)). \textsuperscript{136} \textit{Genesis} 4:15; see also Yale Glazer, Note, \textit{The Chains May Be Heavy, But They Are Not Cruel and Unusual: Examining the Constitutionality of the Reintroduced Chain Gang}, 24 Hofstra L. Rev. 1195, 1202 (1996) (noting that the Bible also authorized “heinous punishments for heinous crimes” through its concept of \textit{lex talionis}: “an eye for an eye, a tooth for a tooth”). \textsuperscript{137} See Doe v. Pataki, 940 F. Supp. 603, 624 (S.D.N.Y. 1996) (illustrating that branding was used to subject an individual believed to be incurable to ongoing public humiliation). “The message was that \textit{this} offender was not likely to mend his ways; disgrace would and should last until death.” \textit{Id.} at 625; see also Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 911 (1995) (noting that “[t]he purpose was to humiliate the offender before the community”). in their front yards proclaiming their crimes.\textsuperscript{138} Although rarely affirmed at the appellate level, these punitive measures show a modern tendency to place public shame on individuals. Community notification is clearly an embodiment of a modern shame punishment.\textsuperscript{139} Traditionally, shame punishments had the purpose to diminish an offender’s standing in the community through some form of public humiliation.\textsuperscript{140} The community shames an offender by beginning to harass and shun him, ultimately barring the offender from participating in normal community life.\textsuperscript{141} Aside from physical and life-threatening abuse, offenders undergo other forms of harassment.\textsuperscript{142} In \textit{Trop v. Dulles},\textsuperscript{143} the Supreme Court held that Eighth Amendment concerns arose regardless of physical maltreatment if the action led to “the total destruction of the individual’s status in organized society.”\textsuperscript{144} As a result, offenders often move from community to community following notification of their past crimes.\textsuperscript{145} Police in one California town handed out flyers \textsuperscript{138}. See People v. Letterlough, 655 N.E.2d 146, 151 (N.Y. 1995) (invalidating a district court ruling that required a drunk driver to affix a sign reading “convicted dwi” to his vehicle); State v. Burdin, 924 S.W.2d 82, 87 (Tenn. 1996) (reversing a court order requiring a shaming sign to be placed outside of an offender’s home). \textsuperscript{139}. But see David S. DeMatteo, Note, \textit{Welcome to Anytown, U.S.A.—Home of Beautiful Scenery (And A Convicted Sex Offender): Sex Offender Registration and Notification Laws} in E.B. v. Verniero, 43 Vill. L. Rev. 581, 616-17 (1998) (noting that the Third Circuit Court of Appeals likened community notification to public safety warnings, as opposed to acts meant to bring about shame). “[T]he court compared community notification under Megan’s Law with quarantine notices, which pertain to dangerous health-related matters, and ‘warning’ posters, which notify the public that a pictured individual represents a danger to the community.” \textit{Id.} \textsuperscript{140}. See Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 911-12 (1995) (suggesting that requiring a sex offender to identify himself through print ads and postcards “is the modern day equivalent of an afternoon in the pillory in the public square”). \textsuperscript{141}. See \textit{id.} at 912 (illustrating how community notification, as well as other similar models of notification, damage the offender’s relationship to the community). “Shaming thus becomes merely an outlet for the community’s rage.” \textit{Id.} at 913. \textsuperscript{142}. See Jane A. Small, Note, \textit{Who Are the People in Your Neighborhood? Due Process, Public Protection, and Sex Offender Notification Laws}, 74 N.Y.U. L. Rev. 1451, 1468-69 (1999) (highlighting several accounts of vigilantism and ostracism ranging from hate mail, threatening phone calls, protestors armed with signs and bullhorns, and other hostile methods of confrontation). “These anecdotes represent only a few of hundreds of overt acts of animosity toward released sex offenders.” \textit{Id.} at 1469. \textsuperscript{143}. 356 U.S. 86 (1958). \textsuperscript{144}. Trop v. Dulles, 356 U.S. 86, 101 (1958). The Court held that a statute authorizing the denationalization of a convicted deserter, even without alliance to a foreign power, was beyond the scope of Congress’s war powers. \textit{Id.} at 90, 103. \textsuperscript{145}. See Christy Hoppe & Diane Jennings, \textit{Ex-inmates Pose Quandary For Many States - Convicts Seen as Threat Even After Their Release}, \textit{Dallas Morning News}, Aug. 29, 1993, at 1A, available at 1993 WL 9283171 (reporting that one offender was chased and continually pursued one offender until he accepted a one-way plane ticket to another state.\textsuperscript{146} Having no safe place to resort, many offenders divest themselves from society and become virtual prisoners within their own homes.\textsuperscript{147} Whether it is public flogging or community notification, shaming in any manifestation serves punitive purposes. The last element of the \textit{Artway} objective test looks generally at the measure’s effects.\textsuperscript{148} As evidenced by the numerous violent acts committed since the enactment of Megan’s Law, vigilantism is a real and identifiable effect.\textsuperscript{149} Therefore, by both historical standards and modern views, community notification, especially when accompanied with vigilantism, constitutes punishment.\textsuperscript{150} Clearly community notification meets all three elements of the \textit{Artway} test, thereby establishing notification as punishment.\textsuperscript{151} Furthermore, community notification punishment may \textsuperscript{146} See Michael Dear & Django Sibley, \textit{The One-Way Strategy for Sex Offenders Makes Nobody Safe}, L.A. \textit{Times}, Oct. 1, 2000, at M6, available at 2000 WL 25902533 (reporting that Monrovia police sought private donations to fund a one-way plane ticket to get the offender to leave their community). \textsuperscript{147} See Edward Martone, \textit{No: Mere Illusion of Safety Creates Climate of Vigilante Justice}, A.B.A. J., Mar. 1995, at 39 (noting that sex offenders through community notification ultimately “run from family, avoid treatment and seek the safety of anonymity by hiding out, thus subjecting the public to even greater risk”). \textsuperscript{148} Artway v. Attorney Gen., 81 F.3d 1235, 1263 (3d Cir. 1996). \textsuperscript{149} See Amy L. Van Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 \textit{Drake L. Rev.} 635, 650 (1999) (suggesting that notifications through media releases, leaflets, and other public notices creates a lynch-mob type attitude). \textsuperscript{150} See E.B. v. Verniero, 119 F.3d 1077, 1113 (3d Cir. 1997) (Becker, J., concurring and dissenting) (summarizing that “[b]ecause the history of notification evidences an objective punitive intent, and because the design or operation of notification does not negate this objective intent, the notification provisions of Megan’s Law must be considered punishment”). But see David S. DeMatteo, Note, \textit{Welcome to Anytown, U.S.A.—Home of Beautiful Scenery (And A Convicted Sex Offender): Sex Offender Registration and Notification Laws in E.B. v. Verniero}, 43 \textit{Vill. L. Rev.} 581, 620 (1998) (noting that the majority of the Third Circuit Court of Appeals failed to conclude that application of Megan’s Law constituted punishment). The court did acknowledge the potential for private violence through notification, yet it ultimately held that such risks were still insufficient to compel the classification of community notification as punishment because it was not “sufficiently burdensome.” \textit{Id.} at 623 (citing \textit{Verniero}, 119 F.3d at 1104). \textsuperscript{151} But see W. Paul Koenig, Comment, \textit{Does Congress Abuse Its Spending Clause Power by Attaching Conditions on the Receipt of Federal Law Enforcement Funds to a State’s Compliance with “Megan’s Law”?}, 88 \textit{J. Crim. L. & Criminology} 721, 737 (1998) rise to cruel and unusual levels when the registration of offenders incites vigilantism.