input
stringlengths 0
1.96k
| context
stringlengths 1.23k
257k
| answers
listlengths 1
5
| length
int32 399
40.5k
| dataset
stringclasses 10
values | language
stringclasses 5
values | all_classes
listlengths | _id
stringlengths 48
48
|
|---|---|---|---|---|---|---|---|
What are the benefits of using binary variables in the SLAS formulation?
|
Paper Info
Title: SLAS: Speed and Lane Advisory System for Highway Navigation
Publish Date: Unkown
Author List: Faizan Tariq, David Isele, John Baras, Sangjae Bae
Figure
Fig. 1.Motivational Example.With a slow moving vehicle ahead, the ego vehicle (in blue) may decide to either change lane to the fast moving lane (left) to minimize travel time or adjust its speed without changing lanes to preserve safety but it would be unwise for it to switch to the slow moving lane (right) as that would not benefit travel time or safety.
Fig. 3. Simulation Setup.Scenario Runner sets up the scenario for the CARLA Simulator, which then communicates with the SLAS and the Planning and Control ROS (Robot Operating System) nodes through the ROS bridge node.
Fig. 4. Testing scenario with three lanes: lane 0 (left), lane 1 (center) and lane 2 (right).The expected motion of the ego vehicle, over the course of the simulation, is shown with numbered frames.The right most lane (lane 3) is reserved for merging traffic so it is not utilized in our simulation.
Fig. 5. Left: Travel time comparison.Center: Lane choice (lateral position) comparison.The center lines of lanes 0 (left), 1 (center) and 2 (right) have fixed lateral displacements of 0m, 3.5m and 7m respectively.Right: Headway comparison.With no leading vehicle, the headway is restricted by the visibility range of 50m.
abstract
This paper proposes a hierarchical autonomous vehicle navigation architecture, composed of a high-level speed and lane advisory system (SLAS) coupled with low-level trajectory generation and trajectory following modules. Specifically, we target a multi-lane highway driving scenario where an autonomous ego vehicle navigates in traffic.
We propose a novel receding horizon mixed-integer optimization based method for SLAS with the objective to minimize travel time while accounting for passenger comfort. We further incorporate various modifications in the proposed approach to improve the overall computational efficiency and achieve real-time performance.
We demonstrate the efficacy of the proposed approach in contrast to the existing methods, when applied in conjunction with state-of-the-art trajectory generation and trajectory following frameworks, in a CARLA simulation environment.
INTRODUCTION
Lane changing is considered to be one of the most risky driving behaviors since it is highly contingent upon multimodal trajectory predictions of neighboring vehicles and requires timely decision making . It is further influenced by a number of uncertainty factors such as road conditions, measurement accuracy, and a long tail of behavioral uncertainty of on-road agents.
However, if executed efficiently, lane changing coupled with speed adjustment can yield significant improvement in minimizing overall travel time while ensuring passenger comfort . To elaborate further, consider the scenario presented in Fig. . Based on the predicted motion (shown in a lighter shade) of the neighboring vehicles (shown in orange), the ego vehicle (shown in blue) may decide to either change lane left in an attempt to minimize its travel time or slow down in the current lane to maintain safety.
However, it would be imprudent for the ego vehicle to risk changing lane right and consequently get stuck behind a slow moving vehicle even though there is presently a greater headway. This simple scenario highlights the importance of foresight and long planning-horizon in strategic decision making for autonomous vehicles.
Existing methods like MOBIL give us the ability to change lanes but behave greedily (prioritizing immediate rewards) oftentimes, which can lead to sub-optimal performance. It was shown in that the lane changing performance can be improved with an A inspired approach, but the formulation was limited to constant speed.
Such an approach is unable to assess the benefits of speed adjustment 1 University of Maryland, College Park, MD, USA. Email: {mftariq,baras}@umd.edu. 2 Honda Research Institute, San Jose, CA, USA. Email: {disele,sbae}@honda-ri.com. Research supported by Honda Research Institute, USA. in minimizing overall travel time.
As will become apparent in Section IV, it may be necessary at times to sacrifice on shortterm benefits to gain long-term performance improvements. In such a scenario, an approach with speed adjustment coupled with long planning horizon has the foresight to deliver significantly better results. Moreover, the inclusion of speed adjustment in the decision making process inhibits the risk of incurring trajectory infeasibility as the environment conditions may prevent the ego vehicle from traveling at a constant reference speed and the low-level planner may be unable to handle such a discrepancy.
Therefore, in this work, we propose a low complexity receding horizon optimization based approach that outputs the lane change maneuvers coupled with speed adjustments for long planning horizons (> 15s) while guaranteeing safety. The long horizon strategic decision making gives ego vehicle the ability to proactively anticipate and handle challenging driving situations.
Literature review: In the literature, speed and lane changing decisions are generally considered from a motion planner's perspective , which allows for a simultaneous determination of target lanes and waypoints to perform the maneuver. The motion planning methods present in the literature can broadly be categorized into sampling-based, learning-based and optimization-based approaches.
In regards to the sampling-based approaches, single-query methods, in particular the different variants of RRT, are preferred over multi-query methods, like roadmap-based methods, due to the faster execution time and their ability to incorporate non-holonomic constraints . Even though these methods are able to incorporate safety guarantees by sampling feasible trajectories from a reachable safe set , the overall driving experience is often rather uncomfortable due to the concatenation of individual trajectories.
Moreover, the asymptotic optimality guarantees availed by arXiv:2303.00861v1 [cs.RO] 1 Mar 2023 these methods do not help with real-world implementation in complex driving scenarios since they tend to have high sample complexity . In terms of the learning-based methods, the preferred approach seems to be the variations of Reinforcement Learning techniques applied in a simulated environment , , , , .
These approaches, although seeming to work well in simulation, have concerns regarding real-world implementation due to the large amount of training data that they require, the exploration of unsafe behaviors during training, and a general inability to handle edge cases. They mainly utilize neural networks as function approximators which yields low computational complexity but also results in a lack of explainability and safety guarantees.
Lastly, the optimization-based approaches, especially the derivatives of optimal control methods, are abundant in the literature. In contrast to the potential-field based approaches that yield decent collision avoidance performance but are unable to accommodate vehicle dynamics, the optimal control methods , especially the derivatives of Model Predictive Control (MPC) approach , , , yield excellent collision avoidance performance while accommodating vehicle dynamics.
However, this performance comes at a cost of high computational complexity, arising mainly from the non-convex collision avoidance and the non-linear dynamics constraints. This, in turn, restricts the planning horizon to merely a few seconds. The key requirements for the algorithmic design of an autonomous vehicle include real-time operation, safety guarantees, optimality with respect to some metric(s), and accounting for the behavior variability of on-road agents.
Considering these requirements, we propose an optimization-based behavioral planning framework that enables autonomous vehicle maneuvering on multilane highways. While having the benefits of optimizationbased approaches, our method achieves a low computational complexity by employing a binary representation of the decoupled lane indicator dynamics in lieu of lateral dynamics, and utilizing algorithmic modifications to aid numerical computations.
Specifically, our method provides: • optimality with respect to travel time and comfort; • safety and feasibility guarantees; • real-time applicability for a long planning horizon; and • modularity in design, which enables the integration of external trajectory prediction modules. The proposed method fills in the research gap by meeting all the key algorithmic requirements while simultaneously gaining the foresight to make strategic decisions that yield long-term performance benefits, as verified in Section IV.
In this section, we present the algorithmic pipeline and formalize the road, observation and vehicle dynamics models that will be utilized in the subsequent sections.
Algorithmic Pipeline
Fig. illustrates the algorithmic pipeline of the proposed navigation architecture, in reference to the various existing . Algorithmic pipeline of the proposed navigation architecture. The raw sensory input data is processed by the Perception, and Simultaneous Localization and Mapping (SLAM) modules to place the autonomous vehicle relative to the various environmental entities in a unified frame of reference.
This information is then passed on to the navigation stack, composed of the behavioral planning, motion planning, and vehicle control modules. The output of the navigation module is passed down further in terms of actuation commands (brake, throttle and steering) to the actuators. algorithmic modules deployed on an autonomous vehicle.
The taxonomy of the various components of the navigation stack (highlighted by the dotted rectangle) is borrowed from . This pipeline essentially improves the pipeline introduced in by adding a speed advisory system. Our main focus is the development of the behavior planning module, highlighted as SLAS in Fig. . SLAS outputs the target lane and reference speed which are utilized by the motion planning module to generate a reference trajectory for the ego vehicle.
The vehicle controllers compute the throttle and steering commands to track the trajectory accordingly. For the motion planning module, we adopt the Neural Networks integrated Model Predictive Control (NNMPC) due to its ability to accommodate the behaviors of neighboring vehicles in the trajectory generation process.
In our approach, we assume that the perception (of other vehicles) and the localization (of ego vehicle) are known without any uncertainty, for simplicity, but the modular architecture avails us the ability to integrate any perception or SLAM module in the overall framework. Throughout the manuscript, Z will denote the set of integers and R the set of real numbers.
For some a, c ∈ Z and a < c, we will write For some e, g ∈ R and e < g, we will write
Road Model
The physical road structure is modeled as a continuous multi-lane highway with negligible curvature and unidirectional traffic flow. The lanes on the highway are clearly demarcated and at any given time k, the number of available lanes for the vehicles to travel on is denoted by N l (k) while the road speed limit is denoted by V l .
Therefore, the set of lanes available for traveling at a given time instant k is denoted by . We work with the Frenet coordinate system where the distance along the road is denoted by the longitudinal displacement (s) and the distance perpendicular to the road is defined by the lateral displacement (d).
Each lane is assigned a lane indicator variable l. The leftmost lane, with respect to the direction of traffic flow, is assigned a value of l = 0 while each subsequent lane is assigned an increasing integer value for l, as depicted in Fig. .
Vehicle Model
Since we aim to have real-time computations for a long planning horizon (> 15s), we model the vehicle dynamics with a linearized decoupled dynamical system. For the highway driving scenario, where the road curvature is typically small, it is reasonable to assume a decoupling between the lateral and the longitudinal dynamics , especially for the behavior planning layer.
Therefore, we utilize a linear constant acceleration model for the longitudinal dynamics and abstract out the lateral dynamics with a lane indicator variable. For the lane change dynamics, we use a moving average filter coupled with a rounding function to model the time required by the ego vehicle to change lanes.
This is compactly represented as: where s 0 (k), v 0 (k), l 0 (k) and L(k) denote the ego vehicle's longitudinal displacement, speed, lane indicator and target lane, respectively, at time instant k; the subscript i indexes the vehicles on the road with 0 being reserved for the ego vehicle; T s denotes the discretization time step; and N corresponds to the number of time steps required to change lane.
The state (x 0 (k)) and control input (u 0 (k)) to the system at time instant k are defined as: where V m denotes the maximum speed of the ego vehicle.
Observation Model
For practical considerations, we restrict the ego vehicle's visibility range to the sensory perception limit, denoted by R v . Then, the set of vehicles in ego vehicle's visibility range at time instant k, represented by O(k), is defined as: where s i (k) corresponds to the longitudinal displacement of the observed vehicle.
Remark 1: For the multi-lane highway driving scenario, occlusion does not play a prominent role so we do not account for it in the existing formulation. However, the proposed framework can easily accommodate occlusion and measurement uncertainties since the receding horizon approach bases its decision on the most up-to-date information available at any given time, as demonstrated in .
In this section, we describe the prediction model to generate the predicted future trajectories of observed vehicles and present a discussion on the proposed receding horizon optimization-based behavioral planning module.
Trajectory Prediction
Reliable behavior and trajectory prediction of other traffic participants is crucial for safe maneuvering of autonomous vehicles. The algorithm proposed in Section III-B is able to incorporate any generic prediction module available in the literature as long as it can provide a deterministic predicted future trajectory for a given vehicle.
In this work, we formulate a low-complexity prediction model that highlights the flexibility and efficiency of our proposed approach. For an observed vehicle i ∈ O(k), the future speed profile is predicted using a piece-wise linear function while the lane profile is assumed to stay constant for the duration of the prediction horizon.
At a given time step k, the estimated acceleration (ā k i ) and the estimated speed (v k i ) parameters are obtained through linear regression with mean-squared error on the past o k i > 1 speed observations. Based on the estimated parameters, we predict the future speed and longitudinal displacement as follows:
Here, H a corresponds to the acceleration horizon while vk i (j) and ŝk i (j) respectively represent the predicted speed and longitudinal displacement for vehicle i, j time steps into the future starting from the current time instant k. Remark 2: Due to the modular nature of the proposed framework, the behavior planning module detailed in Section III-B can work with advanced maneuver-based (e.g.
Markov Chain ) and interaction-based (e.g. Social Generative Adversarial Networks ) trajectory prediction modules, allowing for interactive maneuvering behaviors.
Speed and Lane Advisory System
The goal of our behavior planning module, Speed and Lane Advisory System or in short, SLAS, is to determine a sequence of speed and lane change commands that would enable the ego vehicle to maximize its speed, thus minimizing the travel time, while accounting for driver comfort and abiding by its dynamical, actuator, and safety limits.
The output of this module is a relatively smooth speed and lane change profile which is then passed on to a motion planner. It is necessary to incorporate the dynamical and actuator limits in the behavioral planning module so as not to provide the motion planner with goals that are not reachable, and jeopardize the safety of the overall system as a result.
In the subsequent discussion, we provide a formulation of the optimization problem for SLAS; highlight the modifications necessary to improve the computational complexity; and, present safety and feasibility analysis. 1) Optimization Problem with Integer Constraints: SLAS is posed as an optimization problem, with the objective to maximize speed while minimizing frequent lane changes and abrupt changes in speed.
The output of SLAS, at time instant k, is the control input u 0 (k + 1), as defined in . The optimization problem is formulated as follows: Objective Function: In the formulation above, the optimization variables are the ego vehicle's speed (v k (j)) and target lane (L k (j)), j step into the future, starting from time instant k.
Here, H corresponds to the planning horizon. The scalarization parameters γ 1 , γ 2 and γ 3 in the objective function account for a relative tradeoff between maximizing speed, minimizing lane changes and minimizing abrupt changes in speed respectively. Increasing γ 1 yields a more aggressive behavior with the priority placed on maximizing speed while γ 2 and γ 3 combine to place an emphasis on maximizing passenger comfort by reducing lane and speed changes respectively.
Dynamical Constraints: These constraints are put in place to ensure the dynamical feasibility of the solution. The constraints ( ), and serve to initialize the longitudinal displacement, speed and target lane respectively for the optimizer, based on the values observed at time instant k. The constraints and ( ) bound the ego vehicle's speed by the speed limit and the acceleration limits of the vehicle respectively.
The ego vehicle's speed is then used to calculate the projected longitudinal displacement in . The target lane values at any planning step (j) are restricted to the set of reachable values by ( ), ( ) and . Here, restricts the target lane to the set of available lanes (L(k)), ensures that the lane change, if needed, is made to the adjacent lane only and (17) models the time steps (N ) required for a lane change.
The flooring function can easily be transformed into a couple of linear constraints by the introduction of an auxiliary integer variable, as shown in the Appendix. Finally, l k (j) is merely the internal representation of the lane the ego vehicle is projected to travel on at planning step j. Safety Constraint: The safety constraint ensures that the ego vehicle maintains a minimum safe distance (L s i (j)) to the nearest vehicle i, in its projected lane of travel (l k (j)), at planning instant j.
We borrow the definition of this safe distance from , where the authors provide a formalization, based on the clause from Vienna Convention on Road Traffic that states that "A vehicle [...] shall keep at a sufficient distance [...] to avoid collision if the vehicle in front should suddenly slow down or stop."
Furthermore, the absolute value constraint can be decomposed into linear constraints by the application of big-M method and the introduction of an auxiliary variable, as shown in the Appendix. Remark 3: The proposed formulation can accommodate arbitrary number of lanes at any given time instant k. This means that if at any given time, the number of available lanes for traveling either increases or decreases, the proposed formulation will still continue to hold.
This is an important consideration since many a times on highways, some lanes are blocked due to various unanticipated situations such as road accidents, roadwork, narrowing of road etc. 2) Computational Complexity Reduction: This section details the optimization problem reformulation with binary variables, optimization warm start technique and lazy constraint implementation, all of which combine to improve the computational complexity of our SLAS module.
Binary Variables: The proposed formulation in Section III-B has relatively high computation complexity (computation time of ∼ 2s in the worst case scenario -slow moving traffic blocking all the lanes) due to the integer decision variables yielding a mixed-integer optimization problem . To circumvent the computational overload, we reformulate the problem with binary variables that replace the integer variables, as follows:
where the Lk (i, j) represents the modified target lane variable, indexed by the lane (i) as well as the planning step (j) and Lk (a, b) = 1 represents the choice of lane a ∈ L as the target lane at planning step b ∈ Z . Then, some of the constraints from the SLAS formulation in Section III-B are modified as follows:
Here, initializes the target lane, (21) restricts the target lane at any planning step to the set of available lanes, restricts the lane change between consecutive planning steps to the adjacent lanes, and ( ) represents the augmented safety constraint. The implication ( =⇒ ) in ( ) can easily be transformed into a linear constraint (see Appendix).
The augmented minimum safety distance ( Ls i (j)) incorporates the time required to execute the lane change maneuver (N ) from ( ) into the following unified safety constraint: where L l is the width of the lanes (see Fig. ), δ(k) is the signed lateral deviation of the ego vehicle from the previous target lane's boundary at time step k, and γ d (δ k (j)) is the dynamic cost of deviation from the previous target lane (L(k − 1)).
Moreover, in the cost function , we take L k (0) = L(k − 1). These costs are introduced to prevent the swerving (canceling of lane switch before completion) behavior, unless absolutely necessary (for safety purposes). Remark 4: Since the ego vehicle is considered to have changed lane once it crosses a lane boundary, the deviation δ k (j) is considered from the lane boundary instead of the center of the target lane to maintain the continuity of γ d (δ k (j)) with respect to the lateral displacement of the ego vehicle.
Specifically, δ k (j) > 0 if the ego vehicle has crossed the previous target lane boundary and 0 otherwise. This is an important consideration since a discontinuity in γ d (δ k (j)), upon completion of lane change, may lead to infeasibility. Remark 5: The swerving behavior is suppressed but not completely eliminated with a hard constraint since such a behavior is necessary at times to react to the environment's unpredictability.
This reactive strategy, which is a distinctive feature of our approach, avails the algorithm the ability to proactively 'change its mind' in case something unanticipated happens in the environment that can jeopardize safety. Optimization Warm Start: To aid the optimizer in finding an initially feasible solution, we provide the solution from the previous time step as a reference.
Formally, This doesn't imply that the solution from time step k − 1 will hold exactly at time step k, owing to the unmodeled disturbances, but providing this reference aids the optimizer in finding an initially feasible solution in the vicinity of the reference solution. This observation is rooted in the premise that the solution for the long planning horizon is not expected to change significantly between time steps, given the sampling time is not too large, and the predicted behavior of on-road agents does not alter significantly.
It is also worth pointing out that the priority here is quickly finding a feasible solution that obeys the safety constraints and actuator limits, and recursively improving it rather than excessively iterating to reach at a global optimum. In our experiments, it was observed that a suboptimal solution was qualitatively not significantly different from the optimal one.
Therefore, we utilize the cutting planes method for optimization , which first looks for a feasible solution, using our provided reference, and then recursively updates it until either the globally minimal solution is found or the time limit is reached. Lazy Constraints: To further enhance the computational efficiency, we introduce a lazy implementation of the lane changing constraints .
It was observed in our experiments that a feasible solution without the lane changing constraints ( ) can be found several order of magnitude (∼ 10×) quicker than if we include these constraints so we decided to have a lazy implementation for them. With a lazy implementation , the solver finds a set of feasible solutions without the inclusion of these constraints and then determines the feasibility of those solutions from the reduced problem with respect to the lazy constraints.
3) Feasibility: By an argument similar to the one presented in , it is a relatively straightforward proof for recursive feasibility of the problem, i.e. the optimization problem will continue to stay feasible, if initially feasible, with the trivial solution being matching the speed of the leading vehicle and not changing lanes.
In this section, we detail our experimental setup, demonstrate the performance of SLAS, and report a qualitative as well as a quantitative comparative analysis. The baselines in our comparative analysis are set to: Extended-Astar (EA ) , MOBIL , and no lane-change model (No-Change).
Experimental Setup
The implementation setup, depicted in Fig. , is composed of the CARLA simulator (Version 0.9.11) , SLAS module (Section III-B), and the planner and controller module . To solve the optimization problem for SLAS, we use Gurobi Optimizer (Version 9.1.1) . The simulations are performed on a computer equipped with an Intel Xeon(R) CPU E5-2643 v4 @ 3.40GHz × 12 and NVIDIA Titan XP, running Ubuntu 20.04 LTS.
On average, the time required for each optimization step is ∼ 0.096s, while the maximum time limit for the optimizer is set to 0.2s, indicating the strong potential for real-time applicability.
Case Study
Figure illustrates the test case scenario for our comparative analysis. The scenario is composed of a highway segment with four lanes and the rightmost lane reserved for merging vehicles. The ego vehicle is initialized to follow a slow moving vehicle in lane 1 and has even slower moving traffic to its right in lane 2. Thus, the only option for it, in order to minimize travel time, is to switch left to lane 0 with faster moving traffic and greater headway.
Once it moves to lane 0, and overtakes the slow moving vehicle in lane 1, it has two options: either to keep traveling in lane 0 without making any lane change decisions until getting close to the lead vehicle or proactively exploiting the gap in lane 2 to switch to lane 3 in anticipation of traffic buildup in lanes 1 and 2. A strategic decision maker with foresight will choose to take the later option and make the decision proactively for a greater overall benefit.
The evaluation metrics for the comparative analysis include: travel time, lateral displacement, headway and distance to the closest vehicle. As for the simulation parameters, the simulation step size is set to 0.05s (simulation frequency of 20Hz); the velocities of vehicles in lanes 0, 1 and 2 are set to 8, 5 and 2 m/s respectively while the speed limit V l is set to 15m/s; the length of the highway patch is set to 350m while the width between the lanes is set to 3.5m; and the sensor visibility range is set to R v = 50m.
The parameters for SLAS are set as follows: T s = 0.4s, H = 40, N = 3, A min = −5m/s 2 , A max = 3.5m/s 2 , γ 1 = 1, γ 2 = 0.1 and γ 3 = 0.01. The values of these parameters can be tuned to yield an aggressive or defensive behavior of the algorithm. 1) Travel Time: The left plot in Fig. depicts the travel time as a function of longitudinal displacement for the four algorithms.
As seen in the plot, our method (SLAS) maintains a lower overall travel time as compared to the other methods. Quantitatively speaking, SLAS outperforms EA , MOBIL and No-change methods by 12.72%, 23.52% and 54.34% respectively in terms of the time required to complete the simulation scenario. This shows that our method's foresight compensates for its apparent conservativeness arising from the need to preserve passenger comfort.
2) Lateral Displacement: To identify the differences in lane changing behaviors between the four approaches, the relationship between lateral and longitudinal displacements over the course of the simulation is highlighted in the center plot of Fig. . In the plot, the lateral displacement of 0 corresponds to the center of lane 0 while the center of each following lane is 3.5m away.
Comparing the performance of the four algorithms, we see SLAS and EA showing relatively similar performances, resulting from proactive decision making. In contrast, since MOBIL only assesses the advantage of switching to the adjacent lanes, it is unable to see the benefit of proactively switching to lane 2. This explains why EA and SLAS start outperforming MOBIL in terms of travel time (left plot) at around the 130 [m] mark for longitudinal displacement.
As for a direct comparison between SLAS and EA , the benefits of having speed advisory system become apparent in this center plot. Due to speed control, SLAS is able to constantly maintain a greater headway (right plot) without having to brake significantly upon getting too close to the lead vehicle. This results in a smooth lateral displacement profile which allows the vehicle to change lanes with minimal jerk (quantitative analysis to follow in Section IV-C) and deliver better overall timing performance (left plot).
3) Headway: The right plot in Fig. shows the headway maintained by the ego vehicle over the course of the simulation. In accordance with our prior discussion, MOBIL cruises behind the front vehicle, maintaining a relatively low headway until a sufficient space in the adjacent lane is found to perform the lane-change maneuver.
On the other hand, EA and SLAS show a comparable headway trajectory, however, SLAS maintains a greater headway throughout and achieves the maximum headway prior to EA . Quantitatively, SLAS maintains on average 9.43%, 36.57% and 113.17% more headway than the EA , MOBIL and No-change approaches respectively.
This strong performance by SLAS can be attributed to its incorporation of safety guarantees coupled with its consideration for passenger comfort. 4) Distance to closest vehicle: Finally, we compare the distance that ego vehicle maintains from the closest vehicle throughout the simulation. On average, SLAS maintains 9.28%, 32.01%, and 22.84% more distance in comparison to EA , MOBIL and No-change approaches respectively.
These numbers are a testament to the strength of our approach resulting from consideration of long planning horizon coupled with speed control.
Monte Carlo Simulations
To demonstrate the long-term performance of the three approaches (SLAS, EA and MOBIL), we run a series of Monte Carlo simulations on scenarios with randomized initial positions (within a range of 8m) and velocities (within ranges of 8, 5 and 2 m/s assigned to each of the three lanes randomly) of traffic participants.
The result from 50 simulations is presented in Table . In this table, the columns represent the different evaluation metrics, the rows identify the three algorithms, and the values highlighted in green represent the best result with respect to each evaluation metric. The evaluation metrics, going from left to right in the table, are completion time (s), brake (R [−1,0] ), brake jerk (R [−1,0] ), throttle (R [0,1] ), throttle jerk (R [0,1] ), angular acceleration ( • /s 2 ) and angular jerk ( • /s 3 ).
Apart from completion time, the remaining metrics, based on the commands passed to the vehicular actuators (Fig. ), are used to model passenger comfort. In terms of average performance, SLAS greatly outperforms the other methods when it comes to passenger comfort since it explicitly accounts for comfort in the formulation.
However, it does so at a cost of slightly reduced performance in regards to travel time, when compared to EA , since SLAS tries to strike a balance between minimizing travel time and maximizing passenger comfort. SLAS also secures the lowest standard deviation, for each of the evaluation metrics, when compared to the other methods, which points to the consistency in its long-term performance.
CONCLUSION
We propose a novel behavior planning module for the multi-lane highway maneuvering scenario, that outputs strategic target lane and reference speed commands, and incorporate it with a state-of-the-art motion planning and control framework. We formulate the approach as a receding horizon mixed integer optimization with the goal to minimize travel time while accounting for passenger comfort for a long planning horizon.
In order to reduce the computational overload, we reformulate the problem by replacing integer variables with binary ones and further incorporate various modifications to aid numerical computations. We also carry out a detailed comparative analysis to demonstrate the performance of our approach on the CARLA simulator.
Our future work includes incorporating various delays and uncertainty measures in the perception, localization and prediction modules to evaluate the robustness properties of our approach.
Flooring Constraint
For y ∈ Z and x ∈ R, the constraint y = x can be represented by the following linear constraints: y ≤ x, y + 1 ≥ x + where > 0 accounts for the feasibility tolerance. where M 0 (big-M) and > 0 accounts for numerical errors (chosen to be 0.1 in our implementations).
Absolute Value Constraint
For ∆s, L s ∈ R, the constraint |∆s| − L s ≥ 0 can be represented as: This can further be generalized, as done in our implementation, to have different forward and rear safety margins as: ∆s ≥ L f s ∨ ∆s ≤ −L r s where L f s and L r s are forward and rear safety margins respectively. This can be represented with the following linear constraints:
s ≥ 0 where M 0 (big-M) and c ∈ {0, 1} is responsible for making a choice between the two constraints.
|
[
"Reduced computational complexity."
] | 5,466
|
multifieldqa_en
|
en
| null |
0e9a32e0989483442381f0195e620fea8c5538e42f130bdb
|
Where can users go for troubleshooting and support?
|
'Quectel_QuecPython_BC25 开发板使用说明 版本:Quectel_QuecPython_BC25 开发板使用说明_V1.1日期:2021-11-30 状态:临时文件
Quectel_QuecPython_BC25 开发板使用说明一、基本概述BC25_QuecPython_EVB_V1.1 开发板(本文简称“V1.1 开发板”)是专门针对 BC25 制造,是一款小巧便携的“口袋型”开发板。体型虽小,但是功能丰富,拥 有 SIM 卡座、板载天线、磁开关、LED 等元件。开发者仅需一条 USB Type-C 数据线即可轻松玩转开发板。二、开发板资源Quectel 移远 BC25 通信模组NANO SIM 自弹卡座USB Type-C 数据接口开机按键,唤醒按键磁开关单色灯GPIO 排针上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 1 / 6
三、开发板介绍Quectel_QuecPython_BC25 开发板使用说明开发板是为方便开发者使用 QuecPython,而设计的一款基于 BC25 通信模块 的开发板,其上集成了开发常用的配置,可以满足开发者的开发需求。V1.1 开发板正面接口V1.1 开发板配置开发板配备了多种外设。明细如下:序 号名称型号是否支持接口类 型1磁开关KTH1601SL-ST3是GPIO2LED 灯S3528UG6W9TLC2G- 是GPIOTJ- 34微动按键GPIOA5--------是是---------上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 2 / 6
Quectel_QuecPython_BC25 开发板使用说明四、功能详解4.1 磁开关开发板集成了一个磁开关。使用磁铁靠近,可使磁开关输出引脚变为低电平, 默认为高电平。4.2 LED 灯开发板集成了一颗高亮度灯珠,可以用来做显著指示灯。上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 3 / 6
4.3 按键开发板集成了 2 个微动按键,其功能是 S1 为开机键,S2 为睡眠唤醒按键。Quectel_QuecPython_BC25 开发板使用说明五、调试步骤1.拿到开发板 V1.1 先插上 USB 安装串口驱动,在官方 QQ 群文件搜 CP210 或者自 行百度下载 CP210x 的串口芯片驱动进行安装。2.使用串口工具(例如 QCOM_V1.6)连接 BC25 的主串口(硬件 17、18 脚)。V1.1 选择 Enhanced COM 口,波特率选择 9600,打开串口,按下 PWK 键约一秒松开进 行开机,串口工具收到消息则代表开机成 功,然后按下 EINT 键串口显示 +QATWAKEUP 表示模组唤醒了。3.从 https://python.quectel.com/download 下载 BC25QuecPython 版本固件, 使用 Qflash(群文件下载)选择 BC25 的调试串口(硬件 38、39 脚),波特率选 择 921600,选择 lod 后缀的固件,按下 EINT 键串口工具显示模组已经唤醒串口 工具发 AT+QSCLK=0 可关闭睡眠(不会发 AT 则多按几次 EINT 键),点击 Start 开 始下载固件,下载进度条开始下载,等待下载完成。关闭以上所有工具,并给板 子断电重新上电。4.从 https://python.quectel.com/download 下载 QPYCOM 工具,直接解压运行 工具,选择主串口(同第 2 步),选择 57600 波特率,打开串口。再按 PWK 按键 进行开机,会看到 QPYCOM 有打印 mount.Type "help()" for more information.然后就可以进行 QuecPython 的交互调 试了。上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 4 / 6
六、常见问题解决Quectel_QuecPython_BC25 开发板使用说明Q:模块的固件在哪?A:请登录 QuecPython 网站下载:http://python.quectel.com/downloadQ:哪里有开发板和其他常用资料?A:请登录 QuecPython 网站下载:http://python.quectel.com/downloadP.S. 如果您遇到任何问题,请参照本官网在线文档进行解决或访问 QuecPython 社区进行搜索、交流、提问:QuecPython 社区或者联系我们的在线支持:QQ 群 445121768获取 QuecPython 开发固件及加入官方交流群官网主页:https://python.quectel.com官网文件下载(各类资料、工具):https://python.quectel.com/download官网 wiki(常用于视频教程、手把手教程下载、API 库):https://python.quectel.com/wiki/#/官网文档中心(拥有从入门到精通的各种文档介绍、必看):https://python.quectel.com/doc/工单系统:https://workorder.quectel.com/QuecPython 社区:https://forumschinese.quectel.com/c/function-subjects/quectpython/43QuecPython 官方 QQ 开发交流群:445121768微信公众号:QuecPython移远 OTA 升级平台: https://cloudota.quectel.com/移远 IoT 管理平台:https://python.quectel.com/doc/doc/Advanced_development/zh/QuecPython Cloud/QuecCloud.html上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 5 / 6
附录 1 V1.1 开发板丝印图Quectel_QuecPython_BC25 开发板使用说明附录 2 V1.1 开发板原理图上海市闵行区田林路 1016 号科技绿洲 3 期(B 区)5 号楼 200233 邮箱: info@quectel.com 网址: www.quectel.com 6 / 6
PIU101 PIU102 PIU103 PIU104 PIU105 PIU106 PIU107 PIU108 COR9 PIR902 PIR901 PIU109 PIU1010 PIU1011 PIU1012 PIU1013 PIU1044 PIU1043 PIU1042 PIU1041 PIU1040 PIU1039 PIU1038 PIU1037 PIU1036 COU1A PIU1014 PIU1015 PIU1016 PIU1017 PIU1018 PIU1019 PIU1020 PIU1021 PIU1022 PIU1035 PIU1034 PIU1033 PIU1032 PIU1031 PIU1030 PIU1029 PIU1028 PIU1027 PIU1026 PIU1025 PIU1024 PIU1023 COJ1 PIJ101 COC1 PIC101 PIC102 COC2 PIC201 PIC202 PIC602 COC6 PIC601 COR22 PIR2201 PIR2301 COR23 COR24 PIR2401 PIR2501 COR25 COR14 PIR1401 PIR1601 COR16 PIR2202 PIR2302 PIR2402 PIR2502 PIR1402 PIR1602 COC14 PIC1402 PIC1401 COR33 PIR3301 PIR3302 COU2 PIU201 PIU202 PIU203 PIR3002 COR30 COD6 PIR3001 PID601 PID602 COR31 PIR3102 PIR3101 PIQ201 PIQ203 COQ2 COR32 PIQ202 PIR3201 PIR3202 COR1 COD1 PIR102 PIR101 PID101 PID102 PIQ103 COQ1 PIQ102 COR13 PIR1302 PIR1301 PIQ101 PIR1501 COR15 PIR1502 PIR302 COR3 PIR301 PIR402 COR4 PIR401 PIU1045 PIU1046 PIU1047 PIU1048 PIU1049 PIU1050 PIU1051 PIU1052 PIU1053 COR19 PIR1902 PIR1901 COR20 PIR2002 PIR2001 PIU1072 PIU1071 PIU1070 PIU1069 PIU1068 COU1B PIU1054 PIU1055 PIU1056 PIU1057 PIU1058 PIU1067 PIU1066 PIU1065 PIU1064 PIU1063 PIU1062 PIU1061 PIU1060 PIU1059 PIU1073 PIU1074 PIU1075 PIU1076 PIU1077 PIU1078 PIU1079 PIU1080 COU1C PIU1088 PIU1087 PIU1086 PIU1085 PIU1084 PIU1083 PIU1082 PIU1081 PIU1089 PIU1090 PIU1091 COU1D PIU1094 PIU1093 PIU1092 COM2 COM1 1122334455667788DDCCBBAATitleNumberRevisionSizeA3Date:2021/11/1Sheet ofFile:E:\\\\..\\1.BC25.SchDocDrawn By:1J1ADCR44.7KR34.7KADC_INGNDQUECTEL_LOGOQuecPythonGNDC1100uF 6.3VGNDAUX_TXD_1V8AUX_RXD_1V8GNDUSIM1_VDDRESETNETLIGHTM_RXD_1V8M_TXD_1V8PIN19PIN20VDD_EXTPIN23PIN22PIN21R234.7KR224.7KVDD_EXTR254.7KR244.7KPIN20PIN21PIN23PIN22PIN25PIN30PIN31PIN32PIN33GNDR14.7K312Q1D1蓝 LEDNETR130RR15NCNETLIGHTC61uFGNDGND1RESERVED2MIC_P3MIC_N4SPK_P5SPK_N6PWRKEY7RESERVED8RESERVED9GND10USIM_DATA11USIM_RST12USIM_CLK13USIM_VDD14RESET_N15NET_STATUS16MAIN_RXD17MAIN_TXD18MAIN_DTR19MAIN_RI20MAIN_DCD21MAIN_CTS22MAIN_RTS23VDD_EXT24STATUS25RESERVED26GND27AUX_RXD28AUX_TXD29PCM_CLK30PCM_SYNC31PCM_DIN32PCM_DOUT33GND34ANT_MAIN35GND36GND37DBG_RXD38DBG_TXD39GND40GND41VBAT42VBAT43RESERVED44U1ABC25/EC800NGND45GND46GND47GND48RESERVED49RESERVED50RESERVED51RESERVED52RESERVED53RESERVED54RESERVED55RESERVED56RESERVED57RESERVED58USB_DP59USB_DM60USB_VBUS61RESERVED62RESERVED63RESERVED64RESERVED65I2C_SDA66I2C_SCL67RESERVED68RESERVED69GND70GND71GND72U1BEC800NGND73RESERVED74RESERVED75RESERVED76RESERVED77RESERVED78USIM_DET79RESERVED80RESERVED81USB_BOOT82RESERVED83RESERVED84RESERVED85RESERVED86RESERVED87GND88U1CEC800NGND89GND90GND91GND92GND93GND94U1DEC800NGNDGNDUSIM_DETUSB_BOOTGNDVBUSDM_EC800NDP_EC800NGNDGNDPIN3POWRKEYUSIM1_CLKUSIM1_RSTUSIM1_DATAGNDGNDD_RXD_1V8D_TXD_1V8C2100uF 6.3V+3.8VR90RADCI2C_SCL_EC800NI2C_SDA_EC800NR164.7KR144.7KI2C_SDA_EC800NI2C_SCL_EC800N+3.8VPIN4PIN5PIN6R190RR200RDM_EC800NDP_EC800NUSB_DMUSB_DP+3.8VGNDR304.7K312Q2D6翠绿灯珠NETR310RR32NCPIN30+3.8VGND3OUTPUT2VCC1U2KTH1601SL-ST3VCC_1V8C141uFGNDGNDR3310KVCC_1V8PIN31磁性开关灯珠EC800N焊接R19、R20电源部分请参考官方设计BC25不焊接
COC9 PIC902 PIC901 COU3 PIU301 PIU302 PIU303 PIU306 PIU305 PIU304 COR7 PIR702 PIR701 COL1 PIL101 PIL102 PIC701 PIC702 COC7 COD2 PID202 PID201 COC10 PIC1001 PIC1002 PIC1201 PIC1202 COC12 COR8 PIR802 PIR801 PID501 PID502 COD5 COU6 PIU601 PIU602 PIU603 PIU605 PIU604 PIC1102 COC11 PIC1101 PIC802 COC8 PIC801 COR21 PIR2101 PIR2102 COUSBC1 PIUSBC100 PIUSBC10A12 PIUSBC10A9 PIUSBC10A8 PIUSBC10A7 PIUSBC10A6 PIUSBC10A5 PIUSBC10A4 PIUSBC10A1 PIUSBC10B1 PIUSBC10B4 PIUSBC10B5 PIUSBC10B6 PIUSBC10B7 PIUSBC10B8 PIUSBC10B9 PIUSBC10B12 COR10 PIR1002 PIR1001 COR11 PIC1301 PIC1302 COC13 PIR1101 PIR1102 COD4 PID401 PID402 COD3 PID301 PID302 COD7 PID701 PID702 11223344DDCCBBAATitleNumberRevisionSizeA4Date:2021/11/1Sheet ofFile:E:\\\\..\\2.POWER.SchDocDrawn By:type-CDCDCGNDGNDB1VBUSB4CC2B5DP2B6DN2B7SBU2B8VBUSB9GNDB1200000000GNDA1VBUSA4CC1A5DP1A6DN1A7SBU1A8VBUSA9GNDA12USBC1USB3.1C16PFSMTGNDGNDUSB_DMUSB_DMUSB_DPUSB_DPVBUSVBUSVBUSVBUSD3ESD9L5.0ST5GD4ESD9L5.0ST5GD2SMBJ6.5CAGND1SW2VIN3VFB4EN5VBST6U3TPS563201DDCRGND2.2uHL1WPN4020H2R2MTC90.1uFR710KC120.1uFGNDGND+5V+3.8V+5VR1110KR1040.2KC130.1uFGND+3.8VD54.7KR8GND+3.8VC722uF 10VC1022uF 10VVCC_1V8C84.7uFR2110KVIN1GND2EN3NC4VOUT5U6ME6212C18M5GGNDGNDC114.7uFGND+5VD7SS34VBUS+5V
COC3 PIC301 PIC302 COCARD1 PICARD10C1 PICARD10C2 PICARD10C3 PICARD108 PICARD109 PICARD1010 PICARD1011 PICARD10C5 PICARD10C6 PICARD10C7 PICARD10CD PIR1202 COR12 PIR1201 PIU501 PIU503 PIU504 PIU505 PIU506 COU5 PIU502 11223344DDCCBBAATitleNumberRevisionSizeA4Date:2021/11/1Sheet ofFile:E:\\\\..\\4.SIM-CARD.SchDocDrawn By:123456U5USIM1_VDDUSIM1_RSTUSIM1_CLKUSIM1_DATAGND10KR12USIMGNDVCCC1RSTC2CLKC3I/OC7VPPC6GNDC5CDCDEP8EP9EP10EP11CARD1SMN-303GNDC30.1uFUSIM_DET
COJ5 PIJ501 PIJ502 PIJ503 PIJ504 PIJ505 PIJ506 PIJ507 PIJ508 PIJ509 PIJ5010 PIJ5011 PIJ5012 PIJ5013 PIJ5014 PIJ5015 COJ6 PIJ601 PIJ602 PIJ603 PIJ604 PIJ605 PIJ606 PIJ607 PIJ608 PIJ609 PIJ6010 PIJ6011 PIJ6012 PIJ6013 PIJ6014 PIJ6015 COU4 PIU409 PIR501 PIR502 COR5 COS1 PIS101 PIS102 COR17 COS2 PIR1702 PIR1701 PIS201 PIS202 COR18 PIR1802 PIR1801 COR2 PIR201 PIR202 PIC402 COC4 PIC401 PIC502 COC5 PIC501 PIR602 COR6 PIU405 PIR601 PIU406 PIC1702 PIC1701 COC17 PIU407 PIU402 PIU408 PIU403 PIU404 PIU401 PIU4024 PIU4023 PIU4022 PIU4021 PIU4020 PIU4019 PIU4018 PIU4017 PIU4016 PIU4015 PIU4014 PIU4013 PIU4012 PIU4011 PIU4010 PIU400 COR26 COR27 PIR2602 PIR2702 PIR2601 PIR2701 COR28 COR29 PIR2802 PIR2902 PIR2801 PIR2901 11223344DDCCBBAATitleNumberRevisionSizeA4Date:2021/11/1Sheet ofFile:E:\\\\..\\6.GPIO+UART.SchDocDrawn By:GPIOAUX_RXD_1V8AUX_TXD_1V8GNDD_TXD_1V8D_RXD_1V8S1S2GNDVDD_EXTPOWRKEYPIN19VBUSRI_SCI1GND2D+3D-4VIO5VDD6REGIN7VBUS8-RST9CTS_ECI10RTS_ECI11RXD_ECI12TXD_ECI13GPIO.1_ECI14GPIO.0_ECI15NC16RI_ECI17CTS_SCI18RTS_SCI19RXD_SCI20TXD_SCI21GPIO.2_SCI22GPIO.1_SCI23GPIO.0_SCI24GND0U4CP2105GND1uFC17R5NC1uFC4C50.1uFGNDGNDR6NCR20RADC_INM_TXD_1V8M_RXD_1V8PIN19PIN25PIN33PIN30PIN31PIN32USB_DMUSB_DPM_RXD_1V8M_TXD_1V8R260RR270RR280RR290RD_RXD_1V8D_TXD_1V8PIN3PIN4PIN5PIN6PIN20PIN21PIN22PIN23123456789101112131415J5Header 15123456789101112131415J6Header 15R170RR180RUSB_BOOTI2C_SCL_EC800NI2C_SDA_EC800N+3.8VRESETGNDVCC_1V8VCC_1V8+5VEC800N不焊接CP2105
'
|
[
"Online documentation, QuecPython community, online support: QQ group 445121768."
] | 682
|
multifieldqa_en
|
en
| null |
ec016e90ac78727f3c4aa176db472724bda53c07cb8cb696
|
What are the symptoms of alpha thalassemia major?
|
Thalassaemia minor | definition of Thalassaemia minor by Medical dictionary
Thalassaemia minor | definition of Thalassaemia minor by Medical dictionary
https://medical-dictionary.thefreedictionary.com/Thalassaemia+minor
(redirected from Thalassaemia minor)
Related to Thalassaemia minor: thalassaemia major
Thalassemia describes a group of inherited disorders characterized by reduced or absent amounts of hemoglobin, the oxygen-carrying protein inside the red blood cells. There are two basic groups of thalassemia disorders: alpha thalassemia and beta thalassemia. These conditions cause varying degrees of anemia, which can range from insignificant to life threatening.
All types of thalassemias are considered quantitative diseases of hemoglobin, because the quantity of hemoglobin produced is reduced or absent. Usual adult hemoglobin is made up of three components: alpha globin, beta globin, and heme. Thalassemias are classified according to the globin that is affected, hence the names alpha and beta thalassemia. Although both classes of thalassemia affect the same protein, the alpha and beta thalassemias are distinct diseases that affect the body in different ways.
Beta thalassemia may be the most best-known type of thalassemia and is also called Cooley's anemia. It is caused by a change in the gene for the beta globin component of hemoglobin. Beta thalassemia causes variable anemia that can range from moderate to severe, depending in part on the exact genetic change underlying the disease. Beta thalassemia can be classified based on clinical symptoms. Beta thalassemia major usually causes severe anemia that can occur within months after birth. If left untreated, severe anemia can result in insufficient growth and development, as well as other common physical complications that can lead to a dramatically decreased life-expectancy. Fortunately, in developed countries beta thalassemia is usually identified by screening in the newborn period, before symptoms have developed. Children who are identified early can be started on ongoing blood transfusion therapy as needed. Although transfusion therapy prevents many of the complications of severe anemia, the body is unable to eliminate the excess iron contained in the transfused blood. Over time, the excess iron deposits in tissues and organs, resulting in damage and organ failure. Another medication must be administered to help the body eliminate the excess iron and prevent iron-over-load complications. Beta thalassemia intermedia describes the disease in individuals who have moderate anemia that only requires blood transfusions intermittently, if at all.
Alpha thalassemia is the result of changes in the genes for the alpha globin component of hemoglobin. There are two main types of alpha thalassemia disease: hemoglobin H disease and alpha thalassemia major. The two diseases are quite different from beta thalassemia as well as from one another. Individuals with hemoglobin H disease can experience events of hemolytic anemia—anemia caused by the rapid breakdown of the red blood cells. These events are thought to be triggered by various environmental causes, such as infection and/or exposure to certain chemicals. Hemoglobin H disease is in most cases milder than beta thalassemia. It does not generally require transfusion therapy. Alpha thalassemia major is a very serious disease that results in severe anemia that begins even before birth. Most affected babies do not survive to be born or die shortly after birth.
The thalassemias are among the most common genetic diseases worldwide. Both alpha and beta thalassemia have been described in individuals of almost every ancestry, but the conditions are more common among certain ethnic groups. Unaffected carriers of all types of thalassemia traits do not experience health problems. In fact, the thalassemia trait is protective against malaria, a disease caused by blood-borne parasites transmitted through mosquito bites. According to a widely accepted theory, most genetic changes—mutations—that cause thalassemia occurred multiple generations ago. Coincidentally, these mutations increased the likelihood that carriers would survive malaria infection. Survivors passed the mutation onto their offspring, and the trait became established throughout areas where malaria is common. As populations migrated, so did the thalassemia traits.
Beta thalassemia trait is seen most commonly in people with the following ancestry: Mediterranean (including North African, and particularly Italian and Greek), Middle Eastern, Indian, African, Chinese, and Southeast Asian (including Vietnamese, Laotian, Thai, Singaporean, Filipino, Cambodian, Malaysian, Burmese, and Indonesian). Alpha-thalassemia trait is seen with increased frequency in the same ethnic groups. However, there are different types of alpha thalassemia traits within these populations. The frequency of hemoglobin H disease and alpha thalassemia major depends on the type of alpha thalassemia trait. The populations in which alpha thalassemia diseases are most common include Southeast Asians and Chinese (particularly Southern Chinese).
It is difficult to obtain accurate prevalence figures for various types of thalassemia within different populations. This difficulty arises due to testing limitations in determining exact genetic diagnoses, as well as the fact that many studies have focused on small, biased hospital populations.
Two studies reflect prevalence figures that can be helpful counseling families and determining who to screen for beta thalassemia. Between the years of 1990 and 1996, the State of California screened more than 3.1 million infants born in the state for beta thalassemia. Approximately 1 in 114,000 infants had beta thalassemia major, with prevalence rates being highest among Asian Indians (about one in 4,000), Southeast Asians (about one in 10,000), and Middle Easterners (about one in 7,000). Another type of beta thalassemia disease, E/beta thalassemia, was represented in approximately one in 110,000 births, all of which occurred in families of Southeast Asian ancestry. Among Southeast Asians, the prevalence of E/beta thalassemia was approximately one in 2,600 births. This is in keeping with the observation that hemoglobin E trait carrier rates are relatively high within the Southeast Asian population: 16% in a study of 768 immigrants to California, and up to 25% in some specific Southeast Asian populations such as Cambodians. While these California studies address some of the limitations of earlier population studies, the pattern observed in California is expected to be different in other areas of the United States and the world. For example, Italians are underrepresented in this population when compared to the population of the East Coast of the United States.
Determining prevalence figures for alpha thalassemia is even more difficult due to increased limitations in diagnostic testing. All types of alpha thalassemia disease are most common among people of Southeast Asian and Chinese descent, for reasons that become clearer with an understanding of the underlying genetics of alpha thalassemia. One study of 500 pregnant women in Northern Thailand estimated a frequency of one in 500 pregnancies affected by alpha thalassemia major, for example. Prevalence of alpha thalassemia disease is significantly lower in the United States primarily because of immigration patterns; although at least one state, California, has observed growing hemoglobin H disease incidence rates that are high enough to justify universal newborn screening for the condition.
Humans normally make several types of the oxygen-carrying protein hemoglobin. An individual's stage in development determines whether he or she makes primarily embryonic, fetal, or adult hemoglobins. All types of hemoglobin are made of three components: heme, alpha (or alpha-like) globin, and beta (or beta-like) globin. All types of thalassemia are caused by changes in either the alpha- or beta-globin gene. These changes cause little or no globin to be produced. The thalassemias are, therefore, considered quantitative hemoglobin diseases. All types of thalassemias are recessively inherited, meaning that a genetic change must be inherited from both the mother and the father. The severity of the disease is influenced by the exact thalassemia mutations inherited, as well as other genetic and environmental factors. There are rare exceptions, notably with beta thalassemia, where globin gene mutations exhibit a dominant pattern of inheritance in which only one gene needs to be altered in order to see disease expression. Scientists continue to study the causes. For instance, a new mutation for alpha-thalassemia was discovered for the first time among Iranian patients in 2004.
BETA-THALASSEMIA. Most individuals have two normal copies of the beta globin gene, which is located on chromosome 11 and makes the beta globin component of normal adult hemoglobin, hemoglobin A. There are approximately 100 genetic mutations that have been described that cause beta thalassemia, designated as either beta0 or beta + mutations. No beta globin is produced with a beta0 mutation, and only a small fraction of the normal amount of beta globin is produced with a beta + mutation.
When an individual has one normal beta globin gene and one with a beta thalassemia mutation, he or she is said to carry the beta thalassemia trait. Beta thalassemia trait, like other hemoglobin traits, is protective against malaria infection. Trait status is generally thought not to cause health problems, although some women with beta thalassemia trait may have an increased tendency toward anemia during pregnancy.
When two members of a couple carry the beta thalassemia trait, there is a 25% chance that each of their children will inherit beta thalassemia disease by inheriting two beta thalassemia mutations, one from each parent. The clinical severity of the beta thalassemia disease—whether an individual has beta thalassemia intermedia or beta thalassemia major—will depend largely on whether the mutations inherited are beta0 thalassemia or beta + thalassemia mutations. Two beta0 mutations generally lead to beta thalassemia major, and two beta+ thalassemia mutations generally lead to beta thalassemia intermedia. Inheritance of one beta0 and one beta + thalassemia mutation tends to be less predictable.
Although relatively uncommon, there are other thalassemia-like mutations that can affect the beta globin gene. Hemoglobin E is the result of a substitution of a single nucleotide. This change results in a structurally altered hemoglobin that is produced in decreased amounts. Therefore, hemoglobin E is unique in that it is both a quantitative (i.e. thalassemia-like) and qualitative trait. When co-inherited with a beta thalassemia trait, it causes a disease that is almost indistinguishable from beta thalassemia disease. Large deletions around and including the beta globin gene can lead to delta/beta thalassemia or hereditary persistence of fetal hemoglobin (HPFH). Interestingly, delta/beta thalassemia trait behaves very similarly to beta thalassemia trait in its clinical manifestations. However, HPFH trait does not tend to cause hemoglobin disease when co-inherited with a second thalassemia or other beta globin mutation.
ALPHA-THALASSEMIA. Most individuals have four normal copies of the alpha globin gene, two copies on each chromosome 16. These genes make the alpha globin component of normal adult hemoglobin, which is called hemoglobin A. Alpha globin is also a component of fetal hemoglobin and the other major adult hemoglobin called hemoglobin A2. Mutations of the alpha globin genes are usually deletions of the gene, resulting in absent production of alpha globin. Since there are four genes (instead of the usual two) to consider when looking at alpha globin gene inheritance, there are several alpha globin types that are possible.
Absence of one alpha globin gene leads to a condition known as silent alpha thalassemia trait. This condition causes no health problems and can be detected only by special genetic testing. Alpha thalassemia trait occurs when two alpha globin genes are missing. This can occur in two ways. The genes may be deleted from the same chromosome, causing the 'cis' type of alpha thalassemia trait. Alternately, they may be deleted from different chromosomes, causing the 'trans' type of alpha thalassemia trait. In both instances, there are no associated health problems, although the trait status may be detected by more routine blood screening.