\textsuperscript{152} C. \textit{Community Notification May Not Withstand Eighth Amendment “Cruel and Unusual” Scrutiny} The Eighth Amendment mandates that “[e]xcessive bail shall not be required, nor excessive fines imposed, nor \textit{cruel and unusual punishments} inflicted.”\textsuperscript{153} Historically, the Eighth Amendment’s prohibition against cruel and unusual punishment protects citizens from gruesome tortures and lingering deaths.\textsuperscript{154} However, the scope of the Eighth Amendment’s application has broadened from the ancient torture devices of yesteryear to a more modern paradigm.\textsuperscript{155} (suggesting that the recent case decisions of \textit{Hendricks} and \textit{Verniero} make it unlikely that the Supreme Court will find community notification a punitive measure). \textsuperscript{152}. See Amy L Duyn, Note, \textit{The Scarlet Letter Branding: A Constitutional Analysis of Community Notification Provisions in Sex Offender Statutes}, 47 \textit{Drake L. Rev.} 635, 650 (1999) (implying that cruel and unusual punishment occurs when notification inspires “far more assaults and further violence”). \textsuperscript{153}. U.S. Const. amend. VIII (emphasis added). Cruel and unusual punishment was also viewed negatively by the American colonists. See Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 189 (1995) (noting that in 1776, a verbatim copy of the English Bill of Rights prohibition against cruel and unusual punishment was included in the Virginia Constitution). \textsuperscript{154}. See Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 \textit{Clev. St. L. Rev.} 505, 524 (1997) (noting that the Eighth Amendment initially protected against severe punishments delivered as a consequence of regicide and treason). \textsuperscript{155}. See Estelle v. Gamble, 429 U.S. 97, 102 (1976) (opining that the Eighth Amendment “proscribes more than physically barbarous punishments”); Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 190 (1995) (emphasizing that courts have held that the Eighth Amendment not only limits punishment associated with torture, but all punishments excessively severe or long, or even greatly disproportional to the crime”); see also Trop v. Dulles, 356 U.S. 86, 100-01 (1958) (discussing the historical context from which the Eighth Amendment stems). Writing for the majority, Justice Warren discussed the nature of cruel and unusual punishment: The basic concept underlying the Eighth Amendment is nothing less than the dignity of man. While the State has the power to punish, the Amendment stands to assure that this power be exercised within the limits of civilized standards. Fines, imprisonment and even execution may be imposed depending upon the enormity of the crime, but any technique outside the bounds of these traditional penalties is constitutionally suspect. This Court has had little occasion to give precise content to the Eight Amendment, and, in an enlightened democracy such as ours, this is not surprising. But when the Court was confronted with a punishment of 12 years in irons at hard and painful labor imposed for the crime of falsifying public records, it did not hesitate to declare that the penalty was cruel in its excessiveness and unusual in its character. The 1. The Proportionality Test In determining whether a modern statute or law is otherwise cruel and unusual, the Supreme Court often relies on the aforementioned proportionality test.\textsuperscript{156} Simply stated, the test weighs the punishment inflicted upon the offender against the protection and safety the community enjoys as a result of the punishment.\textsuperscript{157} Although the Eighth Amendment does not require the punishment to be strictly proportional to the crime, some Justices suggest it prohibits a grossly disproportionate punishment when compared to the offense.\textsuperscript{158} Within the past twenty years, the Supreme Court decided three important cases regarding the proportionality test for non-capital cases: \textit{Rummel v. Estelle},\textsuperscript{159} \textit{Solem v. Helm},\textsuperscript{160} and \textit{Harmelin v. Michigan}.\textsuperscript{161} In \textit{Rummel}, the defendant was sentenced to a mandatory life sentence after obtaining $120.75 on false pretenses.\textsuperscript{162} Writing a strong dissent, Justice Powell opined that the sentence was grossly disproportionate to the off- --- Court recognized in that case that the words of the Amendment are not precise, and that their scope is not static. The Amendment must draw its meaning from the evolving standards of decency that mark the progress of a maturing society. \textit{Id.} \textsuperscript{156}. Andrea L. Fischer, Note, \textit{Florida's Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 \textit{CLEV. ST. L. REV.} 505, 529 (1997); see also Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 \textit{CAL. L. REV.} 885, 927 (1995) (suggesting that, as of 1991, the Supreme Court's divided decision in \textit{Harmelin v. Michigan} may signal an adoption of a "new standard in the near future"). \textsuperscript{157}. Andrea L. Fisher, Note, \textit{Florida's Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 \textit{CLEV. ST. L. REV.} 505, 529 (1997); see also Michigan v. Ayres, 608 N.W.2d 132, 136 (1999) (opining that "[i]n deciding if punishment is cruel or unusual, this Court looks to the gravity of the offense and the harshness of the penalty, comparing the punishment to the penalty imposed for other crimes in this state as well as the penalty imposed for the same crime in other states. In addition, we consider the goal if rehabilitation"). \textsuperscript{158}. See United States v. Bajakjian, 524 U.S. 321, 336 (1998) (stating that although the facts of the case dealt with excessive fines, the Court emphasized utilizing the gross disproportionality standard); Weems v. United States, 217 U.S. 349, 367 (1910) (opining that the proportionality principle "is a precept of justice that punishment for crime should be graduated and proportioned to offense"); see also Marti Paulsen, \textit{Does Public Access to Sex Offender Registration Information Under the Kansas Sex Offender Registration Act Constitute Cruel and Unusual Punishment? [State v. Scott, 961 P.2d 667 (Kan. 1998)]}, 38 \textit{WASHBURN L.J.} 727, 734 (1999) (analyzing whether the Kansas Sex Offender Registration Act violates the Eighth Amendment's prohibition against cruel and unusual punishment). \textsuperscript{159}. 445 U.S. 263 (1980). \textsuperscript{160}. 463 U.S. 277 (1983). \textsuperscript{161}. 501 U.S. 957 (1991). \textsuperscript{162}. Rummel v. Estelle, 445 U.S. 263, 269 (1980) (noting that the life sentence was a result of a felony theft conviction and two prior felony convictions). fense committed.\textsuperscript{163} To determine the proportionality of a punishment as it relates to the offense, Justice Powell created a test based on three objective factors: “(i) the nature of the offense[,] . . . (ii) the sentence imposed for commission of the same crime in other jurisdictions [.]. . . and (iii) the sentence imposed upon other criminals in the same jurisdiction.”\textsuperscript{164} The following year, the majority of the Court adopted Justice Powell’s three-part test in \textit{Solem v. Helm}.\textsuperscript{165} In \textit{Solem}, the defendant was sentenced to life imprisonment without the possibility of parole for the crime of “uttering a ‘no account’ check for $100.”\textsuperscript{166} Now writing for the majority, Justice Powell traced the meaning of the Eighth Amendment, and eventually concluded that the concept of proportionality was “deeply rooted” in American jurisprudence.\textsuperscript{167} However, the Court recognized that “[o]utside the context of capital punishment, \textit{successful} challenges to the proportionality of particular sentences [will be] exceedingly rare,’ . . . [yet] [t]his does not mean, however, that proportionality analysis is entirely inapplicable in noncapital cases.”\textsuperscript{168} The Court acknowledged that “a criminal sentence must be proportionate to the crime for which the defendant [was] convicted.”\textsuperscript{169} To determine proportionality, the Court adopted Justice Powell’s three-part test set forth in his \textit{Rummel} dissent.