Hemoglobin H disease results from the deletion of three alpha globin genes, such that there is only one functioning gene. Typically, this can occur when one parent carries the silent alpha thalassemia trait, and the other parent carries the 'cis' type of the alpha thalassemia trait. In this situation, there is a 25% chance for hemoglobin H disease in each of such a couple's children.
Hemoglobin H disease-like symptoms can also be a part of a unique condition called alpha thalassemia mental retardation syndrome. Alpha thalassemia mental retardation syndrome can be caused by a deletion of a significant amount of chromosome 16, affecting the alpha globin genes. This is usually not inherited, but rather occurs sporadically in the affected individual. Affected individuals have mild hemoglobin H disease, mild-to-moderate mental retardation, and characteristic facial features. This syndrome can also occur as a sex-linked form in which a mutation is inherited in a particular gene on the X-chromosome. This gene influences alpha globin production, as well as various other developmental processes. Individuals affected with this form of the syndrome tend to have more severe mental retardation, delayed development, nearly absent speech, characteristic facial features, and genital-urinary abnormalities. The remaining discussion will focus only on aspects of hemoglobin H disease.
Alpha thalassemia major results from the deletion of all four alpha globin genes, such that there are no functioning alpha globin genes. This can occur when both parents carry the 'cis' type of the alpha thalassemia trait. In this situation, there is a 25% chance for alpha thalassemia major in each of such a couple's children.
Beta thalassemia major is characterized by severe anemia that can begin months after birth. In the United States and other developed countries beta thalassemia is identified and treated early and effectively. Therefore, the following discussion of symptoms applies primarily to affected individuals in the past and unfortunately in some underdeveloped countries now. If untreated, beta thalassemia major can lead to severe lethargy, paleness, and delays in growth and development. The body attempts to compensate by producing more blood, which is made inside the bones in the marrow. However, this is ineffective without the needed genetic instructions to make enough functioning hemoglobin. Instead, obvious bone expansion and changes occur that cause characteristic facial and other changes in appearance, as well as increased risk of fractures. Severe anemia taxes other organs in the body—such as the heart, spleen, and liver—which must work harder than usual. This can lead to heart failure, as well as enlargement and other problems of the liver and spleen. When untreated, beta thalassemia major generally results in childhood death, usually due to heart failure. In 2004, the first known heart attack associated with beta thalassemia major was reported. Fortunately, in developed countries diagnosis is usually made early, often before symptoms have begun. This allows for treatment with blood transfusion therapy, which can prevent most of the complications of the severe anemia caused by beta thalassemia major. Individuals with beta thalassemia intermedia have a more moderate anemia that may only require treatment with transfusion intermittently, such as when infections occur and stress the body. As a person with beta thalassemia intermedia gets older, however, the need for blood transfusions may increase to the point that they are required on a regular basis. When this occurs their disease becomes more similar to beta thalassemia major. Other genetic and environmental factors can influence the course of the disease as well. For example, co-inheritance of one or two alpha thalassemia mutations can tend to ameliorate some of the symptoms of beta thalassemia disease, which result in part from an imbalance in the amount of alpha- and beta-globin present in the red blood cells.
Hemoglobin h disease
Absence of three alpha globin genes causes an imbalance of alpha and beta globin proteins in the red blood cells. The excess beta globin proteins tend to come together to form hemoglobin H, which is unable to release oxygen to the tissues. In addition, hemoglobin H tends to precipitate out in the cells, causing damage to the red blood cell membrane. When affected individuals are exposed to certain drugs and chemicals known to make the membrane more fragile, the cells are thought to become vulnerable to breakdown in large numbers, a complication called hemolytic anemia. Fever and infection are also considered to be triggers of hemolytic anemia in hemoglobin H disease. This can result in fatigue, paleness, and a yellow discoloration of the skin and whites of eyes called jaundice. Usually, the anemia is mild enough not to require treatment. Severe anemia events may require blood transfusion, however, and are usually accompanied by such other symptoms as dark feces or urine and abdominal or back pain. These events are uncommon in hemoglobin H disease, although they occur more frequently in a more serious type of hemoglobin H disease called hemoglobin H/Constant Spring disease. Individuals effected with this type of hemoglobin H disease are also more likely to have enlargement of and other problems with the spleen.
Alpha thalassemia major
Because alpha globin is a necessary component of all major hemoglobins and some minor hemoglobins, absence of all functioning alpha globin genes leads to serious medical consequences that begin even before birth. Affected fetuses develop severe anemia as early as the first trimester of pregnancy. The placenta, heart, liver, spleen, and adrenal glands may all become enlarged. Fluid can begin collecting throughout the body as early as the start of the second trimester, causing damage to developing tissues and organs. Growth retardation is also common. Affected fetuses usually miscarry or die shortly after birth. In addition, women carrying affected fetuses are at increased risk of developing complications of pregnancy and delivery. Up to 80% of such women develop toxemia, a disturbance of metabolism that can potentially lead to convulsions and coma. Other maternal complications include premature delivery and increased rates of delivery by cesarean section, as well as hemorrhage after delivery.
Thalassemia may be suspected if an individual shows signs that are suggestive of the disease. In all cases, however, laboratory diagnosis is essential to confirm the exact diagnosis and to allow for the provision of accurate genetic counseling about recurrence risks and testing options for parents and affected individuals. Screening is likewise recommended to determine trait status for individuals of high-risk ethnic groups.
The following tests are used to screen for thalassemia disease and/or trait:
hemoglobin electrophoresis with quantitative hemoglobin A2 and hemoglobin F
free erythrocyte-protoporphyrin (or ferritin or other studies of serum iron levels)
A complete blood count will identify low levels of hemoglobin, small red blood cells, and other red blood cell abnormalities that are characteristic of a thalassemia diagnosis. Since thalassemia trait can sometimes be difficult to distinguish from iron deficiency, tests to evaluate iron levels are important. A hemoglobin electrophoresis is a test that can help identify the types and quantities of hemoglobin made by an individual. This test uses an electric field applied across a slab of gel-like material. Hemoglobins migrate through this gel at various rates and to specific locations, depending on their size, shape, and electrical charge. Isoelectric focusing and high-performance liquid chromatography (HPLC) use similar principles to separate hemoglobins and can be used instead of or in various combinations with hemoglobin electrophoresis to determine the types and quantities of hemoglobin present. Hemoglobin electrophoresis results are usually within the normal range for all types of alpha thalassemia. However, hemoglobin A2 levels and sometimes hemoglobin F levels are elevated when beta thalassemia disease or trait is present. Hemoglobin electrophoresis can also detect structurally abnormal hemoglobins that may be co-inherited with a thalassemia trait to cause thalassemia disease (i.e., hemoglobin E) or other types of hemoglobin disease (i.e., sickle hemoglobin). Sometimes DNA testing is needed in addition to the above screening tests. This can be performed to help confirm the diagnosis and establish the exact genetic type of thalassemia.
Diagnosis of thalassemia can occur under various circumstances and at various ages. Several states offer thalassemia screening as part of the usual battery of blood tests done for newborns. This allows for early identification and treatment. Thalassemia can be identified before birth through the use of prenatal diagnosis. Chorionic villus sampling (CVS) can be offered as early as 10 weeks of pregnancy and involves removing a sample of the placenta made by the baby and testing the cells. CVS carries a risk of causing a miscarriage that is between 0.5%-1%. Amniocentesis is generally offered between 15 and 22 weeks of pregnancy, but can sometimes be offered earlier. Two to three tablespoons of the fluid surrounding the baby is removed. This fluid contains fetal cells that can be tested. The risk of miscarriage associated with amniocentesis ranges from 0.33-0.5%. Pregnant woman and couples may choose prenatal testing in order to prepare for the birth of a baby that may have thalassemia. Alternately, knowing the diagnosis during pregnancy allows for the option of pregnancy termination. Preimplantation genetic diagnosis (PGD) is a relatively new technique that involves in-vitro fertilization followed by genetic testing of one cell from each developing embryo. Only the embryos unaffected by sickle cell disease are transferred back into the uterus. PGD is currently available on a research basis only and is relatively expensive.
Individuals with beta thalassemia major receive regular blood transfusions, usually on a monthly basis. This helps prevent severe anemia and allows for more normal growth and development. Transfusion therapy does have limitations, however. Individuals can develop reactions to certain proteins in the blood—called a transfusion reaction. This can make locating appropriately matched donor blood more difficult. Although blood supplies in the United States are very safe, particularly relative to the past and to other areas of the world, there remains an increased risk of exposure to such blood-borne infections as hepatitis. Additionally, the body is not able to get rid of the excess iron that accompanies each transfusion. An additional medication called desferoxamine is administered, usually five nights per week over a period of several hours, using an automatic pump that can be used during sleep or taken anywhere the person goes. This medication is able to bind to the excess iron, which can then be eliminated through urine. If desferoxamine is not used regularly or is unavailable, iron overload can develop and cause tissue damage and organ damage and failure. The heart, liver, and endocrine organs are particularly vulnerable. Desferoxamine itself may rarely produce allergic or toxic side effects, including hearing damage. Signs of desferoxamine toxicity are screened for and generally develop in individuals who overuse the medication when body iron levels are sufficiently low. Overall, however, transfusion and desferoxamine therapy have increased the life expectancy of individuals with the most severe types of beta thalassemia major to the 4th or 5th decade. This can be expected to improve with time and increased developments in treatment, as well as for those with more mild forms of the disease.
New treatments offer additional options for some individuals with beta thalassemia major. There are various medications that target the production of red blood cells (i.e. erythropoeitin) or fetal hemoglobin (i.e. hydroxyurea and butyrate). Their effectiveness in ameliorating the severity of beta thalassemia is currently being investigated. Another promising new treatment is bone marrow transplantation, in which the bone marrow of an affected individual is replaced with the bone marrow of an unaffected donor. If successful, this treatment can provide a cure. However, there is an approximately 10-15% chance the procedure could be unsuccessful (i.e. the thalassemia returns); result in complications (i.e. graft-versus-host disease); or result in death. The risk for specific individuals depends on current health status, age, and other factors. Because of the risks involved and the fact that beta thalassemia is a treatable condition, transplant physicians require a brother or sister donor who has an identically matched tissue type, called HLA type. HLA type refers to the unique set of proteins present on each individual's cells, which allows the immune system to recognize "self" from "foreign." HLA type is genetically determined, so there is a 25% chance for two siblings to be a match. Transplant physicians and researchers are also investigating ways to improve the safety and effectiveness of bone marrow transplantation. Using newborn sibling umbilical cord blood—the blood from the placenta that is otherwise discarded after birth but contains cells that can go on to make bone marrow—seems to provide a safer and perhaps more effective source of donor cells. Donors and recipients may not have to be perfect HLA matches for a successful transplant using cord blood cells. Trials are also underway to determine the effectiveness of "partial transplants," in which a safer transplant procedure is used to replace only a percentage of the affected individual's bone marrow. Other possible treatments on the horizon may include gene therapy techniques aimed at increasing the amount of normal hemoglobin the body is able to make.
Hemoglobin H disease is a relatively mild form of thalassemia that may go unrecognized. It is not generally considered a condition that will reduce one's life expectancy. Education is an important part of managing the health of an individual with hemoglobin H disease. It is important to be able to recognize the signs of severe anemia that require medical attention. It is also important to be aware of the medications, chemicals, and other exposures to avoid due to the theoretical risk they pose of causing a severe anemia event. When severe anemia occurs, it is treated with blood transfusion therapy. For individuals with hemoglobin H disease, this is rarely required. For those with the hemoglobin H/Constant Spring form of the disease, the need for transfusions may be intermittent or ongoing, perhaps on a monthly basis and requiring desferoxamine treatment. Individuals with this more severe form of the disease may also have an increased chance of requiring removal of an enlarged and/or overactive spleen.
Anemia — A blood condition in which the level of hemoglobin or the number of red blood cells falls below normal values. Common symptoms include paleness, fatigue, and shortness of breath.
Bilirubin — A yellow pigment that is the end result of hemoglobin breakdown. This pigment is metabolized in the liver and excreted from the body through the bile. Bloodstream levels are normally low; however, extensive red cell destruction leads to excessive bilirubin formation and jaundice.
Bone marrow — A spongy tissue located in the hollow centers of certain bones, such as the skull and hip bones. Bone marrow is the site of blood cell generation.
Bone marrow transplantation — A medical procedure used to treat some diseases that arise from defective blood cell formation in the bone marrow. Healthy bone marrow is extracted from a donor to replace the marrow in an ailing individual. Proteins on the surface of bone marrow cells must be identical or very closely matched between a donor and the recipient.
Desferoxamine — The primary drug used in iron chelation therapy. It aids in counteracting the life-threatening buildup of iron in the body associated with long-term blood transfusions.
Globin — One of the component protein molecules found in hemoglobin. Normal adult hemoglobin has a pair each of alpha-globin and beta-globin molecules.
Heme — The iron-containing molecule in hemoglobin that serves as the site for oxygen binding.
Hemoglobin — Protein-iron compound in the blood that carries oxygen to the cells and carries carbon dioxide away from the cells.
Hemoglobin A — Normal adult hemoglobin that contains a heme molecule, two alpha-globin molecules, and two beta-globin molecules.
Hemoglobin electrophoresis — A laboratory test that separates molecules based on their size, shape, or electrical charge.
Hepatomegaly — An abnormally large liver.
HLA type — Refers to the unique set of proteins called human leukocyte antigens. These proteins are present on each individual's cell and allow the immune system to recognize 'self' from 'foreign'. HLA type is particularly important in organ and tissue transplantation.
Hydroxyurea — A drug that has been shown to induce production of fetal hemoglobin. Fetal hemoglobin has a pair of gamma-globin molecules in place of the typical beta-globins of adult hemoglobin. Higher-than-normal levels of fetal hemoglobin can ameliorate some of the symptoms of thalassemia.
Iron overload — A side effect of frequent blood transfusions in which the body accumulates abnormally high levels of iron. Iron deposits can form in organs, particularly the heart, and cause life-threatening damage.
Jaundice — Yellowing of the skin or eyes due to excess of bilirubin in the blood.
Mutation — A permanent change in the genetic material that may alter a trait or characteristic of an individual, or manifest as disease, and can be transmitted to offspring.
Placenta — The organ responsible for oxygen and nutrition exchange between a pregnant mother and her developing baby.
Red blood cell — Hemoglobin-containing blood cells that transport oxygen from the lungs to tissues. In the tissues, the red blood cells exchange their oxygen for carbon dioxide, which is brought back to the lungs to be exhaled.
Screening — Process through which carriers of a trait may be identified within a population.
Splenomegaly — Enlargement of the spleen.
Because alpha thalassemia major is most often a condition that is fatal in the prenatal or newborn period, treatment has previously been focused on identifying affected pregnancies in order to provide appropriate management to reduce potential maternal complications. Pregnancy termination provides one form of management. Increased prenatal surveillance and early treatment of maternal complications is an approach that is appropriate for mothers who wish to continue their pregnancy with the knowledge that the baby will most likely not survive. In recent years, there have been a handful of infants with this condition who have survived long-term. Most of these infants received experimental treatment including transfusions before birth, early delivery, and even bone marrow transplantation before birth, although the latter procedure has not yet been successful. For those infants that survive to delivery, there seems to be an increased risk of developmental problems and physical effects, particularly heart and genital malformations. Otherwise, their medical outlook is similar to a child with beta thalassemia major, with the important exception that ongoing, life-long blood transfusions begin right at birth.
As discussed above, the prognosis for individuals with the most serious types of thalassemia has improved drastically in the last several years following recent medical advances in transfusion, chemo-, and transplantation therapy. Advances continue and promise to improve the life expectancy and quality of life further for affected individuals.
"First Known Heart Attack Associated With Beta-thalassemia Major Reported." Heart Disease Weekly February 22, 2004: 10.
"Novel Alpha-thalassemia Mutations Identified." Hematology Week January 26, 2004: 19.
Children's Blood Foundation. 333 East 38th St., Room 830, New York, NY 10016-2745. (212) 297-4336. cfg@nyh.med.cornell.edu.
Cooley's Anemia Foundation, Inc. 129-09 26th Ave. #203, Flushing, NY 11354. (800) 522-7222 or (718) 321-2873. http://www.thalassemia.org.
March of Dimes Birth Defects Foundation. 1275 Mamaroneck Ave., White Plains, NY 10605. (888) 663-4637. resourcecenter@modimes.org. http://www.modimes.org.
National Heart, Lung, and Blood Institute. PO Box 30105, Bethseda, MD 20824-0105. (301) 592-8573. nhlbiinfo@rover.nhlbi.nih.gov. http://www.nhlbi.nih.gov.
National Organization for Rare Disorders (NORD). PO Box 8923, New Fairfield, CT 06812-8923. (203) 746-6518 or (800) 999-6673. Fax: (203) 746-6481. http://www.rarediseases.org.
Bojanowski J. "Alpha Thalassemia Major: The Possibility of Long-Term Survival." Pamphlet from the Northern California Comprehensive Thalassemia Center. (1999).
Children's Hospital Oakland, Northern California Comprehensive Thalassemia Center website. http://www.thalassemia.com.
Cooley's Anemia Foundation, Inc. website. http://www.thalassemia.org/gohome.html.
Joint Center for Sickle Cell and Thalassemic Disorders website. http://cancer.mgh.harvard.edu/medOnc/sickle.htm.
[thal″ah-se´me-ah]
a heterogeneous group of hereditary hemolytic anemias marked by a decreased rate of synthesis of one or more hemoglobin polypeptide chains, classified according to the chain involved (α, β, δ); the two major categories are α- and β-thalassemia.
α-thalassemia (alpha-thalassemia) that caused by diminished synthesis of alpha chains of hemoglobin. The homozygous form is incompatible with life, the stillborn infant displaying severe hydrops fetalis. The heterozygous form may be asymptomatic or marked by mild anemia.
β-thalassemia (beta-thalassemia) that caused by diminished synthesis of beta chains of hemoglobin. The homozygous form is called t. major and the heterozygous form is called t. minor.
thalassemia ma´jor the homozygous form of β-thalassemia, in which hemoglobin A is completely absent; it appears in the newborn period and is marked by hemolytic, hypochromic, microcytic anemia; hepatosplenomegaly; skeletal deformation; mongoloid facies; and cardiac enlargement.
thalassemia mi´nor the heterozygous form of β-thalassemia; it is usually asymptomatic, but there may be mild anemia.
sickle cell–thalassemia a hereditary anemia involving simultaneous heterozygosity for hemoglobin S and thalassemia.
thal·as·se·mi·a
, thalassanemia (thal'ă-sē'mē-ă, thă-las-ă-nē'mē-ă),
Any of a group of inherited disorders of hemoglobin metabolism in which there is impaired synthesis of one or more of the polypeptide chains of globin; several genetic types exist, and the corresponding clinical picture may vary from barely detectable hematologic abnormality to severe and fatal anemia.
[G. thalassa, the sea, + haima, blood]
/thal·as·se·mia/ (thal″ah-se´me-ah) a heterogeneous group of hereditary hemolytic anemias marked by a decreased rate of synthesis of one or more hemoglobin polypeptide chains, classified according to the chain involved (α, β, δ); the two major categories are α- and β-thalassemia.
α-thalassemia that caused by diminished synthesis of alpha chains of hemoglobin. The homozygous form is incompatible with life, the stillborn infant displaying severe hydrops fetalis. The heterozygous form may be asymptomatic or marked by mild anemia.
β-thalassemia that caused by diminished synthesis of beta chains of hemoglobin. The homozygous form is called t. major and the heterozygous form is called t. minor.
thalassemia ma´jor the homozygous form of β, in which hemoglobin A is completely absent; it appears in the newborn period and is marked by hemolytic, hypochromic, microcytic anemia, hepatosplenomegaly, skeletal deformation, mongoloid facies, and cardiac enlargement.
thalassemia mi´nor the heterozygous form of β, usually asymptomatic, although there is sometimes mild anemia.
(thăl′ə-sē′mē-ə)
An inherited form of anemia occurring chiefly among people of Mediterranean descent, caused by faulty synthesis of part of the hemoglobin molecule. Also called Mediterranean anemia.
thal′as·se′mic adj.
[thal′əsē′mē·ə]
Etymology: Gk, thalassa, sea, a + haima, without blood
production and hemolytic anemia characterized by microcytic, hypochromic red blood cells. Thalassemia is caused by inherited deficiency of alpha- or beta-globin synthesis. See also hemochromatosis, hemosiderosis.
Beta thalassemia, clinical thalassemia, Cooley's anemia, Mediterranean anemia, thalassemia major Hematology A group of genetic diseases by underproduction of hemoglobin due to mutations in the beta globin gene, which is more common in Mediterraneans Heredity Parents are carriers–heterozygotes; one in 4 children is homozygous for the mutation and thus has full-blown disease Clinical See Anemia. Cf Sickle cell anemia.
α-thalassemia
Hemoglobin Barts Hematology An inherited condition caused by a defect in the synthesis of the Hb α chain; Hb Barts hemoglobinopathy is characterized by the presence of 4 gamma chains; it is more common in southeast Asians; the most severe form of alpha thalassemia causes stillbirth due to hydrops fetalis Heredity Parents are carriers–heterozygotes; one in 4 children is homozygous for the mutation and thus has full-blown disease Clinical Pallor, fatiguability, FTT, fever, infections, diarrhea Management Transfusions
Thalassemia major Hematology A hemoglobinopathy caused by a defect in the synthesis of Hb β chain Clinical Pallor, fatigability, FTT, fever due to infections, diarrhea, bone deformities, hepatosplenomegaly Management Transfusions, but iron overload can damage the heart, liver, and endocrine systems, ergo iron chelation–early use of deferiprone, deferoxamine ↓ transfusion-related iron overload and may protect against DM, cardiac disease, early death
δ-thalassemia
Hematology A condition characterized by a defect of Hb A2–α2δ2; because Hb A2 comprises only 3% of the circulating Hb, even its complete absence; δ-thalassemia has little clinical or hematologic impact
γ-thalassemia
Hematology A condition characterized by a defect of gamma–γ Hb chains found in Hb F–α2γ2; because Hb F is present primarily in the fetus and newborns, it is rarely seen outside of the neonatal period, but may cause transient neonatal hemolytic anemia.
, thalassanemia (thal'ă-sē'mē-ă, -ă-să-nē'mē-ă)
Any of a group of inherited disorders of hemoglobin metabolism in which there is impaired synthesis of one or more of the polypeptide chains of globin; several genetic types exist, and the corresponding clinical picture may vary from barely detectable hematologic abnormality to severe and fatal anemia. People of Mediterranean, extraction are more often affected than others by this type of anemia.
Synonym(s): thalassaemia, thalassanaemia.
Any of a group of inherited disorders of hemoglobin metabolism with impaired synthesis of one or more polypeptide chains of globin; several genetic types exist.
<a href="https://medical-dictionary.thefreedictionary.com/Thalassaemia+minor">thalassemia</a>
Barts hemoglobin
beta hemoglobinopathy
beta-delta thalassemia
beta-thalassaemia
Bite Cell
black gallstone
I know of a couple, totally unrelated and unbeknownst to them, who are silent carriers of Thalassaemia minor.
Pakistan: Genetic factor: All in the genes
But, unfortunately, when one person with thalassaemia minor carrier happens to marry another with the same diagnosis, there is a strong possibility that their child would be thalassaemia major, as happened in the case of Taneja.
' My life depends upon a monthly blood transfusion '
0] thalassaemia demonstrates variable severity, ranging from a condition similar to [beta] thalassaemia minor to something approaching thalassaemia major.
A retrospective review of homozygous haemoglobin E patients
Thal, Alan P.
thalame
thalamencephalic
thalamencephalon
thalamic
thalamic fasciculus
thalamic nucleus
thalamic pain syndrome
thalamic peduncle
thalamic radiation
thalamo-
thalamocoele
thalamocortical
thalamocortical fibers
thalamogeniculate artery
thalamolenticular
thalamoperforating artery
thalamostriate radiation
thalamotuberal artery
Thalassaemia minor
thalassaemiaor Cooley's disease
thalassemic facies
thalasso-
Thalassobacter
Thalassobacter utilis
thalassoplankton
thalassoposia
thalidomide neuropathy
Thalidomider
thallium poisoning
Thalarctos
THALAS
Thalasaemia
Thalassaemia Association of Malaysia
thalassaemia major
Thalassaemias
thalassaemic
thalassanaemia
Thalassemia Action Group
Thalassemia Clinical Research Network
thalassemia syndrome
|
[
"Severe anemia that begins even before birth."
] | 6,102
|
multifieldqa_en
|
en
| null |
d427e3ab7584a0e253bfb6a9d76626b726c79b57d5e39f2a
|
When did Simon English become the leader of the National Party?
|
Sir Simon William English (born 30 December 1961) is a New Zealand former National Party politician who served as the 39th prime minister of New Zealand from 2016 to 2017. He had previously served as the 17th deputy prime minister of New Zealand and minister of finance from 2008 to 2016 under John Key and the Fifth National Government.
A farmer and public servant before entering politics, English was elected to the New Zealand Parliament in as the National Party's candidate in the Wallace electorate. He was elevated to Cabinet in 1996 and in 1999 was made minister of finance, although he served for less than a year due to his party's loss at the 1999 general election. In October 2001, English replaced Jenny Shipley as the leader of the National Party (and consequently as Leader of the Opposition). He led the party to its worst defeat at the 2002 general election, and as a consequence, in October 2003 he was replaced as leader by Don Brash.
In November 2006, after Brash's resignation, English became deputy leader under John Key. After National's victory at the 2008 general election, he became deputy prime minister and was also made minister of finance for the second time. Under English's direction New Zealand's economy maintained steady growth during National's three terms of government. He became a list-only MP after stepping down as an electorate MP at the 2014 general election.
John Key resigned as leader of the National Party and prime minister in December 2016. English won the resulting leadership election unopposed and was sworn in as prime minister on 12 December 2016. His tenure was only ten months, and included a three-month election campaign. In the 2017 general election, National won the largest number of seats but fell short of a majority. The parties holding the balance of power declined to support the existing government, and English was subsequently replaced as prime minister by Jacinda Ardern, leader of the Labour Party. English initially continued on as Leader of the Opposition, but resigned as leader of the National Party on 27 February 2018 and left parliament two weeks later.
Early life
English was born on 30 December 1961 at Lumsden Maternity Centre in Lumsden. He is the eleventh of twelve children of Mervyn English and Norah (née O'Brien) English. His parents purchased Rosedale, a mixed sheep and cropping farm in Dipton, Southland from Mervyn's uncle, Vincent English, a bachelor, in 1944. English was born in the maternity unit at Lumsden.
English attended St Thomas's School in Winton, then boarded at St. Patrick's College in Upper Hutt, where he became head boy. He played in the first XV of the school's rugby team. English went on to study commerce at the University of Otago, where he was a resident at Selwyn College, and then completed an honours degree in English literature at Victoria University of Wellington.
After finishing his studies, English returned to Dipton and farmed for a few years. From 1987 to 1989, he worked in Wellington as a policy analyst for the New Zealand Treasury, at a time when the free market policies favoured by Labour's finance minister Roger Douglas (known collectively as "Rogernomics") were being implemented.
English joined the National Party in 1980, while at Victoria University. He served for a period as chairman of the Southland branch of the Young Nationals, and became a member of the Wallace electorate committee. After moving to Wellington, he served for periods on the Island Bay and Miramar electorate committees, respectively.
Fourth National Government (1990–1999)
At the 1990 general election, English stood as the National candidate in Wallace, replacing the retiring Derek Angus, and was elected with a large majority. He would hold this seat, renamed Clutha-Southland in 1996, until 2014. He and three other newly elected National MPs (Tony Ryall, Nick Smith, and Roger Sowry) were soon identified as rising stars in New Zealand politics, and at various points were dubbed the "brat pack", the "gang of four", and the "young Turks". In his first term in parliament, English chaired a select committee into social services. He was made a parliamentary under-secretary in 1993, serving under the Minister of Health.
First period in cabinet (1996–1999)
In early 1996, English was elevated to cabinet by Prime Minister Jim Bolger, becoming the Minister for Crown Health Enterprises and Associate Minister of Education (to Wyatt Creech). He was 34 at the time, becoming the cabinet's youngest member. After the 1996 general election, the National Party was forced into a coalition with New Zealand First to retain government. In the resulting cabinet reshuffle, English emerged as Minister of Health. However, as a condition of the coalition agreement, NZ First's Neil Kirton (a first-term MP) was made Associate Minister of Health, effectively becoming English's deputy. This arrangement was described in the press as a "shotgun marriage", and there were frequent differences of opinion between the two ministers. After their relationship became unworkable, Kirton was sacked from the role in August 1997, with the agreement of NZ First leader Winston Peters.
As Minister of Health, English was responsible for continuing the reforms to the public health system that National had begun after the 1990 general election. The reforms were unpopular, and health was perceived as one of the government's weaknesses, with the health portfolio consequently being viewed as a challenge. English believed that the unpopularity of the reforms was in part due to a failure in messaging, and encouraged his National colleagues to avoid bureaucratic and money-focused language (such as references to "balance sheets" and "user charges") and instead talk about the improvements to services the government's reforms would bring. He also rejected the idea that public hospitals could be run as commercial enterprises, a view which some of his colleagues had previously promoted.
By early 1997, as dissatisfaction with Bolger's leadership began to grow, English was being touted as a potential successor, along with Jenny Shipley and Doug Graham. His age (35) was viewed as the main impediment to a successful leadership run. National's leadership troubles were resolved in December 1997, when Bolger resigned and Shipley was elected to the leadership unopposed. English had been a supporter of Bolger as leader, but Shipley reappointed him Minister of Health in her new cabinet.
English was promoted to Minister of Finance in a reshuffle in January 1999, a position which was at the time subordinate to the Treasurer, Bill Birch. After a few months, the pair switched positions as part of Birch's transition to retirement, with English assuming the senior portfolio. In early interviews, he emphasised his wish to be seen as a pragmatist rather than an ideologue, and said that the initiatives of some of his predecessors (Roger Douglas's "Rogernomics" and Ruth Richardson's "Ruthanasia") had focused on "fruitless, theoretical debates" when "people just want to see problems solved".
Opposition (1999–2008)
After the National Party lost the 1999 election to Helen Clark's Labour Party, English continued on in the shadow cabinet as National's spokesperson for finance. He was elected deputy leader of the party in February 2001, following the resignation of Wyatt Creech, with Gerry Brownlee being his unsuccessful opponent.
Leader of the Opposition
In October 2001, after months of speculation, Jenny Shipley resigned as leader of the National Party after being told she no longer had the support of the party caucus. English was elected as her replacement unopposed (with Roger Sowry as his deputy), and consequently became Leader of the Opposition. However, he did not openly organise against Shipley, and according to The Southland Times "there was almost an element of 'aw, shucks, I'll do it then' about Mr English's ascension".
Aged 39 when he was elected, English became the second-youngest leader in the National Party's history, after Jim McLay (who was 38 when elected in 1984). He also became only the third Southlander to lead a major New Zealand political party, after Joseph Ward and Adam Hamilton. However, English failed to improve the party's performance. In the 2002 election, National suffered its worst electoral defeat ever, gaining barely more than twenty percent of the vote. English described it as "the worst day of my political life". Both party insiders and the general public were split as to how much to blame him for the loss, but most of the party believed that English would be able to rebuild National's support.
By late 2003, however, National's performance in opinion polls remained poor. The party had briefly increased its popularity in the year following the election, but by October its support had fallen to levels only slightly better than what it achieved in the last ballot. English also appeared in a boxing match for a charity against entertainer Ted Clarke. This did not boost his polling or that of the National party either, with suggestions that it devalued his image as a serious politician. Don Brash, former governor of the Reserve Bank and a relative newcomer to politics, began to build up support to replace English. On 28 October, Brash gained sufficient backing in Caucus to defeat English in a leadership contest.
Shadow cabinet roles and deputy leader
On 2 November 2003, when Brash changed responsibilities for certain MPs, English became National's spokesman for education, ranked at fifth place in the party's parliamentary hierarchy. He remained in parliament after the 2005 election. In his new shadow education portfolio, English performed strongly, and remained a party favourite despite his election defeat as leader in 2002, eventually being returned to the finance portfolio in August 2004 as deputy spokesman (while still retaining responsibility for education).
In November 2006, Brash resigned as leader. English was considered as a potential replacement leader (running against John Key) or deputy leader (against incumbent Gerry Brownlee) in the ensuing leadership election. However, a contest was avoided when the MPs agreed a Key/English ticket would run unopposed in a display of party unity. English took over the deputy leadership and the finance portfolio in the Key shadow cabinet.
Fifth National Government (2008–2017)
Deputy Prime Minister and Minister of Finance (2008–2016)
At the 2008 election, English was re-elected by his electorate, winning by a margin of about 15,500 votes. He became Deputy Prime Minister of New Zealand and Minister of Finance in the fifth National Government, being sworn into office on 19 November 2008 and continued to serve in those roles until becoming Prime Minister on 12 December 2014. He was also made Minister of Infrastructure in National's first term of government and Minister responsible for Housing New Zealand Corporation and minister responsible for the New Zealand flag consideration process in its third.
He was comfortably re-elected in Clutha-Southland in the 2011 election but opted to run as a party-list candidate in 2014.
The pairing of John Key as leader of the National Party and English as his deputy has been compared to that of Bob Hawke and Paul Keating (in Australia) and Tony Blair and Gordon Brown (in the UK).
English acceded to the role of Finance Minister in the continuing wake of the financial crisis. In response to New Zealand's rising debt, English made budget deficit-reduction his main priority. His first budget outlined three focuses in New Zealand's financial recovery: "improving the business environment and removing roadblocks to growth; investment in productive infrastructure; and improving the way government works". One of his first acts was creating the National Infrastructure Unit, charged with formulating a plan for infrastructure projects and investments. He commissioned a government-wide spending review, with an aim to reducing government expenditure—with the exceptions of a two-year stimulus package and long-term increases on infrastructure spending.
In April 2011, the Opposition criticised English for suggesting that New Zealand businesses could use New Zealand's low wages to help it compete with Australia. The National Government campaigned for re-election in 2011 on its economic record. The Government boasted growth for five consecutive quarters up to mid-2010, totalling 1.6% of real GDP.
Strong growth resulted in a surplus of $473 million for the 2015/16 financial year, projected to rise to $8.5 billion by 2020/21. In his 2016 Economic and Fiscal Update address, English stated that reducing debt and tackling the costs of the 2016 Kaikōura earthquake were higher priorities than reducing rates of tax.
Allowances issue
In 2009, the media, including TVNZ and TV3 revealed that English was receiving about NZ$900 a week as part of a living allowance for ministers, to live in his own NZ$1.2 million Wellington home. At the time, English also received $276,200 in his annual salary as Deputy Prime Minister. It was also revealed other ministers with homes in the capital city were also claiming accommodation allowances. On 3 August 2009, Prime Minister John Key started a review of the housing allowances claimed by cabinet ministers. English subsequently paid back $12,000 and only claimed about $24,000 a year in living allowances. The Auditor-General's office said in September 2009 that they were making "preliminary enquiries" into parliamentary housing expenses in response to a letter of complaint from Progressive party leader Jim Anderton. Two days later English stated that he would no longer take up any housing allowance and had paid back all the allowance he had received since the November 2008 election.
Prime Minister (2016–2017)
John Key resigned on 12 December, and endorsed English as his successor in the resulting leadership election. Following the drop-out of both Judith Collins and Jonathan Coleman from the leadership election, English was sworn in as the 39th Prime Minister of New Zealand on 12 December 2016.
English appointed his first cabinet on 18 December. In a reshuffle, he appointed Steven Joyce to succeed him as Finance Minister, while most ministerial portfolios remained the same.
In February 2017, English did not attend Waitangi Day commemorations at the historic treaty grounds, reportedly in response to the Ngāpuhi iwi's decision to stop the Prime Minister from speaking at the marae. Ngāpuhi have protested the Government's negotiation of the Trans Pacific Partnership Agreement (TPPA), which the iwi believe infringes upon Māori sovereignty, and thus does not adhere to the Treaty of Waitangi. English had been invited to attend in an official capacity; his non-attendance was criticised by a Ngāpuhi elder and Opposition leader Andrew Little.
In his first overseas trip as Prime Minister, English travelled to Europe to discuss trade ties, including a prospective New Zealand–European Union free trade agreement. He first travelled to London on 13 January 2017 to meet British Prime Minister Theresa May. Discussing trade relations, English said the two nations were "natural partners" and would "continue to forge ties" after the UK's withdrawal from the EU. He also arranged to meet with London Mayor Sadiq Khan, Belgian Prime Minister Charles Michel and German Chancellor Angela Merkel. In a meeting with Merkel, English received crucial backing from Germany for a trade deal with the EU. On 16 January, English stated that his government would continue to promote TPPA, despite the United States' decision to withdraw from the agreement. He explained that Southeast Asian countries would now be treated as a priority in negotiations—he also asserted that the United States was ceding influence to China by its rejection of the trade pact.
At a press conference at the Beehive on 1 February 2017, English announced that the 2017 general election would be held on 23 September. The Prime Minister later confirmed that his party would approach ACT, United Future and the Māori Party if confidence and supply agreements were required to form a government following the election. In his second cabinet reshuffle on 24 April, English appointed Gerry Brownlee as his new Foreign Affairs Minister; he also promoted Nikki Kaye to the portfolio of Education Minister, and moved Mark Mitchell into the cabinet to become Defence Minister. The reshuffle was perceived as an election preparation.
On 13 February 2017, English welcomed Australian Prime Minister Malcolm Turnbull to Wellington. The two leaders reaffirmed their shared trade agenda, and discussed changes to the Australian citizenship pathway which will affect permanent residents originating from New Zealand.
On 19 June, it was reported that Todd Barclay, who succeeded English as MP for Clutha-Southland, had clandestinely recorded one of his employee's conversations the previous year, and that John Key's leaders' budget was used to pay a confidential settlement after the employee resigned. English admitted that he had been aware of the illegal recording and the settlement, and thus implicated in the scandal.
During the 2017 National campaign launch, English introduced a $379 million social investment package including digital learning academies for high school students, more resources for mathematics, and boosting support for teaching second languages in schools, and maintaining National Standards in the school curriculum. Prime Minister English also sought to defend National's financial management and economic track record and claimed that the opposition Labour Party would raise taxes. Early opinion polling had forecast a poor showing in the election for the Labour Party, but in early August 37-year-old Jacinda Ardern took over as Labour leader and seemingly energised younger voters.
At the 2017 general election, National won the largest share of the party vote (44.4%) and the largest number of seats (56) in the House Representatives. However, National lacked enough seats to govern alone due to two of the party's support partners, the Māori Party and United Future, losing their parliamentary seats. In response, English stated that the party would be entering into talks to form a coalition with New Zealand First. Following talks with the two largest parties, New Zealand First entered a coalition arrangement with the Labour Party. English was succeeded as prime minister by Jacinda Ardern on 26 October.
Opposition (2017–2018)
Leader of the Opposition
English was re-elected as National Party leader on 24 October 2017. At the time of his re-election, English announced his intention to stay on as leader until the next general election. On 13 February 2018, however, he stood down as National Party leader due to personal reasons, and instructed the party to put into motion the processes to elect a new leader. He also retired from Parliament. English's resignation followed weeks of speculation that he would step aside for a new leader. On 27 February, he was succeeded as party leader by Simon Bridges as the result of the leadership election held that day.
Post-premiership
In 2018, English joined the board of Australian conglomerate, Wesfarmers. English serves in Chairmanships of Mount Cook Alpine Salmon, Impact Lab Ltd and Manawanui Support Ltd. He is also a director of The Instillery, Centre for Independent Studies and The Todd Corporation Limited, and is a member of the Impact Advisory Group of Macquarie Infrastructure and Real Assets.
Political and social views
English is regarded as more socially conservative than his predecessor, John Key. He has stated his opposition to voluntary euthanasia and physician-assisted suicide, same-sex civil unions, and the decriminalisation of prostitution. As Prime Minister he opposed any "liberalisation" of abortion law.
In 2004, English voted against a bill to establish civil unions for both same-sex and opposite-sex couples. In 2005, he voted for the Marriage (Gender Clarification) Amendment Bill, which would have amended the Marriage Act to define marriage as only between a man and a woman. English voted against the Marriage (Definition of Marriage) Amendment Bill, a bill that legalised same-sex marriage in New Zealand. However, in December 2016 he stated, "I'd probably vote differently now on the gay marriage issue. I don't think that gay marriage is a threat to anyone else's marriage".
In 2009, English voted against the Misuse of Drugs (Medicinal Cannabis) Amendment Bill, a bill aimed at amending the Misuse of Drugs Act so that cannabis could be used for medical purposes.
Personal life
English met his future wife, Mary Scanlon, at university. She was studying medicine at the time, and became a general practitioner. Both her parents were immigrants, her father being Samoan and her mother Italian, born on the island of Stromboli. They have six children: a daughter and five sons.
English is a practising Roman Catholic, but has stated that he considers his religious beliefs personal and thus separate from politics.
In June 2002, English took part in TV3's Fight For Life, a celebrity boxing fundraiser to raise money for the Yellow Ribbon anti-youth-suicide campaign, influenced by the death of a teenage nephew in 1997. He lost a split decision to former university colleague Ted Clarke.
Honours
In the 2018 Queen's Birthday Honours, English was appointed a Knight Companion of the New Zealand Order of Merit, for services of over 27 years to the State.
See also
List of New Zealand governments
Politics of New Zealand
References
External links
Profile at National Party
Profile on Parliament.nz
Releases and speeches at Beehive.govt.nz
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
1961 births
21st-century New Zealand politicians
Candidates in the 2017 New Zealand general election
Deputy Prime Ministers of New Zealand
Leaders of the Opposition (New Zealand)
Living people
Members of the Cabinet of New Zealand
Members of the New Zealand House of Representatives
New Zealand farmers
New Zealand finance ministers
New Zealand list MPs
New Zealand MPs for South Island electorates
New Zealand National Party MPs
New Zealand National Party leaders
New Zealand Roman Catholics
New Zealand people of Irish descent
People educated at St. Patrick's College, Silverstream
People from Dipton, New Zealand
People from Lumsden, New Zealand
Prime Ministers of New Zealand
University of Otago alumni
Victoria University of Wellington alumni
Knights Companion of the New Zealand Order of Merit
|
[
"October 2001."
] | 3,590
|
multifieldqa_en
|
en
| null |
67dd297408f3d52f22ede88df0b62644dac86da77f009e71
|
How are smartphones and tablets different from a technical perspective?
|
The future of mobile CPUs, part 1: Today’s fork in the road | Ars Technica
2013 may be a big year for the evolution of smartphones and tablets.
Mobile computing's rise from niche market to the mainstream is among the most significant technological trends in our lifetimes. And to a large extent, it's been driven by the bounty of Moore’s Law—the rule that transistor density doubles every 24 months. Initially, most mobile devices relied on highly specialized hardware to meet stringent power and size budgets. But with so many transistors available, devices inevitably grew general-purpose capabilities. Most likely, that wasn't even the real motivation. The initial desire was probably to reduce costs by creating a more flexible software ecosystem with better re-use and faster time to market. As such, the first smartphones were very much a novelty, and it took many years before the world realized the potential of such devices. Apple played a major role by creating innovative smartphones that consumers craved and quickly adopted.
To some extent, this is where we still stand today. Smartphones are still (relatively) expensive and primarily interesting to the developed world. But over the next 10 years, this too will change. As Moore’s Law rolls on, the cost of a low-end smartphone will decline. At some point, the incremental cost will be quite minimal and many feature phones of today will be supplanted by smartphones. A $650 unsubsidized phone is well beyond the reach of most of the world compared to a $20 feature phone, but a $30 to $40 smartphone would naturally be very popular.
In this grand progression, 2013 will certainly be a significant milestone for mobile devices, smartphones and beyond. It's likely to be the first year in which tablets out-ship notebooks in the US. And in the coming years, this will lead to a confluence of high-end tablets and ultra-mobile notebooks as the world figures out how these devices co-exist, blend, hybridize, and/or merge.
Against this backdrop, in this two-part series, we'll explore the major trends and evolution for mobile SoCs. More importantly, we'll look to where the major vendors are likely going in the next several years.
Tablet and phone divergence
While phones and tablets are mobile devices that often share a great deal of software, it's becoming increasingly clear the two are very different products. These two markets have started to diverge and will continue doing so over time.
From a technical perspective, smartphones are far more compact and power constrained. Smartphone SoCs are limited to around 1W, both by batteries and by thermal dissipation. The raison d’etre of a smartphone is connectivity, so a cellular modem is an absolute necessity. For the cost sensitive-models that make up the vast majority of the market, the modem is integrated into the SoC itself. High-end designs favor discrete modems with a greater power budget instead. The main smartphone OSes today are iOS and Android, though Windows is beginning to make an appearance (perhaps with Linux or BlackBerry on the horizon). Just as importantly, phone vendors like HTC must pass government certification and win the approval of carriers. There is very much a walled-garden aspect, where carriers control which devices can be attached to their networks, and in some cases devices can only be sold through a certain carrier. The business model places consumers quite far removed from the actual hardware.
In contrast, tablets are far more akin to the PC both technically and economically. The power budget for tablet SoCs is much greater, up to 4W for a passively cooled device and as high as 7-8W for systems with fans. This alone means there is a much wider range of tablet designs than smartphones. Moreover, the default connectivity for tablets is Wi-Fi rather than a cellular modem. The vast majority of tablets do not have cellular modems, and even fewer customers actually purchase a wireless data plan. As a result, cellular modems are almost always optional discrete components of the platform. The software ecosystem is relatively similar, with Microsoft, Apple, and Google OSes available. Because tablets eschew cellular modems, the time to market is faster, and they are much more commonly sold directly to consumers rather than through carriers. In terms of usage models, tablets are much more PC-like, with reasonable-sized screens that make games and media more attractive.
Looking forward, these distinctions will likely become more pronounced. Many tablets today use high-end smartphone SoCs, but the difference in power targets and expected performance is quite large. As the markets grow in volume, SoCs will inevitably bifurcate to focus on one market or the other. Even today, Apple is doing so, with the A6 for phones and the larger A6X for tablets. Other vendors may need to wait a few years to have the requisite volume, but eventually the two markets will be clearly separate.
Horizontal business model evolution
Another aspect of the mobile device market that is currently in flux and likely to change in the coming years is the business model for the chip and system vendors. Currently, Apple is the only company truly pursuing a vertically integrated model, where all phones and tablets are based on Apple’s own SoC designs and iOS. The tight integration between hardware and software has been a huge boon for Apple, and it has yielded superb products.
Samsung is one of the few others companies that takes a vertically integrated approach to phones and tablets, although in truth its strategy seems to be ambivalent on that point. Unlike Apple, Samsung’s SoCs are readily available to third parties, and some Samsung devices, such as the S7562 Galaxy S Duos, use SoCs from competitors. More recently though, there has been a trend of Samsung devices using Samsung SoCs, at least for the premier products. For the moment, Samsung’s approach is best characterized as a hybrid, particularly as the company lacks a bespoke OS.
The rest of the major SoC vendors (e.g., Intel, Qualcomm, Nvidia, TI, Mediatek, etc.) have stayed pretty far away from actual mobile devices. These companies tend to focus on horizontal business models that avoid competing with customers or suppliers.
In the long term, mobile devices are likely to evolve similarly to the PC and favor a horizontal business model. The real advantage is one of flexibility; as costs drop and the market expands, it will be increasingly necessary for vendors like HTC to offer a wide range of phones based on radically different SoCs. While a vertically integrated company like Apple can focus and maintain leadership in a specific (and highly lucrative) niche, it would be very difficult to expand in many growing areas of the market. The differences between an iPhone 6 and a $20 feature phone are tremendous and would be very difficult for a single company to bridge.
However, SoC vendors will attempt to reap the benefits of vertical integration by providing complete reference platforms to OEMs. Conceptually, this is a form of "optional" system integration, where the phone vendor or carrier can get the entire platform from the SoC supplier. This has the principal advantages of reducing time to market while also providing a baseline quality and experience for consumers. Currently, this approach has mostly been tested in emerging markets, but it's likely to become more common over time. There is a crucial distinction between reference platforms and vertical integration. Namely, OEMs can always choose to customize a platform to differentiate, and the SoC vendor avoids dealing with consumers directly. Typically, most of the customization is in terms of software on top of a base operating system.
Quote:Moreover, that will make the transition to a 10nm node even more difficult, as the foundries will have to move from 20nm interconnects to 10nm interconnects and skip a generation.The advances in technology lately allowing components on such a small scale to even be envisioned, much less planned for, are truly amazing.
Off topic: show
I present the first generation 'non-technical' rock:
I don't think your horizontal market development theory is supported by facts. Samsung and Apple are more vertically oriented than their competition, for starters. I know this article is narrowly focused on the hardware, but MS and Intel getting into hardware, Amazon getting into hardware, Google buying Moto, this is all vertical integration. How can you support the idea that this trend will be reversed with no real justification? I'm sure mobile chips will continue to specialize, but I don't think this means what you think it means. Automobile companies started making their own engines and with rare exceptions, never went back to being more horizontal. Same with retail and their store brands. Same with cloud companies and their servers. Same with mobile companies and their OSs. The horizontal market of PCs created by long-lasting standards and loose hegemony is the exception, not the norm.
Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?
I'm not so sure about several things:1- Moore's law's relevance. Moore's Law is about ICs. ICs are not as big a part of mobile computers as they are of desktops, even of laptops: screens, batteries, radios are a huge part of tablets' and phones' costs, as opposed to the bare SoC + RAM.2- The tablet vs phone dichotomy. For some reason (probably price insensitivity due to subsidies), Phones have a tendency to be more powerful than Tablets, ie phone SoCs are more than good enough for tablets. Since the OS and peripherals are the same, it makes more sense to design and build just one type of SoC, and just disable the phone-modem part of it (even the other radios are still required: BT, Wifi, GPS...), same as Intel disable cache and cores for their entry-level CPUs. Once you're fabbing a SoC, it makes more sense to make more of the same than to setup a separate run of a cut-down SoC on an older process, unless volumes are huge. We might still be getting previous-generation, well amortized SoCs in cheaper tablets, though.3- On the contrary, I see a tablet and phone convergence (the ugly phablet). I'm patiently waiting for the new 6"+ phones to replace my Nook Color and Galaxy Note 1 with a single device.4- The advantage of diversity ? Software is becoming ever more important than hardware. Multiplying SoCs means multiplying product development costs, making support and updates more difficult... Again, unless volumes are huge, OEMs are probaly better off going the way of the car industry and using modular "platforms" housed in different chassis with various screen sizes, keyboards, radios, digitizers...I'm wondering why the "single device" trend does not figure in your analysis. Is it stillborn ? Does it have no impact nor dependency on/with SoCs ?
Samsung has its own bespoke OS: Bada and it is used on an extensive line of devices. I think there are numbers somewhere that it outsold Windows Phone 7 for a time.
gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?First mover advantage.
SoC? System on a Chip I guess?
You're way off on the Moore's Law/cost of smartphones point. The processors used in today's high-end smartphones are already cheap, around $25. And there are less expensive options if you want a lower end product. In fact, the hardware in the whole smartphone is relatively cheap. Analyst's estimate the Z10's materials cost around $160, the iPhone 5 around $140. They're using expensive glass and metals, then there's the battery, memory, etc. which means the processor is a small factor of the cost.And then there's the jump from $140 in materials to the unsubsidized costs. The reason these phones cost $650 is because of the high margins these companies are able to get and the high cost of hardware design and/or software development. But the point is that making the processors 4 times better/cheaper isn't going to change the economics of the smartphone. What will change the economics is commoditized designs and software and cheaper materials all around. Then you'll have a $50 smartphone that's decent.
Last edited by ggeezz on Wed Feb 13, 2013 9:17 am
bigterp wrote:SoC? System on a Chip I guess?Yup.
gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?Money and momentum, the x86 market is a huge money maker for Intel so it is able to recoup its huge investments for advanced foundries.
Quote:Currently, the only products using 3D integration are FPGAs from Xilinx,Doesn't Sony use it in the PS Vita? I thought I read somewhere that they had the CPU, main memory (2 dies) and video memory, so 4 dies in total, sitting on top of each other all on the same chip.
renoX wrote:gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?Money and momentum, the x86 market is a huge money maker for Intel so it is able to recoup its huge investments for advanced foundries.Exactly and I would clarify that it's all about margins, the difference between what it costs to make a chip and what it sells for. The margins for desktop and server processors is huge because a) the whole product is expensive so $200 to $1000 for the chip is acceptable, and b) Intel has huge advantages in that space and little competition.So Intel can afford to do the R&D to stay ahead of the curve and keep their position. When your smartphone chip sells for $25 you can't do the R&D to leapfrog a company that sells Xeons for $1000 and Core i5's for $200.
I am happy to see Kanter here at Ars, I like his writing and he maintains Real World Tech, where Linus Torvalds often shows up to comment on CPU arch and other interesting topics.
ggeezz wrote:renoX wrote:gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?Money and momentum, the x86 market is a huge money maker for Intel so it is able to recoup its huge investments for advanced foundries.Exactly and I would clarify that it's all about margins, the difference between what it costs to make a chip and what it sells for. The margins for desktop and server processors is huge because a) the whole product is expensive so $200 to $1000 for the chip is acceptable, and b) Intel has huge advantages in that space and little competition.So Intel can afford to do the R&D to stay ahead of the curve and keep their position. When your smartphone chip sells for $25 you can't do the R&D to leapfrog a company that sells Xeons for $1000 and Core i5's for $200.Spot on.Intel are able to piggyback other development efforts off the highly lucrative mainstream x86 market which generates the huge sums of money to fund their amazing fab technology.The question for the future is how the economics will stack up when overall device costs fall significantly and there is a big downward pressure on SoC prices. In that situation, can Intel still justify bringing their A-game to a market where products are essentially commoditised and you have processors selling for a only a few dollars each?The lesson from their previous involvement in the DRAM market is that they probably won't want to be involved because there isn't enough money to be made to justify manufacturing phone SoCs on a cutting edge, or near cutting edge process. In that scenario, Intel may not totally abandon the market but they might just stick to manufacturing SoCs on nodes that are a step or two behind the state of the art.
solomonrex wrote:I don't think your horizontal market development theory is supported by facts. Samsung and Apple are more vertically oriented than their competition, for starters. I know this article is narrowly focused on the hardware, but MS and Intel getting into hardware, Amazon getting into hardware, Google buying Moto, this is all vertical integration. How can you support the idea that this trend will be reversed with no real justification? I'm sure mobile chips will continue to specialize, but I don't think this means what you think it means. Automobile companies started making their own engines and with rare exceptions, never went back to being more horizontal. Same with retail and their store brands. Same with cloud companies and their servers. Same with mobile companies and their OSs. The horizontal market of PCs created by long-lasting standards and loose hegemony is the exception, not the norm.Yea, each year Amazon, MS, Apple and Google look more and more the same.
Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.
gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?Intel's called Chipzilla for a reason up
Lagrange wrote:The question for the future is how the economics will stack up when overall device costs fall significantly and there is a big downward pressure on SoC prices. In that situation, can Intel still justify bringing their A-game to a market where products are essentially commoditised and you have processors selling for a only a few dollars each?The lesson from their previous involvement in the DRAM market is that they probably won't want to be involved because there isn't enough money to be made to justify manufacturing phone SoCs on a cutting edge, or near cutting edge process. In that scenario, Intel may not totally abandon the market but they might just stick to manufacturing SoCs on nodes that are a step or two behind the state of the art.I think the processing is a bigger advantage than many realize. If Intel can stay ahead in process design - which this article seems to indicate - they should have a major advantage. All else being equal a 14nm chip should be significantly faster and more efficient than the same chip at 22nm. Add in the fact that yields increase geometrically - you can fit a lot more 14nm chips on a given wafer size vs 22nm (or 32nm for the other manufacturers.) and you have a very appealing proposition. And then add in the fact that Intel actually has a pretty good graphics stack and IP. It's not a sure thing by any means, but I suspect ARM may have just prodded a sleeping giant.edit: Also worth noting, Intel, TSMC, and Samsung are the only manufacturers who are building out 450nm wafers. This will increase yields dramatically. Of course Samsung and TSMC will build ARM out, but it definitely puts quite a bit of pressure on all other manufacturers. As the article mentions Intel and Samsung are the only ones who control production top to bottom, and Samsung must share some of the benefits with ARM.
As someone who has worked in the semiconductor industry for longer than contemporary fanboys have existed, I'm getting a bit fed-up seeing many of these articles which rewrite history with analyses distorted by the lens of the contemporary Apple or Samsung fanboy.The mobile industry moved to horizontal integration a long time ago. Better indicators than these odd contemporary obsessions with the relatively non-innovative Samsung and Apple where when Motorola spun out its semiconductor division as Freescale, Nokia stopped making it's own custom designs with TI and ST, and Ericsson spun out it's Ericsson Mobile Platforms division and formed ST-Ericsson with ST.The true innovation in the mobile market was done a decade or more ago mainly by Moto/Nokia/Ericsson/TI/Qualcomm, and Samsung and Apple had little to do with it. Under the hood most stuff has been on a simple linear evolutionary path by the SoC providers since then. The phone manufacturers have then mainly been simply sticking these off-the-shelf SoCs (and their included low-level software stacks) in a box, a job made all the easier with the SoC manufacturer collaboration providing the bulk of the work for the AOSP.
Last edited by paul5ra on Wed Feb 13, 2013 11:06 am
introiboad wrote:I am happy to see Kanter here at Ars, I like his writing and he maintains Real World Tech, where Linus Torvalds often shows up to comment on CPU arch and other interesting topics.Indeed. Most tech writing in this area is atrocious. This piece is one of the few well informed articles I've read in a long time.
ggeezz wrote:Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.The word you're looking for is Haswell, as far as I know.
Mabsark
ggeezz wrote:Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.Actually, that trend will not simply keep increasing going forward. The reason desktop/laptop sales are stagnating/decreasing is due to the fact that most people already have one and therefore don't need to buy another one. The exact same thing will happen with tablets as well. Sales are increasing now because people without tablets are buying them. When most people already own a tablet, they won't be buying a new one every year and therefore sales will stagnate/decrease.The PC market is saturated and in a couple of years, the tablet market will be saturated too. Basically, in order to increase sales in a saturated market, you need to increase the population growth or decrease the longevity of the product.
gypsumfantastic wrote:Why wouldn't the foundries be able close the process gap with Intel? Is it a matter of money? Scale?Probably a mix of a lot of things. One big thing was during this recession, Intel was the ONLY fab company that didn't scale back their R&D. That alone gave Intel a large advantage.Intel has almost always been ahead. One of the reasons could be that Intel works with much higher margins than many of the commodity companies like Samsung and TSMC.Outside of the P4 flop and some of the monopolistic abuses, Intel has typically been selling to high end customers that are willing to pay a premium for "the best".Intel has a large benefit of having a relatively "good name" when it comes to CPUs, so they can effectively charge a brand-name premium.I'm sure there are other reasons, and probably better reasons, but these are the main ones that I think of.
Mabsark wrote:Actually, that trend will not simply keep increasing going forward. The reason desktop/laptop sales are stagnating/decreasing is due to the fact that most people already have one and therefore don't need to buy another one. The exact same thing will happen with tablets as well. Sales are increasing now because people without tablets are buying them. When most people already own a tablet, they won't be buying a new one every year and therefore sales will stagnate/decrease.The PC market is saturated and in a couple of years, the tablet market will be saturated too. Basically, in order to increase sales in a saturated market, you need to increase the population growth or decrease the longevity of the product.That's true as long as most people are still buying both a tablet and a laptop when each needs to be replaced. I think the assumption is that, as you say, the tablet market will saturate, with people just replacing existing ones, but the desktop/laptop market could decrease much farther than that, if most people stop replacing them at all. I'm not sure of the likelihood of that, but I think that's where this idea comes from.
ggeezz wrote:Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.The upcoming Haswell chip is showing to consume 1/3 the power of IvyBridge at peak, consumes 1/20th the power at idle, all the while maintaining Identical or better performance.This chip should actually compete with ARM CPUs on both power/performance and idle.I am expecting a large war.
Apple once again is dictating the performance in the mobile industry. Nice to see others being able to keep the pace, as well.
paul5ra wrote:As someone who has worked in the semiconductor industry for longer than contemporary fanboys have existed, I'm getting a bit fed-up seeing many of these articles which rewrite history with analyses distorted by the lens of the contemporary Apple or Samsung fanboy.The mobile industry moved to horizontal integration a long time ago. Better indicators than these odd contemporary obsessions with the relatively non-innovative Samsung and Apple where when Motorola spun out its semiconductor division as Freescale, Nokia stopped making it's own custom designs with TI and ST, and Ericsson spun out it's Ericsson Mobile Platforms division and formed ST-Ericsson with ST.The true innovation in the mobile market was done a decade or more ago mainly by Moto/Nokia/Ericsson/TI/Qualcomm, and Samsung and Apple had little to do with it. Under the hood most stuff has been on a simple evolutionary path by the SoC providers since then.Yeah, and most of the innovation in the automobile industry came about before Henry Ford came into the business. Doesn't change the fact that cars would probably have been an asterisk in the history books under "toys for rich people" if it weren't for him.The same applies to to mobile computing for Apple, Samsung, et al.
SheldonRoss wrote:Lagrange wrote:The question for the future is how the economics will stack up when overall device costs fall significantly and there is a big downward pressure on SoC prices. In that situation, can Intel still justify bringing their A-game to a market where products are essentially commoditised and you have processors selling for a only a few dollars each?The lesson from their previous involvement in the DRAM market is that they probably won't want to be involved because there isn't enough money to be made to justify manufacturing phone SoCs on a cutting edge, or near cutting edge process. In that scenario, Intel may not totally abandon the market but they might just stick to manufacturing SoCs on nodes that are a step or two behind the state of the art.I think the processing is a bigger advantage than many realize. If Intel can stay ahead in process design - which this article seems to indicate - they should have a major advantage. All else being equal a 14nm chip should be significantly faster and more efficient than the same chip at 22nm. Add in the fact that yields increase geometrically - you can fit a lot more 14nm chips on a given wafer size vs 22nm (or 32nm for the other manufacturers.) and you have a very appealing proposition. And then add in the fact that Intel actually has a pretty good graphics stack and IP. My point was that Intel might have a one or two process advantage over the rest of the industry at the cutting edge but that doesn't mean that they can afford to manufacture on those processes for very low margin parts. If the SoC market becomes increasingly commoditised, there isn't going to be the money to justify making them in a state of the art fab.Remember that one of the big selling points of Itanium was that it would make use of process advantages that were effectively paid for by the mainstream x86 market. That didn't quite work out in practice and Itanium processors were often well behind Xeons in process technology.
paul5ra wrote:As someone who has worked in the semiconductor industry for longer than contemporary fanboys have existed, I'm getting a bit fed-up seeing many of these articles which rewrite history with analyses distorted by the lens of the contemporary Apple or Samsung fanboy.The mobile industry moved to horizontal integration a long time ago. Better indicators than these odd contemporary obsessions with the relatively non-innovative Samsung and Apple where when Motorola spun out its semiconductor division as Freescale, Nokia stopped making it's own custom designs with TI and ST, and Ericsson spun out it's Ericsson Mobile Platforms division and formed ST-Ericsson with ST.The true innovation in the mobile market was done a decade or more ago mainly by Moto/Nokia/Ericsson/TI/Qualcomm, and Samsung and Apple had little to do with it. Under the hood most stuff has been on a simple linear evolutionary path by the SoC providers since then. The phone manufacturers have then mainly been simply sticking these off-the-shelf SoCs (and their included low-level software stacks) in a box, a job made all the easier with the SoC manufacturer collaboration providing the bulk of the work for the AOSP.Just goes to show that people who have worked in an industry for a long time don't always understand what that industry is doing.You haven't been working in it long enough to seem to know that it was Acorn and Apple that invented the mobile ARM CPU in the first place. All those companies you've mentioned have just been working off Acorn and Apple's pioneering work. Now, Apple is back at it again, very successfully, and all the companies you mentioned that produce chips with ARM IP in them are licensing them from the company Acorn and Apple formed—ARM.
Last edited by melgross on Wed Feb 13, 2013 11:13 am
Mark Havel wrote:ggeezz wrote:Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.The word you're looking for is Haswell, as far as I know.If tablets move into the $100-200 range, is there going to be room for Haswell?So long as there is a higher-end tablet market, then Haswell will be able to shine, but it's going to be a much more powerful and costly part than the sort of ARM based hardware that often runs tablets. If we see a race to the bottom where price is the dominant motivator behind purchases, then a high performance SoC will struggle to make its mark.
melgross wrote:paul5ra wrote:As someone who has worked in the semiconductor industry for longer than contemporary fanboys have existed, I'm getting a bit fed-up seeing many of these articles which rewrite history with analyses distorted by the lens of the contemporary Apple or Samsung fanboy.The mobile industry moved to horizontal integration a long time ago. Better indicators than these odd contemporary obsessions with the relatively non-innovative Samsung and Apple where when Motorola spun out its semiconductor division as Freescale, Nokia stopped making it's own custom designs with TI and ST, and Ericsson spun out it's Ericsson Mobile Platforms division and formed ST-Ericsson with ST.The true innovation in the mobile market was done a decade or more ago mainly by Moto/Nokia/Ericsson/TI/Qualcomm, and Samsung and Apple had little to do with it. Under the hood most stuff has been on a simple linear evolutionary path by the SoC providers since then. The phone manufacturers have then mainly been simply sticking these off-the-shelf SoCs (and their included low-level software stacks) in a box, a job made all the easier with the SoC manufacturer collaboration providing the bulk of the work for the AOSP.Just goes to show that people who have worked in an industry for a long time don't always understand what that industry is doing.You haven't been working in it long enough to seem to know that it was Acorn and Apple that invented the mobile ARM CPU in the first place. All those companies you've mentioned have just been working off Acorn and Apple's pioneering work. Now, Apple is back at it again, very successfully, and all the companies you mentioned that produce chips with ARM IP in them are licensing them from the company Acorn and Apple formed—ARM.Of course I realise ARM IP has indeed been a major driving factor too (though only one if several architectures before ARM became dominant), though I see ARM's influence on the mobile industry as having nothing to do with modern day Apple and only one small piece of the puzzle. My point is that the hard electrical engineering, mathematics, DSP, semiconductor physics/chemistry, RF engineering, analogue design, CAD etc. that make modern telecommunications possible has very little to do with the fashion companies who consumers (and unfortunately much of the tech media) associate with it and give the credit (though in this respect Samsung does deserve a bit more credit for their work on NAND flash and displays). The industry simply would not exist TODAY without the overwhelming horizontal integration that already dominates.
Quote:In the long term, mobile devices are likely to evolve similarly to the PC and favor a horizontal business model. The real advantage is one of flexibility; as costs drop and the market expands, it will be increasingly necessary for vendors like HTC to offer a wide range of phones based on radically different SoCs. You don't mention in the article that each SoC necessarily requires a bit of parallel dev work unlike the PC. In the PC world there is a standard BIOS and HW architecture that allows for pluggable designs. On a highly integrated SoC this is untrue. HTC suffers because it has to support radically different SoCs, their drivers and boot loaders, etc. Quote:While a vertically integrated company like Apple can focus and maintain leadership in a specific (and highly lucrative) niche, it would be very difficult to expand in many growing areas of the market. The differences between an iPhone 6 and a $20 feature phone are tremendous and would be very difficult for a single company to bridge.It's only difficult because Apple chooses to ignore that market, not because they can't. If they can release a $99 Apple TV, they can surely cobble together a $20 feature phone if they chose to eschew 8GB of NAND, BT, WiFi, a specialized dock connector, LTE, and their specialized processors. In other words, build the equivalent of an iPod shuffle with a horrible screen and no OS to speak of.
paul5ra wrote:melgross wrote:paul5ra wrote:As someone who has worked in the semiconductor industry for longer than contemporary fanboys have existed, I'm getting a bit fed-up seeing many of these articles which rewrite history with analyses distorted by the lens of the contemporary Apple or Samsung fanboy.The mobile industry moved to horizontal integration a long time ago. Better indicators than these odd contemporary obsessions with the relatively non-innovative Samsung and Apple where when Motorola spun out its semiconductor division as Freescale, Nokia stopped making it's own custom designs with TI and ST, and Ericsson spun out it's Ericsson Mobile Platforms division and formed ST-Ericsson with ST.The true innovation in the mobile market was done a decade or more ago mainly by Moto/Nokia/Ericsson/TI/Qualcomm, and Samsung and Apple had little to do with it. Under the hood most stuff has been on a simple linear evolutionary path by the SoC providers since then. The phone manufacturers have then mainly been simply sticking these off-the-shelf SoCs (and their included low-level software stacks) in a box, a job made all the easier with the SoC manufacturer collaboration providing the bulk of the work for the AOSP.Just goes to show that people who have worked in an industry for a long time don't always understand what that industry is doing.You haven't been working in it long enough to seem to know that it was Acorn and Apple that invented the mobile ARM CPU in the first place. All those companies you've mentioned have just been working off Acorn and Apple's pioneering work. Now, Apple is back at it again, very successfully, and all the companies you mentioned that produce chips with ARM IP in them are licensing them from the company Acorn and Apple formed—ARM.Of course I realise ARM IP has indeed been a major driving factor too (though only one if several architectures before ARM became dominant), though I see ARM's influence on the mobile industry as having nothing to do with modern day Apple and only one piece of the puzzle. My point is that the hard electrical engineering, mathematics, DSP, semiconductor physics/chemistry, RF engineering, analogue design,etc. that make modern telecommunications possible has very little to do with the fashion companies who consumers (and unfortunately much of the tech media) associate with it and give the credit (though in this respect Samsung does deserve a bit more credit for their work on NAND flash and displays). The industry simply would not exist TODAY without the overwhelming horizontal integration that already dominates.Yes the efforts of these companies getting cellular communications standardized were immense. And the technology matured. And then they didn't do much with it. It took some youngin's to look at the problem fresh and add the UI that make today's smartphones work. As we have all seen, the moment your technology has matured is the moment you are screwed because someone else now has the opportunity to look at it as a black box and make something new. Each of those manufacturers knew that smartphones would eventually be awesome, but none of them had the UI and software design to make a truly breakout product. Imagine if Motorola would have been smart enough to buy the Android guys instead of Google. Instead, Google bought a bunch of patents on that cellular black box to try to defend it's platform.And when you think about it, which consumes more man years of engineering effort per year at this point.... iterating that cellular black box or developing the OS, services and apps that power today's smartphones?
Intel had better decide that they are competing in this space "for real", or they are screwed. They've already let the Atom languish for five years, during which ARM has completely caught up in performance.Just like Tim Cook said, if you don't cannibalize your own markets someone else will do it for you.Whether Intel will embrace that concept in time remains to be seen. Personally, I hope they don't; if Intel transforms into a chipless Fab company (like TSMC) everyone benefits.
I still think Samsung has the advantage long term because they have both the SOC and the memory products. As mentioned in the article, TSV's (Through Silicon Via's) are going to be quite a disruption. Today, people normally stack an LPDDR2 package on top of their SOC package (POP or Package On Package). Within the LPDDR2 package, you could have a stack of DRAM die typically with wire bonding connecting the die within the package.Once you more to TSV's, you can have a LOT more connections between the SOC and its DRAM's. While this is being standardized through JEDEC (http://www.jedec.org/category/technolog ... a/3d-ics-0), Samsung has all the pieces in house to do whatever they want. You could see a 512 bit or higher bus from the SOC to the memory. The trick is that the memory and the SOC need to line up with each other when you stack them. This gives Samsung an inherent advantage.This isn't just going to impact mobile either. Take a look at that JEDEC link. It also lists High Bandwidth Memory (HBM). This is a 1024 bit bus that provides 128GBytes/s to 256GBytes/s of bandwidth to a stack of up to 8 DRAM's. Here is your processor that includes 8-16 cores and 4GBytes of really, really, fast DRAM... No DIMMs required. How many of them do you want in your server rack?If I was Intel or Apple, I would be thinking seriously about making some investments in Micron to guarantee they make some compelling DRAM's to integrate with their SOC's and processors... otherwise Samsung is going to blow them out of the water on bandwidth.
Great_Scott wrote:Intel had better decide that they are competing in this space "for real", or they are screwed. They've already let the Atom languish for five years, during which ARM has completely caught up in performance.Just like Tim Cook said, if you don't cannibalize your own markets someone else will do it for you.Whether Intel will embrace that concept in time remains to be seen. Personally, I hope they don't; if Intel transforms into a chipless Fab company (like TSMC) everyone benefits.It's true that Atom has stood still for too long, but honestly it's pretty amazing how Atom is still competitive with current ARM chips. The Z2760 is even 32nm vs 28nm of the latest Krait and A15 chips.But that's all changing with Atom moving to the tick tock schedule this year. It wouldn't even surprise me to see Apple move to Intel chips for IOS.And I don't see how Intel moving to a chipless Fab company would help everyone. It certainly wouldn't help Intel.
Mabsark wrote:ggeezz wrote:Intel cannot abandon the phone/tablet market. Desktop/laptop sales are stagnating/decreasing and phones/tablets are on the rise. This trend is only going to increase going forward.But you're right, they're going to have use their fabs that are a step or two behind the cutting the edge. But they're going to have to up their game in the tablet space to even be able to do that.Actually, that trend will not simply keep increasing going forward. The reason desktop/laptop sales are stagnating/decreasing is due to the fact that most people already have one and therefore don't need to buy another one. The exact same thing will happen with tablets as well. Sales are increasing now because people without tablets are buying them. When most people already own a tablet, they won't be buying a new one every year and therefore sales will stagnate/decrease.The PC market is saturated and in a couple of years, the tablet market will be saturated too. Basically, in order to increase sales in a saturated market, you need to increase the population growth or decrease the longevity of the product.Yes and no. I'm not sure the tablet market will saturate in a "couple of years." It may be more like 5 years. But that's a quibble.Here's the real issue. Right now Apple wants you to own an iPhone AND iPad AND Macbook AND iWatch AND Apple TV. Microsoft, OTOH, is making the Surface so that you could ditch your laptop and just use a Surface. Not everyone, but some people.If 5 years from now, we're in a world where a significant number of people use a Surface-type device instead of a laptop, then the PC market is going to contract significantly. Maybe some of the tablet-like devices will use moderately expensive Intel chips, but some of them are going to use cheaper chips.
GravyGraphics wrote:I still think Samsung has the advantage long term because they have both the SOC and the memory products. As mentioned in the article, TSV's (Through Silicon Via's) are going to be quite a disruption. Today, people normally stack an LPDDR2 package on top of their SOC package (POP or Package On Package). Within the LPDDR2 package, you could have a stack of DRAM die typically with wire bonding connecting the die within the package.Once you more to TSV's, you can have a LOT more connections between the SOC and its DRAM's. While this is being standardized through JEDEC (http://www.jedec.org/category/technolog ... a/3d-ics-0), Samsung has all the pieces in house to do whatever they want. You could see a 512 bit or higher bus from the SOC to the memory. The trick is that the memory and the SOC need to line up with each other when you stack them. This gives Samsung an inherent advantage.This isn't just going to impact mobile either. Take a look at that JEDEC link. It also lists High Bandwidth Memory (HBM). This is a 1024 bit bus that provides 128GBytes/s to 256GBytes/s of bandwidth to a stack of up to 8 DRAM's. Here is your processor that includes 8-16 cores and 4GBytes of really, really, fast DRAM... No DIMMs required. How many of them do you want in your server rack?If I was Intel or Apple, I would be thinking seriously about making some investments in Micron to guarantee they make some compelling DRAM's to integrate with their SOC's and processors... otherwise Samsung is going to blow them out of the water on bandwidth.Why not AMD? Last I checked they still made memory...and processors/GPUs.
|
[
"Smartphones are more compact and power constrained."
] | 7,568
|
multifieldqa_en
|
en
| null |
7d357dddfddb09bf71c6ce3d2c6780b3380d725f534d0b91
|
What is the sticking point in the political showdown over the budget?
|
CNN.com - Transcripts
Tensions Boil Over possible government shutdown; New trouble targeting Gadhafi; Libyan Rebels in Panicked Retreat; Should U.S. Recognize the Rebels?; Meeting With Gadhafi; Washington, D.C. to Feel Burden of Shutdown; Religious Leaders Fast to Protests Cuts for Poor
WOLF BLITZER, HOST: Don, thanks very much.
Happening now, the top U.S. general in charge of the military mission in Libya now expressing doubts that the opposition has the manpower to topple Moammar Gadhafi, as deadly new air strikes force rebel fighters into another retreat. This hour, I'll speak with a former Republican Congressman who's in Tripoli right now trying to get Gadhafi to step down.
Also, growing outrage across the United States, amidst new signs tomorrow's potential government shutdown may -- repeat may be unavoidable. Why one lawmaker is telling Congress -- and I'm quoting right now -- "go straight to hell."
And possible presidential hopeful, Donald Trump, on a mission to tell President Obama, "you're fired." We're fact checking his controversial investigation into the president's birth.
Up first, the political showdown over the budget, as tensions reach a boiling point about 31 hours until impending government shutdown. Just hours from now, President Obama will meet with Republican House speaker, John Boehner, and the Democratic Senate majority leader, Harry Reid, for further negotiations. Those talks scheduled to begin 7:00 p.m. Eastern.
Hundreds of thousands of people across the country will be impacted by the shutdown. And we'll be bringing you examples throughout the next two hours.
One place it would be felt heavily is right here in Congress' backyard, the city of Washington. Washington, DC -- its spending is tied to the federal budget. And this major metropolitan area could lose millions of dollars while a number of critical services, like trash collection, for example, would be suspended for at least a week.
Today, an enraged Eleanor Holmes, the delegate representing Washington, DC, lit into Congress over the stalemate.
(BEGIN VIDEO CLIP) ELEANOR HOLMES NORTON (D), D.C. DELEGATE: It's one thing to beat up on the District of Columbia. It's another thing drop a bomb on the city. And that's what this Congressional -- C.R. does. It takes the route of authoritarian governments and dictatorships by dictating to a local government how it may spend its local funds. And it may force the District of Columbia government to shut down, although our government had a balanced budget.
BLITZER: And get this -- the members of Congress charged with reaching a deal, they'll still be receiving a paycheck if there's a shutdown, despite the hundreds of thousands of government employees who won't be receiving any paychecks. The current Congressional salary, by the way, $174,000 a year.
Our CNN senior Congressional correspondent, Dana Bash, is up on Capitol Hill with the latest developments -- Dana, specifically, where are the sticking points right now?
DANA BASH, CNN SENIOR CONGRESSIONAL CORRESPONDENT:
Well, look, Wolf, this is effectively a bill to fund the government. And the sticking points certainly are about how much spending to cut. That's what this whole issue has been about.
However -- however, one of the main issues, I am told, that were just -- that was discussed at the White House meeting this afternoon with the president, the House speaker and the Senate majority leader, was over not necessarily spending measures, but over lightning rod issues like regulating greenhouse gases and abortion.
BASH (voice-over): One of the biggest disagreements is not over government spending, but policy.
REP. JOHN BOEHNER (R-OH), SPEAKER OF THE HOUSE: Some 40 or 50 policy restrictions that were attached to -- to our bill.
BASH: So-called policy riders Republicans call essential and Democrats call nonstarters. The most divisive is over abortion. A GOP plan to cut all federal funding for Planned Parenthood, which provides abortion procedures in addition other women's health services.
SEN. HARRY REID (D-NV), MAJORITY LEADER: This is a budget. This is to keep our country running. This is not a woman's health bill.
BASH: Planned Parenthood staged a rally outside the Capitol to protest.
CECILE RICHARDS, CEO, PLANNED PARENTHOOD: They don't want to allow Planned Parenthood to serve the three million women that we see every single year. Ninety-seven percent of the services Planned Parenthood provides are preventive care.
UNIDENTIFIED MALE: I certainly don't think that taxpayers should subsidize abortions. It's -- if a woman chooses to have an abortion, it's legal to do that in this country. But I don't think taxpayers should be put in a position to have to pay for those abortions.
BASH: Another major sticking point -- how much spending to cut. A Democratic source tells CNN they have finally tentative agreement on slashing $34.5 billion from the rest of this year's budget. But a Republican source says there's no deal.
BOEHNER: There is no agreement on the number. There are no agreement on the policy issues that are contained with it.
BASH: Then there's the critical issue of what programs and agencies to cut. Democrats say they're trying to find spending cuts with the least impact on those who need it most. So they're pushing for things like temporary one year cuts in programs. Some examples, cuts in wetlands protection and Pell grants for summer school and graduate students.
Republicans call that smoke and mirrors.
BOEHNER: And our goal is to make real spending cuts.
BASH: Some examples of what Republicans want to cut -- money for food inspectors, Head Start education programs and funding for housing.
BASH: This afternoon, House Republicans did pass a bill to keep the government running for one week past tomorrow's midnight deadline. It has $12 billion in cuts. It would fund the Defense Department for the rest of the year. But Democrats, including the president of the United States, call it a distraction and they say that they really want to keep the focus on what they're negotiating, which is a bill that would keep the government open -- keep the government functioning and funded for the rest of the year.
BLITZER: And the president's playing hardball. He's saying he'll veto that legislation --
BASH: He was, yes.
BLITZER: -- if it were to pass the Senate and come to his desk. I hear, Dana, that some employees already are getting furloughing notices.
BASH: It's true. This is just preventive. But all across the Capitol here today, people in offices and -- and -- well, really, everywhere -- were told whether or not, if, in fact, it does come to a government shutdown, if they're going to be here or not. And this is an example. We obtained one of the furlough notices. And I'll just read you a line. This -- imagine if this came across your desk. It says: "Because your services are not needed for the orderly suspension of operations and you're not engaged in one of the accepted functions, you're being placed on furlough effective Saturday, April 9, 2011."
Now, again, of course, this is just protective. The government is still open. But interesting that they're already getting ready for a government shutdown and telling people who will come to work and not.
One more note. Even people who are here, who are called essential, they're not going to get paid, either.
BLITZER: All right, Dana.
Don't go too far away.
We'll be in close touch.
The impact of the potential government shutdown is even being felt on the front lines of combat in Afghanistan. And Iraq. The Defense secretary, Robert Gates, is in Iraq right now. And he's telling U.S. troops they will feel a pinch.
ROBERT GATES, SECRETARY OF DEFENSE: I hope they didn't have you standing out here in the sun too long
If -- if the government shutdown starts on the 8th and goes for a week, you'd get a half a check. If it goes from the 15th to the 30th, you wouldn't get a paycheck on the 30th but you would be back paid for all of it. So that's -- that's the deal.
BLITZER: Not great deal.
Gates also told the troops this would likely be his last trip to the country as Defense secretary and he wanted to say thank you.
He's expected to retire later this year.
Now to the deadly stalemate in Libya. New signs the military operation in the region is facing some tough new challenges.
Our Pentagon correspondent, Barbara Starr is here.
She's watching the story.
She's got more.
What are you learning? BARBARA STARR, CNN PENTAGON CORRESPONDENT: Well, Wolf, there was very dramatic, very hard-nosed testimony today on Capitol Hill from the top U.S. commander responsible for the U.S. involvement in Libya, saying that Gadhafi forces are becoming increasingly difficult to target, as they are using civilian vehicles, mixing in with local populations, moving next to mosques, schools, hospitals -- all the same tactics we saw for years in Iraq.
And now, all of this today leading to a very dramatic exchange between General Carter Ham and one of the most vocal administration critics, Senator John McCain.
SEN. JOHN MCCAIN (R), ARIZONA: Hearing your testimony, General Ham, is almost an Orwellian experience for me. The fact is that if we had imposed the no-fly zone three weeks, four weeks ago, Gadhafi would not be in power today.
The fact is that the situation on the ground is basically a stalemate.
Would you say that the situation on the ground is a stalemate or an emerging stalemate?
GEN. CARTER HAM, COMMANDER, U.S. AFRICA COMMAND: Senator, I -- I would agree with that if present on the ground.
MCCAIN: So the goal -- our policy objective of the removal of Gadhafi is further from being achieved than it was three or four weeks ago.
HAM: Senator, I -- I don't know that I would agree with that. What I -- because that, again, was not a military mission. The military mission of protecting, I think, was not wholly achieved, but achieved in large part.
STARR: General Ham also acknowledging another problem -- a key U.S. aircraft, the AC-130, that flies low and slow to target on the ground, is facing what he called "a significant threat" from surface to air missiles, which he said remain effective and operational in some cases.
And, Wolf, get this. General Ham says there were about 20,000 of those surface to air missiles when the campaign started and they are concerned that an awful lot of them are still out there -- Wolf.
BLITZER: Barbara, thanks very much for that report.
Panicked rebels are once again on the retreat from Gadhafi's forces. Just today, at least three people were killed, another 10 injured, in new air strikes. And there are mounting questions about whether NATO could be responsible for the attack.
Our senior international correspondent, Ben Wedeman, is joining us now from Benghazi.
Ben's watching all of this closely.
You just heard General Ham, who is the commander of the U.S. military's Africa Command. He was in charge of the mission before handing over complete control to NATO. You just heard him say there could be a stalemate out there.
What's the sense on the ground?
BEN WEDEMAN, CNN SENIOR INTERNATIONAL CORRESPONDENT: Well, the sense was a few days ago that it was, indeed, a stalemate -- sort of a seesaw battle that went back and forth between Ajdabiya and Brega.
But what we saw today was that that seesaw was tipped over. And it was a general retreat by the opposition forces from somewhere near Brega to almost the other side of Ajdabiya. This, after this air strike, which almost everybody on the ground believes to be NATO leaving not three, but four people dead. And many others are still unaccounted for.
That set off this general retreat whereby we saw all their heavy -- all of the opposition forces' heavy equipment -- multiple rocket launchers, tens and tens of these pickup trucks mounted with heavy machine guns streaming through Ajdabiya to the other side, the far side of the city. Some of them going all the way back to Benghazi, according to the head of the rebel forces in the eastern part of the country, Abdul Fatah Younis. He says that the Gadhafi forces were approaching Ajdabiya from three different directions.
I would not call that a stalemate -- Wolf.
BLITZER: Ben, you got a close-up look at some of the casualties today out on the front lines.
WEDEMAN: It's very bad, very bad. I mean it wasn't just fighters. It was also medics who had gone to the scene of this reported air strike, which then got hit again. So one of them was a doctor, one of them was a medic. And we were in the hospital. And there was real anger at NATO, anger at the fact that when they needed those air strikes on the Gadhafi forces, they weren't getting them. And now, for the second time in a week, there's been another strike. Now, of course, we must stress that NATO says that they -- because they don't have enough boots on the ground, they can neither confirm nor deny this was a NATO strike. But certainly, speaking to eyewitnesses in the hospital, it certainly sounded like an air strike. And there are no other planes in the skies of Libya other than NATO planes -- Wolf.
BLITZER: Ben Wedeman in Benghazi for us.
The U.S. says Moammar Gadhafi is no longer the legitimate leader of Libya.
So why not recognize the rebels?
Why one U.S. official says it raises serious concerns.
And a former U.S. Congressman in Libya armed with a message for the Libyan dictator.
Will he get to meet with him face-to-face?
My interview with Curt Weldon, that Republican former Congressman -- that's coming up, as well.
BLITZER: Let's get right to Jack.
He's got some nuclear concerns on his mind with The Cafferty File -- Jack.
JACK CAFFERTY, THE CAFFERTY FILE: Well, they had another little temblor in Japan -- a 7.1 magnitude earthquake hit Northeastern Japan today, the strongest aftershock since that massive 9.0 quake and tsunami that followed devastated that nation four weeks ago. And this one today was in roughly the same area.
One of the big concerns, of course, is possible further damage to the Fukushima Daiichi nuclear power plant. The Tokyo Electric Power Company, TEPCO, which operates the plant -- or what's left of it -- said there were no serious incidents as a result of today's aftershock.
So they say. Radioactivity from that plant has poisoned the surrounding land, air and ocean. Millions of people have been exposed. Millions more could be, as radioactivity has been picked up in food and drinking water and detected in faraway places, like California.
This week, workers plugged a crack in the plant that had been gushing contaminated water into the ocean for weeks. As a result, TEPCO says now radiation levels in the ocean waters off the coast there have dropped dramatically.
Yesterday, the head of the United Nations' scientific committee on the effects of atomic radiation said the Fukushima accident is not expected to have any serious impact on the health of the Japanese people. He said, quote: "We have seen traces of iodine in the air all over the world, but they are much, much, much lower than traces we have seen at similar distances following Chernobyl," unquote.
Well, not everybody is convinced. In South Korea, more than 130 primary schools and kindergartens ordered closed today outside of Seoul. People there were worried that windy, rainy weather could be carrying radioactive material from Japan.
North Korea aired warnings on television for its people to stay indoors during that rain storm and to take a full shower if they were caught outside in the storm.
Even here in the United States, some chefs are now using sensors to test levels of radiation in the fish they plan to serve in restaurants.
Here's the question -- do you think you're being told the truth about the nuclear accident in Japan?
If your -- if your trout is he glowing, Wolf --
BLITZER: Yes?
CAFFERTY: -- you might want to send it back and get a ham sandwich.
BLITZER: You want it well done, but not necessarily that well done.
CAFFERTY: No.
BLITZER: All right, Jack.
Not a laughing matter.
BLITZER: Serious stuff.
CAFFERTY: Right.
BLITZER: See you in a few moments.
New questions this hour about the capabilities of the rebels in Libya and whether they have the power to overthrow Moammar Gadhafi.
Should the United States -- should the United States have a hand in helping arm the rebels?
Let's bring in our foreign affairs correspondent, Jill Dougherty, with this part of the story.
What are you hearing over at the State Department -- Jill. JILL DOUGHERTY, CNN FOREIGN AFFAIRS CORRESPONDENT: Well, you know, Wolf, other countries have done it, other countries like France and Italy have done it -- recognizing the opposition. And supporters say now, with the rebels in retreat, the U.S. shouldn't wait.
But what would it really change anything?
DOUGHERTY (voice-over): The U.S. says Moammar Gadhafi is no longer the legitimate leader of Libya.
Secretary of State Hillary Clinton is full of praise for them.
HILLARY RODHAM CLINTON, SECRETARY OF STATE: These were not soldiers. These were not trained military forces. They were doctors and lawyers and university professors and economists and, you know, young men who were students. And they are being attacked by mercenaries, by ruthless forces that Gadhafi is utilizing to show no mercy against his people. And they are courageous. They are moving as fast as they can to try to form themselves into a military operation.
DOUGHERTY: Clinton has met with the rebel leaders personally, but the administration still is cautious. The president authorized the CIA to send in agents to learn about the rebels and assess their needs. Clinton's special representative, the State Department's Christopher Stevens, seen here in 2008 in Tripoli, is on the ground in Benghazi, scoping them out.
MARK TONER, U.S. STATE DEPARTMENT SPOKESMAN: We sent somebody in to get that kind of on the ground assessment of the -- of -- of their identity, of their leadership structure, to talk with them firsthand and to see what direction we think they're moving in. We've seen some positive signals.
DOUGHERTY: Recognizing the rebels, a senior official tells CNN, raises serious issues. It would acknowledge that Libya is now a divided country.
And could the U.S. be sure the group represents the whole opposition movement?
It's a bit early, this official says. Maybe they turn out not to be the right folks.
But Secretary Clinton knows the timing is urgent.
CLINTON: What NATO is doing is buying time, buying space.
DOUGHERTY: So far, the U.S. is providing what's called non- lethal humanitarian aid. The administration hasn't yet decided to arm them or provide financial assistance.
DOUGHERTY: But a senior U.S. official tells CNN there's a lot the United States could be doing right now without going so far as to recognize the rebels, pointing out that the U.S. funds political groups and other organizations around the world. But this official says you want to be careful about who they are.
So, so far, caution seems to be winning out over urgency -- Wolf.
Jill is at the State Department.
The House speaker, John Boehner, may be doing double duty if the government shuts down this weekend. You're going to find out why he could be cleaning up a lot of trash in his own backyard.
And a former U.S. Congressman now on a mission to meet with Moammar Gadhafi in Tripoli in person. Curt Weldon, he's here. He'll join us in THE SITUATION ROOM from Tripoli. You're going to find out who he says would be a good replacement for the embattled Libyan leader.
BLITZER: Military leaders have a message for Congress about "don't ask/don't tell."
Well, military leaders say preparations for repealing "don't ask/don't tell" are going better than they expected. They testified before a House committee today about getting rid of the policy that bars openly gay service members. They caution, though, that it will take time and training to implement the repeal. And it must still be certified by President Obama, the Defense secretary and the chairman of the Joint Chiefs of Staff.
Well, your Smartphone just got a little smarter. The FCC is requiring that wireless carriers provide access to the mobile Internet anywhere it's available, even when it's offered by a competing provider. And that could be a huge -- make a huge difference to smaller carriers, who told the FCC they just can't compete otherwise against industry heavyweights like Verizon and AT&T.
New York City school chancellor, Cathie Black, is stepping down after only three months on the job. Mayor Michael Bloomberg says her short stint just didn't work out as either of them had expected or hoped. Her approval rating has plunged to 17 percent.
Black chaired "First" magazine before overseeing the nation's largest school system. Deputy Mayor Dennis Walcott will replace her.
And a war of words is erupting between an emerging Republican star, New Jersey Governor Chris Christie, and his state's largest teachers' union. In a network TV interview, Christie called the union leaders, quote, "political thugs." He blames them for teacher lay-offs that he says could have been avoided if they had not opposed salary freezes. The New Jersey Education Association is firing back, accusing Christie of name-calling -- Wolf.
BLITZER: Sticks and stones will break many bones.
SYLVESTER: Sticks and stones may break my bones --
SYLVESTER: But words never hurt me.
A former U.S. Congressman is in Tripoli, Libya right now. His goal -- to talk to Moammar Gadhafi. His message -- we'll talk about that. My interview with Curt Weldon coming up next.
Plus, we showed it to you earlier -- a member of Congress telling colleagues to, quote, "go to hell."
Now she's is joining us live here in THE SITUATION ROOM to explain.
HOLMES NORTON: -- of Columbia. It's another thing to drop a bomb on a city. And that's what this --
BLITZER: Former Congressman Curt Weldon is in a -- Weldon is on a mission to Libya right now to try to meet with the embattled leader, Moammar Gadhafi. But that may be easier said than done.
Joining us now from Tripoli, former Republican Congressman Curt Weldon of Pennsylvania. Congressman, thanks very much for coming in.
And joining us now from Tripoli, former Republican Congressman Curt Weldon of Pennsylvania.
CURT WELDON, FORMER U.S. CONGRESSMAN: My pleasure, Wolf.
BLITZER: Let's talk about your meeting with Moammar Gadhafi. I take it it has not yet happened.
Do you expect to meet with the Libyan leader? WELDON: Absolutely. The invitation that was sent to me was from his chief of staff, Bashir Salah, who I've met on all three of my official visits here in 2004 and 2005. And the letter specifically says we want you to come over and meet with the leader and our senior leadership.
And I said it's worth me coming over to support the administration and to try to let the leader know face to face that this is facing -- it's very grave timing in the situation and they have to have some movement fairly quickly or they're not going to be happy with the -- with the alternatives.
BLITZER: What's taking so long?
Why haven't you been able to meet with Gadhafi yet?
WELDON: Well, it -- that's not unusual. I mean all three of the delegation trips that I led here in 2003 and 2004 -- or, actually, 2004 and 2005 -- they always make you wait until 30 minutes before the meeting and then you go. And some of those meetings were at 10:00 at night, some were at 5:00 in the afternoon.
As you know from the excellent reporting being done by your folks here, there's a lot of security concerns, and they are very concerned where Gadhafi is at any given moment. That's one of the issues, but we have been making ourselves available.
We have been doing a lot of back-channel meetings with friends and associates that I have here, and we have met with the chief of staff and one of the sons, and today with the prime minister, a very lengthy meeting for two hours. So, we're going to give them until tomorrow. We're not going to stay beyond that. And we have given them some suggestions, and we expect a response by midday tomorrow. And if we don't, we will done exit conversation with your people and let you know our feelings.
BLITZER: What's the major headline that you got out of these meetings with other leaders? I take it you met with Saif Al-Islam Gadhafi, one of the sons of Moammar Gadhafi. What are they saying to you?
WELDON: Well, we actually didn't meet with Saif. I have met with Saif probably 10 times over the past seven years, both in America and here in Libya. I have not yet met with Saif. I have offered, if he is available.
I have met with Saadi. And the general thrust is obviously that they want peace and they want to find a way out of this. But as I have explained to them, there's certain things that have to be done according to our president and our secretary of state, who I'm here to support.
We don't have a different agenda. There's no compromise on our part. Our only mission here is to talk face to face with them and say this is reality and this is a grave situation, and you need to do certain things that we suggest that we think will get our administration to respond to your actions. And again, we're not doing any negotiating.
They know me, they have seen my efforts. I have not taken anything from their country in the way of financial benefits, and I'm here only because I want to avoid war. I don't want to see American soldiers killed, and I don't want to see more innocence Libyans killed.
BLITZER: You wrote an op-ed in "The New York Times" this week saying that once you meet face to face with Moammar Gadhafi, you will tell him to step down. Is that still your intention?
WELDON: Absolutely, Wolf. I wrote the op-ed before the trip was planned. And I wrote it, Wolf, because back in 2004, when I led the first delegation of Americans to sit down with him in the tent in Tripoli, he said to me, "Congressman, why did it take 30 years for someone from your country to come and sit with me and tell me to my face that you believe that I'm a criminal and a terrorist. And then if you didn't believe me, bomb me?"
And I said, "Leader, I can't explain that." So I said now it's time for someone to sit in a tent face to face with Colonel Gadhafi and let him know how grave this situation is.
And I'm willing to do that. And I think I'm probably the best person because I have met with him three times, and because I sat in that tent in 2004 and listened to him tell me that. So, in effect, that's why I'm here.
BLITZER: You wrote also in "The New York Times" this -- you wrote, "Colonel Gadhafi's son, Saif, a powerful businessman, a politician, could play a constructive role as a member of the committee to devise a new government structure or constitution."
You know, a lot of people, including the opposition, the rebels, as they're called, they think Saif Al-Islam Gadhafi is just as much a killer or thug as his father is, and they say they have no interest in dealing with him either.
What do you say to that criticism?
WELDON: Well, what I said, I'm not endorsing anything anyone for any office here. What I am hoping for is what the president wants, which is a free and fair election to take place, hopefully sooner rather than later.
But having been involved with Libya for seven years, I was a witness to the work that Saif did in the Lockerbie case, the La Bella nightclub bombing. I personally witnessed through the Gadhafi Foundation the work that Saif did to free up the Bulgarian nurses who were sentenced to death twice, along with a Palestinian doctor.
I have seen the work that Saif and Dr. Salani (ph) at the foundation have done in dealing with chemical weapons destruction and with the elimination of landmines and humanitarian efforts worldwide. I have been out to (INAUDIBLE), the chemical weapons plant, and I have actually seen visibly how they have removed the chemical weapons production materials. He was behind all of that.
Believe me, Wolf, I'm not happy with some of the statements and the actions that he's made over the past month, and he knows I'm not happy. But I think in a fair election, up until now, he should be given the opportunity to seek office where he can run against other candidates, perhaps, for the presidency. And so I would at this time think that he should be allowed that opportunity.
That's not to say I condone anything that he said or his actions. He will have to be accountable for those on his own.
BLITZER: Because you make him sound like he's a decent guy when so many people think he is a killer, a murderer, especially given the statements that he recently made, that if he goes into Benghazi, if he finds these rebels, he will go and kill them all. You make it sound like he's a decent guy.
WELDON: Well, I -- you know, I haven't been with him on a continual basis. I have met with him a number of times, both in the U.S. and here, under some very stressful situations, especially when it came to resolving the Lockerbie case and the La Bella nightclub. And despite what Sarkozy said about resolving the issues of the Bulgarian nurses when they were sentenced to death twice, it was Saif who played a very critical role against some very powerful forces in this country that wanted to kill those people.
You know, I don't know of any incidences where I, first hand, have seen evidence of him committing human rights violations, and if he did, he has to be held accountable like everyone else. And I have said that publicly and I will say that privately.
So my judgment is just based upon my experience with him, the fact that he is a knowledgeable person, he understands the need to interact and interface with the West. I think he could be a viable candidate. But ultimately, my opinion is hopefully going to be the opinion of the Libyan people.
BLITZER: Because you probably have seen all of the articles, the reports over the past month, month and a half, of mass murder, of killings, not only by Saif Al-Islam, but some of his brothers that have gone on, the atrocities that have been so widely reported. I hear what you're saying about his role over the recent years when the Bush administration, and later the Obama administration, was trying to improve relations with Libya, but over the past several weeks, based on all of the international reporting we have seen, it's been a brutal record that he has accomplished.
WELDON: Well, again, I don't have firsthand evidence of that. I just got here two days ago. And I fully support an international tribunal to look at human rights violations on everyone in this country. That's necessary. And if they find evidence that he has been involved in that, then he should suffer the consequences of his actions.
(END VIDEOTAPE) BLITZER: In our next hour, part two of the interview with former congressman Curt Weldon. There have been some questions raised about his motive. Is he in all of this for the money? You're going to find out his answer to that and more. Stand by.
Also, Washington, D.C.'s congressional delegate is telling colleagues -- and I'm quoting her now -- "Go to hell." She is joining us live in THE SITUATION ROOM to tell us why.
Plus, no budget deal, no food -- the extreme tens of thousands of people are going to as a government shutdown looms.
BLITZER: Let's get back to the outrage boiling over on Capitol Hill, only hours before a potential government shutdown.
Joining us now, the Democratic delegate representing the city of Washington, D.C., Eleanor Holmes Norton.
ELEANOR HOLMES NORTON (D), D.C. DELEGATE: Of course, Wolf.
BLITZER: I think it's fair to say that Washington, D.C., a city of a population of about 600,000 people, the only major metropolitan -- the only major city in the United States that's going to foal the direct impact of a federal government shutdown so dramatically, so powerfully, because it is a federal district.
Give me an example of what's going to happen if there's a government shutdown.
NORTON: Absolutely, although your viewers will be shocked by what they are about to hear.
They know a little bit about taxation without representation -- we pay our taxes, then we have full representation in the House and the Senate. But I bet they didn't know that our local budget, without a dime of federal money in it -- and we support ourselves almost entirely -- has to be sent to the masters in the Congress to sign off on it before we can spend our own local money.
Well, listen to this, Wolf. We passed our budget in -- last spring. The appropriators signed off on it last summer.
So, why are we in a federal budget fight over their money when it is our money I am talking about? I have put forward amendments that said the district can spend its own local funds.
BLITZER: What's going to happen in the District of Columbia Saturday, Sunday, Monday, if there is a government shutdown? Give me an example or two.
NORTON: I will give you some dramatic ones. How about the shutdown of the D.C. government itself? Because since the final gavel hasn't fallen on all the federal appropriations, then the district government has now prepared to shut down on Saturday morning just because the federal government is shutting down.
We are at the height of the tourist season, the Cherry Blossom Festival. That has been severely curtailed because of the federal shutdown. That's going to -- three million people come here just in one month for the cherry blossoms. Our mayor has had to put out a list of agencies that will be open and a list of agencies that won't be open.
BLITZER: Trash collection -- will there be any trash collection in the District of Columbia?
NORTON: No trash collection, and some residents have started up a Facebook page that says if they close down the District of Columbia, we're carrying our trash to Speaker Boehner's House.
BLITZER: You don't support that do you?
NORTON: I do not.
NORTON: And let me just say right here, I do not. But let me tell you, I am only expressing a little of the rage that the taxpaying residents of the District of Columbia are feeling.
BLITZER: But let me ask you this, Congresswoman, because the Democrats were in control, they had a large majority in the House all of last year; in the Senate, a significant majority. They failed to pass a budget. Don't the Democrats deserve a lot of the blame for this current impasse?
NORTON: Absolutely not, because the Democrats would never have held our budget up here.
LISA BLOOM, CNN LEGAL ANALYST: Why didn't they pass the budget?
NORTON: Well, that doesn't have anything to do with us. This is our local money.
All it would take is -- the Democrats in the Senate are ready to agree. The president is ready to sign an amendment --
BLITZER: But they could have done this any time last year.
NORTON: Wait a minute, Wolf. Wait a minute -- an amendment that said while we're fighting it out on the federal budget, we will let the district spend its own local funds.
So that's all I'm asking. I'm not in this fight, so don't ask me why the Democrats didn't pass the Democratic budget.
I passed -- we passed our budget. Our budget is balanced. The only issue before the Senate and the House is, can we spend our local money? It doesn't have anything to do with their budget.
They can go on from now until Timbuktu. Let us spend our money and don't close down our city because the federal government can't get its act together.
BLITZER: I'm with you there. This is an outrage, the fact that there is -- if there is going to be shutdown. I'm still hoping there won't be a shutdown, but it's --
NORTON: I think there may not be.
BLITZER: -- ridiculous when you think about it, when you think about how close they are. It would be a horrible, horrible tragedy, because 800,000 people directly are going to start losing their paychecks. And the District of Columbia, which is, as you point out correctly, taxation without representation, is going to suffer a great deal more than any other city in the United States.
Good luck, Congresswoman. Thanks very much.
NORTON: Thank you, Wolf.
BLITZER: I feel your pain.
Concerns within military families over a government shutdown. Also, why they are downright scared they won't be able to put food on the table.
And tens of thousands of people on a hunger strike, including some members of Congress. We'll explain why.
CAFFERTY: The question this hour is: Do you believe you're being told the truth about the nuclear accident in January?
Fred writes, "You want the truth? You can't handle the truth."
"Just how should a government balance our right to know the truth with the perceived need to not create a panic and thus a larger problem? Can you really evacuate a million people? To where? Yes, without the truth, how can anyone try to act reasonably?"
"In the end, we do have a right to know the truth. Honesty is the best policy."
Paul in Ohio writes, "Jack, I believe they're telling what they think they know with certainty. It is most certain that they don't know everything."
Jeremy in California, "So I'm confused. Is the current California radiation level 'harmless to human health,' 'not immediately harmful to human health,' not permanently harmful to people outside the region,' or no more than an apples-to-oranges transcontinental flight?"
Craig writes, "Perspective. In Japan, they have had yet another earthquake and have lived in fear and chaos for over a month. And yet, their government hasn't shut down. Nuclear disaster, natural disaster, absolute destruction hasn't kept their elected officials from doing their duty to the people.
"Yet, in America, we get Harry Reid, John Boehner and a White House who are more concerned with the 2012 election campaign. It's times like these when we see just how far off the mark we really are."
Louis writes, "No. Just too many things going wrong. They say that the seafood will be safe. I ask this: Do fish migrate or do they set up housekeeping in one spot and then stay there? And if so, why don't I catch fish in the same place every day?"
And Jim in Colorado, "The nuclear industry telling the truth? The unicorn, garden gnome and I were talking this over just the other day, and we all agreed it could happen. Why not?"
If you want to read more about the unicorn and the garden gnome, go to CNN.com/CaffertyFile.
BLITZER: We will, for sure, Jack. Thank you. See you in a few moments.
Several sticking points in the ongoing budget negotiations, but will the government shutdown come down to money or social issues?
Plus, Donald Trump, he's making allegations about President Obama's birthplace. Does Donald Trump have any grounds for any of that? We're digging deeper for answers.
BLITZER: The growing outrage over the budget crisis isn't just about Congress' failure to reach a deal, it's also about some of the cuts that are being proposed.
Lets bring in our own Lisa Sylvester once again. She has the details -- Lisa.
Well, as congressional leaders hammer away on a budget compromise, a group of religious leaders have been fasting and praying to raise awareness of cuts in the budget that they say will harm the poor.
JIM WALLIS, PRESIDENT, SOJOURNERS: Orange juice never tasted so good.
SYLVESTER (voice-over): It's been 10 days since Jim Wallis last had solid food. The president of Sojourners, a Christian group that advocates for the underprivileged, is leading the charge among faith groups on a hunger fast to protest proposed cuts in the federal budget for the poor.