\textsuperscript{170} The concept of proportionality would not see a change until 1991. In \textit{Harmelin v. Michigan},\textsuperscript{171} the Court questioned the validity of any proportionality guarantee within the Eighth Amendment.\textsuperscript{172} Justice \begin{itemize} \item \textsuperscript{163} \textit{Id.} at 307 (Powell, J. dissenting) (opining that the sentence was grossly unjust). \item \textsuperscript{164} \textit{Id.} at 295 (Powell, J. dissenting). \item \textsuperscript{165} See Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 193 (1995) (indicating that a court should be guided by the ‘objective factors’ proffered by Justice Powell in an Eighth Amendment proportionality analysis). \item \textsuperscript{166} \textit{See} Solem v. Helm, 463 U.S. 277, 281-82 (1983) (noting the defendant had six prior felony convictions and was subject to the State’s recidivist statute that enhances the sentence when there are three prior convictions). \item \textsuperscript{167} \textit{Id.} at 284; \textit{see also} Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 \textit{Cal. L. Rev.} 885, 928 (1995) (noting that \textit{Solem} “established the validity of the proportionality principle for noncapital sentencing”). \item \textsuperscript{168} \textit{Solem}, 463 U.S. at 289-90 (quoting \textit{Rummel}, 445 U.S. at 272) (alterations in original). \item \textsuperscript{169} \textit{Id.} at 290. \item \textsuperscript{170} \textit{Id.} at 290-92 (indicating that the objective criteria includes “(i) the gravity of the offense and the harshness of the penalty; (ii) the sentences imposed on other criminals in the same jurisdiction; and (iii) the sentences imposed for commission of the same crime in other jurisdictions”). \item \textsuperscript{171} 501 U.S. 957 (1991) (plurality opinion). \item \textsuperscript{172} \textit{See} Harmelin v. Michigan, 501 U.S. 957, 965 (1991) (writing for a divided Court, Justice Scalia dismissed the proportionality test precedent and opted to explore the histori- \end{itemize} Scalia, writing for a divided Court, chose to break precedent by surprisingly deciding that the Eighth Amendment contains no proportionality guarantee.\textsuperscript{173} As Justice Scalia’s opinion overruled three centuries of precedent supporting the proportionality test, only one other Justice supported his rationale.\textsuperscript{174} Justice Kennedy, joined by Justices Souter and O’Connor, opined that the Eighth Amendment’s prohibition against cruel and unusual punishment encompasses a narrow proportionality principle.\textsuperscript{175} “As a result, the proportionality test for non-capital offenses currently encompasses Justice Powell’s three-part test as set forth in \textit{Solem} and as modified by Justice Kennedy’s \textit{Harmelin} limitation of the test to only those punishments that are ‘grossly disproportionate.’”\textsuperscript{176} Ostensibly, the vigilante violence suffered by registered sex offenders may fall into this established grossly disproportionate category. 2. Vigilantism Creates Eighth Amendment Concerns According to the proportionality test, the effects of community notification on offenders must be proportional to the benefit the notification provides to society. The existence of such a benefit causes considerable debate. Since most notification statutes were “enacted with the ostensible goals of protecting public safety,” it is logical to measure the success of these statutes by whether they accomplished the legislative goals originally sought.\textsuperscript{177} \textsuperscript{173} \textit{Harmelin}, 501 U.S. at 965. Justice Scalia’s opinion apparently disregarded the Court’s adoption of seventeenth century law which clearly endorsed the proportionality test. \textit{See} Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 194 (1995) (commenting that Justice Scalia ignored precedent dating back to the seventeenth century). \textsuperscript{174} \textit{See} Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 194 (1995) (noting that only Chief Justice Rehnquist joined Justice Scalia’s opinion). \textsuperscript{175} \textit{See id.} (noting that although Justices Kennedy, O’Conner, and Souter joined Justice Scalia and Chief Justice Rehnquist on the separate issue of capital-sentencing, they disagreed with Justice Scalia and Chief Justice Rehnquist on rejecting the proportionality test). \textsuperscript{176} \textit{See id.} (stating further that “although Justice Scalia’s opinion overruled \textit{Solem} and declared that the Eighth Amendment contains no proportionality principle, this part of his opinion was not joined by a majority of the Court”). \textsuperscript{177} Peter Finn, \textit{Sex Offender Community Notification}, \textit{National Institute of Justice: Research in Action}, (Feb. 1997), available at http://www.ncjrs.org/txtfiles/ One study sought to measure the success of these goals. After five and a half years of research, the study failed to empirically show any additional benefit to the public through community notification.\textsuperscript{178} In fact, prior to the 1970's, criminological studies indicated that dangerous sex offenders had a lower rate of recidivism than the average criminal.\textsuperscript{179} In 1989, a United States Department of Justice report found that, excluding murderers, rapists repeated their crimes less than any other type of criminal offender.\textsuperscript{180} Furthermore, community notification offers little assistance to the community when the sex offender is someone within the victim's own home. Another United States Department of Justice report concluded that only a little over half of all rapes are committed by strangers.\textsuperscript{181} Thus, close to fifty percent of all sex offenses are committed by acquaintances or family members.\textsuperscript{182} To classify vigilante violence incited by community notification as cruel and unusual punishment, the government must at least implicitly sanction the violence, and thereby share responsibility for the additional punishment.\textsuperscript{183} Department of Justice officials, including former Attorney General Janet Reno, are aware of the obvious dangers of vigilantism.\textsuperscript{184} \textsuperscript{162364.txt; see also} Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia’s New Sex Offender Registration Statute}, 2 Wm. & Mary J. Women & L. 171, 171 (1995) (noting that the underlying purpose of such statutes is “to deter repeat offenses and to protect children and others from becoming victims of recidivists”). \textsuperscript{178. See} Peter Finn, \textit{Sex Offender Community Notification}, National Institute of Justice: Research in Action, (Feb. 1997), available at http://www.ncjrs.org/txtfiles/162364.txt (citing a report prepared for the Washington State Institute for Public Policy as the only known empirical study of its kind). \textsuperscript{179. See} Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 893 (1995) (offering an examination of recent studies which link sex offenders and recidivism). \textsuperscript{180. See id. at} 895-96 (stating that the recidivism rate for rapists was approximately eight percent, while, excluding murder, all other offenses were significantly higher). \textsuperscript{181. See id. at} 907 (recognizing that strangers account for fifty-two percent of all rapes). \textsuperscript{182. See id.; see also} Andrea L. Fischer, Note, \textit{Florida’s Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 Clev. St. L. Rev. 505, 510 (1997) (noting that a 1991 Bureau of Justice Statistics study concluded that forty-five percent of the male offenders serving time for sexually abusing a child had committed the offense against either their own children or another family member). \textsuperscript{183. See} W. Paul Koenig, Comment, \textit{Does Congress Abuse Its Spending Clause Power by Attaching Conditions on the Receipt of Federal Law Enforcement Funds to a State’s Compliance with “Megan’s Law”?}, 88 J. Crim. L. & Criminology 721, 736 (1998). \textsuperscript{184. See} Daryl Bell, \textit{ACLU Plans to Sue DPS over Sex Offender Cards; Policy Notifies Neighbors by Mail}, San Antonio Express-News, Aug. 18, 2000, at 3B, available at 2000 WL 27328846 (expressing the sentiment passed on by Peggy Burke, principal for the Center for Sex Offender Management in Maryland). In 1997, the Department of Justice National Center for Missing and Exploited Children issued a statement warning that “[c]onstant harassment and ostracism . . . may cause serious psychological damage, possibly even causing [a sex offender to] . . . return to his previous, dangerous lifestyle.”