WALLIS: We're saying a budget is a moral document. And whether at your kitchen table, as a family, or a church or a nation, you make choices. What's important, what's not?
SYLVESTER: Wallis said in the last 10 days, more than 30,000 people around the country have joined in the fast in their own way. He says they have become a bit like God's lobbyists for the poor, putting a theological and moral spin on the cuts. Wallis said he is all for deficit reduction but --
WALLIS: I don't think doing this at the expense of the poorest people is a good choice, or hurting those who are already hurting the most is moral or even is smart.
SYLVESTER: Fiscal conservatives have suggested cuts in food stamps, foreign aid, and preschool programs for low-income families, that private groups can and should provide for the needy. But David Beckman of Bread for the World, who used to work at the World Bank, says the private sector can't fill the gap.
DAVID BECKMAN, PRESIDENT, BREAD FOR THE WORLD: All the private charitable feeding in the country amounts to about six percent of the food that poor people get from the national programs. So if you slash food stamps, as the House Republicans are proposing to do, there is no way that churches and charities and charitable people can make up for that.
SYLVESTER: Tony Hall was a member of Congress for years. As part of the fast, he is urging his former colleagues to reconsider cuts.
TONY HALL, ALLIANCE TO END HUNGER: When you make decisions about people's lives, be careful. You don't cut the poorest of the poor, because they didn't get you here. They didn't cause this mess.
SYLVESTER: On Wednesday, members of Congress began signing up for the fast.
REP. BARBARA LEE (D), CALIFORNIA: Several members of Congress today will be joining you in this fast.
SYLVESTER: Now, Sheila Jackson Lee, Keith Ellison and Jim McGovern are among 28 congressional Democrats who have signed on so far to join the hunger fast, and they will be doing a relay, with each taking one day to fast and then passing on the fast to their colleagues.
Wallis and Hall, they're doing it a little differently. They're fasting all the way through Easter Sunday. But they say for them, this fight for the poor is larger than just the specific budget battle -- Wolf.
BLITZER: These are committed, committed people to try to help.
We're going back to Libya in just a few moments. Rebel forces, furious with NATO right now, the R-rated message they are sending through our own Ben Wedeman.
|
[
"The sticking point in the political showdown over the budget is how much spending to cut."
] | 7,321
|
multifieldqa_en
|
en
| null |
6ee1971ac8c7c0ee4a5add9ec201557d28d3c2f66b176fb4
|
Who is responsible for carrying out the functions assigned under the act?
|
Bare Acts Live
Himachal Pradesh Town and Country Planning Act, 1977
Himachal Pradesh Town And Country Planning Rules, 1978
3. Form of Notice.
4. Manner of publication of notice.
5. Manner of publication of Regional Plan.
6. Notice of Modifications in Regional Plan.
7. Manner of publication of existing land-use map.
8. Manner of publication of approved Interim Development Plan.
9. Manner of publication of draft development plan.
10. Manner of publication of approved development plan.
11. Intention of development undertaken on behalf of Union or State Government.
12. Form of application for permission for development of land by others.
13. Form of permission.
14. Manner of communication of order under sub-section (4) of Section 31.
16. Notice by owner to purchase interest in land.
17. Manner of communication of revocation and modification permission to development.
20. Preparation of town development scheme.
21. Acquisition of land.
22. Mode of levy.
23. Power to borrow money.
24. Terms and conditions subject to which loans may be raised by the Special area Development Authority.
1. Short title, extent, commencement and application.
3. Director and other officers.
4. Establishment of regions.
5. Director to prepare regional plan.
6. Survey.
7. Contents of regional plan.
8. Preparation of regional plan.
9. Finalisation of regional plan.
10. Restriction on use of land or development thereof.
11. Exclusion from claims of amount in certain cases.
12. Review of regional plan.
13. Planning area.
14. Director to prepare development plans.
15. Existing land use maps.
16. Freezing of land use.
17. Interim development plans.
18. Development plan.
19. Publication of draft development plan.
20. Sanction of development plans.
21. Director to prepare sectoral plan.
22. Contents of sectoral plan.
23. Provisions of sections 19 and 20 to apply to sectoral plan.
24. Review of development plan and sectoral plan.
25. Director to control land use.
26. Conformity with development plan.
27. Prohibition of development without permission.
28. Development undertaken on behalf of Union or State Government.
29. Development by local authority or by any authority constituted under this Act.
30. Application for permission for development by others.
30A. Exemption from development permission in rural areas falling within Planning or Special Area.
30B. Exemption in respect of development of certain lands or buildings.
31. Grant or refusal of permission.
34. Lapse of permission.
35. Obligation to acquire land.
36. Deletion of reservation of designated land from draft or final development plan.
37. Power of revocation and modification or permission to development.
38. Penalty for unauthorised development or for use otherwise than in conformity with development plan.
39. Power to require removal of unauthorised development.
40. Establishment of Town and Country Development Authority.
41. Incorporation of Town and Country Development Authority.
42. Constitution of Town and Country Development Authority.
42A. Constitution of Town and Country Development Authority for the Capital Town of Himachal Pradesh.
43. Term of office of Chairman and other members.
44. Resignation of members and filling of casual vacancy.
45. Remuneration of Chairman.
46. Leave of absence and appointment etc. of acting Chairman.
47. Meeting of Town and Country Development Authority.
48. Chief Executive Officer.
49. Other officers and servants.
50. Conditions of service of Chief Executive Officer and other officers and servants.
51. Town development schemes.
53. Power to revise the development schemes.
54. Power of State Government to give Directions.
55. Restriction on land use and development.
56. Lapse of scheme.
57. Town development scheme public purpose.
58. Acquisition of land for Town and Country Development Authority.
59. Developments.
60. Disposal of land, buildings and other development works.
61. Development charges.
63. Fund of Town and Country Development Authority.
64. Annual budget.
66. Constitution of special areas.
67. Special area Development Authority.
68. Incorporation of Special Area Development Authority.
70. Functions.
71. Powers.
72. Fund of Special Area Development Authority.
73. Annual estimates.
74. Power of State Government of supervision and control.
76. Power of Government to review plans etc. for ensuring conformity.
78. Dissolution of authorities.
79. Right of entry.
80. Jurisdiction of Court.
82. Member and officers to be public servants.
83. Suit and other proceedings.
84. Vacancy not to invalidate proceedings.
85. Member to continue till successor enters upon office.
86. Interpretation of regional plan etc.
87. Powers to moke rules.
89. Power to lay the rules and regulations.
The Himachal Pradesh Town and Country Planning Act, 1977
(as amended by Amendment Act No. 22 of 1983)
Amended by Act No. 8 of 2009
Act published in the Rajpatra, Extraordinary, dated the 30th September, 1977 vide Law Department Notification No. LLR-D(6)5/77, dated the 22nd September, 1977.
An Act to make provision for planning and development and use of land; to make better provision for the preparation of development plans and sectoral plans with a view to ensuring that town planning schemes are made in a proper manner and their execution is made effective; to constitute the Town and Country and Development Authority for proper implementation of town and country development plan; to provide for the development and administration of special areas through the Special Area Development Authority; to make provision for the compulsory acquisition of land required for the purpose of the development plans and for purposes connected with the matters aforesaid.
Be it enacted by the Himachal Pradesh Legislative Assembly in the Twenty-eighth Year of the Republic of India as follows:-
1. Short title, extent, commencement and application. - (1) This Act may be called the Himachal Pradesh Town and Country Planning Act, 1977.
(3) It shall come into force on such date as the State Government may, by notification, appoint and different dates may be appointed for different areas and for different provisions of this Act.
(4) Nothing in this Act shall apply to-
(a) lands comprised within a cantonment under the Cantonments Act, 1924; (2 of 1924).
(b) lands owned, hired or requisitioned by the Central Government for the purpose of naval, military and air force works;
(c) lands under the control of railway administration for the purpose of construction and maintenance of works under Chapter III of the Indian Railways Act, 1890; (9 of 1890) and
(d) lands owned by any department of the Central Government where operational constructions are going on.
(a) "agriculture" includes horticulture, farming, raising of annual or periodical crops, fruits, vegetables, flowers, grass, fodder, trees or any kind of cultivation of soil, the reserving of land for fodder, grazing or thatching areas, breeding and keeping of livestock including cattle, horses, donkeys, mules, pigs, breeding of fish and keeping of bees, and the use of land ancillary to the farming of land, but does not include-
(i) keeping of cattle purely for the purpose of milking and selling the milk and milk products,
(ii) a garden which is an appendage of buildings, and the expression "agricultural" shall be construed accordingly;
(b) "amenity" includes roads and streets, water and electric supply, open spaces, parks, recreational area, natural feature, playgrounds, street lighting, drainage, sewerage and other utilities, services and conveniences;
(c) "building" includes any structure or erection, or part of a structure or erection, which is intended to be used for residential, industrial, commercial or other purposes, whether in actual use or not;
(d) "building operation" includes-
(i) erection or re-erection of a building or any part thereof,
(ii) roofing or re-roofing of any part of building or an open space,
(iii) any material alteration or enlargement of a building,
(iv) any such alteration of a building as is likely to alter its drainage or sanitary arrangements, or materially affect its security,
(v) the construction of a door opening on any street or land not belonging to the owner;
(e) "commercial use" means the use of any land or building or part thereof for the purpose of carrying on any trade, business or profession, or sale or exchange of goods of any type whatsoever and includes running of with a view to make profit hospitals, nursing homes, infirmaries, educational institutions, hostels, restaurants and boarding houses not being attached to any educational institutions, sarais and also includes the use of any land or building for storage of goods or as buildings for storage of goods or as an office whether attached to an industry or otherwise;
(f) "court" means the principal civil court of original jurisdiction in the district;
(g) "development" with its grammatical variations means the carrying out of a building, engineering, mining or other operations in, on, over or under land, or the making of any material change in any building or land or in the use of either, and includes sub-division of any land;
(h) "development plan" means interim development plan or development plan prepared under this Act;
(i) "director" means the Director of Town and Country Planning appointed under this Act;
(j) "existing land use map� means a map indicating the use to which lands in any specified area are put at the time of preparing the map, and includes the register prepared, with the map giving details of land-use;
(k) "land" includes benefits to arise out of land and things attached to the earth or permanently fastened to anything attached to the earth;
(l) "member" means a member of a Town and Country Development Authority or a Special Area Development Authority, as the case may be, and includes a Chairman thereof;
(m) "occupier" includes-
(i) a tenant,
(ii) an owner in occupation of or otherwise using his land,
(iii) a rent free tenant,
(iv) a licensee, and
(v) any person liable to pay to the owner, damages for the use and occupation of the land;
(n) "owner" includes a mortgagee in possession, a person who for the time being is receiving or is entitled to receive, or has received, the rent or premium for any land whether on his own account or on behalf of or for the further benefit of any other person or as an agent, trustee, guardian or receiver for any other person or for religious or charitable institutions or who would receive the rent or be entitled to receive the rent or premium if the land were to be let and includes a head of a Government department, General Manager of a Railway and the Chief Executive Officer, by whatever name designated, or a local authority, statutory authority, company, corporation or undertaking in respect of properties under their control;
(o) "planning area" means any area declared to be planning area under this Act;
(p) "region" means any area established to be a region under this Act;
(q) "regional plan" means a plan for the region prepared under this Act and approved by the State Government;
(r) "sector" means any sector of a planning area for which, under the development plan, a detailed sectoral plan is prepared;
(s) "slum area" means any predominantly residential area, where the dwellings which by reason of dilapidation, over-crowding, faulty arrangement of design, lack of ventilation, light or sanitary facilities or any combination of these factors are detrimental to safety, health or moral and which is defined by a development plan as a slum area;
(t) "special area" means a special area designated as such under section 66;
(u) "Special Area Development Authority� means an authority constituted under section 67;
(v) "Town Development Scheme" means a scheme prepared for the implementation of the provisions of a development plan by the Town and Country Development Authority; and
(w) "Town and Country Development Authority" means an authority established under section 40.
Director of Town and Country Planning
3. Director and other officers. - (1) After the commencement of this Act the State Government shall, by notification in the Official Gazette, appoint an officer for the purpose of carrying out functions assigned to him under this Act, as the Director of Town and Country Planning for the State and may appoint such other categories of officers as it may deem fit.
(2) The Director shall exercise such powers and perform such duties as are conferred or imposed upon him by or under this Act and the officers appointed to assist the Director shall, within such area as the State Government may specify, exercise such powers and perform such duties conferred and imposed on the Director by or under this Act as the State Government may, by special or general order, direct.
(3) The officers appointed to assist the Director shall be subordinate to him and shall work under his guidance, supervision and control.
4. Establishment of regions. - (1) The State Government may, by notification,-
(a) declare any area in the State to be a region for the purposes of this Act;
(b) define the limits of such area; and
(c) specify the name by which such region shall be known.
(2) The State Government may, by notification, alter the name of any such region and on such alteration, any reference in any law or instrument or other document to the region shall be deemed to be a reference to the region as re-named unless expressly otherwise provided or the context so requires.
(3) The State Government may, by notification,-
(a) alter the limits of a region so as to include therein or exclude therefrom Such area as may be specified in the notification;
(b) amalgamate two or more regions so as to form one region;
(c) divide any region into two or more region; or
(d) declare that the whole or part of the area comprising a region shall cease to be a region or part thereof.
5. Director to prepare regional plan. - Subject to the provisions of this Act and the rules made thereunder, it shall be the duty of the Director-
(i) to carry out a survey of the regions;
(ii) to prepare an existing land use map; and
(iii) to prepare a regional plan.
6. Survey. - (1) The Director shall, with a view to prepare the existing land use map, and other maps as are necessary for the purpose of regional plan,-
(a) carry out such surveys as may be necessary;
(b) obtain from any department of Government and any local authority such maps, survey reports and land records as may be necessary for the purpose.
(2) It shall be the duty of every Government department and local authority to furnish, as soon as may be possible, maps, reports and record, as may be required by the Director.
7. Contents of regional plan. - The regional plan shall indicate the manner in which land in the region should be used, the phasing of development, the net work of communications and transport, the proposals for conservation and development of natural resources, and in particular-
(a) allocation of land to such purposes as residential, industrial; agricultural or as forests or for mineral exploitation;
(b) reservation of open spaces for recreational purposes, gardens, tree belts, and animal sanctuaries;
(c) access or development of transport and communication facilities such as roads, railways, water ways, and the allocation and development of airports;
(d) requirements and suggestions for development of public utilities such as water supply, drainage and electricity;
(e) allocation of areas to be developed as "Special Areas� wherein new towns, townships, large industrial estates or any other type of large development projects may be established;
(f) landscaping and the preservation of areas in their natural state,
(g) measures relating to the prevention of erosion, including rejuvenation of forest areas;
(h) proposals relating to irrigation, water supply or flood control works.
8. Preparation of regional plan. - (1) After preparation of the existing land use map, the Director shall cause to be prepared a draft regional plan and publish it by making a copy thereof available for inspection and publishing a notice in such form and manner as may be prescribed inviting objections and suggestions from any person with respect to the draft plan before such date as may be specified in the notice, such date not being earlier than sixty days from the publication of the notice. Such notice shall specify in regard to the draft plan the following particulars, namely-
(a) the existing land use map and the narrative report thereon;
(b) a narrative report supported by necessary map and charts explaining the provisions of the draft plan;
(c) a note indicating the priorities assigned to works included in the draft plan and the phasing of the programme of development as such;
(d) a notice on the role being assigned to different departments of Government, the Town and Country Development Authorities; the Special Area Development Authorities, and the Local Authorities in the enforcement and implementation of draft plan.
(2) The Director shall consider all the objections and suggestions received by him within the period specified in the notice under sub-section (1) and shall, after giving a reasonable opportunity to all persons affected thereby of being heard, prepare the regional plan containing such modifications, if any, as he considers necessary and submit it to the State Government for approval together with all connected documents, plans, maps and charts.
9. Finalisation of regional plan. - (1) The State Government may approve the draft regional plan submitted under section 8 with or without modification or reject or return the same to the Director for reconsideration.
(2) Immediately after the draft regional plan is approved under sub-section (1) the State Government shall publish in such manner, as may be prescribed, a notice stating that the regional plan has been approved and mentioning a place where a copy of the plan may be inspected at all reasonable hours and shall specify therein a date on which the regional plan shall come into operation:
Provided that where the State Government approves the draft regional plan with modifications, it shall not be published, unless the State Government having published such modifications in the Official Gazette along with a notice inviting objections and suggestions thereon, within a period of not less than thirty days from the date of publication of such notice have considered the objections and suggestions after giving a reasonable opportunity of being heard to persons affected thereby.
10. Restriction on use of land or development thereof. - (1) Notwithstanding anything contained in any other law for the time being in force, on or after the date of publication of the draft regional plan, no person, authority, department of Government or any other person shall change the use of land for any purpose other than agriculture, or carry out any development in respect of any land contrary to the provisions of the draft plan, without the prior approval of the Director or any officer next to him authorised by the Director, in this behalf.
(2) Notwithstanding anything contained in any law for the time being in force, the permission referred to in sub-section (1) shall not be granted otherwise than in conformity with the provision of the draft or final plan and no permission, if granted, shall be construed to confer any legal right whatsoever on the person seeking the permission.
(3) If any work is carried out in contravention of the provisions of this section, the Municipal Corporation or Municipal Committee within its local area, and the Collector in area outside such local areas, may cause such work to be removed or demolished at the cost of the defaulter, which shall be recovered from him in the same manner as an arrear of land revenue:
Provided that no action shall be taken under this sub-section unless the person concerned is given a reasonable opportunity of being heard and a notice calling upon him to remove or demolish the work within a time specified therein.
(4) Any person aggrieved by the order of the Municipal Corporation, Municipal Committee or Collector, as the case may be, calling upon to remove or demolish the work may prefer an appeal to the Director within fifteen days of the receipt of the notice under sub-section (3) and the order of the Director in such appeal shall be final.
11. Exclusion from claims of amount in certain cases. - Where the regional plan assigns a particular land use to a certain areas and any land situate therein is already put to such use, subject to substantially similar restrictions in force under any other law which was in force on the date on which restrictions were imposed by or under this Act and if amount in respect of such restrictions have already been paid under any such other law which was in force for the time being in respect of the property or any right or interest therein to the claimant, or any predecessor in interest of the claimant, the owner shall not be entitled to any further amount on account of injury or damage caused to his rights by reasons of the restrictions placed on the use of the land under the provisions of this Act.
12. Review of regional plan. - (1) The Director may, on his own motion or if so required by the State Government, at any time after a regional plan has come into operation, undertake the review and evaluation of the regional plan and make such modification in it as may be justified by the circumstances.
(2) The foregoing provisions of this Chapter shall, so far as they can be made applicable, apply to the modifications under sub-section (1) as these provisions apply in relation to the preparation, publication and approval of a regional plan.
Planning Area and Development Plans
13. Planning area. - (1) The State Government may, by notification, constitute planning areas for the purposes of this Act and define the limits thereof.
(2) The State Government may, by notification.-
(a) alter the limits of a planning area so as to include therein or excluse therefrom such area as may be specified in the notification;
(b) amalgamate two or more planning areas so as to constitute one planning area;
(c) divide any planning area into two or more planning areas;
(d) declare that the whole or part of the area constituting the planning area shall cease to be a planning area or part thereof.
14. Director to prepare development plans. - Subject to the provisions of this Act and the rules made thereunder, the Director shall-
(a) prepare an existing land use map;
(b) prepare an interim development plan;
(c) prepare a development plan;
(d) prepare a sectoral plan;
(e) carry such surveys and inspections and obtain such pertinent reports from government departments, local authorities and public institutions as may be necessary for the preparation of the plans;
(f) perform such duties and functions as are supplemental, incidental, and consequential to any of the foregoing functions or as may be assigned by the State Government for the purpose of carrying out the provisions of this Act.
15. Existing land use maps. - (1 )The Director shall carryout the survey and prepare an existing land use map and, forthwith publish the same in such manner as may be prescribed together with public notice of the preparation of the map and of the place or places where the copies may be inspected, inviting objections and suggestions in writing from any person with respect thereto within thirty days from the date of publication of such notice.
(2) After the expiry of the period specified in the notice published under sub-section (1), the Director may, after allowing a reasonable opportunity of being heard to all such persons who have filed the objections or suggestions, make such modifications therein as may be considered desirable.
(3) As soon as may be after the map is adopted with or without modifications the Director shall publish a public notice of the adoption of the map and the place or places where the copies of the same may be inspected.
(4) A copy of the notice shall also be published in the Official Gazette and it shall be conclusive evidence of the fact that the map has been duly prepared and adopted.
16. Freezing of land use. - On the publication of the existing land use map under section 15-
(a) no person shall institute or change the use of any land or carry out any development of land for any purpose other than that indicated in the existing land use map without the permission in writing of the Director;
Provided that the Director shall not refuse permission if the change is for the purpose of agriculture;
(b) no local authority or any officer or other authority shall, not withstanding anything contained in any other law for the time being in force, grant permission for the change in use of land otherwise than as indicated in the existing land use map without the permission in writing of the Director;
[(c) no Registrar or the Sub-Registrar, appointed under the Indian Registration Act, 1908, shall, in any planning area constituted under section 13, register any deed or document of transfer of any sub-division of land by way of sale, gift, exchange, lease or mortgage with possession, unless the sub-division of land is duly approved by the Director, subject to such rules as may be framed in this behalf by the State Government:]
Provided that the Registrar or the Sub-Registrar may register any transfer,-
(i) where the land is owned by a person and the transfer is made without involving any further divisions;
(ii) where the partition/sub-division of land is made in a Joint Hindu Family;
(iii) where the lease is made in relation to a part or whole of a building;
(iv) where the mortgage is made for procuring the loans for construction or improvements over the land either from the Government or from any other financial institution constituted or established under any law for the time being in force or recognised by the State Government.
17. Interim development plans. - As soon as may be, after the declaration of a planning area, the Director shall, within such time as may be necessary, prepare, after consultation with local authorities concerned, if any, and submit to the State Government an interim development plan for the planning area or any of its parts and such other area or areas contiguous or adjacent to the planning areas as the State Government may direct to be included in the interim development plan.
(2) The interim development plan shall-
(a) indicate broadly the land use proposed in the planning area;
(b) allocate broadly areas or sector of land for-
(i) residential, industrial, commercial or agricultural purposes,
(ii) open spaces, parks and gardens, green belts, zoological gardens and play-grounds,
(iii) public institutions and offices,
(iv) such special purposes as the Director may deem fit;
(c) lay down the pattern of National and State Highways connecting the planning area with the rest of the region, ring roads, arterial roads and the major roads within the planning areas;
(d) provide for the location of airports, railway stations, bus termini and indicate the proposed extension and development of railways and canals;
(e) make proposals for general land scaping and preservation of natural areas;
(f) project the requirement of the planning area of such amenities and utilities as water, drainage, electricity and suggest their fulfilment;
(g) propose broad based regulations for sectoral development, by way of guide-lines, within each sector of the location, height, size of buildings and structures, open spaces, court-yards and the use to which such buildings and structures and land may be put;
(h) lay down the board-based traffic circulation patterns in a city;
(i) suggest architectural control features, elevation and frontage of buildings and structures;
(j) indicate measures for flood control, prevention of air and water pollution, disposal of garbage and general environmental control.
(3) Subject to provisions of the rules made under this Act for regulating the form and contents of the interim development plan any such plan shall include such maps and such descriptive matter as may be necessary to explain and illustrate the proposals in the interim development plan.
(4) As soon as may be, after the submission of the interim development plan, under sub-section (1) the State Government may either approve the interim development plan or may approve it with such modification as it may consider necessary.
(5) The State Government shall publish the interim development plan as approved under sub-section (4) in the Official Gazette. The interim development plan shall come into operation from the date of its publication in the Official Gazette and shall be binding on all local authorities functioning within the planning areas.
18. Development plan. - A development plan shall -
(a) indicate broadly the land use proposed in the planning areas;
(b) allocate broadly areas or sector of land for,-
(c) lay down the pattern of National and State Highways connecting the planning area with the rest of the region, ring roads, arterial roads, and the major roads within the planning area;
(d) provide for the location of airports, railway stations, bus termini and indicate the proposed extension and development of railways;
(g) propose broad-based regulations for sectoral development, by way of guide-line, within each sector of the location, height, size of buildings and structures, open spaces, court-yards and the use to which such buildings and structures and land may be put;
(h) lay down the broad-based traffic circulation patterns in a city;
19. Publication of draft development plan. - (1) The Director shall forthwith publish the draft development plan prepared under section 18 in such manner as may be prescribed together with a notice of the preparation of the draft development plan and the place or places where the copies may be inspected, inviting objections and suggestions in writing from any person with respect thereto, within thirty days from the date of publication of such notice Such notice shall specify in regard to the draff development plan the following particulars, namely:-
(i) the existing land use maps;
(ii) a narrative report, supported by maps and charts, explaining the provisions of the draft development plan;
(iii) the phasing of implementation of the draft development plan as suggested by the Director,
(iv) the provisions for enforcing the draft development plan and stating the manner in which permission to development may be obtained;
(v) an approximate estimate of the cost of land acquisition for public purposes and the cost of works involved in the implementation of the plan.
(2) The Director shall, not later than ninety days after the date of expiry of the notice period under sub-section (1), consider all the objections and suggestions as may be received within the period specified in the notice under sub-section (1)and shall, after giving reasonable opportunity to all persons affected thereby of being heard, make such modifications in the draft development plans as he may consider necessary, and submit, not later than six months after the publication of the draft development plan, the plan so modified, to the State Government for approval together with all connected documents, plans, maps and charts.
20. Sanction of development plans. - (1) As soon as may be after the submission of the development plan under section 19 the State Government may either approve the development plan or may approve it with such modifications as it may consider necessary or may return it to the Director to modify the same or to prepare a fresh plan in accordance with such directions as it may issue in this behalf.
(2) Where the State Government approves the development plan with modifications, the State Government shall, by a notice, published in the Official Gazette, invite objections and suggestions in respect of such modifications within a period of not less than thirty days from the date of publication of the notice in the Official Gazette.
(3) After considering objections and suggestions and after giving a hearing to the persons desirous of being heard the State Government may confirm the modification in the development plan.
(4) The State Government shall publish the development plan as approved, under the foregoing provisions in the Official Gazette and shall along with the plan publish a public notice, in such manner as may be prescribed, of the approval of the development plan and the place or places where the copies of the approved development plan may be inspected.
(5) The development plan shall come into operation from the date of publication thereof in the Official Gazette and as from such date shall be binding on all Development Authorities constituted under this Act and all local authorities functioning within the planning area.
(6) After the coming into operation of the development plan, the interim development plan shall stand modified or altered to the extent the proposals in the development plan are at variance with the interim development plan.
Sectoral Plan
21. Director to prepare sectoral plan. - The Director may, on his own motion, at any time after the publication of the development plan, or thereafter if so required by the State Government shall, within six months of such requisition, prepare a sectoral plan.
22. Contents of sectoral plan. - (1) The sectoral plan shall enlarge the details of land use as indicated in the development plan and shall -
(a) indicate the land liable to acquisition for public purpose or the purposes of the Union Government, the State Government, the Town and Country Development Authority, the Special Area Development Authority, the local authority or any other authority established by or under any enactment for the time being in force.
Provided that no land shall be so designated unless the acquisition proceedings are likely to be completed within ten years of the preparation of the plan;
(b) define in detail and provide for areas reserved for agriculture, public and semi-public open spaces, parks, playgrounds, gardens, recreational areas, green belts and natural reserves;
(c) allocate in detail areas or sectors for residential, commercial, industrial, agricultural and other purposes;
(d) define and provide for the complete road and street pattern for the present and in the future and indicate the traffic circulation;
(e) lay down in detail the projected road and street improvement;
(f) indicate and provide for areas reserved for public buildings, institutions and civic developments;
(g) assess, make projections for and provide for the future requirements of amenities, services and utilities such as municipal, transport, electricity, water and drainage;
(h) prescribe in detail the sectoral regulations for each sector, with a view to facilitating on individual layout and regulating the location, height, number of storeys and the size of buildings and other structures, the size of the court-yards, courts and other open spaces and the use of the buildings, structures and land;
(i) define areas which have been badly laid out or areas which have developed so as to form slums, and provide for their proper development and/or relocation;
(j) designate areas for future development and expansion;
(k) indicate the phasing of the programme of development.
(2) The sectoral plan may and if possible shall, indicate -
(a) control over architectural features; elevation and frontage of buildings and structures; and
(b) the details of development of specific areas for housing, shopping centres, industrial areas, educational and cultural institutions and civic centres.
23. Provisions of sections 19 and 20 to apply to sectoral plan. - The provisions of sections 19 and 20 shall apply for the preparation, publication, approval and operation of sectoral plan as they apply in respect of the development plan.
24. Review of development plan and sectoral plan. - The Director may on his own motion or if so required by the State Government shall, at any time after the sectoral plan has come into operation, undertake a review and evaluation of the development plan and sectoral plan.
(2) The foregoing provisions of sections 19, 20 and 23 shall, so far as may be apply to the modification under sub-section (1) as those provisions apply in relation to the preparation, publication and approval of a development plan or a sectoral plan.
Control of Development And Use of Land
25. Director to control land use. - The overall control of development and the use of land in the planning area shall, as from the date of publication in the Official Gazette of a notification by the State Government, vest in the Director.
26. Conformity with development plan. - (1) After coming into force of the development plan, the use and development of land shall conform to the provisions of the development plan:
Provided that the Director may, at his discretion, permit the continued use of land for the purpose for which it was being used at the time of the coming into Operation of the development plan.
Provided further that such permission shall not be granted for a period exceeding seven years from the date of coming into operation of the development plan.
27. Prohibition of development without permission. - After coming into operation of the development plan, no person shall change the use of any land or carry out any development of land without the permission in writing of the Director.
Provided that no such permission shall be necessary -
(a) for carrying out works for the maintenance, repair or alteration of any building which does not materially alter the external appearance of the building;
(b) for carrying out work for the improvement or maintenance of a highway, road or public street by the Union or State Government or an authority established under this Act or by a local authority having jurisdiction, provided that such maintenance or improvement does not change the road alignment contrary to the provisions of the development plan;
(c) for the purpose of inspecting, repairing or renewing any drain, sewers, mains, pipes, cables, telephone or other apparatus including the breaking open of any street or other land for that purpose;
(d) for the excavation or soil shaping in the interest of agriculture;
(e) for restoration of land to its normal use where land has been used temporarily for any other purposes.
(f) for use for any purpose incidental to the use of building for human habitation, or any other building or land attached to such buildings;
(g) for the construction of a road intended to give access to land solely for agricultural purposes
28. Development undertaken on behalf of Union or State Government. - (1) When the Union Government or the State Government intends to carry out development of any land for the purpose of its departments or offices or authorities, the officer-in-charge thereof shall inform in writing to the Director the intention of the Government to do so, giving full particulars thereof, accompanied by such documents and plans as may be prescribed at least thirty days before undertaking such development.
(2) Where the Director raises any objection to the proposed development on the ground that the development is not in conformity with the provisions of the development plan, the officer shall,-
(i) make necessary modification in the proposals for development to meet the objections raised by the Director, or
(ii) submit the proposal for development together with the objections raised by the Director to the State Government for decision:
Provided that where no modification is proposed by the Director within thirty days of the receipt of the proposed plan by the Government, the plan will be presumed to have been approved.
(3) The State Government, on receipt of the proposals for development together with the objections of the Director shall, approve the proposals with or without modifications or direct the officer to make such modifications in the proposals as it considers necessary in the circumstances.
(4) The decision of the State Government under sub-section (3) shall be final and binding.
29. Development by local authority or by any authority constituted under this Act. - Where a local authority or any authority specially constituted under this Act intends to carry out development on any land for the purpose of that authority, the procedure applicable to the Union or State Government, under section 28 shall, mutatis' mutandis, apply in respect of such authority.
30. Application for permission for development by others. - (1) Any person, not being the Union Government, State Government, a local authority or a special authority constituted under this Act intending to carry out any development on any land, shall make an application in writing to the Director for permission, in such form and containing such particulars and accompanied by such documents as may be prescribed.
(2) Such application shall also be accompanied by such fee as may be prescribed.
[30A. Exemption from development permission in rural areas falling within Planning or Special Area. - (1) Any person who owns land in rural areas, falling within Planning or Special Areas wherein neither Interim Development Plan nor Development Plan has been notified, shall be exempted from permission under this Act for the following development activities up to the limits as may be prescribed: -
(i) Residential activities such as farm-houses and residential houses up to three storeys, cattle shed, toilet, septic tank, kitchen, store, parking shed or garage and rain shelter;
(ii) Commercial activities such as basic commercial activities like shops of general merchandise, cobbler, barber, tailoring, fruit, vegetable, tea or sweet, eating places and dhabas, chemist and farm produce sale depot;
(iii) Service Industries such as cottage or house-hold, service industries like carpentry, knitting, weaving, blacksmith, goldsmith, atta-chakki with capacity up to five horse-power, water mill, agriculture equipments or machinery repair, electrical, electronic and house-hold appliances;
(iv) Public amenities such as public amenities like panchayat offices, schools, mahila mandals, yuvak mandals, community halls, post offices, dispensaries and clinics (including health, veterinary and Indian System of Medicines) information technology kiosks, patwar khanas, guard huts, anganwaries, electricity and telephone installations and connections, roads and paths, ropeways, water tanks, rain harvesting tanks, overhead or underground water tan.
|
[
"The Director of Town and Country Planning is responsible for carrying out the functions assigned under the act."
] | 6,958
|
multifieldqa_en
|
en
| null |
a8da0d2585bb54d571a2ab4a539b61eef56b5e271692be42
|
How does the framework capture the reduced-order dynamics?
|
Paper Info
Title: Interpretable reduced-order modeling with time-scale separation Interpretable reduced-order modeling with time-scale separation
Publish Date: 7 March 2023
Author List: Sebastian Kaltenbach (from CSE-Lab, ETH Zurich, Harvard SEAS), Phaedon-Stelios Koutsourelakis (from CSE-Lab, ETH Zurich, Harvard SEAS), Petros Koumoutsakos (from CSE-Lab, ETH Zurich, Harvard SEAS), Harvard Seas (from CSE-Lab, ETH Zurich, Harvard SEAS)
Figure
FIG. 5. Comparison between the phase-space of the reference solution (left) and the phase-space of the predictions
FIG. 7. Comparison between predictions and reference solutions for a new initial condition fort = 1.25, 3.75, 7.5, 12.5, 20, 30 (from left to right and top to down).We note that with longer prediction time the uncertainty bounds increases.Despite the chaotic nature of the KS equation, the predictive posterior mean is close to the reference solution for t ≤ 12.5
abstract
Partial Differential Equations (PDEs) with high dimensionality are commonly encountered in computational physics and engineering. However, finding solutions for these PDEs can be computationally expensive, making model-order reduction crucial. We propose such a data-driven scheme that automates the identification of the time-scales involved and, can produce stable predictions forward in time as well as under different initial conditions not included in the training data.
To this end, we combine a non-linear autoencoder architecture with a time-continuous model for the latent dynamics in the complex space. It readily allows for the inclusion of sparse and irregularly sampled training data. The learned, latent dynamics are interpretable and reveal the different temporal scales involved.
We show that this data-driven scheme can automatically learn the independent processes that decompose a system of linear ODEs along the eigenvectors of the system's matrix. Apart from this, we demonstrate the applicability of the proposed framework in a hidden Markov Model and the (discretized) Kuramoto-Shivashinsky (KS) equation.
Additionally, we propose a probabilistic version, which captures predictive uncertainties and further improves upon the results of the deterministic framework.
INTRODUCTION
High-fidelity simulations of critical phenomena such as ocean dynamics and epidemics have become essential for decision-making. They are based on physically-motivated PDEs expressing system dynamics that span multiple spatiotemporal scales and which necessitate cumbersome computations . In recent years there is increased attention to the development of data-driven models that can accelerate the solution of these PDEs as well as reveal salient, lower-dimensional features that control the long-term evolution.
In most cases, data-driven reduced-order models are not interpretable. In particular, models based on neural networks despite good predictive capabilities , they offer a black-box description of the system dynamics. A possible remedy is applying a symbolic regression to the learned neural network representation , but this adds additional computational cost due to the two-step procedure.
A number of frameworks such as SINDy allows to learn interpretable dynamics but it relies on the a-priori availability of lower-dimensional descriptors and of time-derivatives which can be very noisy for both simulation and experimental data. Other frameworks are tailored to specific problems such as molecular dynamics .
Here, we present a framework that only needs the value of the observables, and not their derivatives, as training data and is capable of identifying interpretable latent dynamics. The deployment of interpretable latent dynamics ensures that conservation of important properties of that are reflected in the reduced-order model .
The present method is related to approaches based on the Koopman-operator extended Dynamic Mode Decomposition (eDMD) but uses continuous complex-valued latent space dynamics and only requires one scalar variable per latent dimension to describe the latent space dynamics. Therefore we do not have to enforce any parametrizations on the Koopman matrix .
The time-continuous formulation moreover allows to incorporate sparse and irregularly sampled training data and fast generation of predictions after the training phase. By using a complex-valued latent space we can also incorporate harmonic effects and reduce the number of latent variables needed. Linear and non-linear autoencoders are used to map the observed, high-dimensional time-series to the lower-dimensional, latent representation and we identify simultaneously the autoencoder as well as the latent dynamics by optimizing a combined loss function.
Hence the to tasks of dimensionality reduction and discovery of the reduced dynamics are unified while other frameworks treat the two parts separately . Apart from using an architecture based on autoencoders to identify the latent space, projection-based methods could also be employed . We are also proposing a probabilistic version of our algorithm ) that makes use of probabilistic Slow Feature Analysis .
This allows for a latent representation that arart from being time-continuous, can quantify the predictive uncertainty and hierarchically decompose the dynamics into their pertinent scales while promoting the discovery of slow processes that control the system's evolution over long time horizons. The rest of the paper is structured as follows: We introduce the methodological framework as well as algorithmic details in section II.
Particular focus is paid on the interpretability of the inferred lower-dimensional dynamics. In section III we present three numerical illustrations, i.e. a system of linear ODEs, a hidden Markov Model and the discretized KS-equation. We then present in section IV the probabilistic extension of the framework and apply it to the KS-equation.
We conclude with a summary and a short discussion about possible next steps. We introduce the autoencoders deployed in this work, followed by the interpretable latent space dynamic and discuss the training process. We consider data from high-dimensional time series x n ∈ R f with n = 1, ..., T . We remark that the intervals between the different states do not need to be uniformly spaced.
Autoencoder
A core assumption of the method is that each high-dimensional state x n can be compressed to a lower-dimensional representation z n ∈ C c with c << f . We identify this lower-dimensional representation by an autoencoder consisiting of a parameterized encoder and decoder. The encoder maps the high-dimensional representation to the latent space as:
The latent space is complex-valued. The decoder reconstructs the high-dimensional representation based on the latent variables as: We denote the parameters of the encoder as well as the decoder by θ. As discussed later in Section II C, both set of parameters are optimized simultaneously during training and therefore there is no need for differentiating them.
Interpretable Latent Space Dynamics
We employ a propagator in the latent space to capture the reduced-order dynamics of the system. In contrast to other time-extended variational autoencoder frameworks, our representation uses complex valued latent variables. In addition the latent variables are treated independently. The latter feature enables us to have an interpretable latent dynamics as well as a model that is especially suitable for being trained in the Small Data regime due to the small number of required parameters.
This is in contrast to temporal propagators such as LSTMs . For each dimension i of the latent variable z we are using the following continuous ODE in the complex plane: By solving this ODE, we can define the operator: Interpretable reduced-order modeling with time-scale separation Here, λ is a vector containing all the individual λ's and ∆t n indicates the time-step between the latent states.
The symbol is used to indicate a component-wise multiplication. We remark that the latent variables and the parameter governing the temporal evolution are complex numbers and their role in describing the system dynamics is similar to that of an eigenvalue. The real part is associated with growth and decay whereas the imaginary part is representing the periodic component.
This approach has similarities with the Koopman-operator based methods and the extended dynamic mode decomposition . In contrast to the methods mentioned before we are using a continuous formulation in the latent space that allows us to incorporate scarce and irregularly sampled training data and directly rely on complex numbers in the latent space.
Training and Predictions
We optimize a loss function that combines both a reconstruction loss as well as a loss associated with the error of our learned propagator in the latent space: (5) We note that we could directly incorporate mini-batch training by only taking the summation over a subset of the N available training data.
For new predictions of unseen states, we use the encoder to generate a latent representations which is then advanced in time by the learned propagator. At a designated time step we are using the decoder to reconstruct the high-dimensional solution. We applied our algorithm to three systems. First, we show that the algorithm is capable of exactly reproducing the solution of a linear ODE and to identify its eigenvalues.
Afterwards we are applying the framework to a high-dimensional process generated by a complex latent dynamics, which is correctly identified. As a final test case, we are applying the algorithm to a Kuramoto Shivashinski (KS) equation. Interpretable reduced-order modeling with time-scale separation
Linear ODE
We are considering a two-dimensional ODE system for x = y 1 y 2 : Based on the obtained training data we run our algorithm using a linear encoder and decoder structure as well as two latent variables z. The loss function was optimized using the Adam algorithm . As we consider a linear ODE we can analytically compute the eigenvalues involved and compare it with the parameters λ identified by our algorithm.
We observe in Figure that the algorithm was able to recover the correct values, i.e. the eigenvalues 7 and 3 of the given linear ODE. The system does not have a periodic component and the two imaginary parts correctly go to zero, whereas the real parts converge to the reference value. Moreover we are also able to identify for the linear mapping between our latent variables z and the training data a matrix consisting of a multiple of the eigenvectors (1,1) and (1,-1) and thus the correct solution.
This example was chosen to show that the algorithm is able to quickly identify the exact solution of a linear ODE in terms of its linearly independent components.
Hidden multiscale dynamics
We consider eight-dimensional synthetic time series data produced by an underlying twodimensional complex valued process. In particular, the data points x are generated by first solving for the temporal evolution for the two complex-valued processes p 1 and p 2 and than mapping to the eight-dimensional space by using a randomly sampled linear mapping W .
One of the two processes used to generate the data is chosen to be much slower than the other one and both processes have a periodic component. dp 2 dt = (−0.9 + 1.5i)p 2 (8) As training data we consider 40 time series with 150 data points each, obtained by simulating the described processes for a maximum of t = 15 s and then sampling from the obtained data points.
Hence the training data consists of: • 40 time-series • with each consisting 150 observations of the x at a uniform time-step ∆t = 0.0025 The autoencoder obtained consists of one linear layer for both the decoder as well as the encoder. The model is trained for 5000 iterations using the Adam optimizer and a learning rate of 10 −3 .
The results for the convergence of the parameters λ 1 and λ 2 can be found in Figure . We note that the process which is slower decaying and thus more responsible for the long-term evolution of the system has a higher convergence rate than the faster process. With the obtained parameters λ as well as the trained autoencoder, we compute predictions based on the last time step used for training, i.e. we apply the encoder to obtain our latent representation and than use the latent dynamics to advance the latent representation in time.
Afterwards, we employ the decoder to reconstruct the full high-dimensional system. The results can be found in Figure and show very good agreement between predictions and reference data. This example shows that our model is successfully able to carry out dimensionality reduction and moreover indicates that the convergence rate between latent processes can be different.
The latter is relevant when training models as for accurate predictions all latent processes and their dynamics should be converged.
Kuramoto-Sivashinsky
Finally, we applied our algorithm to the KS equation and aim to identify a reduced-order model for the solution u(y, t): We employed periodic boundary conditions, µ = 1 and a domain size y ∈ [0, 22]. For this domain-size, the KS-equation exhibits a structurally stable chaotic attractor as discussed in The black lines divides the area for which training data was given from the area without raining data.
; . The equation is discretized in space using a discretization step of 22 64 resulting in a state vector x of dimension 64 and a nonlinear system of coupled ODEs. This is solved using a stiff fourth-order solver We employed a non-linear encoder and decoder with four fully-connected layers each and ReLU-activation functions as well as Dropout Layers between the fully-connected layers.
We trained the model for 200000 iterations using Adam and a learning rate of 5 • 10 4 and assuming a five-dimensional latent space. We obtained the λ's in Figure . Four latent variables have λ's close to zero and thus a slow temporal dynamic that is responsible for the long-term evolution whereas one latent variable is quickly decaying.
Based on the obtained parameters, we do predictions based on an unseen initial condition not contained in the training data. We are able to reconstruct the correct phase space based on our predictions despite only using a very limited amount of training data. The results for the phase space can be seen in Figure .
Although the small-scale fluctuations in the temporal dynamics are not well captured, the model identifies the correct manifold which has a good accuracy compared to the reference solution. All phase-spaces were obtained by using a finite-difference operator on the data or predictions. These results are in accordance Interpretable reduced-order modeling with time-scale separation with whose LSTM-based temporal dynamic model was also able to find the correct phase space but not to track the actual dynamics for long-term predictions.
Our model is not able to account for noise in the temporal evolution and thus dealing with chaotic, small-scale fluctuations is challenging. We believe that a probabilistic version of our algorithm could be advantageous here. This section contains a fully probabilistic formulation for the deterministic model discussed before.
We replace the Autoencoder with a Variational Autoencoder and the ODE in the latent space with a SDE. The loss function which we optimize is the Evidence-Lower Bound (ELBO).
Model Structure
We postulate the following relations for our probabilistic model using an Ornstein-Uhlenbeck (OU) for each dimension i of the latent space and a Wiener process W t in the latent space: We again assume that the latent variables z t are complex-valued and a priori independent. Complex variables were chosen as their evolution includes a harmonic components which are observed in many physical systems.
We assume an initial conditions z 0,i ∼ CN (0, σ 2 0,i ). The total parameters associated with the latent space dynamics of our model are thus {σ 2 0,i , σ 2 i , λ i } c i=1 and will be denoted by θ together with all parameters responsible for the decoder mapping G (see next section). These parameters along with the state variables z t have to be inferred from the data x t .
Based on probabilistic Slow Feature Analysis (SFA) , we set σ 2 i = 2; (λ j ) and σ 2 0,i = 1. As a consequence, a priori, the latent dynamics are stationary. A derivation and reasoning for this choice can be found in Appendix A. Hence the only independent parameters are the λ i , the imaginary part of which can account for periodic effects in the latent dynamics.
Variational Autoencoder
We employ a variational autoencoder to account for a probabilistic mappings from the lower-dimensional representation z n to the high-dimensional system x n . In particular we are employing a probabilistic decoder The encoder is used to infer the state variables z based on the given data and thus defined in the inference and learning section.
Inference and Learning
Given the probabilistic relations , our goal is to infer the latent variables z 0:T as well as all model parameters θ. We follow a hybrid Bayesian approach in which the posterior of the state variables is approximated using amortized Variational Inference and Maximum-A-Posteriori (MAP) point-estimates for θ are computed.
The application of Bayes' rule for each data sequence x 0:T leads to the following posterior: where p(θ) denotes the prior on the model parameters. In the context of variational inference, we use the following factorization of the approximate posterior i.e. we infer only the mean µ and variance σ for each state variable based on the given data points.
This conditional density used for inference is the encoder-counterpart to the probabilistic decoder defined in the section before. It can be readily shown that the optimal parameter values are found by maximizing the Evidence Lower Bound (ELBO) F(q φ (z 0:T ), θ) which is derived in Appendix B. We compute Monte Carlo estimates of the gradient of the ELBO with respect to φ and θ with the help of the reparametrization trick and carry out stochastic optimization with the ADAM algorithm .
Results for the probabilistic extension
We applied our probabilistic version to the KS-equation. We used the same settings as for the deterministic approach but considered up to 10 complex latent variables. The obtained λ's are in Figure . The probabilistic model allows us to quantify the uncertainty in predictions. In Figure predictions for various time-steps and the respective uncertainty bounds are shown for an unseen initial condition.
Due to the chaotic nature of the KS-equation and the small amount of training data, the underlying linear dynamic of our model is only able to capture the full dynamics for a limited time horizon. Fortunately, due to the probabilistic approach the model is capable of capturing chaotic fluctuations with increasingly wide uncertainty bounds.
We also computed the phase space representation for the KS-equation based on the predictions obtained by our model and compare it with the reference solution. The probabilistic model identifies the correct manifold with a better accuracy than the deterministic model. As some of the small-scale fluctuations are accounted as noise, the resulting manifold is more concentrated at the origin and the obtained values are slightly smaller than the reference manifold although their shape is very similar.
|
[
"By using a propagator in the latent space."
] | 3,083
|
multifieldqa_en
|
en
| null |
47b9dbb6d85243ffdaf6d95e842986b30d49d95913f21b6a
|
How can you level up in the early levels?
|
What is this game all about? (short version) Do you like the board game RISK®? Then chances are you’ll like QONQR. Your job is to join a faction and help your faction (team) take over the world. QONQR is an artificial intelligence that appeared on the Internet. We don’t know where it came from, or its purpose, but we know it is powerful. The Legion want to destroy QONQR because they believe it will enslave and exterminate humanity. The Swarm believe QONQR will advance the human race, and we should protect it. The Faceless don’t care, and want to steal the technology for their own uses. Pick a side, recruit your friends, and help your faction capture the towns and cities in which you live, work, and play. What is this game all about? (long version) Right now an invisible war is raging all around you. At stake: the Past, Present, and Future. A rogue Artificial Intelligence has been detected infiltrating the world’s networked infrastructure. Initial hacking of the source code has revealed incredible new technology. It is not certain whether this AI seeks to enhance or destroy humanity. It is only certain that it is here, and that is has a name: QONQR.Those who first detected the presence of QONQR on the global networks have argued fiercely over its intentions. They have split into viciously rival Factions, each co-opting the known QONQR technologies for their own ends. Even now the Factions battle over the entire globe seeking to gather resources and prepare for the coming power struggle. Whether you accept it or not, the war is here. Your survival, prosperity, and even glory depend on the choices you make and the skill you demonstrate from this point forward. You will be asked to join one of three Factions. The choice should not be made lightly. Your Faction Alignment will define your place in the war over QONQR. THE LEGION unite under the shared goals of destroying QONQR and saving humanity by crushing the nascent AI before it can mature. They are led by AGENT SUNDAY, a former commander of the NSA's Turing Task Force which has been valiantly stamping out dangerous AIs for years. THE SWARM are convinced that QONQR promises an era of unprecedented technological advancement and human prosperity. Nanobot weaponry expert KIMYO NAGUMO leads this faction in the battle to defend QONQR and assemble its future tech, accelerating humanity's path into the future. THE FACELESS are a loosely organized faction of militant hackers who want QONQR's technology for their own ends, but want to prevent the unavoidable nightmare of human slavery they believe it portends. When they choose to communicate, they do so through an anonymous vigilante who goes by the name PROMETHEUS. . What do I do first? Create a base, then launch. Launch nanobots until your fingers hurt. How do I create a base? On iOS there is a Base icon in the menu bar. For Windows Phone, you will find a bases button on the home screen. These take you to the Base Screen where you can see how many bases you have available to you. Once you create a base, be sure harvest often by returning to the list of your bases. You can see how full each base is by checking the fill percentage icon. Bases stop collecting once they are full. What is the point of creating bases and harvesting resources? You need bases to earn money. Bases collect rare elements over time which you can then harvest for your faction in exchange for qredits. Qredits can be used to purchase ordinance (like nanomissiles) and upgrades which will help you capture and hold battle zones more easily. What do you mean, “launch nanobots?” Nanobots are the invisible soldiers generated by your device (which has been transformed into “Scope” by advanced QONQR technology). Nanobots fight for control of the battle zones around you.. From the home screen click “Current Zone”. Once you have selected your zone, you will be able to deploy nanobots there.. Initially, you are just a level 1 recruit. You are only going to get a small attack formation with a limited range.. Other solders have to practice with rifles before they get tanks; you are no different. Once you prove your mettle, you’ll get access to bigger weapons. Soon you’ll be lobbing missiles hundreds of miles. How do I capture a zone? If you play for the Legion and are launching nanobots into a zone controlled by the Swarm, you will capture the zone for the Legion as soon as you have destroyed enough of the enemy that your nonbots outnumber theirs. If you are the person who causes the zone to change control to the Legion, you will be listed as the Capturer of the Zone. The Person with the most nanobots in the zone is the zone leader. What is my current zone? How do you know? Your current zone is determined by your proximity to the nearest zone center. So, while you might be inside the governmental boundaries of a city, your scope (phone) could tell you your current zone is a different city, if that city’s center is closer. So I just keep deploying? Yes, in the early levels of the game, just keep deploying and harvesting your bases. You will earn XP (experience points) proving your loyalty to your Faction. You will level up quickly and soon have access to many more options. So all I can do is just attack? You only get assault bots to start. They are the most basic type of nanobot formation. As you level up you will get many more options, including bots that are good at defense, energy attacks, long-range deployments, formations that will buff the shields for all your faction-mates in the zone, and many more. My faction already controls this zone should I still attack? Yes, assault bots won’t attack your friends. You will increase the bot counts for that zone, which will deter opponents. Attack bots can defend your zone; they just aren’t very good at it. As you level up you will unlock defensive formations that are better for deploying if your faction already holds the zone. I’ll never knock out my enemy at this rate! In the first few levels your impact might feel minimal, but every deployment helps you gain experience. It won’t take long to level up if you keep at it. If you are unlucky enough to be in a zone where someone has already built up huge defenses, you may be in for a long fight. But remember, your scope moves with you. Go explore the world and find softer targets. Once you level up, it won’t seem like a toy gun against a battleship. You’ll get your big weapons once you prove yourself. We have already seen operatives brag about taking down 1,000,000 nanobots in just a couple days. Nothing is impossible. How do I attack a different zone? As you level up you will unlock more and stronger formations. Those new formations will have range. While at the early levels you can only attack nearby zones, as you level up your attacks will go 10-20 miles (roughly 15-30 Km) and you will eventually gain access to nanomissiles that can go hundreds of miles. What should I buy in the depot first? The smallest thing to buy is a refresh. We give you some of these as you level up so you can try them out. Refreshes will refill (or partially fill depending on the size of your tank) your bot bar or your energy bar. But after that, it depends on your goals. There is much to choose from. Do you want to be able to deploy more nanobots on every launch? Do you want to boost your offensive or defensive bots? Do you want to be able to launch missiles into towns far away? All of these things are possible. Look through the depot and see what you like. Most of the time you will need to buy an upgrade before you can buy the ordinance. For example, missiles are fairly inexpensive, but you need to buy the MX Rack Missile Launcher before you can launch them. Buy the upgrade first. What is the difference between qredits and cubes in the depot? A qredit (aka: credit, which looks like the child of a Q and € ) is the type of currency you earn in the game by harvesting your bases. Cubes (aka: power cubes) are purchased with real money in the Bank section of the Depot. We want everyone to be able to do everything in the game for free, by earning qredits, but for those who want to move a bit faster, you can purchase cubes to speed things along. Purchasing cubes is how QONQR makes money. We very much appreciate your support. Every purchase you make helps us to keep making improvements in the game. Future enhancements will enable you to earn cubes in game. Why can’t I create another base? Additional bases become available as you level up. At the start, you will get a new base every 5 levels. If you don’t have any more bases available to build, you will need to level up. If you have a base available, but aren’t allowed to use it, it is because you already have a base in that zone. You can only have one base in a zone. Get yourself to another zone, then create your base there. My bases are collecting credits at different rates. Your bases collect resources faster if your faction controls the zone. Do your best to either put your bases in zones you can control by yourself, or find zones with strong players in the same faction and put your bases there to maximize your credit collection. The game says I’m in a town that doesn’t exist. QONQR tracks almost 3 million battle zones of varying strategic value in 250 countries. Sometimes those zones include locations that haven’t existed for over 100 years. That’s pretty cool if you ask us. If you find a zone that looks like a duplicate or is just plain wrong, however, let us know on the forums under “Zone Corrections”. How do I move my current position on the map? You might need to take a car, bus, plane or train depending on which zone you are trying to get to, but if you want to move on the map, you need to move in the real world. QONQR is a location-based game, which means you play where you are. However we don't want to make you move to play, we want you to plan when you move. QONQR goes with you as you move through the daily activities in your life. Where do I find the Strategy Guide? Here: http://community.qonqr.com/index.php?/topic/1191-the-official-qonqr-strategy-guide/ How do I win? That is for you to decide. There is still much to discover. We don’t even know if QONQR is good or evil. Why is it here? What is its purpose? Help your faction further its goals and unlock all the secrets of QONQR!
Congratulations to the Swarm on their overwhelming victory in Atlantis in May 2015 -- taking and retaining all Atlantis zones from beginning to end is hard to argue with -- most convincing -- well done Swarm!
Rumor has it that the Duggers have 20 scopes. Some families really do have a wife and ten kids... Ha Anyways.... Multi scoping is generally not encouraged, usually if you mention that you do it on the forums or in groupme your not going to be a very liked person, even within your own faction. What tends to happen is if you start multiscoping then your enemies start doing it, then you get into a war where ever person has 6 phones and nobody is happy. I've seen or heard about situations like this in a lot of different locations.
Great job, faceless! It was actually an exciting Atlantis and I prefer it that way. Way to bring your A game.
You know what we need in this game? Nano-Nukes!!
Attention (insert faction here), We, the (insert faction here) are tired of the way you constantly (circle one).. A. Cube rage us B. Bully us with numbers C. Talk mean to us It hurts our feelings because (circle one).. A. We don't cube B. We don't have as many allies C. We have no sense of humor and/or no backbone Please refrain from participating in the above selected actions for above selected reasons so as the game is enjoyable for (insert faction here). Regards, (insert name and faction here) There we go...this should streamline the entire complaint process of the forums. Copy and reuse as needed. You're welcome.
Silver, you mentioned in a blog that there are levels beyond 150, is it safe to say there is no level limit anymore or is that for us to discover? Another question, I'm not sure if I'm the only one noticing this but it seems like bot decay doesn't work against Zone Assault bots. I've hit two players I know have been inactive for well over 6 months but my attack had the same effect it did yesterday before the update. However I did notice against Deflection bots I am getting 2x the kill power. Also in response to decontaminatoR. Paid gaming isn't just something for adults. When I was 13 the best options for handheld gaming was GameBoy or GameGear and the games at the time cost anywhere between $29-$39 dollars. I had a paper route to pay for my games. So, no offense, but you can afford $0.99 for a game. You don't even need a paper route, just check under your couch cushions and I'm sure you'll find a few quarters.
I want to start by thanking Faceless. This round of Atlantis, Legion and Faceless were doubled in sized and probably spending by Swarm. I contacted some great players from the other side and put together a nonaggression pact, this pact was one of the most impressive agreements I've seen in the more than two years of playing. Hundreds of people worldwide stuck to this agreement and put past feelings behind us. It was awesome to see both sides stick so closely to each other in fighting against Swarm. I want to really thank everyone who showed honor by standing behind me and the faceless command when we suggested that, the people who really gave it a chance and then most importantly, to all the players who honored it. Faceless, thank you very much! We stood no chance of winning without you! The battle came down to literally one launch in one of three zones. I'd say that with that being said everyone fought incredibly hard, so I want to give Swarm the respect they deserve. You guys really show out and play to win. Good game, 2 against 1 is not easy, no matter how large your crew is. And Legion, we had many late, late nights, many very long days. You guys killed it this month! We didn't take home a trophy, but I would say we all have something to be proud of! The other leaders who helped me coordinate everything were awesome! So many great people kept everything moving forward 24 hours a day for the whole week. Thank you to everyone who gave it your all for the whole week even when we saw that Swarm had 4x our bots at the end of just one day. Many people would have given up, but we held in and **** near won! I've won Atlantis battles with Faceless and with Legion but I will say, nothing was as fun or incredible as this round! You guys are fantastic and I can't wait to do it all again next month! Hopefully we have more Legion and Faceless show up for the next round, but I know that even if we don't, we will figure out a way, just as warriors do. PEW! PEW! PEW!
I must start with an announcement: Camels are not the only animal in the middle east. You have overused it already. It's saddens me that anyone would still find it funny. Get a bit of originality. For anyone not wanting to read all this drivel, skip to the end (hint: Bold stuff). At what point have I bullied anyone? When was the last aggressive or threatening message you or any of your members received from me? Never. Legion and Swarm (in the UK) have teamed up because Faceless are dominating in London. That makes sense. It's a three sided fight and if one force becomes too powerful, the other two can join forces to try and take them down. But: We are dominating in the London area while your alliance is attacking players outside of that area. Then you expect me to sit back and do nothing. You are specifically using me as an excuse for why you have teamed up but then you're attacking players outside of my reach, sometimes with Europe involved. If that is not reason enough to attack you then I'm not sure what is. You lot cube, multiscope and have multi faction accounts and still complain. I don't complain about anything you do. Play the way you want to, ill do the same. I am never rude to anyone, always polite no matter what the message is, never brag about what I do, can do or have done, never threaten anyone, try and keep in touch with the few swarm or legion who are civilised to me, listen to any message form any side and if I can help in any way, I try my best to. Formed agreements with enemy (that I didn't need to) that ended up slapping me in the face. I have even in the past taken the time to find out who some of the younger players are so I know to avoid them. When I'm in a different country I try and find who the bullies are. Those players who threaten and brag and laugh at others. Those are my targets (if they exist in those areas). I don't see how anyone can think I'm a bully. Is it your money? Its none of your business how I spend it. Either way your numbers are way off. 700 dollars a day? Did you just decide to blindly strike the number pad to come up with that figure? Best part of one of your posts is saying that the devs should worry about my welfare. What concerns you about me spending my money? Maybe I'll self harm due to overspending? I wont have enough to buy food because I bought too many cubes? I don't understand what they are supposed to worry about. I have issues? At what point did you deduce this oh mighty psychologist? Wait a minute are you my bank account manager? What do you know about how much I can or cant afford? Random guy spends money on something he enjoys. The end. Told you last time to give up on all the drama but I guess thank you for the concern. You play to make me spend more? And? What do you think that accomplishes? In fact how do you even make me spend? You don't even attack me. You sulk when I'm in the UK and when I fly out and you find out, you call in Europe to help you take an zone or two. As they say, whatever floats your boat. As for Atlantis: Please try again. I quit Atlantis when we were winning. I have on occasion involved myself after I was asked to help out but on the whole I give it a miss. The last time (months ago) was the last 10 minutes of Atlantis and Legion fought hard. We lost. I was not the only Faceless player to quit Atlantis. Quite a few of us thought it lasted too long and had too many zones to fight over. I hear the duration has been reduced. You can't honestly believe I changed my sleeping pattern for the game. I was in California for a month. I was jet lagged. My sleeping pattern was a bit off when I got back. You're not even accurate about when I deploy. Pay attention. You should know this by now: I play as and when I want, sometimes every 20 minutes and sometimes I do long stretches and sometimes I'm busy and don't deploy for hours. You wont always win, and nor will I. Try and get satisfaction form at least trying to win or putting up a good fight. About the limit on cubing. Please. I suggested that last year. Twice. Unfortunately multiscoping is allowed and so prevalent that it kind of ruins the idea. These are the facts: YOU and YOUR side threatened Faceless members who support London. One of the members threatened is actually London based. What do you expect him to do while his city is under attacked? A few of your members don't know when to keep quiet. They sent messages to us threatening specific players and telling them their zones will be dropped just because they have helped London. Basically if they help London then they get their zones wiped. And you have the cheek to call me a bully? We stood up to your members specifically because they were trying to bully. That is the reason we went strong months ago and took those big zones. How is this me bullying you? This is me answering your threats. I didn't attack those zones "just because i can", it's just because I should. Because of your threats. You can blame your members for the loss of those 2 or 3 big zones. These are the basics: You attack one of our zones. We look at the list of attackers and pick one of the players who deployed the most, find a zone of his or hers and attack it. We don't need to justify our attacks with "because there are Faceless players within 30 miles". What, every time we attack a zone we need to send some letter explaining why? You attack us or we attack you, for any reason. That's the game. When some of you were cheating and you could not win you complained, when you cube and lose you complain, when you invite all of Europe to attack and win you still complain. I just think you like to make a fuss. Last words (for now): You think I attack zones as a means of getting attention? I get enough of it form your threads. The only attention seeker here is you with your victim attitude and pity us posts.
I've had some very angry emails today from a couple users who are upset their rival achieved the ability to switch factions freely having played for one of the factions for only 1 hour. I've been accused of doing favors, changing the rules, and various other backhanded deals. It appears it comes down reading the rules. You do not have to play for every faction for 60 days in order to earn free switching status. Here is a common scenario many players have used to achieve free switching status and avoiding playing for one faction they despise. 1. Start with Swarm 2. Switch to Legion (earn Spy) play for 60 days 3. Switch back to Swarm (earn Double Agent) play for 60 days 4. Switch to Faceless (earn Mercenary) immediately switch back to Swarm or Legion Below is the complete text on the switch nanobots screen. It is the same text that has been there from Day 1 with the exception of the level 100 rules that went into place earlier this year, where you could switch as much as you want before level 100 , but those switches don't count towards the medals. This text has been part of this description since Jan 15, 2013. "Players that earn all three spy awards, may once again switch factions at any time as they could during the training levels 1 through 99." Prior to Jan 15, the text said this. "Players that earn all three awards may be given the opportunity to switch factions more quickly in future updates (contact support for more information)" I pulled that right out of source control, which includes the entire change history. Here is the complete text from this page. http://portal.qonqr....r/SwitchFaction WARNING: Defection has consequences! Self-destruct will be initiated on all your nanobots. Without the self-destruct, you would be required to battle against your former self to regain control of your zones. You will lose the capture and leadership of any zones you currently hold. Lifetime captures will be unaffected. If you are still completing the training levels and have not reached Level 100, you may switch as often as you like to find the faction that suits you best. Once you have reached Level 100 switching factions has rewards, but also has additional consequences beyond the self-destruct of all your nanobots. Defection will usually result in a demotion in rank. This is accomplished through awards with negative rank points. Those awards are: Spy - First switch to an opposing faction (-20 points) Double Agent - Return to a faction from which you had previously defected (-20 points) Mercenary - Become a member of all three factions (-20 points) Other Faction Change Details: You may not switch factions again until at least 60 days have passed since your last faction switch. Defection point penalties are applied only once per award Players that earn all three spy awards, may once again switch factions at any time as they could during the training levels 1 through 99. The decision to switch factions is one that must be made with strong determination. Nanobots cannot be reanimated once destroyed. You will retain your earned experience, level, formations, qredits, cubes, and upgrades. However, as far as your zones go, you will be starting over.
...has got to be one of the funniest moments I've seen in qonqr yet lol.
The **** change operation was a success!
As a relatively new player for faceless in a region dominated by swarm i can understand the OP. However, judging from the numbers i see here on a regular basis i think you are asking a bit much. My idea would be the opposite approach. Why not add a weapon with extremely short range, let's say like 5km that acts like a bomb and make it much stronk? That would add some serious home advantage. Or alternativley make attack formations lose power over range (exclude nanos and plasma). Maybe something like that would allow newcomers to at least get a foothold in their homezones. It's just an idea, maybe i overlooked something?
This is by design. Some day it is possible (I said someday) we could offer skins for your scope. So we will need a uniform color scheme. You can tell the formation families based on the shape of the box. Trapezoid is attack, diamond is defense, and octagon is support. It will take some time to get comfortable with the change.
Geophysical based game. Anyways, probably not a bad idea but, considering the issues with the three platforms and the development of blue for those platforms, I doubt the resources are available for development on a new platform. Seen the blog? Its Qonqr meets wheel of fortune!
I am happy to announce that today I both completed the training and captured my first zone.
^THIS so now that qonqr has been thoroughly funded, can we have blue now? Or is that not happening still lol.
Atleast I am not legion and there for we can have this intelligent discussion rather than just compete over who has the best words XD ohhhhh someone bring the bill to legion cuz someone just served them extra double order of stir fried SNAPPPPPP If the devs wont make zone dueling for us I hope out there somewhere are those who would empty a zone and challenge one on one to a local battle. I'd like to see the transcript of deployments made / moves made as well that would be neat I think such events would be cool. I suppose if people give up on atlantis as it works now they can schedule their own tournements in empty atlantis zones.. have a team clear the zone.. put 1 vs 1 or teams vs teams.. like fisticuffs challenges.. find out what these warriors are really made of!
@Qonqrd everyone you know must face palm every time you make a post. Its embarrassing. Mega cubers or whatever you want to call them are not great for the opposing team surrounding them but are great for the game itself (money) and for the team they are part of. Multiscopers are not not great for the opposing team surrounding them and bring nothing to the game but are great for the team they are part of. Both have a negative impact on enemy teams/players but only one benefits the game itself. Both can make people want to quit out of frustration. And that's not great for the game. @OP unlimited refresh is over powered. Its frustrating to fight against a ridiculous amount of refreshes. Unfortunately i dont see anything changing unless this game gets a lot more people playing. More people might mean more money for the company from various sources. More money from various players might mean they can limit the players who spend a ton and still generate a healthy income. The main issue i see with limiting refreshes is someone multiscoping and spending money. He now has two, three, four accounts to refresh with and gets the advantage. Its tricky.
ey dun new ho to yet it uff.
Yet you complain almost everyday here, on your website, Twitter, and YouTube channel that the game needs to change because cubing has such an impact.
It was fun. Swarm had me scared at first, but it turned into kind of a bullying match between us and legion. Last hour became p obvious which way it was gonna go. Legion rly stepped up their game in the end there, respect.
We are investigating this. Here is what we know: Several of the accounts used the same password. Most of the accounts belonged to people who knew each other personally. The accounts were all switched from the same IP Addresses. The person who logged in, got into each account on the first attempt, so they knew the password for each account. What you should know: QONQR never stores passwords, not even in the logs. Passwords are hashed (one way encrypted) and can never be decrypted When you authenticate to our servers, we hash the password you gave us and compare it to the encrypted password in the database to see if they match. Access to our database in the could is restricted tightly and we are confident no one breached the system. What you should do: Don't use the same password as other people you play with. Don't share your password with anyone.
I heard all the French players fled to the UK after one German player accidentally shot a single missile into France.
Most factions now use GroupMe or Line as their means of communication, the forums are too slow as a means of communication and insecure for specific faction conversations. Think of the forums are more of a gaming information resource rather than a means of communication. Contact the top players of your faction in the leader boards of your state and they will likely point you in the right direction to chatting with your local faction. The developers are also building some sort of new chat system into the game, we don't know much about it but apparently beta testing for the chat will be happening very soon (next couple of weeks) according to their timelines.
A way to honor the dead? Nah, how bout a way to dishonor the dead.
Could just build it up and retain their capture. Remember Bizzy, staq to the heavens.
I just read this entire thread. I am now tuckered.
Does anyone know if Bot Booster has an effect on Seekers and how much dmg they do to attacking players? Also on the topic of seekers, does the amount of skeers in a battlefield have any effect on how much damage they do?
Interactive map of real-time zone captures.
You know that is something I didn't factor in there. Time. The player who can consistently and constantly launch wins against the guy who casually picks up the phone on occasion or has to work away from a cell phone for 8 hours. Good point. And yes I can't argue skill doesn't factor in, it just seems like less of a factor than other games is all.
I cant see why a closed forum, open only to registered Qonqr accounts, cant be used. **** spammers!
Gotta love synclock! I suspect linjin has a problem. Maybe the dvs should look into it.
No, Naamah...I clearly understood what you were trying to convey. I'll even go as far as to agree that what your facing now is, while fully allowed and deemed completely acceptable by the developers, unbalanced and wrong. However..the imbalance isn't in the game and isn't something that, from a business standpoint, is likely to be regulated. The game is fair..the advantages are provided to all players. It's the players themselves that throw the balance into chaos because, as you've said, not everyone can afford spending several thousand bucks a year in only one game. Truthfully, in my opinion, the moment you admitted to buying cubes yourself your complaint became silly..because I'm sure there's a player out there, who has bought NO cubes, who can make this same complaint about you that you are making about others here. I know these things because I've read them so...many...times in this forum. There was likely a time, ages ago when I was a young Massune, that I even posted a few myself. That was the purpose of my post..I was poking fun at addition of yet another cuber/bully/trash talk complaint on the forum. It wasn't directed at your personal plight so much as the idea that someone, yet again, finds it necessary to lobby for a spending cap on the only real way for this game to make money. As to your specific problem..you, like all those that have raised this topic before you, have few options to rectify the issue. Here are a few that seem to have worked for others..fight harder, recruit better, spend less time complaining and more time organizing, budget for more cubes or quit. I'd rather not see you opt for the latter..but to each their own.
I agree, we should find a way to honor the dead, but I don't think keeping their towers infinitely is necessarily the solution. The game must go on. I'm pretty sure the point of bot decay was to clear the game of inactive player bots so that new players can have a chance to rise up, not to dishonor the bots of dead players.
The following are frequently asked questions about the new server update (so far) It still says Training Complete on my iPhone. - Download the update from iTunes It still says Training Complete on my Android. - Sorry, Android will not be updated again until the QONQR Blue beta is released My XP per launch keeps going down - This is XP throttling and is intended to limit the ability for people to leve1 from 1 to 100 in a single day through heavy cubing. The XP throttle was introduced with the original version of QONQR in 2012,and the throttle formula is the same for levels above 100. The throttle resets at midnight UTC every day. How do I buy the Bot Regeneration Accelerator? - Currently the Bot Regen Accelerator can only be purchased through http://portal.qonqr.com. Go to the Depot and review your scope upgrades. The new QONQR Blue clients will allow for this purchase to be made in the app using your mobile billing. I don’t have a PayPal account - For users interested in purchasing the Regen upgrade, but who do not have a PayPal account, PayPal does give you the option to checkout using your billing information without creating an account. PayPal is not allowed in my country, or I don’t have a credit or debit card - Please contact support@QONQR.com for alternate options Is Bot Regen Accelerator counted as part of the 100% scope upgrades? - Yes, but there is a bug that does not increase scope upgrade percent when you purchase this upgrade, that will be fixed in the coming days. For all other questions, please read the 7 blog posts prior to 7/29/2015 for information on what was included in the update today.
Bye Fack, its been a pleasure being allied and against you.
The two big issues that are both killing the game slowly and keeping it from growing exponentially are cube injustice and new player ramp. The game obviously also needs to provide a consistent and growing revenue stream as well. I think Silver needs to rethink how revenue is generated if he is going to address cube injustice and new player ramp. For revenue generation I would suggest a model that doesn't give a significant combat advantages. Download and play for free from level 0-99 Pay small monthly fee to get full functionality or play for free at 50% of offensive/defensive funtionality Still buy cubes, but cubes are used for following: - Credit Boost: harvest more credits for a period of time - Range Extension: ability to use standard attack/defense formations at extended ranges - Base Share: get 100% credit attainment even in bases owned by another faction - Purchase additional ordinance - Zone Name Change - ability to customize zone names. "Breggland" - Faction Change with Bots - pay for the ability to keep up to 50% of your bots with faction change - Experience Boost: %increase in experienced gained while leveling - Other: anything that helps grow a player or provides enjoyment, but doesn't tip the battle capability of a scope. New Player Ramp/Integration into Game - Offer paid immediate ramp package: one price to become 100 with full upgrades - Like the changes in Blue - Create new zones in Metro areas that only 0-99 level can launch into, with statewide ranges Understand that catering to those who have money and like to use it for an advantage is a good business model and for those people it might be ok to offer very expensive options: - Shield generators: temporary energy shield that adds X% increase to defense or stops X% of damage - EMP's: turns Absorbs off for X minutes. Does not destroy, just turns off - Chain Lighting: Does damage across multiple players in a zone From a development standpoint I have no idea what is possible, easy or hard, but the general idea is to make the playing field more fair for the standard player while maintaining and growing a business revenue stream.
You need to come to the Northeast US. We handle our business like no other.
|
[
"Keep deploying and harvesting your bases to earn experience points and level up quickly."
] | 6,594
|
multifieldqa_en
|
en
| null |
3c8e9fef2eae8f49aae38b7314a3425b99c3ca8b051e8293
|
What is the electron correlation parameter, $\Gamma_e$?
|
\section{Introduction}
Ultracold neutral plasmas studied in the laboratory offer access to a regime of plasma physics that scales to describe thermodynamic aspects of important high-energy-density systems, including strongly coupled astrophysical plasmas \cite{VanHorn,Burrows}, as well as terrestrial sources of neutrons \cite{Hinton,Ichimaru_fusion,Atzeni,Boozer} and x-ray radiation \cite{Rousse,Esarey}. Yet, under certain conditions, low-temperature laboratory plasmas evolve with dynamics that are governed by the quantum mechanical properties of their constituent particles, and in some cases by coherence with an external electromagnetic field.
The relevance of ultracold plasmas to such a broad scope of problems in classical and quantum many-body physics has given rise to a great deal of experimental and theoretical research on these systems since their discovery in the late 90s. A series of reviews affords a good overview of progress in the last twenty years \cite{Gallagher,Killian_Science,PhysRept,Lyon}. Here, we focus on the subset of ultracold neutral plasmas that form via kinetic rate processes from state-selected Rydberg gases, and emphasize in particular the distinctive dynamics found in the evolution of molecular ultracold plasmas.
While molecular beam investigations of threshold photoionization spectroscopy had uncovered relevant effects a few years earlier \cite{Scherzer,Alt}, the field of ultracold plasma physics began in earnest with the 1999 experiment of Rolston and coworkers on metastable xenon atoms cooled in a magneto optical trap (MOT) \cite{Killian}.
This work and many subsequent efforts tuned the photoionization energy as a means to form a plasma of very low electron temperature built on a strongly coupled cloud of ultracold ions. Experiment and theory soon established that fast processes associated with disorder-induced heating and longer-time electron-ion collisional rate processes act to elevate the ion temperatures to around one degree Kelvin, and constrain the effective initial electron temperature to a range above 30 K \cite{Kuzmin,Hanson,Laha}.
This apparent limit on the thermal energy of the electrons can be more universally expressed for an expanding plasma by saying that the electron correlation parameter, $\Gamma_e$, does not exceed 0.25, where,
\begin{equation}
\Gamma_e = \frac{e^2}{4\pi \epsilon_0 a_{ws}}\frac{1}{k_B T_e}
\label{eqn:gamma_e}
\end{equation}
defines the ratio of the average unscreened electron-electron potential energy to the electron kinetic energy. $a_{ws}$ is the Wigner-Seitz radius, related to the electron density by, $\rho_e = 1/(\frac{4}{3} \pi a_{ws}^3)$. These plasmas of weakly coupled electrons and strongly coupled ions have provided an important testing ground for ion transport theory and the study of electron-ion collision physics \cite{Strickler}.
Soon after the initial reports of ultracold plasmas formed by direct photoionization, a parallel effort began with emphasis on the plasma that forms spontaneously by Penning ionization and electron-impact avalanche in a dense ultracold Rydberg gas \cite{Mourachko}. This process affords less apparent control of the initial electron temperature. But, pulsed field-ionization measurements soon established that the photoionized plasma and that formed by the avalanche of a Rydberg gas both evolve to quasi-equilibria of electrons, ions and high-Rydberg neutrals \cite{Rolston_expand,Gallagher}.
Early efforts to understand plasmas formed by Rydberg gas avalanche paid particular attention to the process of initiation. Evolution to plasma in effusive atomic beams was long known for high-Rydberg gases of caesium and well explained by coupled rate equations \cite{Vitrant}. But, low densities and ultracold velocity distributions were thought to exclude Rydberg-Rydberg collisional mechanisms in a MOT.
In work on ultracold Rydberg gases of Rb and Cs, Gallagher, Pillet and coworkers describe the initial growth of electron signal by a model that includes ionization by blackbody radiation and collisions with a background of uncooled Rydberg atoms \cite{Mourachko,Gallagher,Li,Comparat,Tanner}. This picture was subsequently refined to include many-body excitation and autoionization, as well as attractive dipole-dipole interactions \cite{Viteau,Pillet}, later confirmed by experiments at Rice \cite{Mcquillen}.
The Orsay group also studied the effect of adding Rydberg atoms to an established ultracold plasma. They found that electron collisions in this environment completely ionize added atoms, even when selected to have deep binding energies \cite{Vanhaecke}. They concluded from estimates of electron trapping efficiency that the addition of Rydberg atoms does not significantly alter the electron temperature of the plasma.
Tuning pair distributions by varying the wavelength of the excitation laser, Weidem\"uller and coworkers confirmed the mechanical effects of van der Waals interactions on the rates of Penning ionization in ultracold $^{87}$Rb Rydberg gases \cite{Amthor_mech}. They recognized blackbody radiation as a possible means of final-state redistribution, and extended this mechanical picture to include long-range repulsive interactions \cite{Amthor_model}. This group later studied the effects of spatial correlations in the spontaneous avalanche of Rydberg gases in a regime of strong blockade, suggesting a persistence of initial spatial correlations \cite{RobertdeSaintVincent}.
Robicheaux and coworkers have recently investigated the question of prompt many-body ionization from the point of view of Monte Carlo classical trajectory calculations \cite{Goforth}. For atoms on a regular or random grid driven classically by an electromagnetic field, they find that many-body excitation enhances prompt ionization by about twenty percent for densities greater than $5.6 \times 10^{-3}/(n_0^2 a_0)^3$, where $n_0$ is the principal quantum number of the Rydberg gas and $a_0$ is the Bohr radius. They observed that density fluctuations (sampled from the distribution of nearest neighbour distances) have a greater effect, and point to the possible additional influence of secondary electron-Rydberg collisions and the Penning production of fast atoms not considered by the model, but already observed by Raithel and coworkers \cite{Knuffman}.
The Raithel group also found direct evidence for electron collisional $\ell$-mixing in a Rb MOT \cite{Dutta}, and used selective field ionization to monitor evolution to plasma on a microsecond timescale in ultracold $^{85}$Rb $65d$ Rydberg gases with densities as low as $10^8$ cm$^{-3}$ \cite{WalzFlannigan}. Research by our group at UBC has observed very much the same dynamics in the relaxation of Xe Rydberg gases of similar density prepared in a molecular beam \cite{Hung2014}. In both cases, the time evolution to avalanche is well-described by coupled rate equations (see below), assuming an initializing density of Penning electrons determined by Robicheaux's criterion \cite{Robicheaux05}, applied to an Erlang distribution of Rydberg-Rydberg nearest neighbours.
Theoretical investigations of ultracold plasma physics have focused for the most part on the long- and short-time dynamics of plasmas formed by direct photoionization \cite{PhysRept,Lyon}. In addition to studies mentioned above, key insights on the evolution dynamics of Rydberg gases have been provided by studies of Pohl and coworkers exploring the effects of ion correlations and recombination-reionization on the hydrodynamics of plasma expansion \cite{Pohl:2003,PPR}. Further research has drawn upon molecular dynamics (MD) simulations to reformulate rate coefficients for the transitions driven by electron impact between highly excited Rydberg states \cite{PVS}, and describe an effect of strong coupling as it suppresses three-body recombination \cite{Bannasch:2011}. MD simulations confirm the accuracy of coupled rate equation descriptions for systems with $\Gamma$ as large as 0.3. Newer calculations suggest a strong connection between the order created by dipole blockade in Rydberg gases and the most favourable correlated distribution of ions in a corresponding strongly coupled ultracold plasma \cite{Bannasch:2013}.
Tate and coworkers have studied ultracold plasma avalanche and expansion theoretically as well as experimentally. Modelling observed expansion rates, they recently found that $^{85}$Rb atoms in a MOT form plasmas with effective initial electron temperatures determined by initial Rydberg density and the selected initial binding energy, to the extent that these parameters determine the fraction of the excited atoms that ionize by electron impact in the avalanche to plasma \cite{Forest}. This group also returned to the question of added Rydberg atoms, and managed to identify a crossover in $n_0$, depending on the initial electron temperature, that determines whether added Rydberg atoms of a particular initial binding energy act to heat or cool the electron temperature \cite{Crockett}.
Our group has focused on the plasma that evolves from a Rydberg gas under the low-temperature conditions of a skimmed, seeded supersonic molecular beam. In work on nitric oxide starting in 2008 \cite{Morrison2008,Plasma_expan,Morrison_shock,PCCP}, we established an initial kinetics of electron impact avalanche ionization that conforms with coupled rate equation models \cite{Saquet2011,Saquet2012,Scaling,haenelCP} and agrees at early times with the properties of ultracold plasmas that evolve from ultracold atoms in a MOT. We have also observed unique properties of the NO ultracold plasma owing to the fact that its Rydberg states dissociate \cite{Haenel2017}, and identified relaxation pathways that may give rise to quantum effects \cite{SousMBL,SousNJP}. The remainder of this review focuses on the nitric oxide ultracold plasma and the unique characteristics conferred by its evolution from a Rydberg gas in a laser-crossed molecular beam.
\section{Avalanche to strong coupling in a molecular Rydberg gas}
\subsection{The molecular beam ultracold plasma compared with a MOT}
When formed with sufficient density, a Rydberg gas of principal quantum number $n_0>30$ undergoes a spontaneous avalanche to form an ultracold plasma \cite{Li,Morrison2008,RobertdeSaintVincent}. Collisional rate processes combine with ambipolar hydrodynamics to govern the properties of the evolving plasma. For a molecular Rydberg gas, neutral fragmentation, occurs in concert with electron-impact ionization, three-body recombination and electron-Rydberg inelastic scattering. Neutral dissociation combined with radial expansion in a shaped distribution of charged particles, can give rise to striking effects of self-assembly and spatial correlation \cite{Schulz-Weiling2016,Haenel2017}.
The formation of a molecular ultracold plasma requires the conditions of local temperature and density afforded by a high mach-number skimmed supersonic molecular beam. Such a beam propagates at high velocity in the laboratory, with exceedingly well-defined hydrodynamic properties, including a propagation-distance-dependent density and sub-Kelvin temperature in the moving frame \cite{MSW_tutorial}. The low-temperature gas in a supersonic molecular beam differs in three important ways from the atomic gas laser-cooled in a magneto-optical trap (MOT).
The milli-Kelvin temperature of the gas of ground-state NO molecules entrained in a beam substantially exceeds the sub-100 micro-Kelvin temperature of laser-cooled atoms in a MOT. However, the evolution to plasma tends to erase this distinction, and the two further characteristics that distinguish a beam offer important advantages for ultracold plasma physics: Charged-particle densities in a molecular beam can exceed those attainable in a MOT by orders of magnitude. A great many different chemical substances can be seeded in a free-jet expansion, and the possibility this affords to form other molecular ultracold plasmas, introduces interesting and potentially important new degrees of freedom governing the dynamics of their evolution.
\subsection{Supersonic molecular beam temperature and particle density}
Seeded in a skimmed supersonic molecular beam, nitric oxide forms different phase-space distributions in the longitudinal (propagation) and transverse coordinate dimensions. As it propagates in $z$, the NO molecules reach a terminal laboratory velocity, $u_{\parallel}$, of about 1400 ${\rm ms^{-1}}$, which varies with the precise seeding ratio.
The distribution of $v_{\parallel}$, narrows to define a local temperature, $T_{\parallel}$, of approximately 0.5 K. The beam forms a Gaussian spatial distribution in the transverse coordinates, $x$ and $y$. In this plane, the local velocity, $v_{\perp}(r)$ is defined for any radial distance almost entirely by the divergence velocity of the beam, $u_{\perp}(r)$. Phase-space sorting cools the temperature in the transverse coordinates, $T_{\perp}$ to a value as low as $\sim 5$ mK \cite{MSW_tutorial}.
The stagnation pressure and seeding ratio determine the local density distribution as a function of $z$. For example, expanding from a stagnation pressure of 500 kPa with a 1:10 seeding ratio, a molecular beam propagates 2.5 cm to a skimmer and then 7.5 cm to a point of laser interaction, where it contains NO at a peak density of $1.6 \times 10^{14}$ cm$^{-3}$.
Here, crossing the molecular beam with a laser beam tuned to the transition sequence, ${\rm X} ~^2 \Pi_{1/2} ~N'' = 1 \xrightarrow{\omega_1} {\rm A} ~^2\Sigma^+ ~N'=0 \xrightarrow{\omega_2} n_0 f(2)$ forms a Gaussian ellipsoidal volume of Rydberg gas in a single selected principal quantum number, $n_0$, orbital angular momentum, $\ell = 3$, NO$^+$ core rotational quantum number, $N^+ = 2$ and total angular momentum neglecting spin, $N=1$.
A typical $\omega_1$ pulse energy of 2 $\mu$J and a Gaussian width of 0.2 mm serves to drive the first step of this sequence in a regime of linear absorption. Overlapping this volume by an $\omega_2$ pulse with sufficient fluence to saturate the second step forms a Rydberg gas ellipsoid with a nominal peak density of $5 \times 10^{12}$ cm$^{-3}$ \cite{Morrison2008,MSW_tutorial}. Fluctuations in the pulse energy and longitudinal mode of $\omega_1$ cause the real density to vary. For certain experiments, we find it convenient to saturate the $\omega_1$ transition, and vary the density of Rydberg gas by delaying $\omega_2$. An $\omega_1$-$\omega_2$ delay, $\Delta t$, reduces the Rydberg gas density by a precise factor, $e^{-\Delta t/\tau}$, where $\tau$ is the 200 ns radiative lifetime of NO ${\rm A} ~^2\Sigma^+ ~N'=0$ \cite{Carter,Hancock}.
\subsection{Penning ionization}
The density distribution of a Rydberg gas defines a local mean nearest neighbour distance, or Wigner-Seitz radius of $ a_{ws} = \left(3/4 \pi \rho \right)^{1/3} $, where $\rho$ refers to the local Rydberg gas density. For example, a Rydberg gas with a density of $ \rho_0=0.5 \times 10^{12}$ cm$^{-3} $ forms an Erlang distribution \cite{Torquato.1990} of nearest neighbour separations with a mean value of $ 2 a_{ws}=1.6$ $\mu$m.
A semi-classical model \cite{Robicheaux05} suggests that 90 percent of Rydberg molecule pairs separated by a critical distance, $ r_c = 1.8 \cdot 2 n_0^2 a_0 $ or less undergo Penning ionization within 800 Rydberg periods. We can integrate the Erlang distribution from $ r=0 $ to the critical distance $r = r_c$ for a Rydberg gas of given $n_0$, to define the local density of Penning electrons ($ \rho_e$ at $t=0$) produced by this prompt interaction, for any given initial local density, $\rho_0$ by the expression:
\begin{equation}
\rho_e(\rho_0,n_0) = \frac{0.9}{2} \cdot 4 \pi \rho_0 ^2\int_0^{r_{c}} r^2 \mathrm{e}^{-\frac{4\pi}{3}\rho_0 r^3}\mathrm{d}r \quad.
\label{eqn:Erlang}
\end{equation}
Evaluating this definite integral yields an equation in closed form that predicts the Penning electron density for any particular initial Rydberg density and principal quantum number.
\begin{equation}
\rho_e(\rho_0,n_0) =\frac{0.9 \rho_0}{2}(1-\mathrm{e}^{-\frac{4\pi}{3}\rho_0 r_c^3}) \quad.
\label{Eq:PenDens}
\end{equation}
\begin{figure}[h!]
\centering
\includegraphics[scale=0.33]{Penning_Latice.pdf}
\caption{Distributions of ion-ion nearest neighbours following Penning ionization and electron-impact avalanche simulated for a predissociating molecular Rydberg gas of initial principal quantum number, $n_0$, from 30 to 80, and density of 10$^{12}$ cm$^{-3}$. Dashed lines mark corresponding values of $a_{ws}$. Calculated by counting ion distances after relaxation to plasma in 10$^6$-particle stochastic simulations. Integrated areas proportional to populations surviving neutral dissociation.}
\label{fig:PL}
\end{figure}
Prompt Penning ionization acts on the portion of the initial nearest-neighbour distribution in the Rydberg gas that lies within $r_c$. When a molecule ionizes, its collision partner relaxes to a lower principal quantum number, $n'<n_0/\sqrt{2}$. This close-coupled interaction disrupts the separability of Rydberg orbital configurations in the Penning partner. This causes mixing with core penetrating states that are strongly dissociative. Penning partners are thus very likely to dissociate, leaving a spatially isolated distribution of ions. We refer to the spatial correlation that results as a Penning lattice \cite{Sadeghi:2014}. The extent of this effect varies depending on the local density and the selected initial principal quantum number. Figure \ref{fig:PL} shows the degree to which Rydberg gases with initial principal quantum numbers from 30 to 80 form a Penning lattice for an initial density of $1 \times 10^{12} ~{\rm cm}^{-3}$.
\subsection{Spontaneous electron-impact avalanche}
The electrons produced by prompt Penning ionization start an electron impact avalanche. The kinetics of this process are well described by a set of coupled rate equations that account for state-to-state electron-Rydberg inelastic scattering, electron-impact ionization and three-body ion-electron recombination \cite{PPR,Saquet2011,Saquet2012,Scaling} using detailed rate coefficients, $k_{ij}$, $k_{i,ion}$ and $k_{i,tbr}$ validated by MD simulations \cite{PVS}.
\begin{eqnarray}
-\frac{d\rho_i}{dt}&=&\sum_{j}{k_{ij}\rho_e\rho_i}-\sum_{j}{k_{ji}\rho_e\rho_j} \nonumber\\
&& +k_{i,ion}\rho_e\rho_i-k_{i,tbr}\rho^3_e
\label{level_i}
\end{eqnarray}
\noindent and,
\begin{equation}
\frac{d\rho_e}{dt}=\sum_{i}{k_{i,ion}\rho_e^2}-\sum_{i}{k_{i,tbr}\rho^3_e}
\label{electron}
\end{equation}
The relaxation of Rydberg molecules balances with collisional ionization to determine an evolving temperature of avalanche electrons to conserve total energy per unit volume.
\begin{equation}
E_{tot}=\frac{3}{2}k_BT_e(t)\rho_e(t)-R\sum_i{\frac{\rho_i(t)}{n_i^2}},
\label{energy}
\end{equation}
Here, for simplicity, we neglect the longer-time effects of Rydberg predissociation and electron-ion dissociative recombination \cite{Saquet2012}.
Such calculations show that the conversion from Rydberg gas to plasma occurs on a timescale determined largely by the local Penning electron density, or Penning fraction, $P_f = \rho_e/\rho_0$, which depends on the local density of Rydberg molecules and their initial principal quantum number.
Avalanche times predicted by coupled rate equation calculations range widely. For example, in a model developed for experiments on xenon, simulations predict that a Rydberg gas with $n_0 = 42$ at a density of $8.8 \times 10^8 ~{\rm cm}^{-3}$ ($P_f = 6 \times 10^{-5}$) avalanches with a half time of 40 $\mu$s \cite{Hung2014}. At an opposite extreme, rate equations estimate that a Rydberg gas of NO with $n_0=60$ at a density of $1 \times 10^{12} ~{\rm cm}^{-3}$ ($P_f = 0.3$) rises to plasma in about 2 ns \cite{Saquet2012}.
\begin{figure}[h!]
\centering
\includegraphics[width= .49 \textwidth]{SFI_n=49.pdf}
\caption{Contour plots showing SFI signal as a function the applied field for an $nf(2)$ Rydberg gas with an initial principal quantum number, $n_0=49$. Each frame represents 4,000 SFI traces, sorted by initial Rydberg gas density. Ramp field beginning at 0 and 150 ns (top, left to right), and 300 and 450 ns (bottom) after the $\omega_2$ laser pulse. The two bars of signal most evident at early ramp field delay times represent the field ionization of the $49f(2)$ Rydberg state respectively to NO$^+$ X $^1\Sigma^+$ cation rotational states, $N^+=0$ and 2. The signal waveform extracted near zero applied field represents the growing population of plasma electrons.
}
\label{fig:SFI}
\end{figure}
Selective field ionization (SFI) probes the spectrum of binding energies in a Rydberg gas. Applied as a function of time after photoexcitation, SFI maps the evolution from a state of selected initial principal quantum number, $n_0$, to plasma \cite{Haenel2017}. Figure \ref{fig:SFI} shows SFI spectra taken at a sequence of delays after the formation of $49f(2)$ Rydberg gases of varying density.
Here, we can see that a $49f(2)$ Rydberg gas with an estimated initial density $\rho_0 = 3 \times 10^{11} ~{\rm cm}^{-3}$ relaxes to plasma on a timescale of about 500 ns. Observations such as these agree well with the predictions of coupled rate-equation calculations. We can understand this variation in relaxation dynamics with $\rho_0$ and $n_0$ quite simply in terms of the corresponding density of prompt Penning electrons these conditions afford to initiate the avalanche to plasma.
Figure \ref{fig:scaled_rise} illustrates this, showing how rise times predicted by coupled rate-equation simulations for a large range of initial densities and principal quantum number match when plotted as a function of time scaled by the ultimate plasma frequency and fraction of prompt Penning electrons. The dashed line gives an approximate account of the scaled rate of avalanche under all conditions of Rydberg gas density and initial principal quantum number in terms of the simple sigmoidal function:
\begin{equation}
\frac{\rho_e}{\rho_0} = \frac{a}{b+e^{-c\tau}},
\label{scaledEq1}
\end{equation}
where,
\begin{equation}
\tau = t \omega_e P_f^{3/4},
\label{scaledEq2}
\end{equation}
in which $\omega_e$ is the plasma frequency after avalanche, $P_f$ is the fraction of prompt Penning electrons, and $a = 0.00062$, $b = 0.00082$ and $c = 0.075$ are empirical coefficients.
\begin{figure}[h!]
\centering
\includegraphics[width= .4 \textwidth]{sim_analytical_density.pdf}
\caption{Rise in fractional electron density as a function of time scaled by the plasma frequency, $\omega_e$ and fraction, $\rho_e(t=0)/\rho_0 = P_f$, of prompt Penning electrons. Simulation results shown for $n_0 = 30$, 50 and 70 with initial densities, $\rho_0 = 10^9,~10^{10},~10^{11},~{\rm and}~10^{12}~{\rm cm}^{-3}$.
}
\label{fig:scaled_rise}
\end{figure}
\subsection{Evolution to plasma in a Rydberg gas Gaussian ellipsoid}
As outlined above, the local density and principal quantum number together determine the rate at which a Rydberg gas avalanches to plasma. Our experiment crosses a 2 mm wide cylindrically Gaussian molecular beam with a 1 mm diameter TEM$_{00}$ $\omega_1$ laser beam to produce a Gaussian ellipsoidal distribution of molecules excited to the A $^2\Sigma^+$ $v=0, ~N'=0$ intermediate state. A larger diameter $\omega_2$ pulse then drives a second step that forms a Rydberg gas in a single $n_0f(2)$ state with the spatial distribution of the intermediate state.
We model this shaped Rydberg gas as a system of 100 concentric ellipsoidal shells of varying density \cite{haenelCP}. Coupled rate equations within each shell describe the avalanche to plasma. This rate process proceeds from shell to shell with successively longer induction periods, determined by the local density as detailed above. The rising conversion of Rydberg molecules to ions plus neutral dissociation products conserves the particle number in each shell. We assume that local space charge confines electrons to shells, conserving quasi-neutrality. Electrons exchange kinetic energy at the boundaries of each shell, which determines a single plasma electron temperature.
\begin{figure}[h!]
\centering
\includegraphics[width= .5 \textwidth]{shell_model_100}
\caption{(top frame) Cross-sectional contour diagram in the $x,y$ plane for $z=0$ describing the distribution of ion plus electron density over 100 shells of Gaussian ellipsoid with initial dimensions, $\sigma_x= 0.75$ mm and $\sigma_y= \sigma_z = 0.42$ mm and an initial $n_0 = 50$ Rydberg gas density, $\rho_0 = 2 \times 10^{11}$ cm$^{3}$ after an evolution time of 100 ns. (bottom frame) Curves describing the (dashed) ascending ion and (solid) descending Rydberg gas densities of each shell as functions of evolution time, for $t=20$, 40, 60, 80 and 100 ns.
}
\label{fig:shell}
\end{figure}
The upper frame of Figure \ref{fig:shell} shows contours of NO$^+$ ion density after 100 ns obtained from a shell-model coupled rate-equation simulation of the avalanche of a Gaussian ellipsoidal Rydberg gas of nitric oxide with a selected initial state, $50f(2)$ and a density of $2 \times 10^{11}$ cm$^{-3}$. Here, we simulate a relaxation that includes channels of predissociation at every Rydberg level and redistributes the energy released to electrons, which determines a uniform rising electron temperature for all shells.
For comparison, the lower frame plots curves describing the ion density of each shell as a function of time from 20 to 100 ns, as determined by applying Eq \ref{scaledEq1} for the local conditions of initial Rydberg gas density. This numerical approximation contains no provision for predissociation. Coupled rate-equation simulations for uniform volumes show that predissociation depresses yield to some degree, but has less effect on the avalanche kinetics \cite{Saquet2012}. Therefore, we can expect sets of numerically estimated shell densities, scaled to agree with the simulated ion density at the elapsed time of 100 ns to provide a reasonable account of the earlier NO$^+$ density profiles as a function of time.
\begin{figure}[h!]
\centering
\includegraphics[width= .4 \textwidth]{Shell_pop}
\caption{Global population fractions of particles as they evolve in the avalanche of a shell-model ellipsoidal Rydberg gas with the initial principal quantum number and density distribution of Figure \ref{fig:shell}
}
\label{fig:shell_yields}
\end{figure}
For each time step, the difference, $\rho_0 - \rho_e$ defines the neutral population of each shell. We assign a fraction of this population to surviving Rydberg molecules, such that the total population of NO$^*$ as a function of time agrees with the prediction of the shell-model simulation, as shown in Figure \ref{fig:shell_yields}. We consider the balance of this neutral population to reflect NO$^*$ molecules that have dissociated to form N($^4$S) $+$ O($^3$P). Figure \ref{fig:shell} plots these surviving Rydberg densities as a function of radial distance for each evolution time. At the initial density of this simulation, note at each time step that a higher density of Rydberg molecules encloses the tail of the ion density distribution in $x$.
\subsection{Plasma expansion and NO$^+$ - NO$^*$ charge exchange as an avenue of quench}
We regard the ions as initially stationary. The release of electrons creates a radial electric potential gradient, which gives rise to a force, $-e\nabla \phi_{k,j}(t)$, that accelerates the ions in shell $j$ in direction $k$ according to \cite{Sadeghi.2012}:
\begin{align}
\frac{-e}{m'}\nabla \phi_{k,j}(t) = & \frac{\partial u_{k,j}(t)}{\partial t} \notag \\
= & \frac{k_BT_e(t)}{m'\rho_j(t)} \frac{\rho_{j+1}(t) - \rho_j(t)}{r_{k,j+1}(t) - r_{k,j}(t)},
\label{dr_dt}
\end{align}
\noindent where $\rho_j(t)$ represents the density of ions in shell $j$.
The instantaneous velocity, $u_{k,j}(t)$ determines the change in the radial coordinates of each shell, $r_{k,j}(t)$,
\begin{equation}
\frac{\partial r_{k,j}(t)}{\partial t}=u_{k,j}(t) = \gamma_{k,j}(t) r_{k,j}(t),
\label{dr_dt}
\end{equation}
\noindent which in turn determines shell volume and thus its density, $ \rho_j(t)$.
The electron temperature supplies the thermal energy that drives this ambipolar expansion. Ions accelerate and $T_e$ falls according to:
\begin{equation}
\frac{3k_B}{2}\frac{\partial T_e(t)}{\partial t}= -\frac{m'}{\sum_{j}{N_j}}\sum_{k,j}{N_j u_{k,j}(t)\frac{\partial u_{k,j}(t)}{\partial t}},
\label{dr_dt}
\end{equation}
\noindent where we define an effective ion mass, $m'$, that recognizes the redistribution of the electron expansion force over all the NO$^+$ charge centres by resonant ion-Rydberg charge exchange, which occurs with a very large cross section \cite{PPR}.
\begin{equation}
m' =\left (1+ \frac{\rho^*_{j}(t)}{ \rho_j(t)}\right) m ,
\label{dr_dt}
\end{equation}
\noindent in which $\rho^*_{j}(t)$ represents the instantaneous Rydberg density in shell $j$.
The initial avalanche in the high-density core of the ellipsoid leaves few Rydberg molecules, so this term has little initial effect. Rydberg molecules predominate in the lower-density wings. There, momentum sharing by charge exchange assumes a greater importance.
We see this most directly in the $\omega_2$ absorption spectrum of transitions to states in the $n_0 f(2)$ Rydberg series, detected as the long-lived signal that survives a flight time of 400 $\mu$s to reach the imaging detector. The balance between the rising density of ions and the falling density of Rydberg molecules depends on the initial density of electrons produced by prompt Penning ionization. As clear from Eq \ref{Eq:PenDens}, this Penning fraction depends sensitively on the principal quantum number, and for all principal quantum numbers, on the initial Rydberg gas density.
\begin{figure}[h!]
\centering
\includegraphics[width= .4 \textwidth]{w2_spectra}
\caption{Double-resonant spectra of nitric oxide Rydberg states in the $nf$ series converging to NO$^+$ $v=0$, $N^+=2$ (designated, $nf(2)$), derived from the late-peak signal obtained after a flight time of 400 $\mu$s by scanning $\omega_2$ for $\omega_1$ tuned to NO A $^2\Sigma^+$ $v=0$, $N'=0$ for initial $nf(2)$ densities from top to bottom of 0.07, 0.10, 0.13, 0.19, 0.27, 0.30, 0.32 and $3 \times 10^{12}$ cm$^{3}$.
}
\label{fig:w2_spectra}
\end{figure}
Figure \ref{fig:w2_spectra} shows a series of $\omega_2$ late-signal excitation spectra for a set of initial densities. Here, we see a clear consequence of the higher-order dependence of Penning fraction - and thus the NO$^+$ ion - NO$^*$ Rydberg molecule balance - on $n_0$, the $\omega_2$-selected Rydberg gas initial principal quantum number. This Penning-regulated NO$^+$ ion - NO$^*$ Rydberg molecule balance appears necessary as a critical factor in achieving the long ultracold plasma lifetime required to produce this signal. We are progressing in theoretical work that explains the stability apparently conferred by this balance.
\subsection{Bifurcation and arrested relaxation}
Ambipolar expansion quenches electron kinetic energy as the initially formed plasma expands. Core ions follow electrons into the wings of the Rydberg gas. There, recurring charge exchange between NO$^+$ ions and NO$^*$ Rydberg molecules redistributes the ambipolar force of the expanding electron gas, equalizing ion and Rydberg velocities. This momentum matching effectively channels electron energy through ion motion into the overall $\pm x$ motion of gas volumes in the laboratory. The internal kinetic energy of the plasma, which at this point is defined almost entirely by the ion-Rydberg relative motion, falls. Spatial correlation develops, and over a period of 500 ns, the system forms the plasma/high-Rydberg quasi-equilibrium dramatically evidenced by the SFI results in Figure \ref{fig:SFI}.
\begin{figure}[h!]
\centering
\includegraphics[width= .4 \textwidth]{Bifurcation.pdf}
\caption{$x,y$ detector images of ultracold plasma volumes produced by 2:1 aspect ratio ellipsoidal Rydberg gases with selected initial state, $40f(2)$ after a flight time of 402 $\mu$s over a distance of 575 mm. Lower frame displays the distribution in $x$ of the charge integrated in $y$ and $z$. Both images represent the unadjusted raw signal acquired in each case after 250 shots.
}
\label{fig:bifurcation}
\end{figure}
In the wings, momentum redistribution owing to cycles of ion-Rydberg charge transfer retards radial expansion \cite{Pohl2003,PPR}. By redirecting electron energy from ambipolar acceleration to $\pm x$ plasma motion, NO$^+$ to NO$^*$ charge exchange dissipates electron thermal energy. This redistribution of energy released in the avalanche of the Rydberg gas to plasma, causes the ellipsoidal Rydberg gas to bifurcate \cite{Schulz-Weiling2016,Haenel2017}, forming very long-lived, separating charged-particle distributions. We capture the electron signal from these recoiling volumes on an imaging detector as pictured in Figure \ref{fig:bifurcation}. Here, momentum matching preserves density and enables ions and Rydberg molecules to relax to positions that minimize potential energy, building spatial correlation.