\textsuperscript{185} Respective state and federal authorities must recognize the threat of vigilante violence. Nevertheless, the very system of notification that incites this violence remains intact. To rebut arguments of vigilantism, proponents of notification often cite narrowly construed and often misleading studies by law enforcement agencies.\textsuperscript{186} A 1997 Oregon study suggested that “less than ten percent of offenders experienced some form of harassment . . . .”\textsuperscript{187} However, the study included interviews from only forty-five law enforcement officials that dealt with sex offenders solely on a limited, custodial level.\textsuperscript{188} It is illogical to assume that an offender would report harassment to the same law enforcement agency promoting the notification from which the vigilantism stems. Rather, society should take notice and legislators should take action to prevent the proliferation of vigilantism, which clearly violates the Constitution. VI. PROPOSAL “States needn’t abandon community notification but should instead carefully attempt to meet the constitutional parameters established by the courts.”\textsuperscript{189} Even though vigilantism incited by community notification may rise to the level of cruel and unusual punishment, the overall policy created the center to train officials in law enforcement. \textit{Id.}; see also Christy Hoppe & Diane Jennings, \textit{Ex-inmates Pose Quandary For Many States - Convicts Seen as Threat Even After Their Release}, \textit{Dallas Morning News}, Aug. 29, 1993, at 1A, available at 1993 WL 9283171 (citing an unnamed Bureau of Justice Statistics sourcebook stating “a 1991 poll shows that 39 percent of the population thinks that vigilantism has increased in the last 10 years and 33 percent think that it is justified at times”). \textsuperscript{185} Peter Finn, \textit{Sex Offender Community Notification}, \textit{National Institute of Justice: Research in Action}, (Feb. 1997), available at http://www.ncjrs.org/txtfiles/162364.txt (noting the organization’s awareness of the sex offender’s stressful environment); see also Edward Martone, \textit{No: Mere Illusion of Safety Creates Climate of Vigilante Justice}, \textit{A.B.A. J.}, Mar. 1995, at 39 (asserting a former New Jersey mayor’s position that the solution to deterring sex crimes does not lie in community notification statutes, since community notification is merely a political ploy “to placate an angry public”). \textsuperscript{186} See Peter Finn, \textit{Sex Offender Community Notification}, \textit{National Institute of Justice: Research in Action}, (Feb. 1997), available at http://www.ncjrs.org/txtfiles/162364.txt (adopting an unnamed Oregon study that surveyed forty-five parole sex offender specialists and probation officers, who supervised only 2160 sex offenders). \textsuperscript{187} See \textit{id.} (noting illegalities committed against offenders). \textsuperscript{188} See \textit{id.} (stating that sex offenders were picketed against and threatened for their lives or the safety of their homes). \textsuperscript{189} See \textit{id.} (revealing the National Center for Missing and Exploited Children’s desire for a more sound method of dealing with sex offenders). of notifying certain members of the public outweighs that danger. Groups identified as targets for sex offenders, such as schools and youth groups, should continue to receive notification. States must also attempt to minimize any Eighth Amendment violations by instituting and enforcing a few relatively simple measures. Educating the community and releasing accurate sex offender information are the best places to start. A. Educate the Community “Educating the community about the nature and purposes of notification is considered essential to preventing undue community alarm and vigilantism . . . .”\(^{190}\) The public deserves awareness of an offender’s presence, but in a manner less likely to inflame their fears. The bright yellow postcards Texas employs speak in generalities regarding the offender and the offense, thereby failing to provide the community sufficient facts to make informed conclusions.\(^{191}\) By better informing the community about offenders and how to respond to the notification, fear would decrease, as would violence. Likewise, the notification information should alert the community of the severe penalties for taking the law into their own hands. Citizens should receive instruction that under our legal system, the offenders have already served their debt to society. States must indicate that community notification is not necessarily a warning that the named offender will re-offend, but merely notifies them that recidivism remains a possibility. All too often, Texas’s postcard distribution sends the message that the named offender is an immediate danger, thus striking fear in the recipient.\(^{192}\) B. Release Accurate Information Releasing accurate information is another means of preventing violent acts against offenders and non-offenders, as well as, avoiding most constitutional complaints. Immediately before disseminating any information regarding an offender, the address must be verified. Texas mailed 16,000 --- 190. *Id.* 191. See Daryl Bell, *ACLU Plans to Sue DPS over Sex Offender Cards; Policy Notifies Neighbors by Mail*, *San Antonio Express-News*, Aug. 18, 2000, at 3B, available at 2000 WL 27328846 (inferring that law suits against the Texas Department of Public Safety are imminent as a result of the postcard mailings). 192. See Jim Vertuno, *Mailing Warns Neighbors of Sex Offenders: Authorities Say Postcards Not Invitations to Violence*, *Dallas Morning News*, Aug. 16, 2000, at 27A, available at 2000 WL 24852154 (asserting the public safety spokesman’s view that although the Texas Department of Public Safety has a zero-tolerance for vigilantes, “[t]he average person will be unsettled when they first receive [the notification postcards]”). postcards to neighbors of only twenty-seven offenders.\textsuperscript{193} Alternatively, it is plausible that Texas could first send certified postcard-questionnaires to those few offenders to verify their addresses. If an offender fails to respond, the State can follow up with a personal visit. Finally, only after this confirmation, should the offenders address be disseminated. Texas should evaluate whether the dissemination of inaccurate information outweighs the danger imposed upon innocent citizens, such as Mr. Pham. No excuse exists for the proliferation of incorrect addresses and names. Legislators should recognize the dangers of inaccurate information and attempt to create new standards and laws that require timely updating and routine maintenance of sex offender registries. It is alarming how underdeveloped and poorly monitored sex offender registries are, considering their widespread use and potential for danger.\textsuperscript{194} The legislature has a duty to assure that the information they require disseminated is timely and accurate. By adequately and intelligently informing the community, a state can minimize the potential for vigilante violence and maximize the protection of its citizens. Until then, all citizens, regardless of criminal history, are vulnerable to physical and life-threatening attacks due to notification errors. VII. Conclusion With any type of criminal conviction, an offender is subjected to public persecution.\textsuperscript{195} However, there are few crimes that provoke such intense public anger and outcry as sexual offenses, especially when the victims are children.\textsuperscript{196} Community notification and its brash method of blanket, public announcements, essentially makes every citizen part of a continued prosecution.\textsuperscript{197} Some citizens assume the role of renegade judges, \textsuperscript{193}. See Rick Klein & Jason Trahan, \textit{DPS Mails Out Postcards Warning Residents of Sex Offenders in Area: ‘High-risk’ Label Not Fair, Critics Say}, \textit{Dallas Morning News}, Aug. 24, 2000, at 21A, available 2000 WL 25849629 (averaging a distribution of nearly 600 postcards per offender). \textsuperscript{194}. See Tex. Dep’t of Pub. Safety Crime Records Serv., Searching the Sex Offender Database, at http://records.txdps.state.tx.us/sossearch/default.cfm (stating that “it is your responsibility to make sure the records you access through this site pertain to the person about whom you are seeking information”). \textsuperscript{195}. Cf. Nathaniel Hawthorne, \textit{The Scarlet Letter} (Bantam Books 1981) (1850) (describing one woman’s struggle with society after committing adultery). \textsuperscript{196}. See Edward Martone, \textit{No: Mere Illusion of Safety Creates Climate of Vigilante Justice}, A.B.A. J., Mar. 1995, at 39 (understanding the public’s rage toward sex offenders since “[t]heir crimes, especially when visited upon children, leave life-long scars and offend the community’s deepest sensibilities.”). \textsuperscript{197}. See Abril R. Bedarf, Comment, \textit{Examining Sex Offender Community Notification Laws}, 83 Cal. L. Rev. 885, 939 (1995) (inferring that supporters of community notification programs are dissatisfied with the criminal justice system). jurors, and executioners. In addition, the lengthy duration of most states' sex offender registrations extend the offender's exposure to a hostile environment, thereby increasing the risk of violence. Community notification has created an environment that encourages the public to take matters into their own hands. In the process, offenders and mistakenly identified innocent citizens are injured. Community notification, and the vigilantism it provokes, wrongfully creates an additional form of punishment that tests the threshold of the Cruel and Unusual Punishment Clause of the Constitution.\textsuperscript{198} Thorough analysis of community notification laws, pursuant to the \textit{Mendoza-Martinez} factors, demonstrate that such programs are indeed punishment, regardless of any supposed regulatory intent. Further investigation into the dangerous and life-threatening side effects of community notification reveals that the proportionality test, as outlined by centuries of Supreme Court precedent, demonstrates a potential breach of the Constitution's prohibition against cruel and unusual punishment. Because of vigilantism's threat, citizens and politicians alike should realize that overzealous notification leads to decreased offender registration. The few offenders that do register are often harassed and physically threatened to the point where they flee to other states where their sexual offense history is unknown. Legislators should not maintain the status quo advocated by an angry lobby of greatly misinformed citizens. Nor should our government readily yield to the trend of community notification without tangible evidence of its success. We must shoulder the responsibility to release accurate information, while balancing the level of danger imposed on past sex offenders with our interests in public safety. A strong effort will keep the community informed and curb vigilante violence. \textsuperscript{198} See id. (expounding that most community notification models offend the Eighth Amendment and compromise "an offender's humanity in the name of protecting the public"); Elizabeth P. Bruns, Comment, \textit{Cruel and Unusual?: Virginia's New Sex Offender Registration Statute}, 2 \textit{Wm. & Mary J. Women & L.} 171, 197 (1995) (indicating that some California registration statutes resulted in punishment that was too severe for some crimes); Andrea L. Fischer, Note, \textit{Florida's Community Notification of Sex Offenders on the Internet: The Disregard of Constitutional Protections for Sex Offenders}, 45 \textit{Clev. St. L. Rev.} 505, 529 (1997) (asserting that a sex offender is branded for life); W. Paul Koenig, Comment, \textit{Does Congress Abuse Its Spending Clause Power by Attaching Conditions on the Receipt of Federal Law Enforcement Funds to a State's Compliance with "Megan's Law"?}, 88 \textit{J. Crim. L. & Criminology} 721, 735 (1998) (noting that although amended versions of Megan's Law could be held constitutional, that statute and its like, reek of cruel and unusual punishment). APPENDIX A: STATE COMPARISON CHART—SEX OFFENDER REGISTRATION STATUTES The following chart demonstrates how each state has chosen to regulate their respective sex offender registries. The compilation of statutory data is meant to only provide a cursory overview. | State | Citation | Subject | |-------------|-----------------------------------------------|-------------------------------------------------------------------------| | Alabama | Ala. Code §§ 13A-11-200 to –203 (1994) | - Registration of persons who have been convicted of certain specified offenses is required with the sheriff in the county of residence - Register is only open for inspection by law enforcement agencies and officers | | Alaska | Alaska Stat. §§ 12.63.010,020, .030, .100 (Michie 2000) | - Sex offenders must register within specified time periods, provide specific information, and allow fingerprints and a photograph to be taken - The offense committed determines the duration of registration | | Arizona | Ariz. Rev. Stat. Ann. §§ 13-3821 to –3825 (West 2001) | - Law enforcement officials are required to notify the community of the sex offender's presence - Offenders must register every year following initial registration | | Arkansas | Ark. Code Ann. §§ 12-12-901 to –919 (Michie Supp. 1999) | - The legislature concluded that an offender's privacy is less important than public safety because sex offenders pose a high risk of recidivism | | California | Cal. Penal Code §§ 290-90.95 (Deering & Supp. 2001) | - The Department of Justice is required to provide law enforcement agencies with CD-Rom or other electronic media containing registrant's information and that information is available for public viewing upon showing an articulable purpose - The Department of Corrections must forward blood and saliva samples to the community where the offender is released | | Colorado | Colo. Rev. Stat. Ann. § 18-3-412.5 (West 2000) | - Local law enforcement officials must release registration information upon request to any person in that community with proof of residence and identification - The Colorado Bureau of Investigation must post a link on the Colorado homepage to a list containing registration information and photographs | | Connecticut | Conn. Gen. Stat. Ann. §§ 54-251 to –260 (West Supp. 2001) | - Courts may restrict registration information access to law enforcement if access is not necessary for public safety - Agencies who provide public access must post warnings indicating that any persons using registration information to harass, injure, or commit other criminal acts against an offender are subject to criminal prosecution | | State | Citation | Subject | |---------|--------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Delaware| **Del. Code Ann. tit. 11, § 4120 (1995 & Supp. 2001)** | - Persons convicted of offenses or attempted offenses must register and verify residence every ninety days | | Florida | **Fla. Stat. Ann. § 775.21 (West 2000 & Supp. 2001)** | - Offender must provide detailed information such as height, weight, eye color, date of birth, age, etc. - Sheriff or Chief of Police will notify the community in manner deemed appropriate - Sheriff or Chief of Police will, within forty-eight hours, notify day cares and schools within one-mile of the radius of the registrant’s home - After ten years without a felony or misdemeanor, offender may petition to be released from the registration requirement | | Georgia | **Ga. Code Ann. § 42—9-44.1 (1997)** | - Persons convicted of an offense shall register within ten days of their parole or residency - Board must notify public school superintendent of the offender’s residency | | Hawaii | **Haw. Rev. Stat. Ann. § 846E (Michie. 