The semi-classical description of avalanche and relaxation outlined above forms an important point of reference from which to interpret our experimental observations. The laser crossed molecular beam illumination geometry creates a Rydberg gas with a distinctively shaped high-density spatial distribution. This initial condition has an evident effect on the evolution dynamics. We have developed semi-classical models that explicitly consider the coupled rate and hydrodynamic processes governing the evolution from Rydberg gas to plasma using a realistic, ellipsoidal representation of the ion/electron and Rydberg densities \cite{haenelCP}. No combination of initial conditions can produce a simulation that conforms classically with the state of arrested relaxation we observe experimentally.
\subsection{A molecular ultracold plasma state of arrested relaxation}
Thus, we find that spontaneous avalanche to plasma splits the core of an ellipsoidal Rydberg gas of nitric oxide. As ambipolar expansion quenches the electron temperature of this core plasma, long-range, resonant charge transfer from ballistic ions to frozen Rydberg molecules in the wings of the ellipsoid quenches the ion-Rydberg molecule relative velocity distribution. This sequence of steps gives rise to a remarkable mechanics of self-assembly, in which the kinetic energy of initially formed hot electrons and ions drives an observed separation of plasma volumes. These dynamics redistribute ion momentum, efficiently channeling electron energy into a reservoir of mass-transport. This starts a process that evidently anneals separating volumes to a state of cold, correlated ions, electrons and Rydberg molecules.
We have devised a three-dimensional spin model to describe this arrested state of the ultracold plasma in terms of two, three and four-level dipole-dipole energy transfer interactions (spin flip-flops), together with Ising interactions that arise from the concerted pairwise coupling of resonant pairs of dipoles \cite{SousMBL,SousNJP}.
The Hamiltonian includes the effects of onsite disorder owing to the broad spectrum of states populated in the ensemble and the unique electrostatic environment of every dipole. Extending ideas developed for simpler systems \cite{Burin1,Sondhi}, one can make a case for slow dynamics, including an arrest in the relaxation of NO Rydberg molecules to predissociating states of lower principal quantum number.
Systems of higher dimension ought to thermalize by energy transfer that spreads from rare but inevitable ergodic volumes (Griffiths regions) \cite{Sarang2, Roeck_griffith, RareRegions_rev, Thermal_inclusions}. However, a feature in the self-assembly of the molecular ultracold plasma may preclude destabilization by rare thermal domains: Whenever the quenched plasma develops a delocalizing Griffiths region, the local predissociation of relaxing NO molecules promptly proceeds to deplete that region to a void of no consequence.
In summary, the classical dynamics of avalanche and bifurcation appear to create a quenched condition of low temperature and high disorder in which dipole-dipole interactions drive self-assembly to a localized state purified by the predissociation of thermal regions. We suggest that this state of the quenched ultracold plasma offers an experimental platform for studying quantum many-body physics of disordered systems. \\
\section{Acknowledgments}
This work was supported by the US Air Force Office of Scientific Research (Grant No. FA9550-17-1-0343), together with the Natural Sciences and Engineering research Council of Canada (NSERC), the Canada Foundation for Innovation (CFI) and the British Columbia Knowledge Development Fund (BCKDF).
|
[
"It is the ratio of the average unscreened electron-electron potential energy to kinetic energy."
] | 5,086
|
multifieldqa_en
|
en
| null |
7f8fc6a04f8be9000b41098aa0f8d7fbfd42e2aa43bf7997
|
How can players skip dialogue on the quest map?
|
Hey folks! Here is the shiny new Changelog thread. We're including the archived patch notes from the old forums, so that they are preserved for anyone that would like to reference back to them. We will continue to update this thread with new notes as the patches are released.
Chat is now accessible from the quest board, upgrade screen, and many other menus.
Tapping on objects and menus may reveal helpful hints about that object.
Team PI is now colored red if lower than recommended for the quest.
Many text fixes and consistency improvements.
• A new Basic Catalyst found in Special Events is used in every recipe!
Several heroes have received improvements to their base stats.
The abilities of all Champions have increased in effectiveness.
A new Critical Boost buff has been introduced.
Iron Fist and Spiderman now have the ability to Armor Break with their Critical Hits.
Deadpool’s ability to Regenerate is more powerful, but only triggers once per fight.
Scarlet Witch now has a chance to trigger Nullify off of any Critical Hit.
Juggernaut and Rhino now have a layer of Armor.
Punisher and Winter Solider now may also trigger Fury in addition to Bleed.
Colossus now further increases his base Armor with the Armor Up ability.
Thor and Ronan no longer Armor Break; instead, base stats and Stun durations have improved.
We reduced the effectiveness of the Revive items in order to give away more as rewards.
A bonus of 50% for using ISO-8 matching your Champion’s Class can now be previewed on the Upgrade screen.
It’s now possible sell Champions in exchange for ISO-8 and Gold. The amount received increases proportionately to the Rank and Level of the sold Champion.
-You can now skip dialogue on the quest map by pressing ‘SKIP’.
-Added a ‘Quit’ button directly on the quest interface.
-The Back button on the Top Bar now returns the player to the Home screen.
-Various game balance and cosmetic improvements to the available quests.
• PVP energy has been replaced with Hero Stamina. Each Hero has their own Stamina values, meaning the more Heroes you have the more you can play in PVP.
• Each Hero has 1 Stamina and takes 2 hours to recharge.
We have removed the Next Quest button for a much more favorable and flavorful approach to teaching and informing people about Marvel : Contest of Champions. In the Main Menu(Bottom Right Corner) you will now see an image of the Collector showing you what the best or recommended actions that you should preform. This can be anything from opening Crystals, Continuing a Quest, Ranking Up Champions if the difficulty is too hard, Tips where to obtain items, and Playing Versus/Arenas.
• Adjusted the PI calculation for Power Burn and Power Drain abilities to improve accuracy.
• Significantly increased the Power Burn multiplier as well as the amount of Power burned. Prior to this change, Vision's Special Attack damage output was far below the curve. Vision's Special Damage is distinct from other heroes in that the dependency on opponents' Power levels cause the damage dealt to be highly variable, and sometimes quite low; however, when striking an opponent with high Power levels, Vision has the potential to deal very high amounts of direct, Armor-ignoring damage.
• Slightly adjusted the Armor Break trigger to be less punishing to opponents with the Armor Up ability without sacrificing PI or damage output.
• Slightly increased his base Health and, in turn, the amount of Health recovered by Regeneration. This improvement is reflected by an increase to PI of about 1%.
• Slightly reduced the damage from Bleeding, but slightly increased the amount of Power drained by E.M.P. Arrow to compensate. This added utility strengthens the choice between whether to offensively Bleed the enemy or defensively drain their Power. These changes may modify PI by +/-1%.
• Slightly reduced the frequency of Nullify for basic attacks, but slightly increased the chance a Special Attack is critical. Chaotic Bombardment no longer has a chance to critical, and instead has a 100% chance to Nullify the target. This is less punishing to opponents with beneficial effects, while providing a more reliable source of Nullify. Overall, her PI has decreased by about 2%.
• Decreased base Health and Attack by 2% each to bring his PI in line with other Champions without compromising Special Attack effectiveness.
• Slightly increased base Health by 2% to bring his PI in line with other Champions. This change may result in a PI increase of up to 1%.
• Fixed a bug with her Bleed ability scaling incorrectly. This has no effect on PI.
• User's on iPhone 4 devices will no longer encounter a progression blocker after fighting Iron Man in the tutorial.
• Fixed an issue where player's Hero would disappear after using a special move.
• Fixed an issue where very rarely a character would lose all functionality when dashing.
• Added additional Network support to better diagnose disconnects. The game should resolve and recover much more gracefully than in previous updates.
• Adjusted some of the touch sensitivity while fighting. Heroes moves should feel more responsive. This is something that is going to be an ongoing process. Please let us know how you think it feels.
• Fixed various issues with Chat.
• We have updated Open GL versions/drivers for iOS devices that support Open GL 3.0.
• User's will no longer receive delayed Game Center notifications. This caused some weirdness to occur while opening Crystals in the Crystal Vault.
• The Crystal Vault has received another polish pass and should now feel much more responsive, thank you for all your feedback on this feature!
• Many more minor bug fixes were included in this update.
• Special Attack 1 base damage increased by +25% Attack Rating.
• Heavy Attack base Power gained reduced to 63 points.
We recently improved the functionality of Heavy Attacks, so they’re easier to use. Their base Power has been reduced to normal levels – previously, they generated Power at a higher rate to compensate for their difficult execution. Special Attacks have been adjusted to give the unlucky recipients more of a fighting chance. These changes bring these attacks in line with existing damage-to-power ratios.
*NOTE: Special Attacks only generate Power for the target struck, not for the user; this prevents infinite loops and helps serve as a comeback mechanic.
Versus Crystal prizes have been adjusted due to the Champion Stamina changes.
Arena Crystal prizes have been increased to help balance the adjustments to the Versus Crystal.
Payouts have significantly increased when receiving a duplicate Champion with a Star rating of two or more. The boosted amount increases based on Star rating. We apologize for any inconvenience caused by delivering each reward individually, and are working to get a fix to you as soon as possible. In the meantime, using the “Skip” button avoids the inconvenience.
• We fixed a bug where finding a new match could cost a player Units.
• Spending Units to find a new opponent will now return opponents with lower ratings.
• Chapters 3 and 4 of Act 2 Story Quests are now available. A mysterious opponent awaits you at the end of Act 2!
*NOTE: This caused some players' progress to reset for a brief time, but that issue should now be corrected.
• Event Quest difficulty has been adjusted to match Catalyst availability.
• Rank-Up Recipes have been adjusted to be more accessible across all ranks.
• Bosses for the Monday through Saturday Daily Events now have a small chance to drop a Class Catalyst. This is in addition to the drop chance from Chests.
• Ambush Rates have been adjusted on all Event Quests.
• Increased Catalyst drops for the Collector Free-For-All Event Quest.
• Alpha Catalysts now have a chance to drop from Chests in Medium and Hard difficulties of The Collector Free-For-All event.
• The unobtainable chest in Act 1, Chapter 1, Quest 6 has been removed from the Battlerealm.
Increased the amount of Gold awarded by the Arena Crystal.
Slightly reduced the cost to level-up a 3-Star Champion at Rank 1 to cleanly align with ISO-8 chunk values.
Fixed a bug with Billion-Dollar Punch not triggering Armor Break.
• Duplicate 2-Star, 3-Star, and 4-Star Champions now awaken a brand new ability unique to that Champion in addition to the rare ISO8 they currently give. Duplicates thereafter continue to level-up this ability to make it stronger. When a Champion is awakened, their Stars turn bright and glow, making them easy to identify (and look pretty cool too). These new abilities can be quite powerful, so please fight responsibly!
• Various other improvements, including rank and level information for opponents, find match options in team select, and animation tuning.
• There is now a chance to encounter the elusive Treasure Adaptoid, who divulges his hoard of ISO8 and Gold to those able to defeat him in battle.
• Class Relationships can be viewed by tapping “Enemy Classes” before entering a quest, and preview the number of enemies in that quest for each class type.
• You can also now see rewards for completion and exploration on the Edit Team screen.
• Opponents are more aware of the distance between you and them, improving their interaction with knockback effects, such as that from Heavy Attacks.
Mutant Champions are now effective against Skill Champions.
• The high Special Attack damage and regenerative abilities of Mutant Champions are effective against Skill Champions, which typically rely on Bleed damage from their weaponry. We think of this relationship as if the X-Gene grants Mutant Champions superpowers that evolved to be stronger than Champions that are merely “Skilled”.
Skill Champions are now effective against Science Champions.
• While scientists fiddle in their cute little laboratories to create flasks full of serums to turn even frail young men into super-soldiers, Skill Champions were just born that way baby. Often donning sharp weaponry to make their opponents Bleed, Skill Champions enjoy watching the high base attributes of Science Champions just melt away.
Cosmic Champions are now effective against Tech Champions.
• Tech Champions construct durable robots and thick suits of Armor to outlast their opponents in battles of tank-the-nuke...which gives Cosmic Champions extra time to build up stacks of beneficial effects to overrun Tech Champions using their peculiar alien enhancements.
• Tech Champions are still effective against Mutant Champions.
Tech Champions typically excel at Armor, Resistance, and Power manipulation, which is effective against the high Special Attack damage of Mutant Champions. Think of the robotic Sentinels adapting for tactical advantages in the war against Mutantkind!
Science Champions are still effective against Mystic Champions.
• Science Champions – a Class of behemoths like Hulk and super-soldiers like Captain America – typically have above average base attributes like Health, Attack, and Armor. These raw stats cannot be affected by pesky Mystics and their removal abilities: Nullify and Purge.
Mystic Champions are still effective against Cosmic Champions.
• Cosmic Champions explore strange new beneficial effects to seek out new power and new abilities, to boldly take their attributes where no class has gone before. Well, not if Mystic Champions – who are fully capable of stripping Cosmic Champions of their beneficial effects – have anything to say about it! Maybe it’s the Mystic Agenda to protect the secrets of the universe?
These changes ensure that having a Class Bonus always gives you the advantage it promises, as it now also reflects ability trends for a particular Class. Please keep in mind that these are generalizations, and some Champions abilities may not always strictly align with these relationships. Learn more about Champions’ abilities by viewing their profiles and tapping on features for detailed information.
• When you attack someone, you charge up their Power in addition to yours. This meant they would reach a full three bars while you only reached one and a half. We've reduced the amount defenders receive such that you'll be at two bars when they're at three. This change maintains the underdog functionality to give defenders a chance to comeback while being less punishing to players earning high Combos.
New damage types for attacks now play a larger role in the abilities of Champions. For example, some heroes power-up by successfully blocking magical damage, while others’ abilities may harm anyone that makes physical contact with them.
New Resistances and Immunities have found their way to the Battlerealm. Some heroes are completely immune to specific status effects based on either lore from the comics or logic. For example, the android Vision has no blood, and is therefore fully immune to Bleed conditions. We’ve also strengthened the effectiveness of certain status effects, so be careful who you choose to bring into battle! Could you guess who might be immune to the new “Poison” condition?
• Poison: Inflicts damage over time and reduces healing and regeneration effectiveness.
• Unstoppable: A buff to shrug off the impact from attacks, but still take the damage.
• Weakness: A debuff that reduces Attack attributes.
• Heal Block: Fully prevents the target from gaining health in any way.
• Power Lock: Seals the target, preventing them from gaining any Power.
• When fighting, you may notice that many status effects are now able to stack. This also changes how certain beneficial “buffs” and detrimental “debuffs” interact with one another. For example, it's now possible to have both Armor Up and Armor Break effects on you simultaneously. Let the tug-o-war begin, and may the strongest effects win!
• Black Bolt's Corkscrew: +25% damage, but at the cost of minor recoil damage.
• Punisher's “Wrath” has been replaced by "Payback". Payback deals additional damage based on the total damage dealt to Frank.
• Colossus' “Unbreakable” now deal bonus damage based on his armor level at the time of activation.
• All of Black Panther’s special attacks now deal bonus damage based on the number of Bleeds on the target.
• Spider-Man’s Web-Slinger now has a chance to inflict Weakness.
• Vision’s Physical Disruption: Added a minor Power Burn effect due to “his” use of his Infrared Beam. “He” also now purges all status effects while phasing through the ground.
• Scarlet Witch: Increased the Critical Hit Chance for Hex Bolt and Hex Sphere.
• Many knockback effects have been adjusted to improve consistency.
We’ve tested the Signature Abilities quite extensively before releasing them, but there have been a few abilities that we have been keeping an eye on. We’ve compared our notes with the feedback you’ve been sending us and are making some balance changes to them. Thanks for your feedback!
Slightly reduced the frequency and duration of Juggernaut’s “Unstoppable” ability.
• He was indeed a bit too...unstoppable. We’ve toned down the frequency this ability triggers, as well as reduced the duration it’s active for when it does trigger. We feel Juggernaut is still a powerful Champion despite these revisions. Take care!
Slightly reduced the starting values of Wolverine's “Cellular Regeneration”.
• We found that Cellular Regeneration was too strong at lower levels where fewer counters to Regeneration exist.
Re-scaled Gamora's “Assassination” to start higher but scale slower.
• At lower levels, Special Attacks were used too infrequently, giving this powerful ability little visibility. We’ve adjusted the scaling to better match Special Attack usage at all levels.
Increased the frequency that Black Bolt’s “Provocation” triggers.
• Due to the varying Critical Hit rates across all Champions, in some cases Provocation would trigger rarely or not at all within a fight. We’ve increased the frequency to ensure you’ll see it every match – but especially so against opponents with high Critical Hit rates.
We’ll continue to follow the effect of these new abilities on gameplay. Please keep your feedback coming!
Hey everyone! We have been hard at work on improving the game and have prepared a big update inspired in part by your great community feedback. Please keep letting us know what you think!
• Fixed many Dash, Medium, Heavy and Special Attacks missing or failing to execute.
• Added Alliances and a new Alliance Crystal.
• Rocket Raccoon and Unstoppable Colossus join The Contest.
• Temporary Boosts to Attack, Health, and XP are now available from the Alliance Crystal.
• Rewards for completing and exploring Chapters and Acts. Earn a guaranteed 3-Star hero crystal for each fully explored Act! This is retroactive, just complete any quest to claim them.
• A new Fight Menu combines The Arenas, Story Quests and Event Quest menus.
• Updated Summoner Profiles with new information. Inspect other players’ Profiles and brag about your achievements!
• A list of blocked users has been added to Chat windows. The option to unblock these users is found in this new menu. The power is in your hands now!
• We fixed Dash and Medium Attack issues for many heroes that sometimes missed or did not activate.
• We fixed issues to Drax and Colossus Light and Medium Attacks where they would not connect.
• Fixed an issue where the camera would stop moving after a level 3 special sequence.
• Fixed an issue where the player’s heavy attack would get stuck in charge even after the player has released input.
• Fixed a rare bug where Champions were still able to deal damage after they died, resulting in tied fights.
Form Alliances with your Friends!
What is better than playing? Playing with your friends! Create a new Alliance or join an existing one through the new Alliance Menu.
• Invite other players to your Alliance.
• Search for an Alliance by name or join a Recommended Alliance.
• Receive rewards for entering your first Alliance.
• Alliance News Feed. The news feed celebrates your Alliance member’s achievements.
• Alliance Chat. Chat with other members of your Alliance in a private channel all to yourself.
• Help Allies. Players can ask for help when out of Energy or Stamina. Alliance members help each other as much as they can to earn Loyalty Points. Loyalty points have a daily limit to how many can be earned.
• Alliance Crystal. Access a new Alliance Crystal while part of any Alliance. Use new Loyalty Points for purchasing Alliance Crystals.
He may start out slow, but watch out for his immense power at high ranks!
• Adjusted the range of many Heavy Attacks, including Hulk and Drax, to ensure they correctly connect with enemies.
• Many Special Attacks, including those for Wolverine, Iron Fist, Winter Soldier, Punisher, Black Panther, and many others have had their range adjusted to ensure they correctly connect with enemies even if activated immediately after a combo that knocked the enemy back.
• Payback and Unbreakable now display their maximum potential damage bonus.
• Added detailed descriptions for Bleed Immunity and Poison Immunity.
• Gamora: We’ve adjusted the scaling of her base Special Attack damage to ensure they scale up more similarly to other heroes. This also makes Gamora more reliant on her high Bleed damage, and improves the chances of opponents able to deal with her high Bleed.
Vital Strike and Jade Assassin damage decreased by 10%.
Godslayer damage increased by 10%.
• Magik: Rewind is a game-changer for Magik that allows her to go up against foes like Gamora and Rewind off big Critical Hits and Bleed damage; however, the frequency of Rewind triggering was too low to be there when she needed it.
Increased the likelihood Rewind triggers by +20% at all levels.
Rewind now heals over one second instead of instantly.
Fixed a bug allowing Magik to break out of an enemy combo using Rewind. It now only removes Status Effects.
• Hulk: Given the riskiness of losing Health in certain game modes, Hulk’s anger-management provided too little help too late in the game. We’ve increased the Attack boost to ensure he’s appropriately scary in all game modes – as long as he’s angry!
Increased Hulk Rage by +20% Attack at all ability levels.
Arc Overload no longer causes Armor Break when it expires.
• Vision: Added Poison Immunity to our robot friend.
Arena tuning is an ongoing process. The team is continually making adjustments to Arenas to improve the experience.
Ultron has infected The Contest!
Many new Champions join the battle against Ultron.
Quest through the new Ultron’s Assault Event.
Wield new power with Summoner Masteries.
Grow your Friend’s List with the new Social Hub.
Team up with your Alliance in new Events, Arenas, and more!
Filter and sort your Stash.
Fights have been optimized for performance improvements on all devices.
Users can now filter through the items in their Stash.
Fixed several issues where Hero Rating would fluctuate.
Fixed a bug with Rhino and Juggernaut having 11-20% more Armor than intended.
Fixed a bug with Rocket Raccoon’s Dash attack being slower than intended.
Added a confirmation popup when spending Units on stamina recharges and unlocking arenas.
Regeneration no longer displays green Health values if you’re at full Health.
Several new improvements to how status effects are displayed.
AI opponents are no longer able to perform one unavoidable attack in response to a Special Attack 3.
A new and improved look for all Health Potions in the Battlerealm.
All Revive Potions now revive your Champions with +10% more Health.
We’re adding so many new Champions, they could form their own Alliance!
Some of your favourite heroes of the Marvel Cinematic Universe join The Contest!
Summoner Mastery is on the horizon!
Masteries provide beneficial effects for your Champions.
Access Masteries through your Summoner Profile.
Earn Mastery Points when you level up.
Choose your Masteries wisely and strategically customize your benefits.
Recover your points to try a new specialization as often as you’d like.
Keep an eye on in-game messaging for more information.
The daily loyalty limit has been set to refresh at 08:00UTC for all players.
A timer has been added to show when the daily loyalty limit resets.
Loyalty balance is now displayed in the Alliance menus.
Ask for Versus help with a single tap on the ‘Help’ icon in Team Select.
New Alliance Events are coming very soon!
Work together with your Alliance to complete objectives and receive rewards!
Muster your might, Alliance Arenas will soon open their gates!
Competing in Alliance Arenas shares your points across your whole Alliance; work together to reach milestones and top ranks!
Work together to amass a huge score, and defeat your competition in classic Arena combat! No slackers here either - if you don’t contribute to win the competition, you’re not eligible for the goods!
All social features (Chat, Mail, and Friends) can now be accessed through the new Social Hub.
Search for and add friends, and send private messages to Summoners on your Friends List.
Redesigned chat and mail screens.
Take on other Summoners’ top Champions for bragging rights and prizes in 1-on-1 Duels!
A new series of special Ultron quests are available, starting with the first Chapter. Fight back against Ultron’s infection alongside the Summoner, and team up with some of Marvel’s finest! New quests unlock each week!
The Spider-Man Champion gate has been removed from Act 1, Chapter 1, Quest 5.
• Fixed an issue where chat snapped to the most recent message.
• Fixed several issues where Hero Rating would fluctuate.
• Various improvements to the Summoner Mastery screens and descriptions.
• Increased the ISO8 awarded by duplicate 2-Star Champions.
Quest through the new single-player campaign, Ant-Man’s Adventure!
In addition to Ant-Man and Yellowjacket feuding throughout the Battlerealm, additional new Champions will be joining The Contest!
Access more Masteries in the new Utility Mastery tree!
Please note, these changes may result in a loss of Hero Rating as incorrect effects are restored back to normal levels.
Improved and polished combat mechanics to reduce the amount of stutters and lost input.
Fixed and optimized rendering related issues with Metal enabled devices.
Team up with Ant-Man, and put a stop to Yellowjacket’s mysterious mission!
All Alliance Quests only last for a specified amount of time, defeat the boss with your Alliance before it expires!
New Prestige System - A dynamic difficulty and score setting that adjusts as you and your Alliance succeed in harder quests. The better you do and the tougher your Alliance is, the higher the prestige. The higher the prestige, the better the rewards!
Choose your teams carefully as Champions within Alliance Quests cannot be used in other Story or Event Quests.
Act 4 has been released! Play Chapter 1 now!
Summoner level maximum has been increased to level 60!
5-Star Champions are coΩming to The Contest! These are the most powerful Champions yet!
Additional improvements have been made to the UI, Versus Arenas, Synergy Bonuses, the Stash & Items Store.
Act 4 - Chapter 1 released!
New challenges - more path variation and features to challenge the strongest Summoners!
Greater challenge means greater rewards! Earn 4 Star Crystals and Mastery Points!
The Summoner Level cap has been increased by ten levels to level 60!
Champion Items will be coming soon! These allow you to apply items and buffs to a specific Champion, keep an eye out for updates on these new Champion Items!
Synergy Bonuses have updated iconography and the calculation has been updated to a distinct, additive bonus - What you see is what you get!
Alliance class distribution is now displayed on team select - Choose the right class!
Your Catalysts now have their own inventory, and will no longer appear in the Upgrade Item inventory.
The Stash is now separated into three tabs: Catalysts, Rewards and ISO, allowing you to sort and view your Stash much faster!
The UI flow for both Quests and Arenas have been greatly improved. You can now skip through fight victory and reward animations!
Here is the rundown of patch 5.1.0, filled with various bug fixes and optimizations. The important ones to note are below.
New Champions, new theme, and a new arena!
To celebrate our one year anniversary AND the holidays, we’ll be running a special event quest! Battle through the history of The Contest, and test your mettle against familiar faces both old and new!
A special reward will be available to those who master every quest!
Our Anniversary Celebration will be happening very soon; stay tuned for more info!
More Act 4 quests are coming very soon!
Opponents in Story Quests now have the ability to use their Special 3 attack! Note that we are not changing previous quest opponents to have this special attack (Act 1-3, Proving Grounds, Realm of Legends will not change); this will be in effect starting with the soon-to-be-released Act 4 content.
As with our previous major build releases (3.0’s Ultron, 4.0’s Ant Man, and 5.0’s Battlerealm), the Contest has been reskinned with a new theme!
The Road to Knowhere map is here! Fight in a new level inspired by Guardians of the Galaxy!
A new button in your Alliance Chat to take you directly to Alliance Quests!
You can now collect Catalyst Fragments in Event Quests, Proving Grounds, and Alliance Quests; these can be pieced together into a Catalyst!
Selling Items is now a thing! Sell any items in your inventory for gold!
Level 3 and Level 4 Health Potions have arrived! These are powerful instruments to help you tackle all the new Act 4 content!
Over 400 bugs were fixed in this patch!
This patch is a fix for the missing Champions during the Special 3 animation on Android devices.
This issue occurred during our upload process to the Google Play Store. This was an odd edge case scenario that we could not have caught during our internal tests, as it began appearing once we uploaded to the Google Play Store. This hotfix will be out by tomorrow, and will put Android at version 6.0.1. As this issue does not occur on iOS devices, iOS will remain at version 6.0.
3:30pm PST: We have started slow-rolling this patch out to Android devices, beginning with about 20% of users. We expect this to be available for 100% of users within the next 24 hours.
We have a few new Champions that you will see within the next couple of months (including one of my personal favorites)!
Over 200 total bugs squashed in this patch!
An artifact left over from the early days of the contest was Black Panther’s ability to gain a Critical Hit Rate boost during Special 3 attacks. As many might know, Critical Hits aren’t possible during a Special 3 anymore, making this effect...unhelpful. We’ve switched it out with a new ability to stack up even more Bleed effects on the opponent based on how many Bleeds are already active.
Example: The opponent has 4 stacks (instances) of Bleed on them when you launch a Special 3. With this new ability, you have a chance to add an additional 0 - 4 more stacks (instances) of Bleed.
Previously, a bug existed that allowed champions with Evade to continue to dodge Black Widow’s attacks, even if her Signature Ability was maxed out. This issue has been fixed.
Captain America WW2 has started to become outpaced by his non-WW2 counterpart and while we want the two to feel different and each have their own specific uses, we also want to ensure they are kept within range of each other in terms of balance. To accomplish this, we’ve given WW2 Cap the ability to Stun with his Special 1 and Special 3 attacks, but kept his Bleed on Special 2 the same, giving him options during combat against non-bleeding champions.
A bug that prevented Daredevil from triggering Armor Breaks from Heavy Attacks has been fixed and is now working as intended.
Against non-bleeding champions: Critical Hits have a chance to Armor Break on Special Attacks.
Increase range of Signature to 25% from 20%.
Many players found Elektra’s signature ability lacked enough opportunities to use it. To remedy this, we’ve increased the range from 20% to 25%. Additionally, to help make Elektra unique from other skill champions, we’ve given her the ability to deal with naturally Bleed Immune champions. Note: This Armor Break only applies to champions naturally immune to bleed, such as Colossus and Ultron, and not to champions granted Bleed Immunity from Local or Link Nodes.
Guillotine’s Bleed effect used to have a chance to activate from any given attack, meaning that it had to be kept quite weak to compensate for the frequency of triggers. We’ve made the switch to have her Bleed behave closer to existing champions, and in doing so have boosted the strength of the Bleed and have allowed it to stack.
Norman Osborn overloads the Arc Reactor in his chest if Health drops below 10%, granting a large burst of power, with (18% - 48% ) Armor, Regeneration, and Power Gain. After that, his suit burns out and cannot trigger Armor Up, Armor Break or Stun and loses all base Armor.
Many players didn’t like Iron Patriot’s old signature ability, feeling that due to the lack of Regeneration, it was considerably weaker than Iron Man’s. While we agreed, we didn’t want to just copy and paste his signature ability, but rather give him his own unique twist on the ability. This “all or nothing version” feels more like Norman Osborn, pushing his suit to the limit to get a larger boost but at the cost of damaging the suit. The addition of Power Gain allows Iron Patriot a large attack before the suit burns out, if timed correctly.
Heavy Attacks: 90% chance to Stagger the enemy for 8 seconds. A Staggered enemy cannot gain their next beneficial effect.
All versions of Juggernaut, even those who haven’t been awakened, now gain the 2 second Unstoppable ability at the start of the fight when they hit Rank 2.
We wanted to add some new functionality to Juggernaut, while also keeping him true to his Mystic class assignment. To accomplish this, we added this “buff smasher” effect which keeps an opponent from gaining their next beneficial effect. Additionally, we wanted to make non-awakened versions of Juggernaut more fun to play, without adding more power to the awakened variations. As a result, we gave all versions of Juggernaut the ability to become Unstoppable at the start of the fight.
While many players liked the new functionality of Star-Lord’s Element Gun effect, they found it to be a little too random, specifically when it would Heal Block a champion incapable of Healing. We’ve now added in some contingencies that will make Heal Block appear less unless the opposing champion shows that he / she can Heal during the fight. This includes both activated healing effects, such as Wolverine or Ultron’s Heal, or passive healing effects gained from Masteries, such as Salve or Willpower.
It’s been a bit weird that Bucky wasn’t friends with his most famous friend. Well, he is now. This affects 3 Star and above versions.
We’ve increased the overall speed of this attack, allowing quick players to use this ability after a four or five hit combo.
It seems the Marvel’s have gotten tired of their beams being dodged so easily and have decided to angle it a little better, increasing the overall range of the attack and making it harder to dodge away from. We’ve also increased the speed of both special attacks to allow them to better flow into combat.
In order to allow this attack to better flow in combat, we’ve shaved off a few frames from the beginning, allowing players to chain this attack into 4 and 5 hit combos.
Alliance Wars have arrived! It’s Alliance versus Alliance in a war for Battlerealm supremacy!
Enter the NEW Loyalty Store to buy Alliance Potions, Mastery items, or other EXCLUSIVE items.
Gain Power back from Special Attacks, enhance or defend against Special Attacks, OR gain a temporary Arena Point Boosts with hoards of new Summoner Boost items!
Additional changes and improvements are listed below.
This patch will be released February 24th.
A new area of the Battlerealm has been opened! Compete with your Alliance-mates for pride, glory, and PRIZES!
Matchmake to find a rival Alliance, then combine strategy and teamwork to dominate them.
Setup the ultimate defensive team to fortify your Battlerealm, then take your offensive team on the assault!
Watch your War Rating skyrocket as your Alliance works together to defeat rivals!
Load up on Crystal Shards, Loyalty, and brand new exclusive rewards!
Note that this will be slow-rolled to Alliances in phases, similar to the introduction of Alliance Quests (to ensure server stability and gather your feedback on the new mode). Expect tuning changes throughout these phases, as well as into Season 1.
Use Loyalty instead of Units to obtain items for Alliance Quests & Wars!
Items will rotate daily, similar to how the Mastery cores in the current Store change.
Store contents will be randomly chosen from a pool of categories/items; a select few items will be persistent and always be available for purchase.
A 5-Star version of Unstoppable Colossus will be available in the Loyalty Store (keep in mind, this is an expensive Champion due to his exclusivity; this will require winning quite a few Alliance Wars and saving up!).
This is accessible from the “Store” section of the pop-down menu, and will be available at a later date after the initial 7.0 launch; there will be advance notice through forums and in-game before we release the Loyalty Store.
New Summoner Boosts have arrived in the Loyalty Store; NEW Boost types, purchasable with Loyalty Points.
Class specific Boosts, such as Mystic Champions restoring power after using Special Attacks 2 and 3, or Skill Champions boosting their Special Attack Damage.
Defensive Boosts, where your Champions take reduced incoming Special 3 Attack Damage.
Gain a temporary Arena Point boost with new Arena Boost items!
Fixed an issue where, after Parrying certain Champion’s Special Attacks, your Champion would be stuck in a blocking state until the Special Attack finished.
Fixed an issue where 90s Cyclops’ Armor Breaks would not remove Armor Ups.
Fixed an issue with Scarlet Witch’s Signature Ability proc rate (previously, the % chance displayed did not match in-game functionality; this is now fixed).
(Netflix) Daredevil’s Heavy Attack now has a chance to apply 2 stacks of Armor Break, instead of the previous 1 stack.
When spending Battlechips to enter an Arena (such as the Tier 4 Basic or Alpha Catalyst Arena), there is now a confirmation popup.
The Alliance Crystal now has a purchase limit that resets daily.
Permanently increased the Alliance Crystal’s points in Summoner Advancement (from 30 to 300).
Updates to Champion Special Attack animations, flow, and timing.
7.0.1 will be released within the next few days.
A celebration message is sent to the War Room when an Alliance War battlegroup is cleared.
Players can now tap directly on another node icon while the tile info popup is open (previously, the popup had to be closed before selecting another node).
Alliance’s reward tier position is now highlighted in the Alliance War tier breakdown.
In Attack Phase, players can view the score breakdown for both the battlegroup and overall.
The “Place Your Defenders” text now disappears much faster after tapping on the screen.
Mail messages now display the date they were sent.
It should be much harder to accidentally tap the Units Store when closing a screen.
Players can tap to skip the point animation in Versus mode again.
Resolved an issue with Class Masteries (specifically Mystic Dispersion) not functioning.
The Juggernaut issue with his linked nodes not appearing in Act 4, Chapter 3, Quest 3 (4.3.3) has been fixed.
Fixed a crash that occurs when a player who is not in an Alliance enters Alliance Wars through an outside link.
Fixed a text issue where Alliance War specific descriptions would appear on the Alliance Quest “Select a Battlegroup” screen.
Resolved ~20 various rare crashes and additional minor issues in different game modes.
Fixed and optimized performance on the new Samsung S7.
Fixed an Unknown Error that occurred rarely after a device was woken after going to sleep.
Improved Performance(Frames Per Second) tracking per fight to help diagnose hitches/pauses/lag spikes during gameplay.
Improved gesture tracking(Swipe, Tap, Hold) during low performance moments in combat.
Fixed a rare crash that would sometimes occur when receiving a phone call while in combat.
Tuned and updated many Champion Special Attack animations to improve timing and combat flow. Please see the expanded forum post HERE for a full list.
Fixed She-Hulk’s Special Attacks being marked as a projectile (allowing Daredevil to evade them).
Fixed an issue where the player would be stuck in place after parrying Captain America’s Special 1.
Fixed an issue where chaining 2 medium attacks into Old Man Logan’s Special 2 would cause the first 2 strikes to miss opponents.
Fixed an issue with Daredevil or Spider-man missing with a dash attack if Vision charges a heavy attack during the dash.
Fixed an issue where some hidden information in Alliance Wars was visible.
Fixed a display issue where Defender Placement percentage was not displaying all placed Alliance members.
Resolved minor issue with the total Alliance’s score being displayed on the War Progress widget (now only displays the score of the battlegroup being viewed).
Multiple minor Alliance War issues have also been fixed in this patch.
Fixed a display issue where Shard amounts provided by defeating a boss displayed as double.
Fixed a display issue where opponent PI values would display differently between the map, prefight screen, and in combat.
Boss power is now correctly displayed after removing Global and Linked boosts.
Fixed an issue where a player in Alliance Quests would lose input ability on the quest board after sleeping the device.
Fixed an issue where a player enters Alliance Quests and gets stuck after viewing the linked node or buff node tutorial.
Fixed an issue where sending an Alliance invite to a player would cause the “Add Friend” button to become greyed out.
Fixed a text issue that appears when viewing Featured Hero information from the Home Screen.
Join The Iron or fight for The Blue with new events, quests, Champions, and special Shards; inspired by Marvel’s Captain America: Civil War!
Solo Events: constantly-evolving events that vary in length, requirements, and prizes!
Compare statistics against other players and Alliances with the new Leaderboards!
|
[
"Players can skip dialogue on the quest map by pressing the 'SKIP' button."
] | 6,743
|
multifieldqa_en
|
en
| null |
c677827fc67e60c6396dceb5c4194aaba925aa1c61ad7115
|
How many years has KSTP-FM 102.1 been on the air?
|
KSTP (1500 AM; SKOR North) is a commercial AM radio station licensed to Saint Paul, Minnesota. It is the flagship AM radio station of Hubbard Broadcasting, which also owns several other television and radio stations across the United States. KSTP has a sports radio format and is the ESPN Radio Network affiliate for Minneapolis-St. Paul. The radio studios are on University Avenue in Minneapolis, shared with sister stations KSTP-FM, KSTP-TV, KTMY, and KSTC-TV. On weekdays, KSTP airs local sports shows from 9 a.m. to 9 p.m. and carries ESPN programming weekday mornings, late nights and weekends. Some KSTP shows are simulcast on other sports radio stations in the region.
KSTP runs the maximum power for AM stations, 50,000 watts. It shares clear-channel, Class A status on 1500 AM with WFED in Washington, D.C. KSTP broadcasts a directional signal at night, using a three-tower array, with its transmitter on U.S. Route 61 at Beam Avenue in Maplewood. Programming is also heard on 250 watt FM translator K235BP at 94.9 MHz in Bemidji.
History
WAMD and KFOY
KSTP's start in 1928 was the product of a merger between two pioneering Twin Cities stations: WAMD ("Where All Minneapolis Dances") in Minneapolis, first licensed on February 16, 1925 to Stanley E. Hubbard, and KFOY in St. Paul, first licensed on March 12, 1924 to the Beacon Radio Service in St. Paul.
Following a few test transmissions, WAMD made its formal debut broadcast on February 22, 1925. (In later interviews Stanley Hubbard traced WAMD's start to April 1924.) It was located at the Marigold Dance Garden, and featured nightly "Midnight Frolics" broadcasts by the ballroom's orchestra. It is claimed that WAMD was the first radio station to be completely supported by running paid advertisements. Effective June 15, 1927, WAMD was assigned to 1330 kHz.
On November 11, 1927 WAMD's transmitter site at Oxboro Heath on Lyndale Avenue South burned down, two weeks after the station had been sold to the National Battery Company. An initial arrangement was made to carry WAMD's programs over WRHM (now WWTC), transmitting on WAMD's 1330 kHz frequency. Beginning on November 24, 1927 the WAMD broadcasts, still on 1330 kHz, were shifted to KFOY's facility in St. Paul. (At this time KFOY was assigned to 1050 kHz). The next day it was announced that National Battery had purchased KFOY, and as of December 1, 1927 both KFOY and WAMD were reassigned to 1350 kHz. WAMD continued making regular broadcasts until the end of March 1928, while KFOY, although it continued to be licensed for a few more months on a time-sharing basis with WAMD, ceased operations at this point.
National Battery Company
In mid-December 1927, the National Battery Company announced it had received permission from the Federal Radio Commission (FRC) to build a new station, with the call letters KSTP, operating from a transmitter site to be constructed three miles south of Wescott. The next month it was reported that the new station, still under construction, had been assigned to 1360 kHz. KSTP made its debut broadcast on March 29, 1928. Although technically it was a separate station from WAMD and KFOY, both of which were formally deleted on April 30, 1928, overall KSTP was treated as the direct successor to a consolidated WAMD and KFOY.
Hubbard became the merged station's general manager, acquiring controlling interest in 1941. A month after the merger, KSTP became an affiliate for the NBC Red Network. It remained with NBC for 46 years. On November 11, 1928, under the provisions of the FRC's General Order 40, KSTP was assigned to a "high-powered regional" frequency of 1460 kHz. The only other station assigned to this frequency was WTFF in Mount Vernon Hills, Virginia (later WJSV, now WFED, Washington, D.C.). On February 7, 1933, the FRC authorized KSTP to increase its daytime power to 25 KW. In 1938 and 1939 KSTP also operated a high-fidelity AM "experimental audio broadcasting station" Apex station, W9XUP, originally on 25,950 kHz and later on 26,150 kHz. In 1941, as part of the implementation of the North American Regional Broadcasting Agreement, KSTP was assigned to its current "clear channel" frequency of 1500 kHz, with the provision that it and WJSV, as "Class I-B" stations, had to maintain directional antennas at night in order to mutually protect each other from interference. An FM station, KSTP-FM, was founded in 1946 but shut down in 1952.
Hubbard reportedly acquired an RCA TV camera in 1939, and started experimenting with television broadcasts. But World War II put a hold on the development of television. In 1948, with the war over, KSTP-TV became the first television station in Minnesota. With KSTP 1500 already associated with NBC Radio, KSTP-TV became an NBC Television Network affiliate. From 1946 to 1952, KSTP also had an FM counterpart. KSTP-FM 102.1 was only on the air four years. There were few radios equipped to receive FM signals in that era, and management decided to discontinue FM broadcasts.
MOR and Top 40
As network programming moved from radio to television, KSTP programmed a full service Middle of the Road (MOR) radio format, in the shadow of its chief competitor, CBS Radio affiliate 830 WCCO. In 1965, a new FM station, reviving the KSTP-FM call sign, was put on the air, largely simulcasting the AM station. But by the late 1960s, KSTP-FM began a separate format of beautiful music. KSTP was the radio home of the Minnesota Vikings football team from 1970 to 1975.
In 1973, KSTP broke away from its longtime adult MOR sound and became one of four area stations at the time to program a Top 40 format. "15 KSTP, The Music Station" competed with Top 40 AM rivals WDGY, KDWB and later, WYOO. The competition would eventually shake itself out, with outrageous rocker WYOO dropping out after being sold in 1976, and then the staid WDGY switching to country music the following year. As for uptempo hits station 15 KSTP, it went from a tight Top 40 format to leaning adult rock in 1978, to leaning adult contemporary in 1979, to evolving into adult contemporary/talk by 1980. In 1982, it officially shifted to talk. Most Top 40 rock music, by this time, had moved to the FM band.
Past Personalities
Notable hosts who have been on KSTP include John Hines, Jesse Ventura, Larry Carolla, Tom Barnard, Big Al Davis, Don Vogel, John MacDougall, Griff, Mike Edwards, Geoff Charles, Joe Soucheray, James Lileks, Leigh Kamman, Barbara Carlson, Peter Thiele, Tom Mischke, Jason Lewis, Chuck Knapp, Machine Gun Kelly, Charle Bush, Mark O'Connell and Paul Brand. These broadcasters were supported by producers such as Bruce Huff, Rob Pendleton, Alison Brown, Jean Bjorgen, David Elvin (who Vogel dubbed the "Steven Spielberg of Talk Radio"), Mitch Berg and others.
The station has, for the most part, emphasized local hosts over the years. But in 1988, KSTP was one of Rush Limbaugh's first affiliates when his conservative talk show was rolled out for national syndication. (Clear Channel-owned KTLK-FM took over rights to Limbaugh's show in January 2006). Other syndicated hosts previously heard on KSTP include Sean Hannity, Bruce Williams, Larry King, and Owen Spann.
Sports Radio
KSTP switched to Sports Radio on February 15, 2010. As the station had to wait for ESPN's contract with rival KFAN and its sister station KFXN to expire, it did not become an ESPN Radio affiliate until April 12, the same day that the Minnesota Twins were scheduled to play the first game in their new ball park, Target Field, against the Boston Red Sox. As a result Coast to Coast AM and Live on Sunday Night, it's Bill Cunningham were retained during this period. One ESPN Radio network program, The Herd with Colin Cowherd, was picked up by KSTP immediately following the format change.
In 2018, the station was approved for an FM translator on 94.1 FM, broadcasting from a transmitter atop the IDS Center in downtown Minneapolis. The two-watt signal threw most of its power to the west, preventing interference to low powered FM stations on the same channel including WFNU-LP in St. Paul. With only two watts of power, however, the signal was limited to the immediate downtown area surrounding the IDS Center. It later acquired a 250 watt translator, K235BP at 94.9 MHz. The original translator was discontinued.
On January 15, 2019, KSTP rebranded as "SKOR North" (a reference to the Vikings team song/chant, "Skol, Vikings"), with local programming between 12 noon and 7 pm. About a year later, in May of 2020, KSTP suspended most of its local programming and laid off nearly all of its local staff. Station management cited the economic toll of the coronavirus for the changes. Sports broadcasting continues, primarily composed of ESPN radio network broadcasts.
Sports Teams
KSTP-AM served as the radio flagship for the Minnesota Vikings football team from 1970 to 1975.
On August 1, 2006, the station announced that it would be the new flagship station for the Minnesota Twins baseball team, effective with the start of the 2007 season. The Twins had been on rival WCCO since arriving in Minnesota in 1961. KSTP served as the flagship for the Twins until the end of the 2012 season, when games moved to 96.3 KTWN-FM (now KMWA). The Twins have since returned to WCCO 830.
The switch to a fairly weak FM station caused dissent among some listeners, particularly in communities that had trouble picking up KSTP 1500. Although KSTP is the state's second most powerful AM station, it must operate directionally at night, delivering a reduced signal to parts of the market. WCCO, by comparison, offers a signal with a wider coverage area during the day than KSTP does, with WCCO's non-directional 50,000 watt signal. In response, the Twins have expanded the number of affiliates.
On March 9, 2011, KSTP announced it would be the new flagship for the University of Minnesota Golden Gophers men's and women's basketball and men's ice hockey, ending a 68-year run on WCCO. The rights have since moved to KFXN-FM, which already aired Gopher football.
On March 2, 2017, KSTP announced it would be the first radio broadcaster for Minnesota United FC. The move brings live soccer action to 1500 AM.
Previous logos
References
External links
KSTP website
FCC History Cards for KSTP (covering 1928-1980)
Radiotapes.com Historic Minneapolis/St. Paul airchecks dating back to 1924 including KSTP and other Twin Cities radio stations.
Rick Burnett's TwinCitiesRadioAirchecks.com has additional airchecks of KSTP and other Twin Cities radio stations from the '60s and '70s, including Chuck Knapp's 2nd show on KSTP.
Hubbard Broadcasting
ESPN Radio stations
Peabody Award winners
Radio stations in Minneapolis–Saint Paul
Radio stations established in 1925
1925 establishments in Minnesota
Minnesota Kicks
Sports radio stations in the United States
Clear-channel radio stations.
|
[
"Four years."
] | 1,802
|
multifieldqa_en
|
en
| null |
622b577978afc1346c315f98a18678c8e6d5ccbf82511f74
|
Besides the Boeing C-17, what other transport aircraft is the IAF considering for acquisition?
|
Transport Aircraft for IAF - Page 67 - Bharat Rakshak
Transport Aircraft for IAF
Re: Transport Aircraft for IAF
Postby abhik » 17 Nov 2014 05:55
+1, Air India recently sold their entire fleet of Boeing 777s.
afaik the A330 MRTT does not make any structural mods or add anything internally in cargo or passenger cabin. it just relies on the intrinsic 110 tons of fuel. external refueling pods are added and internally the control station and cameras for the operator i guess.
so its a easy conversion from a passenger layout to the AAR mode - mostly ripping out the passenger cabin of all extra stuff and retuning the FCS for any changes in COG.
this should have been pursued years ago
the IL78 adds a palletized drum tank system inside its cargo bay due to paucity of intrinsic fuel but it can be removed and a/c converted back to cargo hauling or send off to russia for Phalcon structural mods if we want it that way. they will however need to change engines to PS90 as they have the old engines
http://www.airplane-pictures.net/images ... 7/5616.jpg
the RAF is already gone that route in 2011
http://www.defensenews.com/article/2011 ... -Refuelers
LONDON - Airbus Military has delivered the first of 12 A330-200 airliners due to be converted into in-flight refueling planes for the British Royal Air Force by Cobham Aviation Services.
The aircraft, part of an order of 14 jets, will be modified with aerial refueling pods and other equipment at Cobham's newly refurbished facility in Bournemouth, England. The first two aircraft have already been converted by Airbus in Spain.
The multirole tanker aircraft are being provided to the RAF under a private finance initiative service deal led by Airbus parent EADS.
Seven of the planes will be operated full time by the RAF. The remainder will be available for lease in the third-party market, with the proviso that they can be returned to British military service to meet any surge in demand.
All of the aircraft, to be known as the Voyager in RAF service, will be fitted with two wing-mounted refueling pods, while half the fleet will also be fitted for, but not necessarily with, a center-line mounted unit. The refueling units are being supplied by Cobham.
The first aircraft will become operational in a passenger and freight transport role by the end of this year to start relieving pressure on the RAF's hard-pressed assets.
Despite the increasing fragility of current RAF in-flight refueling operations, the new capability is not contracted to start being used in this role until 2015.
All 14 Voyagers are scheduled to be available for RAF operations by the middle of the decade. The A330 will replace the increasingly ancient Tristar and VC-10 refuelers now in service.
Push the 6 Il-476 from refueler to AEW duty. Phalcon them up
Not sure if that is a good path to follow. For one they all should be sent to pasture in about 8 years. Then if the are to be phalconed up - the requires major structural changes. Not worth that cost.
Whatever happened ot the two new ones that were supposed ot be ordered?
the IL78 can be easily converted back to IL76 cargo hauling. only the fuel tank inside cargo bay needs removal...infact that was even mentioned in initial days as swing role fuel/cargo.
Postby Cybaru » 17 Nov 2014 07:55
I am talking about the new il78 that we ordered recently in refueling role. Sorry for the mix up. They are the same platform, that I why i used 476 or 76 to identify it.
777 carries more internal fuel than the A330. We suck!
From the KC-777 program.
http://www.globalsecurity.org/military/ ... kc-777.htm
"the KC-777 would be 209 feet long with a wingspan of 212 feet, 7 inches. That's the same size as the 777-200LR commercial jet. The KC-777 would be able to carry far more fuel, cargo and passengers than either the KC-767 or the Airbus A330 tanker. The KC-767 offers more operational flexibility, while the KC-777 would be better suited for long-range strategic missions in which more cargo needs to be delivered. The KC-777 would be able to carry more than 350,000 pounds (160,000 kilograms) of fuel and offload more than 220,000 pounds (100,000 kg) of it on a mission of 500 nautical miles (900 kilometers). On the other hand, the KC-767 can lift off with more than 200,000 pounds (90,000 kg) of fuel and offload more than 130,000 pounds (60,000 kg) in a similar mission. The KC-777 would be able to deliver 200 percent more fuel after flying 1,000 nautical miles than older Air Force KC-135s. The KC-777 could carry up to 37 pallets of cargo, compared to the 19 pallets for the KC-767."
Postby Cosmo_R » 18 Nov 2014 04:31
Viv S wrote: From Ajai Shukla's article -
HAL points out that, since each Avro flies barely 350 hours every year, most of them have a residual life of about 80,000 hours. In a request for information (RFI) released on August 15, HAL has proposed replacing the aircraft’s engines (Rolls Royce Dart) with “modern fuel efficient engines”.
So, the IAF's Avros have a residual life of 228 years at the current rate of usage. Ain't life grand?
At zero up time, it could reach infinity.
Relax Cy. Kc777 has no client. Usaf is going with kc767 and almost everyone else with a330.
We don't have the number of heavies and long missions of usaf else I would say convert an124.
KC777 will be extremely expensive given the demand/backlog for the 777 and the 777x. Any buyer would have to virtually pay for the increase in capacity.
I think the 767 production line is closed. so the proposed KC767 Boeing is supposed to deliver 18 by 2017..that can be managed from mothballed and cargo hauler airframes on the market.
but to meet the final order of around 180 will they not have to open the production line unless such a huge number were available on the market?
I do get the spider feel this program again will be cancelled in favour of a in-production plane like the 777X ?
I wasn't suggesting we get the KC777. All I was doing was comparing what possibly the 777 could offload compared to A330. It carries 171000 liters of fuel versus 130000 liters that the A330 carries. If we had older 777s in stock, we could have quite easily converted them to this config. The cost to us would be miniscule just the refurbishing cost vs acquiring a new type.
Singha wrote: I think the 767 production line is closed. so the proposed KC767 Boeing is supposed to deliver 18 by 2017..that can be managed from mothballed and cargo hauler airframes on the market.
The Line is open, they have a backlog of around 50 (All Fed ex), with Fed Ex placing a small order this year. The Pegasus order is for all new builds, and so will the follow on order. The only reason for any nation to buy the 767 tanker is going to be because of the ability to hard bargain with Boeing given that the commercial future of the 767 is dead. This also allows a potential buyer to purchase cheap spares from the open market, or club its logistical and inventory purchase with that of the USAF. Other than that and perhaps availability (which would be doubtful once USAF pushes through a larger order) there is really no technical reason to purchase the this tanker over the A330 which by all accounts is a superior tanker in addition to being a much much better airliner in general.
IAI is doing conversations for the 767 and its called the 767 MMTT
http://www.iai.co.il/sip_storage/FILES/1/38471.pdf
Cybaru wrote: I wasn't suggesting we get the KC777. All I was doing was comparing what possibly the 777 could offload compared to A330. It carries 171000 liters of fuel versus 130000 liters that the A330 carries. If we had older 777s in stock, we could have quite easily converted them to this config. The cost to us would be miniscule just the refurbishing cost vs acquiring a new type.
The cost of converting a commercial airliner to a tanker, certifying it and running a full fledged test program is by no means small. There is absolutely no justification for that sort of cost over and above the capability that that A330 provides. If it were a certified and tested conversion, that would be a different matter.
Postby Kartik » 21 Nov 2014 12:27
Cybaru wrote:
Why? If the airframe can handle more flight hours, why not?
because it is a very very old airframe as is. Maintenance spares won't be available easily even as of now, then imagine how it'll be 20-30 years from now.. and as things stood anyway, the HS-748 offered very little in terms of payload and range versus a C-295 class aircraft. The C-295 offers a very credible light transport, whereas the HS-748's role in the IAF was more akin to a transport trainer and for communication duties with little operational use. Having seen a dozen or so HS-748s parked at Vadodara airport all through my childhood, I never once saw one in the air. They just seemed to be stored out in the open. Upon asking an IAF transport pilot who was my friend's father, he remarked "zyaada kaam ke nahi hain yeh".
Why would you expend more capital on what is essentially an obsolete airframe, even if theoretically it had not yet reached its service life? You'd have to re-engine it, put new avionics on board and even that wouldn't suffice for para dropping requirements..it was operationally never suitable for para dropping, which is an important mission for transport aircraft and had deficiencies in hot and high climes as well.
Unfortunately, the 748 was never meant to be a military transport. At the request of IAF, its door was enlarged to enable larger cargo items to be loaded and to allow para dropping without hitting the tail plane. However, to load a jeep in it, a 30-ft long ramp was required. The jeep would drive in and insert its front wheels into the aircraft. Then it had to be manually lifted and turned to get it in. Unloading it was just as difficult. Para dropping of troops or cargo even from the aircraft with the enlarged door was considered too dangerous with the risk of hitting the tail plane. The aircraft's performance at hot and high airfields was hopelessly inadequate. Eventually IAF acquired the tail-loading An-32s which were powered specifically for IAF's need for operating in the Himalayas.
BRF article -Avro in IAF service
Now unless you want to overcome all these through a costly, time consuming engineering re-design program, that too without access to original documents since this airplane was designed in the 1960s, there is no question of keeping them going for another 40 years. By which time the original design would be over 80 years old and with no one on earth but the IAF as an operator and HAL as the agency supporting it. Hardly a situation anyone would want.
abhik wrote: +1, Air India recently sold their entire fleet of Boeing 777s.
Only 5 of the Boeing 777-200LR, to Etihad Airways, which IMO was a bad decision..they could have reconfigured the airplanes with just 2 classes and continued to fly them to the US, non-stop.
The remaining 3 777-200LR were offered for lease but are still a part of AI's fleet since they didn't find any takers. This particular model hardly sold much and was developed for ultra-long range flights..it was the least successful 777 model and clearly AI goofed up on the configuration by going for these in place of the 300ER. The economics however didn't make too much sense for AI eventually.
there are 13 777-300ER as a part of their fleet ahd their economics is much better.
Govt. to decide tomorrow on whether to go ahead and allow the IAF to verify the technical details of the C-295 bid by Tata-Airbus instead of scrapping the tender due to single vendor situation.
The government will decide on Saturday whether to press ahead with the Rs 13,000 crore mega project for the private sector to supply 56 medium transport aircraft to the IAF despite only a single bidder, the Tata-Airbus consortium, being in the fray.
Though the defence acquisitions council (DAC) chaired by Manohar Parrikar will take the final decision, MoD sources on Tuesday said the "emerging dominant view" is that green signal should be given to the crucial project designed to promote Indian private sector's entry into the domestic aerospace arena with foreign collaboration.
"The Tata-Airbus technical and commercial bid is a credible offer submitted in a competitive environment. The other seven contenders backed out for one reason or the other," said a source.
IAF has now sought the clearance of the DAC -- the first such meeting to be chaired by Parrikar after becoming defence minister on November 10 -- to begin technical evaluation of the C-295 aircraft offered by Airbus Defence & Space and Tata Advanced Systems.
Though it has become a single-vendor situation, the DAC can approve it if it wants as per existing procurement procedures. Of the eight foreign aviation majors that got the global tender, American Boeing and Lockheed-Martin as well as Brazilian Embraer said they did not manufacture the class of aircraft being sought by IAF.
Refusing to take part in the tender, Russian Rosoboronexport said it wanted a fresh design and development project. Antonov of Ukraine wanted yet another extension of the bid submission deadline due to the ongoing conflict in Crimea. Swedish Saab said it had shut down its assembly line for such aircraft.
Then, Alenia Aermacchi was linked to Italian conglomerate Finmeccanica, which has been slapped with "a partial ban" after the infamous VVIP helicopter scandal. "All this left only the European consortium Airbus. The DAC will have to take a call since re-tendering may lead to the same situation," said the source.
Incidentally, it was the Modi government's first DAC in July -- then headed by Arun Jaitley - which revived the Avro replacement project after it was put on hold by the UPA-2 regime last year due to strong opposition from the powerful PSU lobby and ministers like Praful Patel, as reported by TOI earlier.
Apart from the critical need to encourage the private sector to enter defence production in a big way, especially in the aerospace arena where Hindustan Aeronautics enjoys a monopoly, its felt the defence PSU's order books are already overflowing with projects.
Fingers crossed. Hopefully sense will prevail.
Why was lr got? Er is capable of Dubai to sfo nonstop.
Lr is overkill unless we want Delhi to Peru .
Singha wrote: Why was lr got? Er is capable of Dubai to sfo nonstop.
they wanted it for non-stop routes from India to the west coast of the US. But with fuel prices going higher and with the lower seat count on the 777-200LR, the seat mile costs grew too high. A 3 class configuration only made matters worse. A higher density configuration with more economy class seats and just 12-15 Business class seats would have been better perhaps, especially if they didn't have very high First Class load factors.
LR and ER is better if you want to have a better payload down below for long haul. Ultimately, the best bet is going to come form the 787's that take a fewer people (so you can do the longer routes) with still a competitive CASM, and the B and F class folks will pay good money for newer aircraft.
Postby Kartik » 04 Dec 2014 12:55
Lets see if there is any forward movement on the stalled MTA project once Putin arrives in New Delhi
Major defence deals to be signed during Putin-Modi summit
In this connection, it is expected that during the summit, Russia and India may ultimately resolve several long-delayed agreements on military-technical cooperation projects between the two countries and sign them finally for their implementation. These agreements, above all, include joint Fifth Generation Fighter Aircraft (FGFA) project and joint development of Multi-role Transport Aircraft (MTA).
A final deal on FGFA for production has been delayed because the Indian Air Force (IAF) did not approve the design and work-share. Now Russia has reportedly agreed that the jet would be a two-seat design, not a one-seater. India’s work-share would also be increased from18 percent to 25 percent, and even up to 40-50 percent in the near future, in view of the steady development of the Indian aviation industry.
Defence and SecurityAccording to the agreement, India’s stealth air-to-air missile “Astra” along with Indo-Russian BrahMos supersonic cruise missile will be mounted on the FGFA.
The preliminary design agreement on FGFA had been signed in 2010 between Indian HAL and Russian Sukhoi Design Bureau to build the jet for the use by both countries. The final design contract was to be signed in July-August 2012. But the deadline has already passed. According to the Indian media reports, under the programme, India is expected to build 200 fighter jets at the cost of $30 billion.
FGFA is not the only Indo-Russia joint project. The two countries also signed an agreement on the joint development of MTA in 2007, based on Il-214 Russian plane. The cost of the $600 million project is being equally shared by the two countries. The MTA, when developed, will have ready market for 205 aircraft - 45 for the Indian Air Force, 100 for the Russian Air Force, and 60 more for exporting to friendly countries. The international market for MTA is estimated at 390 planes. Under the agreement, thirty percent of the annual production of planes could be exported to third countries.
The MTA was expected to go in service with the Russian and Indian Air Forces in 2015. But the project faced a number of problems, delaying the development of the MTA. The project got into rough weather after India felt there was nothing much for Indian engineers and scientists to do in the design and development of the MTA.
However, all the issues related to the project were resolved with the Russians when the HAL undertook to carry out design and development of its work-share of MTA at Aircraft R&D Centre at Bangalore. Russian Ilyushin Design Bureau and the Irkut Corporation and HAL are participating in the project. The first flight is expected to take place in 2017-18.
The MTA would replace the AN- 32 aircraft being used by the IAF. It will be used for both cargo and troop transportation, para-drop and air drop of supplies, including low-altitude parachute extraction system.
BrahMos missile exports a challenging proposition
Another key deal expected to be signed during the summit, is for the development of “BrahMos mini missile” by the Indo-Russian joint venture BrahMos Aerospace which manufactures supersonic cruise missile. BrahMos’ new CEO Sudhir Mishra recently said he was hopeful that a deal to develop the mini version of the missile will be signed during Putin’s summit with Modi.
“We are hoping to sign a tripartite agreement between DRDO, NPOM lab and BrahMos Aerospace during the planned visit of Russian President in December,” Mishra said.
He said that the new missile will have a speed of 3.5 mach and carry a payload of 300 km up to a range of 290 km. In size, it will be about half of the present missile, which is around 10 metres long. The missile can be integrated with different platforms, including submarines and FGFA. It is planned to be inducted into service by 2017.
Modi-Abbott to upgrade defence ties
A new dimension:
In a first, India and Australia will also set up a mechanism to discuss “synergies in integrating defence system”, including research and development cooperation on integrating defence equipment that both countries currently purchase, for example, U.S’s C-17 Globemaster III, according to officials.
^^That report about MTA is fishy. First it says that India has nothing to learn from an existing design (duh) and then says the issue has been resolved. How? Next it says India's need is 45 planes to replace over 100 An-32s. It also speculates about the export potential which may be nonexistent unless we sell it for peanuts.
This is a scam which only aims to create screwdriver jobs at HAL, stall any attempt to introduce private players into the aviation market and continue the Russian gravy train. My fear is the Russkies have our testiments in a firm grip with key components of Brahmos, nuke subs, Su30mki etc and we may be jerked around.
(They need to be more definitive about "MTA" - Multirole vs. Medium)
The Indians had not selected an engine (among other things) for the MTA with the Russians. Perhaps that has been resolved now.
On export numbers, IIRC, it was the responsibility of Rosoboronexport. ?????
Kartik wrote: The MTA would replace the AN- 32 aircraft being used by the IAF. It will be used for both cargo and troop transportation, para-drop and air drop of supplies, including low-altitude parachute extraction system.
Pardon my ignorance. The Avro and An-32 have different upgrade paths. How are the replacements for these venerable aircraft different in terms of use cases in IAF. Cannot one platform replace both these types? (Either MTA or C-295)
In this case, I feel they should have just gone with screwdrivergiri (production tech) and got to market first. There is no jet-powered transporter in this range! Just license produce the IL-214 with the PD-14M, glass cockpit and a state-of-the-art COTS avionics computer.
In my view, it was a low hanging fruit, which they completely messed up! They could have learnt on how to adopt the plane for the 160-200 seater.
indranilroy wrote: They could have learnt on how to adopt the plane for the 160-200 seater.
Yes, the MTA project should fold the Avro, An-32 and the regional transport role and become a conversion project rather a development one. The driving numbers will come from the regional transport (thousands in India itself) rather than the Avro or medium transport roles (max 300 between them). This changes the ball game and introduces all kinds of possibilities. But I'm pretty sure that the Il-214/MTA is not the way to go because it will take a decade or more to arrive. A good possibility was another Antonov, the An-148 but it has some mechanical glitches apparently besides being bogged down in the Ukraine mess. Maybe the Russians can "relocate" the aircraft to Russia? The other possibility is the BAe-146 which is ironically another Avro. We should remember that both the HS-748 "Avro" and An-32 were regional airliners that were converted to military use, not the other way around. HAL or a private firm will pick up a lot of experience in the conversion process itself.
The Sukhoi Superjet is already in production/orders,with over 100+ for Russian and intl. customers. It is ideal for regional transport,perfect for flights to smaller Tier-2/3 cities from metros. If we really want a regional jet this is the fastest way toi go,we can set up a manufacturing unti here for the same at an HAL unit.
Postby shaun » 05 Dec 2014 15:24
Its an international projects, with components outsourced from different international vendors . Over 30 foreign partnership companies are involved in the project and partly financed by Italy.
Sukhoi is good for passenger use but wont be suitable for military, rough field use. The shoulder wing jets like the An-148 have slower speeds and better ground clearance. The Bae-146 was usedby Druk Air in Bhutan so it should do OK in the ALGs. If we don't fold our requirements then we should go with something like the Superjet which we will at least be able to make in India and also modify to stretched versions. Unless we have a clear path to operational clearance within 10 yrs for the RTA project vetted by our top industrial houses, it is pie-in-the-sky and should be dropped. The RTA will be big enough to keep 2-3 factories humming and leapfrog our capabilities. If we don't get our act together almost immediately, we will miss the boat, just like our trainer fiascos.
I don't think Superjet fits into our scheme of things. We should think as a country and see to it that our programs don't trample on each other.
First, the more certain ones:
1. Mahindras NM5 and Airvans can care of the low-cost but sturdy 5,8,10 and 18-seater section.
2. Saras had such great potential for being the high performance 14-18 seater. But I have almost given up on it. This section will most probably be taken up by the Tata-built Do-228 NG.
3. We should standardize the C-295 as the Avro/An-32 replacement and create a 70-80 seater variant out of it.
And then the more wishful ones:
1. If the RTA is going to be a jet, then make it a 100-130 seater. I don't expect the first prototype to take the sky before 2025. I feel it is too big of a jump where we don't even have a base. With LCA, at least we were at least license producing other fighters.
4. Building on the IL-214, the MTA was on a more sure footing. But, I can't see how the first prototype can to take to the sky before 2019(more than 10 years since MTAL was formed)! If the transport plane materializes, then one can imagine making a civilian 150-200 seater version of the same. But this program needs a push. Will Putin's visit be able to galvanize this into the next symbol of Indo-Russian cooperation. Probably not!
Postby GeorgeWelch » 12 Dec 2014 23:39
http://www.ctvnews.ca/canada/defence-de ... -1.2144472
The Defence Department intends to purchase a Boeing C-17 Globemaster III, a large military transport plane that comes with a price tag of just under $200 million, CTV News has learned
It's difficult to get a good count, but by some sources, if this and the 4 Australia planes go through, there will only be 5 left.
X-Posting from FGFA thread.
Despite Putin’s visit, two pacts on military aircraft still in doldrums
President Vladimir Putin may have come and gone but stalemate largely persists over two key long-pending India-Russian defence projects, the fifth-generation fighter aircraft (FGFA) and military multirole transport aircraft (MTA).
The deadlock over the MTA, which were initially envisaged to gradually replace IAF's ageing fleet of the medium-lift AN-32 aircraft, seems to be much more serious. India now wants to ascertain the cost viability of the twin-engine transport aircraft in comparison to similar planes available in the market.
There are also questions about the MTA's "predicted timelines for delivery" as well as its failure to meet the high-altitude requirements, which need to be answered before India even thinks of inking the full-scale contract for the project, said sources.
Postby Gyan » 13 Dec 2014 12:29
indranilroy wrote: I don't think Superjet fits into our scheme of things. We should think as a country and see to it that our programs don't trample on each other.
1. Mahindras NM5 and Airvans can care of the low-cost but sturdy 5,8,10 and 18-seater section. Righto
2. Saras had such great potential for being the high performance 14-18 seater. But I have almost given up on it. This section will most probably be taken up by the Tata-built Do-228 NG. We need future extended variants of presurrized aircraft like 30 seater Saras and say 30 seater unpressurized Do-328 NG.
3. We should standardize the C-295 as the Avro/An-32 replacement and create a Civilian turboprop pressurized cabin 70-80 seater variant out of it.
1. If the RTA is going to be a jet, then make it a 100-130 seater. Agreeeeeed I don't expect the first prototype to take the sky before 2025. I feel it is too big of a jump where we don't even have a base. With LCA, at least we were at least license producing other fighters. Though I think that we should participate in Russian MS-21 and also the wide body follow on.
4. Building on the IL-214, the MTA was on a more sure footing. But, I can't see how the first prototype can to take to the sky before 2019(more than 10 years since MTAL was formed)! If the transport plane materializes, then one can imagine making a civilian 150-200 seater version of the same. Though I think that we should participate in Russian MS-21 and also the wide body follow on. But this program needs a push. Will Putin's visit be able to galvanize this into the next symbol of Indo-Russian cooperation. Probably not!
Absence of any specifics on Sukhoi Superjet, MS-21, Wide body aircraft, Mi-38, MRTA, FGFA, even after Putin visit is very disappointing.
FlightGlobal- Boeing sitting on 8 unsold C-17s
By: Dan ParsonsWashington DCSource: Flightglobal.com
This story is sourced from Flightglobal.com 12 hours agoBoeing has sold two more C-17 transports to an undisclosed customer, but it will likely end the year with eight unsold white tails.
There are 10 Boeing C-17 airlifters in various stages of assembly at the company’s Long Beach, California, production facility.
Two of the aircraft are spoken for by an unnamed customer, Boeing says. Boeing is trying to sell off the other eight white tails, which will be the last produced before the factory is shuttered sometime in the summer of 2015.
The 279th – and final – C-17 fuselage will be mated to its wings in January or February, programme spokeswoman Tiffany Pitts tells Flightglobal. The operation is California’s last remaining aircraft production line and the lone widebody military aircraft production line in the USA, according to Boeing.
At least two countries – Australia and Canada – have publicly announced an intention to purchase a C-17, though neither factor into Boeing’s future planning, Pitts says. Until contracts are finalised, the number available remains eight, she says. The Royal Canadian Air Force already has four C-17As, according to Flightglobal’s World Air Forces 2014 directory.
Canadian news outlets reported earlier in December that the air force would buy one C-17 with money left over at the end of 2015.
Australia is further along with its bid to purchase C-17s. The US Defense Security Cooperation Agency in November announced Australia was approved to buy up to four C-17s and support equipment for $1.6 billion.
Boeing has plans to store any unsold C-17s following closure of its production line, Pitts says.
“I’m hoping they all will be sold before then, but we’ve had plans in place for a very long time to store and maintain the aircraft if that doesn’t happen,” she says.
the IAF will need to factor in the demand vs availability of C-17s and stock up with a follow-on order quickly. The initial plan to have 16 C-17s may not fructify, considering that there are just 8 left now, with Australia having announced plans to buy 4 more.
why are they closing the line if it has demands ???
Real estate sales tactics probably. Buy now last 8 3bhk flats Saar.
krishnan wrote: why are they closing the line if it has demands ???
It requires 3 years lead time to order raw materials/parts from all of its sub-vendors. All current firm orders have been fulfilled, and no new orders have come. Anticipating a need for a few more aircrafts, they produced 10 extra (self-funded) units before production winded down. Bottom line is they don't make money keeping an idle plant around with all its employees and infrastructure. At most what they will likely do is keep a limited infrastructure around for a few more years in case a bunch of new orders come. They can then see if it makes business sense to re-open the plant.
Postby Aditya_V » 17 Dec 2014 12:19
Wish this can be brought to the notice of Journos/ Poster when slamming LCA/ Arjun and other indigenous projects. If there are no orders there will be no efficiency.
Dec 10, 2014 :: Russia launches Il-76MDM upgrade programme
Russia's Ilyushin has started to upgrade a first Russian Air Force (VVS) Ilyushin Il-76MD 'Candid' military transport aircraft to Il-76MDM standard, company officials have told IHS Jane's . The main features of the upgrade include refurbished engines and upgraded avionics.
The modernisation is being conducted at the VVS's Military Transport Aviation (MTA) maintenance facility based at the Ilyushin division in Zhukovsky city near Moscow.
A senior Ilyushin official told IHS Jane's that the upgrade of the first aircraft will be finished in 18 months. Subsequent aircraft will take less time to complete the process, however. When the modernisation is finished the initial Il-76MDM will undergo state trials. The upgrade process for subsequent aircraft will begin when the trials programme is completed.
IHS Jane's was previously told by a VVS senior official that the modernisation of 41 MTA Il-76MDs is planned by 2020. While the Il-76MDM upgrade retains the old D-30KP engine (compared with the PS-90A engine equipping the new Il-76MD-90A/Il-476), the modernisation effort should match the aircraft's onboard electronics with those of the newbuild Il-76MD-90A. This and other efforts mean the cost of modernising the Il-76MD to Il-76MDM is only a third of that of a newbuild Il-76MD-90A.
The existing D-30KP engines are to be enhanced to increase their service life. The overall aircraft's service life will be extended by 15 years.
The upgrade works are planned to be conducted in an aviation repair factory or in the MTA's aircraft maintenance facility. As a result, the Ulyanovsk-based Aviastar-SP plant, which is building the Il-76MD-90A, is not involved in the Il-76MD to Il-76MDM modernisation programme.
Users browsing this forum: Jaeger, Manish_Sharma, rajkumar, VikramA and 43 guests
|
[
"The IAF is considering the acquisition of the Airbus A330 MRTT (Multi-Role Tanker Transport) besides the Boeing C-17."
] | 5,660
|
multifieldqa_en
|
en
| null |
8d72c6709ee1da38a65cdfb4f9d90e7348fd8e356c0a8165
|
What may happen if the VR headset lenses are exposed to sunlight or strong light?
|
'用户指南 * User Guide 02 CN 11 EN * 包装内含 使用前注意事项 快速引导 产品部件详情说明 操作说明 02 02 03 06 08 01
•本产品支持在系统设置中进行瞳距调节 , 调节时请务必注意,最小瞳距可能会碰触鼻梁。当您佩戴头盔后,您 “显示”中进行手动调节,请注意设置使用不合适的瞳距,可能会引起视觉重影或者眼睛疲劳。 可在“设置” ► •本产品“护眼模式”经德国 TÜV Rheinland 低蓝光认证,通过软件算法降低三色通道中的蓝光量,来达到保护 “护眼” “色彩调节” 眼睛的作用,该模式下画面颜色偏黄,您可根据个人喜好在“设置” 中激活或关闭此功能。 ““显示” ► ► ► 包装内含: VR 头盔 / 手柄 × 2 / 1.5V AA 碱性干电池 × 4/ 眼镜支架 / 遮光鼻托 / 手柄挂绳 × 2 / USB-C 电源适配器 / USB-Cto C 2.0 数据线 / 快速指南 / 用户指南 / 安全与质保指南使用前注意事项 •本产品在开阔的室內环境使用体验最佳,建议至少预留 2×2 米 的空间。使用前请确认身体没有不适且周围环 境安全,特别是佩戴头盔在室内行走移动时,要尽量避免发生意外。 •不建议 12 岁及以下儿童使用本产品,建议将头盔、手柄和配件置于儿童够不到的位置,13 岁以上青少年须在 成人监护下使用,以免发生意外。 •本产品无近视调节功能,近视用户请佩戴眼镜使用并尽量避免近视眼镜被头盔的光学镜片磨伤或刮伤。建议在 使用和收纳时注意防护光学镜片,避免尖锐物体划伤镜片,擦拭清洁时请使用柔软的眼镜布,否则可能划伤镜片, 影响视觉效果。 •长时间使用可能引发轻微的昡晕或者眼疲劳,建议使用 30 分钟后适当休息,可通过眼保健操或观看远处物体缓 解眼疲劳。如果您的身体感到任何不适,请立即停止使用。如果不适持续,请咨询医生。 •当头盔镜片被阳光或紫外线照射时(尤其在户外、阳台、窗台及汽车内存放时),可能导致屏幕出现永久性黄斑。 请尽量避免该情况发生,此种屏幕损坏不在产品的质保范围内。 *本产品最终外观及功能以实物为准,部分地区包装内含物品有所差异,本说明仅供参考。 02 CN
六自由度 VR 体验 本产品可以追踪头盔和手柄前、后、左、右、上、下和旋转的运动状态,您在现实中的肢体运动会实时反映在虚 拟世界中。 由于没有任何线缆的束缚,您在虚拟世界自由探索时请确保游玩区域的安全。 1. 建议准备一个整洁安全的体验空间:至少 2×2 米;保持房间明亮,避免在只有单色的墙或大面积玻璃、镜子类 反射物以及许多移动画面和物体的空间中使用。 2. 撕下 VR 头盔前端摄像头上的保护膜,并佩戴手柄挂绳。 3. 根据开机后的画面提示进行游玩区域的设定。 ❶ 安装电池 按箭头方向拔出电池盖侧边的绝缘纸 快速引导 提示:本产品虚拟的安全区提醒功能,不能完全保证您在设定好的游戏区域中的安全,请时刻注意周围的安全情况。 提示:建议使用 1.5V AA 碱性电池。 按照图示拨动电池盖拨钮打开电池盖更换电池。 03 CN
❷ 手柄开机 ❸ 头盔开机 ❹ 佩戴头盔,调节至清晰舒适的位置 首次开机:拔出绝缘纸,手柄自动开机(蓝灯闪烁) 非首次开机:短按手柄 Home 键开机(蓝灯闪烁) 长按头盔电源键 2 秒(蓝灯常亮) 调节旋钮转动绑带,使后脑垫套在头上,微调绑带长度及佩戴位置至视野清晰 04 提示:近视用户请佩戴眼镜或镜片插件使用,本产品不具备近视调节功能。 CN
❺ 微调顶绑带 微调顶绑带使其受力以减少额头压力 ❻ 瞳 距 调 节 在系统设置:“设置” ► “显示”界面中进行瞳距调节,点击“+”或“-”按钮可微调瞳距直至画面清晰 64mm 请勿 强行 掰动镜 筒,以 免造 成损坏 ! 请注 意设 置使用 不合适 的瞳 距,可 能 会引起 视 觉重影 或 者眼睛 疲 劳。准 确 的瞳距 设 置有助 于 获得清 晰 的图像 并 减少眼睛 疲劳。 05 CN
产品部件详情说明 头盔状态指示灯 蓝灯常亮:开机进行中或工作状态 黄灯常亮:充电中,电量低于 98% 红灯常亮:充电中,电量低于 20% 绿灯常亮:充电完毕,电量大于 98% 或 充满 蓝灯闪烁:关机进行中 红灯闪烁:电量低于 20% 指示灯熄灭:休眠或关机 06 ① 电源键 开机:长按 2 秒 关机:长按 5 秒 复位:长按 10 秒 开机时,短按休眠 ② ③ ④ ⑤ 状态指示灯 贴脸泡棉 音量键 彩色透视摄像头 使用时请勿遮挡 ⑥ ⑦ ⑧ 顶部绑带 可拆卸 绑带旋钮 环境追踪摄像头 使用时请勿遮挡 ⑨ ⑩ ⑪ USB-C 接口 左 / 右喇叭 距离传感器 佩戴头盔后,系统自动唤醒 摘下头盔后,系统自动休眠 ⑫ ⑬ 眼球追踪摄像头 此功能仅 Pro 版支持 使用时请勿遮挡 面部追踪摄像头 此功能仅 Pro 版支持 使用时请勿遮挡 CN
手柄状态指示灯 熄灭:已连接或者关机 蓝灯常亮:固件升级模式 蓝灯闪烁:连接中 红蓝灯交替慢速闪烁:等待配对 ① ② 摇杆 菜单键 ③ Home 键 开机 : 短按关机 : 长按 6 秒退出应用 : 短按屏幕中心校正 : 长按 1 秒④ ⑤ ⑥ ⑦ 状态指示灯 抓握键 截屏键 扳机键 ⑧ ⑨ 电池盒 打开:拨动拨钮,电池盒弹出 安装:按压直至自动锁紧 追踪光环 使用时请勿遮挡 注:手柄挂绳可按图示将粗绳穿过细绳并锁紧在手柄尾端 07 CN
手柄硬件复位 如果手柄出现按 Home 键和任何按键均无反应或者头盔中虚拟手柄卡死不动的问题可拆装电池重新启动手柄。 近视用户配戴 本设备不具备近视调节功能,头盔可支持佩戴镜框宽度小于 150mm 的大多数标准眼镜。 操作说明 头控模式 未连接手柄的情况下,您可通过转动头部光标及点击头盔音量加减按键进行操作。 切换主控手柄射线 在主控菜单下,短按对应手柄的扳机键可以切换主控手柄的射线。 屏幕中心校正 戴着头盔直视前方,按住手柄 Home 键(或头控模式下头盔上的音量减键)1 秒以上,进行屏幕中心的校正将菜 单拉到当前视野朝向位置。 断开手柄 长按手柄 Home 键直至手柄状态指示灯红灯亮起并伴随振动产生时即可松手,此时手柄关机并断开与头盔的连接。 您无需刻意进行手柄关机操作,在以下状态下手柄会自动关机省电: •头盔进入深度休眠时(摘下头盔后一段时间) •头盔手柄管理界面解绑手柄时 •头盔关机时 添加新手柄 如需添加新手柄(头盔最多可同时连接一对手柄,即左右手柄各一只),或解绑手柄后再次连接 , 可进入“设置” “手 柄”,点击“配对”,同时按住手柄 Home 键和扳机键直至手柄状态指示灯红蓝交替闪烁时即可松开,然后根据 头盔画面提示操作。 ► 休眠 / 唤醒 方式一:摘下头盔一段时间后,系统自动休眠;戴上头盔时,系统自动唤醒。 方式二:短按头盔电源键也可以进行休眠或唤醒操作。 硬件复位 头盔硬件复位 如果头盔出现短按头盔电源键没有反应或头盔的画面卡死等问题,可以长按头盔电源键 10 秒以上重新启动头盔。 08 CN
安装眼镜支架 安装遮光鼻托 如您存在眼镜摩擦光学镜片或者压迫鼻梁的问题,请按照图示安装眼镜支架以增加间隔空间。 您可根据佩戴的舒适度选择是否安装。 如您感觉鼻子处漏光影响体验,请按照图示安装遮光鼻托配件。 由于眼睛空间密闭可能加剧起雾及出汗问题,您可根据喜好选择是否安装。 ❶ 摘下贴脸泡棉 ❷ 将眼镜支架按照图示安装在产品上 ❸ 将贴脸泡棉按照图示安装眼镜支架上 ❶ 摘下贴脸泡棉 ❸ 安装贴脸泡棉❷ 将遮光鼻托按照图示方式安装在贴脸泡棉上 注:按照图示拆卸眼镜支架 09 CN
更换贴脸泡棉 贴脸泡棉多次清洁和长时间使用后会变色和质地变软,您可酌情更换新泡棉。 更换顶绑带 摘下贴脸泡棉 ❸ 安装贴脸泡棉 按照图示捏住顶绑带金属扣,往下压到底然后抽出 ❷ •购买优质热门应用 •畅 聊 社 区, 与 众 多 PICO 玩 家 一起探索 VR 世界 •管理设备更便捷 •参与丰富互动活动 •更多精彩内容等你来发现 ❶ 微 信公 众 号:PICO VR抖音:PICO官 方 旗 舰 店哔 哩 哔 哩:PICO-VR官 方微 博:PICO-VR ❶ ❷ 10 CN
In The Box: VR Headset / 2 Controllers / 4 1.5V AA Alkaline Batteries / Glasses Spacer / Nose Pad / 2 Controller Lan- yards / USB-C Power Adapter / USB-C to C 2.0 Data Cable / Quick Guide / User Guide / Safety and WarrantyGuide Important Health & Safety Notes • This product is designed and intended to be used in an open and safe indoor area, free of anytripping or slipping hazards. To avoid accidents, remain conscious to the potential confines ofyour physical area and respect the boundary of your virtual area whenever you see it. Be sure towear the lanyards when using the Controllers. Make sure that there is enough space around yourhead and body (at least 2 meters by 2 meters) to stretch your arms to avoid damage or injury toyourself, others, and your surroundings. • This product is not recommended for children aged 12 and under. It is recommended to keep headsets,controllers and accessories out of the reach of children. Teenagers aged 13 and over must use it underadult supervision to avoid accidents. • This product is designed to accommodate most prescription glasses. Make sure to wear the VR Headsetin a manner in which the VR Headset lenses do not rub or impair your prescription lenses. • Prolonged use may cause dizziness or eye fatigue. It is recommended to take a break every 30 minutes.Try relieving your eyestrain by looking at distant objects. If you feel any discomfort, stop using the prod- uct immediately. If the discomfort persists, seek medical advice.• Do not expose the optical lenses to direct sunlight or other strong light sources. Exposure to directsunlight may cause permanent yellow spot damage on the screen. Screen damage caused by sunlightexposure or other strong sources of light is not covered by the warranty. • This product supports interpupillary distance (IPD) adjustment in system settings. When adjusting,please be aware that with the minimum IPD, it may touch the bridge of the nose. You can adjust the IPDaccording to your actual interpupillary distance in "Settings"►"Display". Please note that using inap- propriate IPD may increase the risk of discomfort. • This product has an “Eye Protection Mode”, certified by TÜV Rheinland (Germany), which can protectyour eyes by reducing blue light in the three color channels using software algorithms. The screen ap- pears yellowish in this mode and you can turn this feature on/off in "Settings"►"Display"►"Color"►“- Eye Protection”. • Protect optical lenses during use and storage to prevent damage, such as scratches or exposure tostrong light or direct sunlight. * Product and packaging are updated regularly, and the functions and contents of the standalone headset may be upgraded in the future.Therefore, the content, appearance and functionality listed in this manual and product packaging are subject to change and may notreflect the final product. These instructions are for reference only. * Carefully read this user guide before using the product and share this information with any other users, as it contains important safetyinformation. Keep the user guide as reference for the future. 11 EN
6 Degrees of Freedom VR The device can track your translational and rotational movements in all directions (up/down, left/right,forward/backward, pitch, roll, and yaw). Your movements in the real world will be captured and translatedto what you see in the virtual world when using the appropriate content. Ensure a safe environment before you start your VR experience. 1. Clear a safe indoor area of at least 2 meters by 2 meters. Keep the room bright, avoid spaces with main- ly single-colored walls, glass, mirrors, moving pictures or other similar objects. 2. Remove the protective film that covers the headset front cameras. Wear the lanyards connected to theControllers. 3. Set up your environment by following instructions on the VR Headset screen. Install Batteries ❶Pull the tab to remove the insulating paper. Quick Guide 2 m 2m This product can not guarantee your safety with guardian system, you will need to always pay attention to the surrounding safety. * Note: 1.5V AA alkaline batteries should be used.Slide the toggle according to arrow direction toopen the battery case. 12 EN
Power on the Controller ❷ First Start: The Controller will start automaticallyafter removing the insulating paper. Others: Short press the Home button for 1second until the status indicator flashes blue.Power on the VR Headset ❸ Long press the Power button for 2 seconds untilthe status indicator turns blue.Wear Your Headset for a Comfortable Fit and View ❹ Adjust the strap dial to turn the strap so that the back of your head rests on the padding. Fine-tune thelength and position of the strap to give a clear view. * Note: You can use this product with prescription glasses or lenses insert. 13 EN
Fine-tune the Top Strap ❺ Fine-tune the head strap to reduce pressure on the forehead. Interpupillary Distance (IPD) Adjustment ❻ In System Setting, go to “Setting” ► “Display” to adjust IPD, tap “+” or “-” button to slightly adjust IPDuntil the picture is clear. 14 64mm Please note that inappropriate IPD setting may cause ghosting or eyestrain.Accurate IPD setting helps you get a clear imaging and ease eyestrain. EN
Product Details VR Headset Status Indicator Legend Blue: Powered on with battery over 20% Yellow: Charging: Battery is less than 98% Red: Charging: Battery is less than 20% Green: Charging: Battery is more than 98% or charge complete Blue flashing: Shutting down Red flashing: Battery is less than 20% Off: Sleeping or Powered off Power Power on: Long press for 2 seconds Power off: Long press for 5 seconds Hardware reset: Long press for 10 seconds Short press to enter sleep or wake up Status Indicator Face Cushion Volume ① ② ③ ④ ⑤ ⑥ ⑦ ⑧ RGB See Through Camera Do not block during use. Top Strap Removable Strap Dial Tracking Cameras Do not block during use. ⑨ ⑩ ⑪ USB-C Interface Left/Right Speaker Proximity Sensor The system wakes upwhen the VR headset isput on, sleeps when VRheadset is taken off. ⑫ ⑬ Eye Tracking Cameras Pro version only. Do not block during use. Face Tracking Camera Pro version only. Do not block during use. 15 EN
Controller Status Indicator Legend Off: Connected or Powered off Blue: Firmware updating in progress Blue flashing: Searching for connection Red and blue flashing alternately: Pairing in progress 16 Joystick Menu ③ ① ② Home Power on: Short pressPower off: Long press for 6 secondsReturn home screen: Short pressScreen recentering: Press for 1 secondStatus Indicator Grip Capture Trigger ④ ⑤ ⑥ ⑦ ⑧ ⑨ Battery Case Open: Slide down the toggle andpop up the battery case. Lock: Push the battery case to lock. Tracking Ring Do not block during use. * Note: Pass the Controller Lanyardthrough the string as shown andlock at the end of the Controller EN
Operating Instructions Headset Control Mode If the Controller is not connected, you can interact with the home screen by moving your head to directthe crosshairs over your intended selection and clicking the Volume Up/Down button on the VR Headset. Switch the pointer of the master Controller In the home screen, short press the Trigger of the corresponding Controller to switch the pointer of themaster Controller. Screen re-centering Wear the VR Headset and look straight ahead, press and hold the Home button of the Controller or VRHeadset ( or the Volume Down button of the VR Headset in head control mode) for more than 1 second tore-center the screen. Disconnect the Controller Press and hold the Home button until the status indicator turns red and the Controller vibrates.Controllers will automatically shut down to save power in the following cases:When the VR Headset enters deep sleep (a while after the VR Headset is taken off)When the Controller is unpairedWhen the VR Headset is powered off Add a new Controller If you need to add a new Controller (the VR Headset can only connect one left Controller and one rightController) or reconnect with an unpaired Controller. Go to “Settings” ► “Controller”, click on “Pair”.Press and hold the Home button and the Trigger of the Controller at the same time until the red and bluelights of the Controller flashing alternately, and then follow the instructions on the VR Headset screen. Sleep / Wake up Option 1 (Proximity Sensor) Take off VR Headset for automatic sleeping: wear the VR Headset for automat- ic waking up. Option 2 (POWER Button) Press the Power button of the VR Headset for manual sleeping or waking up. Hardware reset VR Headset reset If the visual in the VR Headset freezes, or the VR Headset does not respond after short press the Powerbutton, you can press the Power button of the VR Headset for more than 10 seconds to reboot the VRHeadset. Controller reset If the virtual Controller, the Home button or any buttons of the Controller doesn\'t respond, remove andreinstall the battery case to restart the Controller. The VR Headset Adjustment This device has no myopia adjustment function. The VR Headset allows wearing most standard glasseswith a frame width of less than 150mm. to install Glasses Spacer to increase the space. You can install or not according to your situation. 17 EN
Install Glasses Spacer Install Nose Pad If you have glasses collision with headset lens or pressure on the bridge of nose, please follow the pictureto install Glasses Spacer to increase the space. You can install or not according to your situation. If you feel light leaking from your nose, please follow the picture to install Nose Pad to block the light.You can consider having it installed at your own discretion. Disassemble the Face Cushion. Install the Glasses Spacer on the Headset. ❸ ❶ ❷ Install the Face Cushion on the Glasses Spacer. Disassemble the Face Cushion. Install the Nose Pad on the Face Cushion. ❶ ❷ Install the Face Cushion on the Headset. ❸ * Note: Disassemble the Glasses Spacer 18 EN
Replace Face Cushion The Face Cushion will have the following phenomena such as color change, surface fluff, soft texture afterlong-term use and repeated cleaning. You can replace a new Face Cushion as needed. Replace Top Strap ❶ ❷ Disassemble the Face Cushion. Pinch the metal buckle of the top strap asshown, press it down and pull it out.Install the Face Cushion on. ❸ ❷ ❶ • Purchase high-quality and trending apps • Join PICO Community and explore the VR worldwith other PICO players• Manage your device with ease • Engage in diverse and interactive activities • More exciting features waiting for you 19 EN
'
|
[
"Exposure to sunlight or strong light may cause permanent yellow spot damage on the screen."
] | 2,188
|
multifieldqa_en
|
en
| null |
45e06726b160cfb851e2179017f90e37f4f4dec62f346e33
|
Why does Craig want to find his own place?
|
My Aspergers Child: COMMENTS & QUESTIONS [for Feb., 2017]
I emailed you a while back and you mentioned that I could email when I needed to. Thank you. I last wrote you in December that my son became involved in a dispute involving the local police. We have had 3 court dates. It keeps delaying due to not being able to come to an agreement. But the attorney, even though he was just vaguely familiar with Aspergers, has been very good with Craig. He has the compassion and excellence that is needed here. What started out very bad is turning into a good thing. It will probably take another 90 days or more.
But Craig is working hard. Too hard sometimes. He goes to therapy 3 times a week. Doing excellent. He's more focused and can calm down easier. He's got a lot on his plate but has support from his family. From his attorney. From therapy. And from his work.
He has been renting a room from a lady who has a son with ADHD. It is good for him. I'm a little worried though because since she smokes he wants to find his own place. With all the costs he has to balance it out financially. That is good. I can't help him more than I am which is good. He is stepping up and taking responsibility. He is listening much better.
He is going to have an evaluation today to get an accurate diagnosis. I understand that is a little difficult since he is an adult. Also the PTSD may cover it over. The attorney stated it would help to have the diagnosis.
Aware this is a long update, but thanks for reading. I am fighting much guilt still but I have a lot of peace now. My daughter and her 4 year old son also have Aspergers symptoms. So my life chapters may not close for a while. :-)
My name is Mac. I'm sure you're quite busy, so I'll get right to it I just wanted to pass on compliments on My Aspergers Child and your post, How to Implement the GFCF Diet: Tips for Parents of Autistic Children.
Me and my wife absolutely loved it!
I got a facebook message from him today begging to be able to come home saying he misses home and he will change. He says he will follow rules now. I stated to him the simple rules he has to follow which were - No weed in my house, or smoked in my house, coming home at curfew, going to school, no skipping, no drugs at school, and to drop the attitude of I am 17 I can do whatever I want.
I have made it very clear that if I see any drugs in my home I will be calling the police, as well as if I see signs of it being sold by him I will report him. (He has never had selling amounts in my house, ... I believe it's being kept at his "friends" which of course I have no proof of....I just know it is not here.
I know my battle is not over by a long shot, I am sure we will have more consequences and possibly another being kicked out, but I am going to think positive and hope that he learned some form of a valuable lesson here.
Thank you so much for the guidance, never in a million years did I ever think I'd be on this side, (the one needing the help, as I am the one who helps.)
I am going to go back to the start of the program like I said earlier and keep notes close by for reference.
Thanks for all you do, helping us all with ODD children/teens
I have a small company providing educational support services to a few families who have children with various disabilities in Ohio. One of the families has multiple adopted children of whom several have significant attachment disorders including RAD. As an experienced teacher and foster parent I have some experience in working with children who have extensive trauma backgrounds. However, I could use additional training. Also working with these children are two staff members with minimal background in attachment disorders who would also benefit from training primarily in behavior management. The primary caregiver to the children does a wonderful job managing their needs. In order to further develop team cohesion, I'm hoping to include her in any training as well.
Is it possible to schedule such a training session with you? If so, please let us know what will work for you including time, place, and cost. Thank you for your assistance.
I just listed to your tapes on dealing with an out of control, defiant teen. I'd like to ask your advice on a particular situation we have. Our 15 year old daughter is smoking pot almost every day at school. Because we had no way to control the situation, we told her, fine, go ahead and smoke weed. However, you will no longer receive the same support from us. You will not have your phone, lunch money to go off campus (she has an account at the school for the cafeteria she can use), and you will be grounded until you can pass a drug test. We will not be testing you except for when you tell us you are ready to be tested. She is now saying she's suicidal because she feels so isolated, yet she continues to smoke weed. In fact, she tried to sneak out last night but was foiled by our alarm system. For the particular drug test we have, I read it takes about 10 days of not smoking to pass the test. What would you do? Please advise.
I am having a problem with my 18 year old son, Danny, with high functioning autism. We finally had him diagnosed when he was 16 years old. I always knew something was going on with him but the doctors misdiagnosed him as bipolar. It's been 2 years now and he will not accept his diagnosis. He won't talk about it and when I try to bring it up he gets very angry. I've tried telling him that it's not a bad thing, that there's been many, many very successful people with Aspergers. He won't tell anyone and refuses to learn about managing life with it. He once shared with me that the other kids at school use it as an insult, like saying someone is so autistic when they do something they don't approve of. So he doesn't want anyone to know. He's turned down services that could help him. He has a girlfriend, going on 8 months. He won't tell her and they're having problems arguing a lot and I wonder if it would help for her to know.
I'm sad that he thinks it's a life sentence to something horrible instead of accepting, embracing it and learning about it more so he maybe can understand why he's struggling. I told him that he doesn't need to shout it out to the whole world but he won't even accept it himself.
I don't know how to help him with it and because he's almost 19 I have limited control now. It's made my life easier knowing what we're dealing with and I think his life would be easier is he accepted it.
Please help me help him.
I am a clinical psychologist in NYC who now has several (!!) children I see who have RAD. In 20 years of practice, I’d seen only one case. Now, I have at least three children with this. I have no training, per se, in working with this children though I know about setting structure, consistency, etc. I do a lot of work with parents about parenting. I work primarily within the school setting in a charter school whose mission is to educate children on the autism spectrum in a mainstream setting. We use Michelle Garcia Winner’s social thinking program with our ASD kids. I also work with gen ed kids in the school who are at-risk; the school is in the inner city from where the majority of our non-ASD kids live.
It would have been so much easier to mention to my adult son that I think (I know he does, but want to ease into the subject)
he has Asperger's when we were living together two years ago. He has since moved to Tennessee working in his field of interest
which is 3-D printing and software development. I am so happy for him that he has found his way into a job that he truly enjoys
even though he's socially isolated.
He's not diagnosed and does not know he has it. How I know is his classic symptoms being sensory issues (fabric feeling like sandpaper)
communication difficulties, meltdowns and much more. Throughout his childhood I just felt he was a bit different. Nothing major stood out and time
just passes, misdiagnosis of ADHD, low frustration, etc. We've talked about his ADHD numerous times (which I now know he doesn't have).
It's so much easier to communicate with him now that I know he has Asperger's. I keep it "slow and low" in talking, with long moments
of silence and then we connect. It's really too bad that Asperger's got a diagnostic code back in the 90's, yet all the so called doctors,
physiologist's, etc, didn't know how to diagnose it. Too bad.
There seems to be no one answer to "should I tell my adult son he has Asperger's" from a few specialists I asked. He is typical Asperger,
complicated, highly intelligent (high IQ), anxiety at times, socially isolated, hard to make friends. Not knowing how he will react is the hard part.
How will he be better off knowing he has it? Do I wait to tell him in person, or ease into it with him over Skype? He likes direct, honest, concrete communication.
Why is this so hard for me? Maybe because no one know's if he is going to be better off knowing or not. Do you know if people are better off
knowing? I try to get up the courage to just let him know, then I back down.
I have been searching the web looking for advice and came upon your site. I am trying to read blogs, websites, books, and articles to help guide me. I was so happy when you said that I could ask you a question. My husband and I are struggling with my 27 year old son who lives with us.
Kyle is the youngest of 4 sons. He is a college graduate but never could find the "right" job. He has always been quiet and never had a lot of friends. Two years ago, his girlfriend broke up with him. Kyle had an online gambling addiction and was using pot all the time. After the breakup, Kyle was very depressed and started using heroin and finally told my husband he was using. He is now seeing a psychiatrist who has him on suboxone and antidepressants. He is also seeing a psychologist weekly for counseling but it does not seem to be helping.
Last October,, Kyle lost his job, got drunk, and was agitated and came home , fighting with us, damaging our home and being verbally abusive. My other son , age 32, who also lives with us called the police and Kyle got arrested. He is currently in the family court system. He went through an anger management course and now is in substance abuse classes. Kyle continues to verbally abusive to me and blame me for everything. He says he "hates me "and calls me terrible names. At times, he pushes my husband and intimidates me. My husband and I are so upset. We just hired an attorney for him because since he has been going to these classes, he is getting more depressed and not getting better. Kyle continues to drink while taking his meds prescribed by the psychiatrist and then he has his "moods." My husband and I have met once with the psychiatrist just to give him background information when Kyle started with him.
At this point, we do not know what to do. We never thought at this stage of our life, we would be supporting and spending our retirement money on adult children. I do not know why Kyle hates me, I could not have been a better mom. My husband and I have no life and just do not know what it the right path we should take. Kyle does not want anything to do with us. He spends all his time in his room playing football online.We have tried tough love versus caring and love and understanding. Do you have any advice for me?
This whole ODD and ADHD is killing me as a parent. I work in the field of adult psych and addictions so I am well educated. I have been dealing with my teen being like this for almost 3 years and I totally lost my cool today with my 17-year-old son to the point I told him he is out of the house. He can never simple rules, comes and goes as he pleases sometimes doesn't come home, just recently back in school from several suspension for drug related... I am just so exhausted. He has made me hate life, hate being a parent and sometimes I just feel like not even being here. I bought your program in hopes to it would help, I am at week three and I feel things are getting worse... what am I doing wrong??
My partner hasn't been diagnosed yet but I know he has aspergers ..day to day is a struggle . I feel I'm going crazy with how he makes me feel.Feel let down constantly. He lies alot but I've been told they can't but I know he does.I just feel trapped and unloved.We have a 4yr old daughter together and my main worry with how he is that it will effect our daughter ; (his skills as a parent are so weak.He can't disapline at all.Feel so alone .he hides it well too.I just wondered if things will get worse? He's angry so quick in arguments.Scares me etc.I can't leave as he's the main bread winner and our daughter loves him to bits.Don't know why I'm writing this..Sorry if I'm going on and not making sense :(
I wanted to let you know about a research opportunity for children, teens, and young adults with autism. I am studying the effects of Brazilian Jiu Jitsu, and psychotherapy on helping people with autism develop subjective awareness of others.
I am writing you to see if this might help someone in your practice, or to see if you might know of someone with autism who may benefit from participating in this study. The requirements of the study will be:
1. A participant should be between 7-21 years of age and have a diagnosis of Autism Spectrum Disorder.
2. The participant should enroll in an approved Jiu Jitsu Academy and attend at least two sessions a week for a period of six months.
3. The participant should enroll in social skills groups, provided by my office or be in a steady psychotherapeutic relationship in your office, at least once a week, or minimally two to three times a month.
4. The participant will be given a SRS (Social Responsiveness Scale) test at the beginning of the study, at three months, and again at six months.
If you know of anyone who might benefit from this novel approach to helping to develop social awareness in autism, please do not hesitate to contact me for further information.
I have a 10 year old daughter who has outbursts with prolonged crying almost like tantrums that 2 year olds have when they cannot express themselves.
I had her in therapy from age 6-8 years old for the same thing but I feel that the sessions didn't really help much.
She has severe sensitivities to light, sound, vibration, frequencies which trigger irritability and crying.
We changed her diet and tried getting her involved with activities but she is anti-social and prefers reading than being social. She is terrified of change even in daily routine (even that will trigger prolonged crying).
It frustrates me because I don't know what else to do with her behavior.
I've tried acupuncture (she refused at the first session); she refuses massage too.
She is an honor-roll student at school and has very minimal issues at school but if she has had a bad day it does result in a tantrum or crying and defiance.
How can I get her tested for Asperger's Syndrome?
Last night our 24 year old son with Aspergers told his dad and I that he is pulling out of the 4 college classes that he recetnly enrolled in because he has not been attending class or turning in his assignments. He paid $2800 (his own money) for tuition and I reminded him of this when he told us but it did not seem to bother him.
This is the 3rd time he has started college courses and has not completed them. (He also took some concurrent college classes while he was in high school that he failed). This is a son who basically had a 4.0 grade point average through 10th grade and got a 34 on the ACT the first time he took it.
With the news that he was once again not sticking with college courses I did not sleep well. When I got up this mornning I began looking online for help in how to deal with his situation. I found your "Launching Adult Children With Aspergers" and purchased it. Most of what is included are things we have done or did with our son throughout his life. I was hoping for more help so I am emailing you now in hopes of more specific ideas.
We noticed some things with our son, Taylor, as a yound child but as we had not heard of Aspergers at that time we just did what we thought would help him. As a toddler and a child at pre-school he generally went off on his own to play. When I talked to his pre-school teacher about my concerns (that I was worried he would end up a hermit) she said she did not see him being a loner and that he seemed to interact fine with others in many situations. We worked with him on making eye contact when talking with others. We explained different emotions in people's faces and mannerisms to help him know how to interact with others. We discussed the fact that people would say things that did not mean what they souneded like - such as "I'm so hungry I could eat a horse". As we did these things he worked hard to better understand communication with others.
During his 4th grade year I had a teacher from the gifted program ask me if I had ever heard of Aspergers. I told her that I had not heard of it. She proceeded to read me some of the charateristics and so many of them described my son. So we had him tested by the school district during the summer between 4th and 5th grade and they did find that he had Aspergers but that he was high functioning. We then set him up with and EIP which stayed with him until his sophomore year. We pulled him from it at that time because we had moved and the new district was requiring him to take one class a day that was a study class. This reduced the number of required classes he could take and he was doing fine with his studies at the time.
It was during the 2nd half of his Junior year that we noticed some of his grades going down. Then during his Senior year is when he started skipping classes and not doing assignments. We had not realized it before then but we soon became aware that he was addicted to gaming. He would go to the library or somewhere else on campus and play games on the computer rather than go to class. It was also at this time that he began lying about his actions (so as not to get in trouble).
Based on his grades and his ACT score he received offers from colleges for full tuition scholarships. He chose the college where he had taken concurrent classes during his high school years. But he proceeded to skip class and not turn in assignments so he lost his scholarship and quit attending college. During this time he was only able to find employment through an employment agency where he was mostly sent to manuel labor type jobs (which is not something he enjoys but he did it anyway). It was during this time that at one place had gone to on numerous occasions he was told if he came late one more time they would tell the emplyment agency they did not want him to come there anymore. (This seemed to make an impression on him because he has continued to be reliable and responsbile at his places of employment).