1999)** | - The offender must register with the attorney general by providing among other things, all current addresses, and any future addresses | | Idaho | **Idaho Code §§ 18-8301 to –8311 (Michie Supp. 2000)** | - Persons convicted of the offense must register within ten days of coming into the county | | Illinois| **730 Ill. Comp. Stat. Ann. § 150/1 to /12.9 (West 1997 & West Supp. 2001)** | - Sex offender shall include current place of employment when registering with Chief of Police of city or Sheriff of the county - Must register even if temporarily domiciled over ten days - If offender gets new domicile for ten days, the offender must register again | | Indiana | **Ind. Code Ann. § 5-2-12-1 to –13 (Michie 1997 & Michie Supp. 2000)** | - Sex offender must register with the local law enforcement within seven days if the offender has resided or intends to reside in an area for more than seven days - Registry list is supplied to schools, state agencies that work with children, child care facilities, and any other entity requesting the registry | | Iowa | **Iowa Code Ann. § 692A.1-16 (West Supp. 2001)** | - Sex offender shall register with the sheriff of the county within five days of establishing a residence or changing residences - Registry may be released to juvenile justice agencies, governmental agencies or any person who requests, in writing, information regarding a registrant | | State | Citation | Subject | |---------|-----------------------------------------------|------------------------------------------------------------------------| | Kansas | Kan. Stat. Ann. § 22-4901 to -4910 (1995) | - Sex offender must register with the sheriff of the county within fifteen days of entering the county or if the offender is temporarily domiciled for more than fifteen days - Information is forwarded to the appropriate law enforcement agency maintaining jurisdiction over place of residence | | Kentucky| Ky. Rev. Stat. Ann. § 17.500-540 (Michie 1996 & Michie Supp. 2000) | - Sex offenders shall register with the parole officer in the county in which he/she intends to reside - Registration information is sent to the Information Services Center, which releases the information to any state or local law enforcement agency | | Louisiana| La. Rev. Stat. Ann. §§ 15:540 to -:549 (West Supp. 2001) | - Sex offender must register with the police department - Sex offender must personally notify residences and businesses within a one-mile radius, the school district superintendent and any landlord of his/her name, address and convicted crime - Authorities must release the information when necessary to protect the public - Public officials are immune from civil liability for any consequences resulting from release | | Maine | Me. Rev. Stat. Ann. tit. 34A, §§ 11101-44 (West Supp. 1998) | - Sex offenders are required to register their current address with Maine's Department of Public Safety - Registration information is considered part of the offender's criminal record | | Maryland| Md. Ann. Code art. 27, § 792 (1996 & Supp. 2000) | - Sex offender must register every ninety days for a ten year period or for life if the offender is classified as a violent predator or is convicted of multiple sex offenses - Police department must notify school superintendents who determine which school principals need notification to protect the safety of children - Information is also sent to the FBI and may be given to a public requestor or posted on the Internet by a local police department | | State | Citation | Subject | |------------|--------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Massachusetts | MASS. ANN. LAWS ch. 6, §§ 178C-178P (Law Co-op. 1988 & Supp. 2001) | - Prior to release from custody, the custody agency is required to send all registration data to the state board - Sex offender is then required to register after release to verify and update the data if necessary - Police departments where the offender plans to live and work and where the offense occurred receive registration information - Information may be released upon request if the offender is classified as a level two or level three sex offender - Release of information includes a warning not to use the registry information to commit a crime or discriminate against or harass the offender | | Michigan | MICH. STAT. ANN. § 4.475(1)-(12) (Michie 1997 & Supp. 2000) | - Sex offenders must register with local police departments, who must maintain a computerized database of all registration information - Police departments may only reveal the information to the public for law enforcement purposes as the information is not subject to disclosure under the Freedom of Information Act | | Minnesota | MINN. STAT. ANN. § 243.166 (West Supp. 2001) | - Predatory offenders must register as soon as they are assigned a corrections agent and at least five days before living at a new address - Registration includes a written statement signed by the offender which must include relevant information, a fingerprint card, and a photograph | | Mississippi | MISS. CODE ANN. §§ 45-33-25 to -57 (2000) | - Sex offenders must register within three days after the date of judgment unless the offender is immediately confined or committed - Every individual convicted for a sexual offense after January 1, 1996, must provide a blood sample for purposes of DNA identification analysis within three working days after registration | | Missouri | MO. ANN. STAT. §§ 589.400-.425 (West Supp. 2001) | - Sex offenders must register within ten days after judgment or upon entering any county - Registration includes a written statement by the sex offender, fingerprints, and a photograph - Chief law enforcement official of the county must maintain a complete list of all registered offenders' names, addresses, and crimes for which the offenders are registered - The information may be requested by any person | | Montana | MONT. CODE ANN. §§ 46-23-501 to –508 (2000) | - No retroactive status - Offender must be in custody, sentenced, or under Department of Corrections supervision on or after July 1, 1989 | | State | Citation | Subject | |------------|--------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Nebraska | NEB. REV. STAT. ANN. §§ 29-4001 to –4013 (Michie Supp. 2000) | - The legislature concluded that sex offenders pose a high risk of recidivism - Requires registration of persons convicted of false imprisonment and kidnapping of minors | | Nevada | NEV. REV. STAT. §§ 179D.010-.800 (1999) | - Applies a three-tiered system of notification - Includes a section on juvenile sex offenders | | New Hampshire | N.H. REV. STAT. ANN. §§ 651-B:1-:19 (Supp. 2000) | - A list of sexual offenders is kept with law enforcement agencies and can be made available to the public only upon request | | New Jersey | N.J. STAT. ANN. §§ 2c:7-2 to –11 (West 1995 & Supp. 2001) | - Law enforcement agencies may only release information concerning sex offenders when necessary for public safety | | New Mexico | N.M. STAT. ANN. §§ 29-11A-1 to –8 (Michie Supp. 2000) | - Allows the state's department of public safety to establish and maintain an Internet website providing offender information, except their social security number and place of employment - The public can request offender information from law enforcement officials | | New York | N.Y. CORRECT. LAW § 168 (McKinney Supp. 2001) | - Provides a statutorily-required “900” number in which the public may call for information regarding sex offenders | | North Carolina | N.C. GEN. STAT. §§ 14-208.5 to .32 (1999) | - Registration requirement terminates after ten years if there are no subsequent convictions for sexual offenses | | North Dakota | N.D. CENT. CODE § 12.1-32-15 (Supp. 1999) | - Law enforcement agencies must disclose registration information if the individual is determined a public risk | | Ohio | OHIO REV. CODE ANN. § 2950.11 (West, WESTLAW through 124 G.A., 2001) | - Sheriff shall notify, among others, all superintendents of school boards within county | | Oklahoma | OKLA. STAT. ANN. tit. 57, §§ 581-589 (West Supp. 2001) | - Any offender required to register cannot work with or provide services to children | | Oregon | OR. REV. STAT. § 181.585-.602 (1995) | - Offender may petition to relieve him/her of registering in county of residence if offender has only one misdemeanor or Class C felony conviction and is not classified a predatory sex offender | | Pennsylvania | PA. STAT. ANN. 42, §§ 9791 (West Supp. 2001) | - No statutory duty for real estate agents or employees to disclose information regarding sexual predators | | State | Citation | Subject | |------------|--------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Rhode Island | R.I. GEN. LAWS §§ 11-37.1-1 to -19 (2000) | - Requiring offenders to register in person annually and verify his/her address on a quarterly basis for life - Information may be released without consent to law enforcement or governmental agencies completing background checks - Law enforcement may release relevant information necessary to protect an individual concerning a specific registrant | | South Carolina | S.C. CODE ANN. §§ 23-3-400 to –530 (Law. Co-op. Supp. 2000) | - The county sheriff must release all registered information, or a list of registered sex offenders residing in the community to the public upon proper written request - The sheriff must provide the newspaper with general circulation within the county a listing of the registry for publication | | South Dakota | S.D. CODIFIED LAWS §§ 22-22-30 to –41 (Michie 1998 & Supp. 2001) | - Any person who, as a juvenile, was placed on the sex offender registry may petition the Circuit Court for removal upon a showing that he has not been adjudicated or convicted of any sex offenses for at least ten years and no longer considered a threat to reoffend. | | Tennessee | TENN. CODE ANN. §§ 40-39-101 to –110 (Michie 1997 & Supp. 2000) | - Information must not be used to inflict retribution or additional punishment on any offender - Specified offenders must register within ten days of release on probation, parole, or any other alternative to incarceration or of move into municipality | | Texas | TEX. CRIM. PROC. CODE ANN. §§ 2.01-12 (Vernon Supp. 2001) | - Specified offenders must register with the local law enforcement authority in any municipality where the offenders reside or intend to reside for more than seven days | | Utah | UTAH CODE ANN. § 77-27-21.5 (1999) | - Specified offenders must register after release from incarceration every year for ten years and within ten days of moving - Law enforcement agencies shall inform the Department of Corrections when a person commits a sex crime or is arrested for one | | Vermont | VT. STAT. ANN. tit. 13, §§ 5401-13 (1998 & Supp. 2000) | - Prior to sentencing and upon release from serving sentence, a sex offender must provide registration to either the court or police department - Information cannot be disclosed except for law enforcement purposes, background checks by government agencies, authorized potential employers to protect public safety, or to the actual offender to review for accuracy - Victim’s identities are not released | | State | Citation | Subject | |------------|--------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Virginia | VA. CODE ANN. § 19.2-390.1 (Michie 2000) | - State Police distribute registration information to local police departments, who may release information to anyone upon proper request - If the information is used to harass an offender, the harasser may be charged with a Class One misdemeanor - Police officials have no liability for releasing or not releasing information | | Washington | WASH. REV. CODE ANN. §§ 9A.44.130-.140 (West 2000 & Supp. 2001) | - Local police chiefs must make reasonable efforts to verify addresses registered by sex offenders to county sheriffs - Each year, the addresses are verified by certified mail - Requirement to register continues for ten to fifteen years or upon court order | | West Virginia | W. VA. CODE ANN. § 15-12-1 to 10 (Michie 2000 & Michie Supp. 2000) | - When a sex offender is released from incarceration, the administrator of the institution must send written notice to the state police within three days - State police shall distribute this information to the law enforcement officer of the county, the superintendent of schools, the child protective services office, all community organizations involving youths, day care centers, and the FBI in the county where the sex offender will reside | | Wisconsin | WIS. STAT. ANN. § 301.45-.46 (West Supp. 2000) | - All sex offenders must register with the Department of Corrections, which immediately makes the information available to the police chief or the sheriff - Information is available, upon request to schools, day care centers, neighborhood watch programs, and many other organizations | | Wyoming | WYO. STAT. ANN. § 7-19-301 –303 (Michie 1999) | - Sex offender must register with the division of criminal investigation if residing or intending to reside in the state - If risk of reoffense is low, notification shall only be to persons authorized to receive criminal history records - If risk of reoffense is moderate, notification shall be to residential neighbors within at least 750 feet of the offender’s residence - If risk of reoffense is high, notification will be provided to the public through electronic internet technology that contains the public registry |
8ccd34a8-6f76-419e-85c1-aa03078dff80
HuggingFaceFW/finepdfs/tree/main/data/eng_Latn/train
finepdfs
eng_Latn
139,786
ZASTUPNICAMA I ZASTUPNICIMA HRVATSKOGA SABORA PREDsjEDNICAMA I PREDsjEDNICIMA RADnih TIJELA Na temelju članka 33. stavka 1. podstavka 3. Poslovnika Hrvatskoga sabora u prilogu upućujem **Prijedlog odluke o izboru dva suca Ustavnog suda Republike Hrvatske**, koji je predsjedniku Hrvatskoga sabora, sukladno odredbi članka 126. stavka 2. Ustava Republike Hrvatske i članka 60. stavka 1. podstavka 5. Poslovnika, dostavio Odbor za Ustav, Poslovnik i politički sustav, aktom od 28. travnja 2015. godine. Za izvjestitelja na sjednici Hrvatskoga sabora Odbor je odredio zastupnika Pedu Grbina, predsjednika Odbora. **PREDSJEDNIK** Josip Leko PREDSEDNIKU HRVATSKOGA SABORA Predmet: Prijedlog odluke o izboru dva suca Ustavnog suda Republike Hrvatske Na temelju članka 126. stavka 2. Ustava Republike Hrvatske i članka 60. stavka 1. podstavka 5. Poslovnika Hrvatskoga sabora, a u svezi s člankom 6. Ustavnog zakona o Ustavnom sudu Republike Hrvatske Odbor za Ustav, Poslovnik i politički sustav Hrvatskoga sabora podnosi Hrvatskom saboru Prijedlog odluke o izboru dva suca Ustavnog suda Republike Hrvatske koju je utvrdio na sjednici održanoj 28. travnja 2015. godine te predlaže Hrvatskom saboru da Odluku o izboru dva suca Ustavnog suda Republike Hrvatske donese na 17. sjednici. Za izvjestitelja Odbora, koji će sudjelovati u radu Hrvatskoga sabora i njegovih radnih tijela Odbor je odredio zastupnika Pedu Grbina, predsjednika Odbora. PREDSEDNIK ODBORA Peda Grbin Na temelju članka 126. stavka 1. Ustava Republike Hrvatske Hrvatski sabor na ___sjednici održanoj___2015. godine donio je ODLUKU O IZBORU DVA SUCA USTAVNOG SUDA REPUBLIKE HRVATSKE I. Za suce Ustavnog suda Republike Hrvatske biraju se II. Izabrani suci Ustavnog suda Republike Hrvatske stupit će na dužnost 9. srpnja 2015. u skladu s odredbom članka 7. Ustavnog zakona o Ustavnom sudu Republike Hrvatske. III. Ova Odluka objavit će se u „Narodnim novinama” Klasa: Zagreb, PREDsjEDNIK HRVATSKOGA SABORA Josip Leko Na temelju članka 6. Ustavnog zakona o Ustavnom sudu Republike Hrvatske Odbor za Ustav, Poslovnik i politički sustav Hrvatskoga sabora predlaže Hrvatskom saboru Prijedlog liste kandidata koji ulaze u uži izbor za suce Ustavnog suda Republike Hrvatske i to: 1. prof. dr. sc. SANJA BARIĆ 2. IVANA ČALIĆ 3. MLADEN BAJIĆ Obrazloženje Člankom 126. stavkom 2. Ustava Republike Hrvatske i člankom 6. stavkom 1. Ustavnog zakona o Ustavnom sudu Republike Hrvatske propisano je da postupak kandidiranja sudaca Ustavnog suda i predlaganja za izbor Hrvatskom saboru provodi odbor Hrvatskoga sabora nadležan za Ustav. Odbor za Ustav, Poslovnik i politički sustav Hrvatskoga sabora uputio je sukladno članku 6. Ustavnog zakona o Ustavnom sudu Republike Hrvatske poziv pravosudnim institucijama, pravnim fakultetima, odvjetničkoj komori, pravničkim udrugama, političkim strankama, drugim pravnim osobama i pojedincima da predlože kandidate za izbor dva suca Ustavnog suda Republike Hrvatske. Poziv je objavljen u „Narodnim novinama” broj 6/15 od 19. siječnja 2015., u „Jutarnjem listu” i „Večernjem listu” 19. siječnja 2015. te na internetskoj stranici Hrvatskoga sabora. Rok za podnošenje kandidatura bio je 30 dana od dana objave u „Narodnim novinama” te je istekao 18. veljače 2015. U pozivu je od kandidata zatraženo da uz životopis trebaju priložiti dokumentaciju o ispunjenju Ustavnim zakonom propisanih uvjeta, a posebice: dokaz o hrvatskom državljanstvu (preslika osobne iskaznice, vojne iskaznice, putovnice ili domovnice), diplome o završenim stupnjevima obrazovanja (izvornik ili ovjerena preslika), potvrde o radnom iskustvu u pravnoj struci (izvornik ili ovjerena preslika radne knjižice odnosno elektronički zapis ili potvrda o podacima evidentiranim u bazi podataka Hrvatskog zavoda za mirovinsko osiguranje te potvrde poslodavaca), uvjerenje nadležnog suda da se protiv kandidata ne vodi kazneni postupak (ne starije od 6 mjeseci), potvrda Ministarstva financija – Porezne uprave da je kandidat podmirio sve dospjele obveze. Na temelju odredbe članka 6. Ustavnog zakona o Ustavnom sudu Republike Hrvatske, nakon proteka roka za podnošenje kandidatura, Odbor je na 84. sjednici održanoj 17. ožujka 2015. utvrdio da je na Poziv za predlaganje kandidata za izbor dva suca Ustavnog suda Republike Hrvatske pravovremeno pristiglo 12 kandidatura, pri čemu je jedna kandidatura, Zorka Čaćić – Zagrajski, utvrđena nepravovaljanom iz razloga što nije priložila potpunu dokumentaciju, u skladu s navedenim Pozivom, dok je 11 kandidatura utvrđeno pravovaljanima. Na temelju navedenog i provedene rasprave, Odbor za Ustav, Poslovnik i politički sustav Hrvatskoga sabora utvrdio je LISTU KANDIDATA za izbor dva suca Ustavnog suda Republike Hrvatske 1. dr. sc. DUBRAVKO LJUBIĆ 2. prof. dr. sc. SANJA BARIĆ 3. ŠIME SAVIĆ 4. ŽELIMIR BROZOVIĆ 5. ANĐELKO STANIĆ 6. mr. sc. NEVENKA ŠERNHORST 7. MILA JELAVIĆ 8. mr. sc. ANTONIJA KOVAČIĆ 9. BORIS KOZJAK 10. IVANA ČALIĆ 11. MLADEN BAJIĆ Člankom 6. stavkom 4. Ustavnog zakona o Ustavnom sudu Republike Hrvatske propisano je da nadležni odbor obavlja javni razgovor sa svakim kandidatom koji ispunjava uvjete za izbor za suca Ustavnog suda Republike Hrvatske i na temelju prikupljenih podataka i rezultata razgovora sastavlja listu kandidata koji ulaze u uži izbor za suce Ustavnog suda Republike Hrvatske s tim da lista kandidata u pravilu sadržava više kandidata od broja sudaca Ustavnog suda koji se bira. Odbor je pozvao na javni razgovor 11 kandidata čije kandidature je utvrdio pravovaljanim. Tijekom javnog razgovora članovi Odbora pobliže su se upoznali s kandidatima koji su iznijeli podatke koje su smatrali bitnim. S obzirom da je člankom 6. Ustavnog zakona o Ustavnom sudu Republike Hrvatske propisano da lista kandidata u pravilu sadržava više kandidata od broja sudaca koji se bira te uzevši u obzir da 11 kandidata ispunjavaju formalne uvjete kao i uočenu izvršnost istaknutu u njihovim životopisima, Odbor je prihvatio prijedlog predsjednika Odbora da lista kandidata za izbor dva suca Ustavnog suda Republike Hrvatske sadržava najmanje tri kandidata. Tajnim glasovanjem utvrđeno je da su kandidati dobili sljedeći broj glasova: 1. dr. sc. DUBRAVKO LJUBIĆ - 1 glas 2. prof. dr. sc. SANJA BARIĆ - 9 glasova 3. ŠIME SAVIĆ - 0 glasova 4. ŽELIMIR BROZOVIĆ - 0 glasova 5. ANĐELKO STANIĆ - 0 glasova 6. mr. sc. NEVENKA ŠERNHORST - 0 glasova 7. MILA JELAVIĆ - 0 glasova 8. mr. sc. ANTONIJA KOVAČIĆ - 1 glas 9. BORIS KOZJAK - 0 glasova 10. IVANA ČALIĆ - 9 glasova 11. MLADEN BAJIĆ - 7 glasova Iz navedenog proizlazi da Odbor za Ustav, Poslovnik i politički sustav Hrvatskoga sabora predlaže Hrvatskom saboru Prijedlog liste kandidata za izbor dva suca Ustavnog suda Republike Hrvatske i to: 1. prof. dr. sc. SANJA BARIĆ 2. IVANA ČALIĆ 3. MLADEN BAJIĆ Odbor uz svoj Prijedlog dostavlja potpunu dokumentaciju kandidata. Na temelju članka 6. stavka 5. Ustavnog zakona o Ustavnom sudu Republike Hrvatske Odbor daje obrazloženje iz kojeg je razvidno zašto je pojedinom kandidatu dao prednost pred ostalim kandidatima. Za prof. dr. sc. SANJU BARIĆ Odbor se opredijelio zbog stručnih, znanstvenih i profesionalnih rezultata kao izvanredne profesorice (predstojnice katedre) na katedri za Ustavno pravo Pravnog fakulteta u Rijeci. Prva u generaciji završila je Međunarodni studij komparativnog ustavnog prava - magisterij znanosti na Srednje europskom sveučilištu u Budimpešti koji je jedini studij komparativnog usporednog ustavnog prava koji postoji u Europi. 1999. dobila je pohvalu rektora Međunarodnog studija komparativnog ustavnog prava na kojem se bavila ustavnim sudovanjem i komparativnim ustavnim sudovanjem (proučavajući i presude Vrhovnih sudova, Europskog suda pravde, Europskog suda za ljudska prava). 2005. doktorirala je na Pravnom fakultetu u Zagrebu na katedri za Ustavno pravo. Kroz daljnje profesionalno usavršavanje stekla je status gosta predavača na Sveučilištu u Trstu gdje predaje komparativno ustavno sudovanje. Vanjska članica je Odbora za Ustav, Poslovnik i politički sustav te je bila vanjska članica Odbora za ravnopravnost spolova Grada Rijeke, vanjska članica Pododbora za ljudska prava i prava nacionalne manjine Hrvatskoga sabora, članica proširene radne skupine Ministarstva pravosuđa za izradu Zakona o besplatnoj pravnoj pomoći. Također, članica je Akademije pravnih znanosti Hrvatske, Hrvatske udruge za Ustavno pravo kao i drugih stručnih udruga. Za IVANU ČALIĆ Odbor se opredijelio zbog stručnih i profesionalnih rezultata tijekom dugogodišnjeg rada kao pravnice i sutkinje Općinskog suda te sada Županijskog suda u Zagrebu. Za vrijeme obnašanja sudačke dužnosti na Županijskom sudu u Zagrebu radila je na najsloženijim predmetima iz područja korupcije i organiziranog kriminaliteta. Također, predsjednica je Službeničkog suda u Zagrebu. Bila je članica radne skupine za izradu provedbenih propisa za primjenu Zakona o kaznenom postupku pri Ministarstvu pravosuda te članica radne skupine pri Ministarstvu socijalne politike i mladih za pripremu potpisivanja i usklađivanja prijevoda Konvencije Vijeća Europe o sprječavanju i borbi protiv nasilja nad ženama i nasilja u obitelji. Sudjelovala je kao predavač na katedrama za Kazneno pravo i Kazneno procesno pravo te na Pravosudnoj akademiji na temu „Rad na složenim kaznenim predmetima“. Za MLADENA BAJIĆA Odbor se opredijelio zbog njegovih istaknutih i dugogodišnjih (40 godina) stručnih i radnih rezultata u sudbenoj vlasti Republike Hrvatske. Obavljao je poslove ravnatelja USKOK-a, u tri mandata glavnog državnog odvjetnika i zadnju godinu dana zamjenika glavnog državnog odvjetnika. Sudjelovao je na brojnim stručnim seminarima te je dobitnik nagrade Miko Tripalo za doprinos u zaštiti i promicanju ljudskih prava u Hrvatskoj koji nadilaze profesionalne obveze i uobičajene standarde. Član je udruženja europskih tužitelja te član Svjetskog udruženja tužitelja. Nositelj je niza odlikovanja iz Domovinskog rata. Odbor ističe da je postupak kandidiranja i predlaganja za izbor dva suca Ustavnog suda Republike Hrvatske proveden potpuno transparentno, a sjednici Odbora i javnom razgovoru nazočili su predstavnici GONG-a i medija. SLUŽBENA ZABILJEŠKA S JAVNOG RAZGOVORA S KANDIDATIMA ZA IZBOR DVA SUCA USTAVNOG SUDA REPUBLIKE HRVATSKE SUKLADNO ČLANKU 6. STAVKU 4. USTAVNOG ZAKONA O USTAVNOM SUDU REPUBLIKE HRVATSKE Javni razgovor održan je 24. ožujka 2015. godine od 9,30 do 16,05 sati u zgradi Hrvatskoga sabora, Trg sv. Marka 6, u dvorani „Ivana Mažuranića“. Razgovoru su nazočili: Peđa Grbin, predsjednik Odbora za Ustav, Poslovnik i politički sustav, Ingrid Antičević Marinović, Gordana Sobol, Nenad Stazić, Ivo Jelušić, mr. sc. Marin Jurjević, Goran Beus Richembergh, Dragutin Lesar, Davorin Mlakar i mr. sc. Josip Salapić, članovi Odbora iz reda zastupnika te prof. dr. sc. Nenad Zakošek i Dragan Zelić, članovi Odbora iz reda javnih, znanstvenih i stručnih djelatnika. Sjednici nisu nazočili: Vladimir Šeks, potpredsjednik Odbora, prof. dr. sc. Milorad Pupovac i dr. sc. Davor Božinović, članovi Odbora iz reda zastupnika te Florijan Boras, prof. dr. sc. Sanja Barić¹, prof. dr. sc. Ivan Koprić i prof. dr. sc. Branko Smerdel, članovi Odbora iz reda javnih, znanstvenih i stručnih djelatnika. Osim članova Odbora, sjednici je nazočila i Jadranka Kosor, zastupnica te predstavnici medija. Sjednica Odbora na kojoj je održan javni razgovor s kandidatima tonski je snimana, a prijepis snimke čini sastavni dio zapisnika 85. sjednice Odbora od 24. ožujka 2015. godine. ¹ Prof. dr. sc. Sanja Barić, članica Odbora, sudjelovala je kao kandidatkinja u javnom razgovoru radi utvrđivanja Prijedloga kandidata za suce Ustavnog suda Republike Hrvatske.
<urn:uuid:df1cf40c-46f1-46c1-bef5-ed2e67484eeb>
HuggingFaceFW/finepdfs/tree/main/data/hrv_Latn/train
finepdfs
hrv_Latn
11,708