At 19 1/2 he left to serve a 2 year full-time mission for our church. He completed his mission successfully. (I don't think it was without some struggle, stress and depression, but he was able to pick himself up and move on from those times).
When he came home he started working for the employment agency again but began looking for employment elsewhere. He got a job at a local Chick Fil-A where he has worked for 3 years. He started college again shortly after he came home but as before it was short lived. He did finish out the semester but failed most of the classes due to his skipping class and not turning in assignments. When he skipped class he would usually sleep in his car.
Taylor's life consists of working (where to the best of our knowledge) he does well, he is reliable and his employer likes him. When he comes home from work he either sleeps or plays video games or other games - such as kakuro. He spendes most of his time in the basement where his bedroom is and this is where he games. Taylor owns his own car, bought his own laptop and very rarely spends money. He pays us $200 /month to still live at home, unloads the dishwasher on a regular basis and does the weekly garbage. However, his room is a mess and he only cleans his bathroom when I tell him he needs to clean it.
Taylor used to read quite a bit and loved to learn. It has just been in his adult years that he has not read as much - I think because of his gaming addiction. Taylor goes to church on a regular basis but sleeps through the main meeting. In Sunday class room settings he stays awake - I think because he is able to particpate in discussions.
Taylor has only had 2 real friends since entering Junior High school. And as of now he only keeps in contact with one of them who still lives in Georgia. We have lived in Utah since the summer of 2007 and he has never had a friend to do things with since we have lived here. He has two younger siblings, a brother 22 and a sister 20. They love Taylor and spend time with him when they are home. They are both at college and doing well.
Throughout Taylor's school years he has seen a counsleor on a fairly regular basis. One summer during junior high he attended a weekly class where he interacted with other kids with Aspergers. We did see a lot of change in him from this group. After he returned from his mission he went to see a counselor for a short period - this counselor tried to help him with some social skills. His dad and I went with him the first 3 or 4 times but we found out that after we quit going with him he only went a few more times and then scheduled appointments but did not show a couple of the times. We only found this out when a bill came for a "no show" appointment.
I don't know if this is too much information but were are in dire need of help for him. In the information that we purchased from you you mentioned that you do coaching for Aspergers adults. I don't know if you can help us but I thought I would check with you just in case.
Alas I think I have found your information too late to save my marriage but I am hoping to save myself.
I am currently going through a very very painful separation after a 27 year relationship with my husband whom I am convinced has aspergers syndrome. It is a long and painful story and I am desperately trying to process it all alongside dealing with a very conflictual separation. My partner is angry non communicative and totally dismissive of me and our long shared history.
He walked out last year after I discovered he had been visiting massage parlours and developed a relationship with an illegal Chinese escourt whom he subsequently moved in with. He had been seeing this woman behind my back for over 18 months. The pain of all this indescribable and his dismissal of my pain and very existence beyond belief.
Leading up to this I had been battling anxiety and depression which my husband found very hard to cope with.
Over the years of our relationship I knew something was off but I just could not put my finger on it. I often felt a complete lack of validation and empathy. Communication was also difficult as my husband was defensive and unwilling to look at issues in our marriage.
Please Mark could you help me validate some of this pain and try and make dense of 27 years of my life without drowning in fear guilt and despair about my future.
Thank you for listening and your site.
I have had problems with drunkenness, being late for school, not handing in school work, buying pot from a dealer etc. I chose to focus on the drinking and did the grounding then (grounding happened 3 times). I also stopped sleep overs at friends 100%. I have stopped handing out money for no reason or even buying treats like chocolate.
I did lose it one evening (and didn't do the poker face) when I was trying to unplug the internet at midnight on a school night (she’s always late for school so I am trying to get her to sleep at a reasonable hour). I was physically stopped and pushed around so I slapped my daughter (it was not hard). This ended up with her saying she didn’t want to come home (the next day after school). By this stage, I also had enough and didn’t go get her. I thought I am not begging. You will run out of money soon. It was quite a relief to have some peace. Daughter’s Dad was in town (from another country) and called a family meeting with the counsellor. To cut a long story short, daughter and her counsellor put it on the table that daughter wants to go live somewhere else (with her friends family) because of the stress at home with me (we live on our own) (i.e. stricter rules and her bucking up against it).
I didn’t really want this but made a compromise that daughter would go there Tues morning – Friday afternoon as the friend is an A student whereas my daughter is failing. They do the same subjects. I made the decision at the end of the day based on what is good for me – some time away from the daughter. I also thought of your book when the child went to live with the grandparents – daughter will dig her own hole over at the friend’s house. They have a week day no going out policy which made me think it is OK. I went and discussed with them the problems experienced (drinking, pot, late nights, not handing in work)
I am also trying to follow the let go of school thing per your book. I find it really difficult to remain calm when I can see daughter on her phone and watching series (when I have her on the weekends) when I know there are projects due. I hired her a private tutor once a week for help with a subject. The tutor has just fired my daughter for not handing in work and being not committed. It’s not the first time private tutoring has not been appreciated. The school give me a report back on a Friday as to whether everything is handed in. The deal is – if the work is not handed in – no pocket money and no Friday night out). Her school is a "progressive" school and there are no repercussions for her being late or not handing in work. I would change schools if I could but there are only 8 months left of school (she turns 18 in August).
We have just completed the first week and beginning week two of your material. We are agreeing with your take and see our son and ourselves in most of what you are saying. Prior to finding your material and starting your program we had been having extreme out of control behaviors and had to call the police because he was breaking things in our house and pushed my husband. This happened three weeks ago. After that incident we took away privileges ie. PS4, phone (which had already been taken for a few days), and friends. So, last week while doing your program he already didn’t have privileges and has continued with poor behavior – name calling, throwing things, slamming doors. We are not sure when to give privileges back. He has been given the privilege of playing with friends on occasion. His 13th birthday is tomorrow. This past weekend, for his birthday my husband and he went boar hunting. Of course we debated about it but decided to go ahead since it was his bday. We are cooking some of the meet on the grill tomorrow night for his bday and inviting a couple of his friends over for a cookout. No more gifts other than cards and balloons. We are wondering if we should go ahead and give him his privileges back and not sure how to do it. Last Friday morning we attempted to talk giving him a date to return privileges and that conversation ended with him getting angry but he gathered from our conversation that he is getting his stuff back on his bday. We are starting week 2 assignments today but not sure how to handle what was already in place. Of course, we aren’t seeing the respect and responsibility we are looking for but realize it has been a long time. We were wanting him to pay for his phone and thought it might be a good time to introduce that idea. Allowing him to earn his phone. We expect that he will be angry with this idea and not sure how to implement.
My son and myself are interested in a inpatient Aspergers program. We line in Calif which is preferable. My son is very high functioning and was diagnosed dry late. He was eight years old. He has never been in or attended a full day of class. Partially due to depression,anxiety, and trouble with his ADHD also his aversion and being bullied and of course his Aspergers. He will not attend his freshmen year due to surgery on both Achilles' tendons from walking on his toes. With physical therapy he should be ready by his sophomore year! We all feel he needs in patient therapy to give him the tools on how to work with his issues in a structured setting and a place that will give him tools for the rest of his life.
In my utter desperation to find a way to get some help for my daughter's increasingly challenging behaviour I trawled the internet to see if I could find some strategies that would provide specific methods on dealing with teenagers with Asperger's syndrome. When I came across your website, I couldn't believe that every statement you made was exactly what I have been going through with my daughter. She has just turned 14 last week, and was diagnosed with Asperger's/ Autism Spectrum Disorder 15 months ago. I have already been seeing a child psychologist for the past five months, however the methods she has been advising have not been very effective.
Our main difficulty with our daughter is her overwhelming obsession to use her cell phone (and to a lesser extent her laptop) constantly. Without any restriction, she will be on it every minute of the day, and will be awake until the early hours every day. We have tried to incorporate her input around rules as to when she has to give in her phone, but she is unwilling to compromise on a time that she should give it to us, believing that she should have unlimited use. I believe she is unable to do any adequate study or homework, as she is constantly having to look at the phone. We have tried to put rules in place that she has to give in her phone and laptop on school nights at 22:15. If she is able to do this then she is given rewards, and if she doesn't then she knows that there will be consequences. The consequence has been restricted use the following day. However, this is usually where we fail, because taking her phone away from her results in tantrums, screaming, and even threatening to harm herself. This behaviour is relentless to the point where the whole family becomes deeply distressed, and inevitably results in her getting the phone back.
This obsession is affecting her schoolwork, and more severely her eyesight. She has become very shortsighted, and her eyesight continues to deteriorate as a result of holding the phone or laptop very close, and mostly in the dark without any lights on. My husband and I have a constant battle on our hands daily, in all areas of discipline with our daughter, but our main concern is that we have been unable to find a way to minimise this obsessive behaviour centred around her phone and laptop. Please can you provide some strategies that can help us specifically with this problem.
First of all, I thank you for developing this program and I am only at the first stage of assignment 1. I have loads of books I have bought, attended psychiatrists for my son and myself, family therapy, occupational therapy, begged and prayed for change but have been dealing with behavioural issues for so long I am definitely exhausted and resentful.
I am a mum to a 15 yr old boy with ASD, dyslexia, OCD and ODD. Sorry to focus on the labels but just to give you an idea of what I am dealing with. I also have a 13 yr old son whom finds his brother’s behaviours difficult, embarassing and challenging. My husband whom is not in great health ( he had a cerebral aneurysm clamped two years ago and has two further aneurysms that are inoperable so endures fatigue, headaches and stress). We have however a pet cat that is very social and a calming influence in the home! I was fortunate enough to have loving parents but I lost both my mum and dad in 2008 and 2015. My inlaws are elderly and quite directly say they are too old to help us so it feels we are alone in dealing with the issues we have.
I am desperate for change as the household is one of stress and anger and I feel all the control lies in my son Patrick’s hands. I am hopeful your programme can make life better for all of us but I wonder if it is too early to ask you two questions?
The first lies with what to do when Patrick goes into my other son Brendan’s room and will either turn on a light when he is sleeping, yell when he is on his phone or create some disturbance. He will not leave the room when asked to do so and the situation always escalates into yelling and Brendan attempting to physically remove him. This happens regularly and always ends badly with doors slamming, my husband being woken and myself in tears feeling the lack of control and also I admit I seem to think “Why me?” which rationally I know is of no help.
The second problem is leaving the house for school. Patrick refuses personal hygiene (either morning or night) and any request to even brush his teeth is fraught with swearing and abuse. If I can get him to shower, he will watch the water roll down the drain and turn up the water really high temp (mu husband has had to turn down the thermostat on the hot water service) without so much as getting wet. My husband leaves for work at 6am but I leave at 745 to work as a nurse in a busy outpatients department in the Alfred Hospital (Melbourne). My work is my sanity as it is a paid break from home but most days I am late which is causing considerable stress and anxiety not to mention my responsibility to do my job. Patrick simply refuses to leave the house and as much as I am tempted to just walk out and leave I know the house would be left unlocked and wonder if Patrick would even attend school. The time I need to leave is not negotiable but Patrick uses this to his advantage and seems to delight in stressing me out and subsequently speeding to work in a frazzled mess.
The interesting and frustrating element in all of this is that although he is socially isolated at school (he has no friends) and academically challenged his behaviour at school is not a problem. He is quiet and his teachers report he does his best and is compliant and well mannered. It is like a Jekyll and Hyde situation where another side of him at home is so angry and abusive yet at school this behaviour does not happen.
I’m Jackie, I now work primarily as a freelance tech writer, after starting my career in software development and moving on to teach IT to young adults at a variety of colleges and schools.
My freelance work is pretty varied and looks at many aspects of the computer industry as a whole, and I’ve just recently completed a piece which gives help and advice to anyone wanting to become a game designer, which you can read here: http://www.gamedesigning.org/become-a-game-designer/. It highlights the hard work and effort it takes to get into such a role, and also how you can further your career and continue to learn and improve as you go. I hope you’ll agree it shows that starting work in the industry takes dedication and skill and that becoming a game designer isn’t just a fly-by-night job!
If you’d be interested in sharing a quick mention of my work on your blog that would be really wonderful and I’d appreciate the chance to get my work out there to a wider audience. Alternatively, I’d be happy to write a short blurb or paragraph or two (or a longer piece - just let me know) highlighting the key points because I think some of your readers might get a lot of value from it.
My son just turned 15 and is a freshman in high school. Although this is his first year in a general ed environment, he is struggling with behaviors in school. He has meltdowns and does not express why he would have them until much later. Once we all know what caused it, the school will accommodate him and try to "change up" things so as not to cause his meltdown. Once that is resolved, another issue comes up and causes him to melt down. He is a high functioning and academically does well, when he wants to do the work. We battle at home over homework. He does not care how it is done, as long as he hands it in. He thinks failing a test is ok, at least he took the test. Homework is never on his mind when he gets home from school. If I never prompt him, he would never open is backpack. He can be aggressive but is never intentionally trying to hurt anyone. He may push over a chair in school, but it is not directed at anyone. We know how that in itself could hurt someone who gets hit by it though. He is defiant in that he only wants to do what interests him. He does not go out by himself (still immature), or abuse alcohol or drugs and never curses. He is a very funny kid and very talented. His main problems are task avoidance and seeking attention. He can be disrespectful to adults in that he is "cheeky" with them, trying to be funny or cute. And he has no "filters".
I’ve just finished reading your Living with an Aspergers Partner ebook. I found it so informative, thank you.
You offered some personal advise, and i wanted to run a situation past you and seek your input as to a strategy for what to do next.
I’ve been seeing a guy for about 7 months now who I believe has Aspergers. I came to this conclusion months ago and I don’t think he realizes, (or acknowledges) although he is aware he has some traits.
He’s highly intelligent and successful, a pattern seeker, has a tendency to focus on the project to hand to the total exclusion of all else for as long sit takes (work or home) socially awkward (has learned coping strategies), sensitive to loud noise, high anxiety with control strategies, black and white thinking etc. He’s currently not working and I’ve seen a slow withdrawal over the last 6 weeks, including the need to ‘escape’ and leave a situation at least once.
He also has a bipolar ex overseas who has primary custody one daughter where there has been ongoing patterns of drama which has recently increased.
Over the past couple of months (since stopping work and drama increase) I’ve gone from being ‘wonderful’ in his eyes to him now being sorry and not having the ‘urge’ to spend close/intimate time with me and offering friendship. Since he shared that with me in a message he’s stonewalled and has retreated to the safety of minimal messages and talks about not knowing what best to say and not being able to find the right words somehow.
He’s a good kind man who I feel is struggling. I’m concerned about his anxiety and possibly the risk of depression. I’m fairly resilient and whilst i’m disappointed he doesn’t want to pursue a relationship with me, i’m concerned for him and his well being. One of his very few close friends is also just leaving the country to live overseas.
The strategy I’ve used so far is simply to back off and give him space. I’ve asked to take him up on an original offer he made to talk but haven’t pushed it. I also haven’t been aggressive or accusatory in the few messages i’ve sent.
Any advise you could give would be greatly appreciated,
Carli who is 10 years old and has had behavioral issues her whole life. The other night she came home very upset after having a conflict with a friend. She was at her friend's house and her and her friend wanted to get on the computer and the older sister was using it. Carli made up a story that someone was at the door to get the older sister off the computer. Her friend didn't understand that she was making up a story to get the sister off the computer. She got excited that someone was at the door and ran downstairs to answer the door. In the process of getting the door, she fell and yelled at Carli. Carli became extremely upset. She was able to control her feelings at her friend's house, but when she came home, she proceeded to cry extremely loudly for over an hour. Her dad spent most of that time with her, talking to her and trying to calm her down. After an hour, I asked him if he could please tell her to be more quiet because the other members of the household were trying to go to sleep.
My question is....how do I as the girlfriend, handle this? He did not like that I asked her to be quiet. We have a rule that if she is having bad behavior, and can't calm down in 5 minutes, he takes her out of the house because her yelling doesn't stop for a long time and is very upsetting to everyone in the household. I would like to ask him to do this with this kind of situation as well. Is this a reasonable request? His thought was that she shouldn't be made to calm down, because everyone handles being upset in a different way. But, she was literally sobbing and wailing very loudly.
My other question is should she have been told that if she wouldn't have lied, this wouldn't have happened? She has a history of lying and of not accepting responsibility for her actions. My boyfriend became very upset with me when I brought this up. He was being very sympathetic and understanding to her. I feel like he was giving her negative attention, and being an over indulgent parent by not putting his foot gown and saying, "you can't carry on like this, even though you are upset". Please let me know how we can handle these situations better.
I am contacting you for help with adult AS. I am taking initiative to pre screen potential therapists to help my current boyfriend get therapy and help with Adult AS.
He has seen many therapists, but it seems like they aren’t really helping him with his problems. They don’t seem to understand how his (undiagnosed) AS would affect therapy approaches. For example, he may not share enough in therapy session and I’m assuming an AS therapist would recognize that is part of the AS and employ strategies to get information from him that helps with treatment. Sometime he tunes out when he is processing something heavy or that he doesn’t want to hear necessarily, or he gets distracted and I’m hoping an As therapist would recognize that and get that he may need repeated something for example, if this is happening.
He is currently suffering from depression that appears clinical in nature as well as reoccurring negative thoughts about something specific that has been worrying him about our relationship. Today he told me these reoccurring thoughts happen during all waking hours unless he watches TV, he never gets a break from them and they make him feel like he is going crazy. As his girlfriend, I am extremely concerned that he cannot get relief from these thoughts and that the therapists he is seeing are unable to help him with his problems. Therefore, I am taking initiative to try and help him find better therapy options, because I want to see him someone who can better help him get to the bottom of things and help him with the challenges he is facing. He really needs an advocate that will help him go deep to figure things out and not just assume therapies are working well, without seeing changes or getting supporting feedback from him in that regard.
Here are some questions I am trying to ask in advance to find the right people to help us with this. As you may know, insurance for these therapies are not often available. We don’t have a lot of money to go from therapist to therapist to find the right person and are hoping prescreening will help.
I recently downloaded your e-book and listened to your talks and your information is by far the most helpful I have been able to find to date. It's very accurately describes my situation as an NT wife married to a very probable AS husband. I think you for taking the time to write this and sharing your insights as well as the experiences of many of your clients. It has really helped me understand the last 32 years of our marriage and get a grasp on how to move forward.
One area that is of primary concern to me, that I did not see addressed, is stimming. I believe that is the behavior my husband is showing through constant vocal singing, repetition of words, shouting out, as well as slapping himself in the chest and general nervous activity. It is very loud and disruptive to our household and it is often a relief when he is not at home. I think there may be a level of Tourette's syndrome as well.
I did some searches on the Internet and could not find anything that really describes his behavior. Most of what I found was flapping or children's behavior. I understand that it is a release of nervous tension but I am really trying to find some strategies to help him stop this behavior as it is extremely frustrating and builds my resentment in dealing with it daily. A lot of it is embarrassing as well and sounds childish to me.
He usually does this when close family members are around and will reign himself in if he is around other people besides us. When we are home it is constant. He also has a lot of anger, mostly at himself, and blows up at unimportant things, it is as if he has a ton of negative energy inside him that need to get out and stimming is one outlet.
I will try to build my acceptance of it, but I also would just like him to stop especially the loudest and most annoying portions. Would you have any resources you could point me to?
|
[
"Because his roommate smokes."
] | 8,501
|
multifieldqa_en
|
en
| null |
6065487485ac8c59b14aeb4bfb6c0cc1c26203d0ab1d3b1b
|
What did the London Directory proclaim to contain?
|
A Brief History of Benjamin Franklin's Residences on Craven Street, London: 1757 - 1775 - Journal of the American Revolution
Benjamin Franklin House, 36 Craven St, London. (Photo by Elliott Brown | Wikimedia Commons)
If one looked into Benjamin Franklin’s time on Craven Street, they might initially believe he lived at 36 Craven Street the entirety of his two stays in London based on the plethora of articles on the internet that say so. If they dug a little deeper they might read that he lived at No. 27 Craven Street, previously numbered 7, but now numbered 36; or that he lived exclusively at No. 7 Craven Street; or that he lived in multiple residences on Craven Street; or that he moved out of No. 36 to another house on Craven Street and then moved back into No. 36 the last year of his residence. What is one to believe with all of the conflicting accounts? What does the historical record have to say about Franklin’s time on Craven Street?
Figure 1. Spur Alley 1685. “A map of the parish of St Martins in the Fields, taken from ye last survey, with additions (1685)”. (© The British Library Board, Shelfmark: Maps Crace Port. 13.2, Item number: 2)
Before Craven Street existed there was Spur Alley, a narrow passageway sandwiched between the Hungerford Market to the north (now Charing Cross Station) and Scotland Yard and the Northumberland House and Garden to the south. It was flanked on both ends by major thoroughfares, the Strand on the west, connecting Westminster to London by road, and the River Thames on the east, not only connecting the two cities to each other and to Southwark on the south side of the Thames, but connecting the entire metropolis to the rest of the world. Being located in the City of Westminster, Spur Alley had escaped the devastation of the Great Fire of London in 1666 leaving its wooden structures, built in the early part of seventeenth century, intact, but also in dire need of restoration or demolition. “The ratebooks show that during the last thirty years or so of their existence the houses in Spur Alley were in a very bad condition. Few of them were rated at more than a few shillings and many of them were unoccupied.”[1] The landowner, William, 5th Baron Craven, desiring to increase the profitability of his assets, tore down the derelict structures on Spur Alley around 1730 and leased the newly established lots to builders. By 1735, twenty brick houses in the Georgian style had been built on the west side and sixteen on the east side of the way now called Craven Street.[2]
Figure 2. Craven Street 1746. (John Rocque London, Westminster and Southwark, First Edition 1746, Motco Enterprises Limited, motco.com)
Letters to Franklin during his residence with Mrs. Margaret Stevenson, his landlady on Craven Street, were addressed rather vaguely; “Craven Street/Strand”, “Mrs. Stevensons in Craven Street”, or “Benjamin Franklin Esqr.” are but a few examples. Letters from Franklin referenced “London,” or sometimes “Cravenstreet,” but never included a number. Despite the absence of numbered addresses in Franklin’s correspondence, there was a sense of one’s place in the neighborhood based on entries in the Westminster Rate Books (tax assessments). The Rate Books did not list house numbers during Franklin’s time there, but they did list the residents of Craven Street in a particular order that became the default numbering system for the street. Number one was associated with the first resident listed under “Craven Street” in the Rate Books and was the northernmost house on the west side of the street. The numbers increased counter-clockwise down the west side and up the east side in accordance with the list of residents. In 1748, the first year of Margaret Stevenson’s (Stevens in the Rate Books for that year) residence on Craven Street, she is listed as the twenty-seventh resident, the second house north of Court Street (later Craven Court, now Craven Passage) on the east side of the street.[3]
In 1766, Parliament passed the London Paving and Lighting Act (6 Geo. 3 c. 26), “An act for the better paving, cleansing, and enlightening, the city of London, and the liberties thereof; and for preventing obstructions and annoyances within the same; and for other purposes therein mentioned.”[4] One of the other purposes therein mentioned was the numbering of houses. With an aim to bring order to the chaotic numbering systems or lack thereof on London streets the Act provided that “… the said commissioners … may also cause every house, shop, or warehouse, in each of the said streets, lanes, squares, yards, courts, alleys, passages, and places, to be marked or numbered, in such manner as they shall judge most proper for distinguishing the same.”[5] This was quite an undertaking that took years to accomplish. It was a decade later before numbered addresses on Craven Street in the City of Westminster appeared in The London Directory (1776). The London Directory and its competitors were published primarily by booksellers or printers to supplement their income and were highly profitable. To say they were competitive is an understatement. “Some of the most hotly disputed struggles over copyright in the century concerned guidebooks. Many were optimistically emblazoned with a royal license and a notice that the work had been entered at Stationers’ Hall. Various struggles between rival guides intensified as the potential for profits became clear.”[6] The London Directory boldly proclaimed to contain “An ALPHABETICAL LIST OF THE NAMES and PLACES of ABODE of the MERCHANTS and PRINCIPAL TRADERS of the Cities of LONDON and WESTMINSTER, the Borough of SOUTHWARK, and their Environs, with the Number affixed to each House.”[7] Kent’s Directory made a similar proclamation: “An Alphabetical LIST OF THE Names and Places of Abode OF THE DIRECTORS of COMPANIES, Persons in Public Business, MERCHANTS, and other eminent TRADERS in the Cities of London and Westminster, and Borough of Southwark WITH THE NUMBERS as they are affixed to their Houses agreeable to the late Acts of Parliament.”[8] Mrs. Stevenson wasn’t included in the directories because she didn’t meet the criteria of being a merchant or trader, not because she was a woman. Although it is rare to see women listed in the directories, some examples do exist.[9] If Mrs. Stevenson had appeared in the directories in 1776 it would not have been on Craven Street as she had moved to Northumberland Court, a stone’s throw away, the previous year.[10] A comparison of Craven Street residents whose names and addresses do appear in the directories with the same residents as they appear in the Westminster Rate Books determines if the numbering systems were congruent. For the most part they were. For example, Joseph Bond at No. 30, William Rowles at No. 31, Samuel Sneyd at No. 32, and Jonathan Michie at No. 35 in The London Directory coincide with their places of residence in the Westminster Rate Books; however, errors did occur. The 1776 edition of The London Directory lists Brown & Whiteford, wine merchants, at No. 9 Craven Street while the Westminster Rate Books list them as the twenty-ninth residents. Obviously, it makes no sense to have Brown & Whiteford at No. 9 in The London Directory and their next-door neighbor, Joseph Bond, at No. 30. The same error appears in Baldwin’s The New Complete Guide for 1783. The New Complete Guide may have “borrowed” the error from The London Directory. It was not uncommon for the owner of one directory to copy entries from another to save both time and money. Beginning in 1778 and contrary to The London Directory, Kent’s Directory faithfully followed the numbering system of the Westminster Rate Books in all of its editions and listed Brown & Whiteford at No. 29 as did Bailey’s Northern Directory in 1781. Perhaps realizing their error, The London Directory changed their listing of Brown & Whiteford from No. 9 to No. 29 in their 1783 edition and maintained that listing thereafter.
Sometime prior to 1792, the embankment on the Thames at the south end of Craven Street had been sufficiently extended allowing for the construction of ten new houses below the original houses: “ … four houses, Nos. 21–24, were built on the west side, and six houses, Nos. 25–30, on the east side of the way.”[11] In a note in the same report, the new numbering system is explained. “The houses in the street, which had previously been numbered consecutively down the west side and up the east side, were then renumbered on the same system to include the additional houses.”[12] Because the new houses (21-24) on the west side were built below the existing houses (1-20), houses 1-20 retained their original numbering.
Figure 4. Craven Street 1799. (Richard Horwood’s Map of London, Westminster and the Borough of Southwark 1799, Motco Enterprises Limited, motco.com)
One would think that the numbers of the sixteen original houses on the east side, Nos. 21 – 36, would simply increase by ten with the addition of the ten new houses, but such was not the case; they increased by nine. How could that be? The only possible explanation is that No. 21 of the original houses was demolished to make way for the construction of the northernmost of the six new houses on the east side (No. 30). Evidence of No. 21’s demolition appears in the lease granted to Charles Owen by William, 7th Baron Craven, in 1792, which describes No. 22 as: “All that messuage in Craven Street late in the occupation of Francis Deschamps undertaker … being the Southernmost house in the Old Buildings on the East Side of the said Street numbered with the No. 22.”[13] The lease describes No. 22 as being the southernmost house in the old buildings on the east side of Craven Street. Clearly the house previously at No. 21 did not exist when the lease granted to Charles Owen was written in 1792 as it used to be the southernmost house. It is also worth noting that in 1790, The London Directory listed Jacob Life at No. 21 (original numbering). In 1791-2, it listed him at No. 6. With No. 21 vacated, it would allow for its demolition and the construction of the tenth new house. By utilizing lot No. 21 for the new construction, only nine additional lots were needed to build the ten houses, hence, Margaret Stevenson’s former residence at 27 became 36 (27 + 9) in the renumbering and not 37.
For nearly a century and a half after Franklin departed London for America in March of 1775 the scales were tipped heavily in favor of his residence having been No. 7 Craven Street. As early as 1807 in London; Being An Accurate History And Description Of The British Metropolis And Its Neighborhood, Volume 4, one would have read: “In Craven Street is a house, No. 7, remarkable for having been the residence of Dr. Benjamin Franklin.[14] In 1815, the identical phrase appeared in The Beauties of England and Wales.[15] After 23 editions of not mentioning Franklin, his name finally appeared in the 24th edition of The Picture of London in 1826: “The house, No. 7, Craven Street, in the Strand, was once the residence of Dr. Benjamin Franklin.”[16] In 1840, Jared Sparks referred to Franklin’s Craven Street residence appearing in London guide books in his voluminous The Works of Benjamin Franklin: “In the London Guide Books, ‘No. 7, Craven Street,’ is still indicated as the house in which Dr. Franklin resided.”[17] In 1846, George Gulliver F.R.S., in his book, The Works of William Hewson, wrote: “She [Polly] had been upon terms of the warmest friendship with Dr. Franklin
Figure 5. No. 7 Craven Street with Memorial Tablet. (Photo courtesy of British History Online, and the Survey of London)
since she was eighteen years of age. That eminent philosopher resided with her mother, Mrs. Margaret Stevenson, at No. 7, Craven Street, Strand, during the fifteen years of his abode in London.”[18] Guide books mentioning Franklin at No. 7 continued to proliferate throughout the century: Handbook for London; Past and Present, Volume I (1849);”[19] Handbook for Modern London (1851);”[20] The Town; Its Memorable Characters and Events (1859);”[21] London and Its Environs (1879).[22] There was an anomaly when London In 1880 Illustrated With Bird’s-Eye Views of the Principal Streets, Sixth Edition (1880) placed Franklin at 27 Craven street.[23] The anomaly lasted for six years until his place of residence was changed to No. 7 in the revised edition, London. Illustrated by Eighteen Bird’s-Eye Views of the Principal Streets (1886).[24] London Past and Present; Its History, Associations, and Traditions, Volume 1 (1891), copied the 1849 Handbook for London almost word-for-word and included, “The house is on the right from the Strand.”[25] In October of 1867, The Society of Arts in London declared that: “In order to show how rich the metropolis is in the memory of important personages and events, which it would be desirable to mark by means of tablets on houses, the Council have caused an alphabetical list to be prepared, … ”[26] Franklin had been elected a corresponding member to the Society in 1756 and was a popular choice among Council members deciding who they were to memorialize.[27] By January of 1870, a tablet honoring him was affixed to the house they believed to have been his residence while in London, No. 7 Craven Street in the Strand on the west side of the street.[28] A majority of historians writing about Franklin in the nineteenth and early twentieth century placed him at No. 7: O. L. Holley, The Life of Benjamin Franklin (1848); E. M. Tomkinson, Benjamin Franklin (1885); John Torrey Morse, Benjamin Franklin (1891); Paul Elmer More, Benjamin Franklin (1900); John S. C. Abbot, Benjamin Franklin (1903); Sydney George Fisher, The True Benjamin Franklin (1903). A notable exception is D. H. Montgomery’s His Life Written by Himself published in 1896. He has Franklin at No. 27 Craven Street. It seems then that depending upon the source, Franklin was thought to have lived at either No. 7 or No. 27, but not both, the overwhelming majority favoring No. 7. As late as 2011, Franklin is still mentioned as living at No. 7.[29]
In 1913, No. 7 was scheduled to be torn down. An article in the March 1914 edition of The Book News Monthly, describes the situation:
As is well known to informed American pilgrims, it has been possible for all admirers of the famous philosopher and statesman to pay their respects to his memory before that house, No. 7 Craven Street, just off the Strand, which was his chief home during his two sojourns in the British capital, but even as these lines are being written the London newspapers are recording that that interesting shrine is soon to be pulled down to make room for a restaurant. It is some mitigation of this misfortune to remember that at the most the Craven Street house was nothing more than a reproduction of the one in which Franklin had his suite of four rooms, for the structure has been rebuilt since Franklin’s time. When, then, some one makes a piteous plea that at least the philosopher’s bedroom shall be preserved, the soothing answer is that the apartment in question is only a replica of that in which the illustrious American enjoyed his well-earned slumbers in 1757-62 and 1764-75. The restaurant-builder, however, with an eye doubtless to possible American patronage, has assured the world that every effort will be made to preserve as much as possible of the entire structure.[30]
Concerned with the possible demolition of Franklin’s residence, the Royal Society of Arts (formerly the Society of Arts[31]) initiated an inquiry into the matter.[32] The London County Council, having taken over the responsibility of placing memorial tablets on notable houses from the Royal Society, was charged with the investigation. It ultimately fell to Sir George Laurence Gomme, a clerk to the Council, to come up with a response. A few years earlier Sir George had discovered Margaret Stevenson residing at No. 27 Craven Street in the Westminster Rate Books. He must have wondered why No. 7 on the west side of Craven Street was being celebrated as Franklin’s residence when the evidence clearly showed otherwise.
Sir George and his staff examined the various London directories discussed earlier and came up with a novel explanation for the discrepancy. They concluded that there had been two numbering systems on Craven Street. An anonymous author echoes Sir George’s conclusion about the two numbering systems in an article in The Journal of the Royal Society of Arts:
…an inspection of the directories of that time proves that there were at least two systems of numbering in Craven Street before the erection of the additional houses. According to one of these the numbers started from the top (Strand end) on the west side of the street, and ran down to the bottom to No. 20, then crossed over and went back to the Strand along the east side – 21 to 36. According to the other system, the east side of the street was numbered from the bottom upwards, starting at No 1. This was not apparently in general use, but there is evidence that this numbering was at all events occasionally used.
The evidence of these two systems of numbering, and for believing that Mrs. Stevenson’s house was first No. 7 under the oldest system, next No. 27 under the second system, and finally No. 36 under the latest and existing system, is to be found in the various directories and the Westminster rate-books.[33]
The “evidence” mentioned above consisted of The London Directory’s listing of Brown & Whiteford at No. 9: “The rate-books for 1781 and 1786 show the house next but one to the north of Mrs. Stevenson’s house as in the occupation of Brown and ‘Whiteford,’ while the old directories mention the business of the firm as wine merchants, and give their address as 9, Craven Street – then a little later, down to 1791, as 29, Craven Street. Curiously enough, in the years 1778 to 1780, or 1781, Lowndes gives it as No. 9, and Kent as 29.”[34] Ignoring Kent’s Directory having Brown and Whiteford as 29 and The London Directory (Lowndes) having Brown and Whiteford “a little later” as 29, and knowing that Mrs. Stevenson lived two doors south of them, Sir George concluded that her house must have been numbered 7, even though there is no listing in any of the directories of her residence ever being No. 7. He surmised that the No. 7 on the west side of Craven Street with the memorial tablet thought to have been Franklin’s residence had simply been confused with number 7 (27) on the east side. Again from The Journal of the Royal Society of Arts:
Taking all the evidence together, there cannot be any doubt whatever that Mrs. Stevenson’s house, in which Franklin lodged, was the house two doors north from Craven Court, first numbered 7, afterwards 27, and finally 36, and consequently that the house in which Franklin lived was that now numbered 36, not the one now numbered 7, on which the tablet is placed.[35]
A response to The Royal Society of Arts was issued: “… the London County Council … informed the Society that it had made a mistake and that No. 36 Craven street was the building that deserved commemoration.”[36] The Society accepted the Council’s conclusion, and despite assurances of preservation by the restaurant builder, No. 7 was torn down the following year.
Sir George’s assertion “that Mrs. Stevenson’s house, in which Franklin lodged, was the house two doors north from Craven Court” was correct, however, his assertion that it was “first numbered 7, afterwards 27”, was not. It was only by association with the errant entry of Brown & Whiteford at No. 9 from 1776-1782 in The London Directory that Mrs. Stevenson’s address was conjured to be No. 7. The problem with associating her address exclusively with that of Brown & Whiteford at No. 9 during those years is that, as previously demonstrated, The London Directory also listed four other Craven Street residents, Bond, Rowles, Sneyd, and Michie, who’s addresses did conform to the numbering system in The Westminster Rate Books. If Brown & Whiteford at No. 9 was indicative of a numbering system different from The Westminster Rate Books, Bond, Rowles, Sneyd, and Michie would have been listed as Nos. 10, 11, 12, and 15, respectively. So on one hand Sir George was relying on the Westminster Rate Books to establish Mrs. Stevenson at No. 27 and on the other hand he was dismissing the Westminster Rate Books to establish her at No. 7. Instead of using the anomalous listing of Brown & Whiteford at No. 9, he could have just as easily, and more logically, used the Bond et al. listings, or the post-1782 Brown & Whiteford listing in the London Directory at No. 29 to establish Mrs. Stevenson at No. 27. Even if there had been two numbering systems, his assertion that No. 27 was first numbered 7 would still be false. The earliest numbering system was the Westminster Rate Books dating from the early 1730s when the houses were constructed. Brown & Whiteford at No. 9 didn’t appear until 46 years later and then only for a brief period.
There is ample evidence in Franklin’s correspondence and in a memoir by Polly Hewson (Mrs. Stevenson’s daughter) that Benjamin and Mrs. Stevenson lived in not one, but two houses on Craven Street. On July 6, 1772, Polly wrote to Benjamin from her house at Broad Street North in London: “My Mother I must tell you went off last friday week, took our little Boy with her and left Mr. Hewson [Polly’s husband, William] the care of her House [27 Craven Street]. The first thing he did was pulling down a part of it in order to turn it to his own purpose, and advantage we hope. This Demolition cannot affect you, who at present are not even a Lodger [Benjamin was traveling at the time], your litterary apartment remains untouch’d, the Door is lock’d …”[37] In a memoir about her husband written after his death Polly writes: “He [William Hewson] began his Lectures Sept. 30, 1772, in Craven-street, where he had built a Theatre adjoining a house which he intended for the future residence of his family.”[38] On October 7, 1772, Benjamin wrote to his son William: “I am very well. But we [Mrs. Stevenson and I] are moving to another House in the same street; and I go down tomorrow to Lord LeDespencer’s to [stay a] Week till things are settled.”[39] To his son-in-law, Richard Bache, on the same day he wrote: “We are moving to another House in the [street] leaving this to Mr. Hewson.”[40] Writing to a friend on October 30, 1772 he explained: “I should sooner have answered your Questions but that in the Confusion of my Papers, occasioned by removing to another House, I could not readily find the Memorandums …”[41] On November 4, 1772 Benjamin informed his wife Deborah of the move. “We are removed to a more convenient House in the same street, Mrs. Stevenson having accommodated her Son-in-Law with that we lived in. The Removing has been a troublesome Affair, but is now over.”[42]
An agreement had been struck between the parties. Margaret and Benjamin would move to another house on Craven Street and allow Polly and William to move into No. 27, the large yard behind the house being spacious enough to accommodate the anatomy school William wished to build.[43] Perhaps the idea was inspired by Margaret’s next-door neighbor at No. 26, Dr. John Leake, a man-midwife and founder of the Westminster Lying-in Hospital, who had built a theater adjoining his residence in which he practiced anatomy and taught midwifery.[44]
After Margaret and Benjamin vacated No. 27, Polly, William, their son William Jr., and William’s younger sister, Dorothy Hewson, took up residence there.[45] In the 1773 Westminster Rate Books for Craven Street, Mrs. Stevenson’s (Stephenson in the Rate Books) name has been crossed out and replaced with “William Hewson.”[46] Further proof that the Hewsons had indeed moved into 27 Craven Street has been confirmed by the discovery of human and animal remains buried in the basement of No. 36 (formerly No. 27 and now the Benjamin Franklin House), a by-product of the dissections that took place at William’s anatomy school.[47]
So what house on Craven Street did Mrs. Stevenson and Benjamin move into after vacating No. 27? An examination of the Westminster Rate Books for the years 1774 and 1775 reveal them living not at No. 7 on the west side of Craven Street as one might expect from the overwhelming consensus of nineteenth century guidebooks and biographies, but surprisingly at No. 1.[48] The controversy of No. 7 being torn down was all for naught as it had never been Franklin’s residence. Sir George was correct on that point. Unfortunately, No. 1 was torn down as well in the early part of the twentieth century. The first time No. 1 is mentioned as Franklin’s second residence is in the Survey of London: Volume 18, St Martin-in-The-Fields II: the Strand published by the London County Council in 1937, ironically the same County Council that had declared No. 36 as Franklin’s only residence twenty-four years earlier.
From 1748 until 1772 Margaret ‘Stephenson’ occupied this house [No. 27 (36)], and it was there that Benjamin Franklin settled after his arrival in London in 1757 as Agent to the General Assembly of Pennsylvania … In October, 1772, Mrs. Stevenson and Franklin removed to No. 1, Craven Street (now demolished), and No. 36 was for the next two years occupied by William Hewson, surgeon, who had married Mary Stevenson.[49]
In the spring of 1774, William Hewson died unexpectedly of septicemia two weeks after cutting himself while dissecting a cadaver. Polly was left to care for their two young sons and was pregnant with a daughter she would give birth to in August of the same year. Is it possible that Margaret and Benjamin moved back into No. 27 to assist Polly after the death of her husband as suggested in The Americanization of Benjamin Franklin?[50]
If the Westminster Rate Books are to be believed, the answer is no. For the year 1774, the Rate Books list Margaret Stevenson at No. 1 and William Hewson at No. 27. For the year 1775, they list Margaret Stevenson at No. 1 and Magnus Falkner (Falconer/Falconar) at No. 27. Magnus was William’s assistant at the anatomy school and fiancé to William’s sister, Dorothy. On his death bed, William instructed Polly, “let Mr. Falconar be my successor.”[51] Magnus would immediately take over the running of the anatomy school and continue William’s unfinished research. Four months later, he and Dorothy would marry.[52] Essentially only two things changed at 27 Craven Street after William’s death: Polly gave birth to her daughter, and Magnus replaced William as the lease holder, so even if Margaret and Benjamin had wished to move back into No. 27, there would have been no room for them. It is also interesting to note that considering the multiple times Benjamin wrote of his move out of No. 27 (and complained of it), he never once mentioned moving back into No. 27 in any of his correspondence after Mr. Hewson’s death.
Figure 6. No. 36 Craven Street. (Photo courtesy of David Ross, britainexpress.com)
In sum, based on the Westminster Rate Books[53] and Franklin’s correspondence, Mrs. Stevenson is known to have resided at No. 27 (36) Craven Street from 1748 to 1772. It follows that, aside from the two years Franklin spent in Philadelphia from 1762 to 1764, he resided there from 1757 to 1772. Franklin’s correspondence also reveals that in the autumn of 1772, he and Mrs. Stevenson moved to another house on Craven Street. The 1773 Westminster Rate Books show her name crossed off at No. 27 and William Hewson’s inserted. The following year the Rate Books list her at No. 1 Craven Street. Evidence for Mrs. Stevenson and Benjamin remaining at No. 1 after William’s death appears in the Westminster Rate Books for 1775 which have Mrs. Stevenson still residing at No. 1 and Magnus Falkner residing at No. 27. Further evidence can be construed from the lack of any mention of a move back into No. 27 in Franklin’s correspondence. Despite the many theories one could devise as to why Franklin was thought to have lived at No. 7 Craven Street by so many guide books and Franklin biographers of the nineteenth century, one thing is certain; at some point after Franklin’s departure to America in March of 1775, and no later than 1807, someone mistakenly associated him with No. 7 on the west side of Craven Street, and it soon became his de facto residence. Credit must go to D. H. Montgomery in 1896 and Sir George in 1913 for setting the record partially straight by placing Franklin at No. 27(36). In 1937, the London County Council gave us the first accurate account of Franklin’s residences on Craven Street in the Survey of London at No. 27(36) and No. 1. It has been shown conclusively that No. 27 was never previously numbered 7. It was, however, renumbered 36 in 1792 after ten additional houses were built at the southern end of the street and remains No. 36 to this day.
[1] “Craven Street and Hungerford Lane”, in Survey of London: Volume 18, St Martin-in-the-Fields II: the Strand, ed. G H Gater and E P Wheeler (London, 1937), 27-39, Early History of the Site.
http://www.british-history.ac.uk/survey-london/vol18/pt2/pp27-39
[2] “England, Westminster Rate Books, 1634-1900,” from database with images, Craven Street – 1735, FamilySearch from database by FindMyPast and images digitized by FamilySearch; citing Westminster City Archives, London.
[3] Ibid., Craven Street – 1748.
[4] The Statutes at Large, From Magna Charta to the End of the Eleventh Parliament of Great Britain. Anno 1761 Continued, Vol. XXVII, ed. Danby Pickering, (Cambridge, John Archdeacon, 1767), 96.
[6] James Raven, Publishing Business in Eighteenth-Century England, (Woodbridge: The Boydell Press, 2014), 201.
[7] The London Directory For the Year 1776, Ninth Edition, (London: T. Lowndes, 1776), title page.
[8] Kent’s Directory For the Year 1778, Forty-Sixth Edition, (London: Richard and Henry Causton, 1778), title page.
[9] A listing in Kent’s Directory for the Year 1882 on p. 28 reveals, “Brown Sarah, Leather-seller, 1, Westmoreland-buildings, Aldersgate-street”, and in Kent’s Directory for the Year 1883 on p. 175, “Whiteland Mary, Wine & Brandy Mercht. Jermyn-str. St. James.”
[10] “The Papers of Benjamin Franklin,” Sponsored by The American Philosophical Society and Yale University, Digital Edition by The Packard Humanities Institute, 22:263a.
http://franklinpapers.org/franklin
Mrs. Stevenson wrote to Benjamin Franklin a letter from her new home at 75 Northumberland Court on November 16, 1775: “In this Court I have a kind friend, Mr. Lechmoen he comes and seats with me and talks of you with a hiy regard and friendship.”
[11] Survey of London, Early History of the Site.
[12] Survey of London, Footnotes/n 10.
[13] Survey of London, Historical Notes/No. 31.
[14] David Hughson, LL.D., London; Being An Accurate History And Description Of The British Metropolis And Its Neighbourhood, To Thirty Miles Extent, From An Actual Perambulation, Vol. IV, (London: W. Stratford, 1807), 227.
[15] The Reverend Joseph Nightingale, The Beauties of England and Wales: Or, Original Delineations, Topographical, Historical, and Descriptive, of Each County, Vol. X, Part III, Vol. II (London: J. Harris; Longman and Co.; J. Walker; R. Baldwin; Sherwood and Co.; J. and J. Cundee; B. and R. Crosby and Co.; J Cuthell; J. and J. Richardson; Cadell and Davies; C. and J. Rivington; and G. Cowie and Co., 1815), 245.
[16] John Britton, F.S.A. & Co., ed., The Original Picture of London, Enlarged and Improved: Being A Correct Guide For The Stranger, As Well As For the Inhabitant, To The Metropolis Of The British Empire Together With A Description Of The Environs, The Twenty-Fourth Edition (London: Longman, Rees, Orme, Brown, and Green, 1826), 479.
[17] Jared Sparks, The Works of Benjamin Franklin, Vol. VII, (Philadelphia: Childs & Peterson, 1840), 151.
[18] George Gulliver, F.R.S., The Works of William Hewson, F. R. S., (London: Printed for the Sydenham Society, MDCCCXLVI), xx.
[19] Peter Cunningham, Handbook for London; Past and Present, Vol. I, (London: John Murray, 1849), 245.
[20] F. Saunders, Memories of the Great Metropolis: or, London, from the Tower to the Crystal Palace, (New York: G.P. Putnam, MDCCCLII), 138.
[21] Leigh Hunt, The Town; Its Memorable Characters and Events, (London: Smith, Elder and Co., 1859), 185.
[22] K. Baedeker, London and Its Environs, Including Excursions To Brighton, The Isle of Wight, Etc.: Handbook For Travelers, Second Edition, (London: Dulau and Co., 1879), 133.
[23] Herbert Fry, London In 1880 Illustrated With Bird’s-Eye Views of the Principal Streets, Sixth Edition, (New York: Scribner, Welford, & Co., 1880), 50.
[24] Herbert Fry, London. Illustrated By Eighteen Bird’s-Eye Views of the Principal Streets, (London: W. H. Allen and Co., 1886), 40.
[25] Henry B. Wheatley, F.S.A., London Past and Present; Its History, Associations, and Traditions, Vol. 1, (London: John Murray, New York: Scribner & Welford, 1891), 473.
[26] The Journal of the Society of Arts, Vol. XV, No. 778, (October 18, 1867): 717.
[27] D. G. C. Allen, “Dear and Serviceable to Each Other: Benjamin Franklin and the Royal Society of Arts,” American Philosophical Society, Vol. 144, No. 3, (September 2000): 248-249.
Franklin was a corresponding member in 1756 because he was still residing in Philadelphia. He became an active member the following year when he moved to London.
[28] The Journal of the Society of Arts, Vol. XVIII, No. 894, (Jan. 7, 1870): 137.
“Since the last announcement, the following tablets have been affixed on houses formerly occupied by – Benjamin Franklin, 7 Craven-street, Strand, W.C.”
[29] Franklin in His Own Time, eds. Kevin J. Haytes and Isabelle Bour, (Iowa City, University of Iowa Press, 2011), xxxvii.
“Takes lodgings with Margaret Stevenson at No. 7 Craven Street.” It is unknown if the editors are referring to No. 7 on the west side of Craven Street or No. 36 on the east side using Sir George’s explanation of No. 36 being previously numbered 7.
[30] Henry C. Shelly, “American Shrines on English Soil, III. In the Footprints of Benjamin Franklin,” in The Book News Monthly, September, 1913 to August, 1914, (Philadelphia: John Wanamaker, 1914), 325.
[31] The Journal of the Royal Society of Arts, Vol. LVI, No. 2,880, (Jan. 31, 1908): 245.
http://babel.hathitrust.org/cgi/pt?id=mdp.39015058423073;view=1up;seq=251
“His Majesty the King, who is Patron of the Society, has granted permission to the Society to prefix to its title the term ‘Royal,’ and the Society will consequently be known in future as the ‘Royal Society of Arts.’”
[32] Nineteenth Annual Report, 1914, of the American Scenic and Historic Preservation Society, (Albany: J. B. Lyon Company, 1914), 293.
http://babel.hathitrust.org/cgi/pt?id=wu.89072985302;view=1up;seq=4;size=150
[33] The Journal of the Society of Arts, Vol. LXII, No. 3,183, (Nov. 21, 1913): 18.
http://babel.hathitrust.org/cgi/pt?id=mdp.39015058422968;view=1up;seq=26
[36] Allen, “Dear and Serviceable,” 263-264.
[37] Papers of Benjamin Franklin, 19:20.
[38] Thomas Joseph Pettigrew, F. L. S., Memoirs of the Life and Writings of the Late John Coakley Lettsom With a Selection From His Correspondence, Vol. I, (London: Nichols, Son, and Bentley, 1817), 144 of Correspondence.
[39] Papers of Benjamin Franklin, 19:321b.
[40] Ibid., 19:314.
[41] Ibid., 19:353a.
[43] Simon David John Chaplin, John Hunter and the ‘museum oeconomy’, 1750-1800, Department of History, King’s College London. Thesis submitted for the degree of Doctor of Philosophy of the University of London., 202.
“Following Falconar’s death [1778] the lease [27 Craven Street] was advertised, and the buildings were described as:
A genteel and commodious house, in good Repair, with Coach-house and Stabling for two Horses…consisting of two rooms and light closets on each floor, with outbuildings in the Yard, a Museum, a Compleat Theatre, and other conveniences. (Daily Advertiser, 27 August 1778)”
[44] Simon Chaplin, “Dissection and Display in Eighteenth-Century London,” in Anatomical Dissection in Enlightenment England and Beyond: Autopsy, Pathology and Display, ed. Dr. Piers Mitchell, (Burlington: Ashgate Publishing Company, 2012), 108.
“Given that a nearby building at 35 [ No. 26 in Franklin’s time] was occupied by the man-midwife John Leake, who advertised lectures – including lessons in the art of making preparations – at his ‘theatre’ between 1764 and 1788, it is possible that some facilities were shared. In both cases, however, the buildings [Leake’s residence at No. 26 and Hewson’s residence next door at 27] served a dual function as domestic accommodation and as sites for lecturing and dissection.”
[45] George Gulliver, F.R.S., The Works of William Hewson, F. R. S., (London: Printed for the Sydenham Society, MDCCCXLVI), xviii.
[46] Westminster Rate Books, Craven Street – 1773, courtesy of the City of Westminster Archives.
[47] S.W. Hillson et al., “Benjamin Franklin, William Hewson, and the Craven Street Bones,” Archaeology International, Vol. 2, (Nov. 22, 1998): 14-16.
http://dx.doi.org/10.5334/ai.0206
[48] Westminster Rate Books, Craven Street – 1774, 1775, courtesy of the City of Westminster Archives.
[49] Survey of London, Historical Notes/No. 36, Craven Street (not sourced).
[50] Gordon S. Wood, The Americanization of Benjamin Franklin, (New York: The Penguin Press, 2004), 261.
[51] Pettigrew, Memoirs, 146 of Correspondence.
[52] http://founders.archives.gov/documents/Franklin/01-22-02-0178, note 7. “Falconar married Hewson’s sister five months after the Doctor’s death; most of the Craven Street circle attended the wedding, and BF gave away the bride: Polly to Barbara Hewson, Oct. 4, 1774, APS” (American Philosophical Society); “England Marriages, 1538–1973 ,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:V52W-TGS : accessed September 15, 2015), Magnus Falconar and Dorothy Hewson, September 12, 1774; citing Saint Martin In The Fields, Westminster, London, England, reference ; FHL microfilm 561156, 561157, 561158, 942 B4HA V. 25, 942 B4HA V. 66.
[53] I chose to rely on the Westminster Rate Books for the numbering system on Craven Street. The books were consistent throughout the eighteenth century in the ordering of residents on the street and were used as the basis for the 1792 re-numbering. For the most part, commercial directories aligned with them as well. If by chance a directory didn’t initially align, it would inevitably produce future editions that did.
Benjamin Franklin, Benjamin Franklin House, London
More from David Turnquist
If one looked into Benjamin Franklin’s time on Craven Street, they might...
I think it’s very ironic that on the street maps included in your excellent article, Craven Street is so close to Scotland Yard. Because following the back and forth juxtapositions of numbers 7, 27 and 36 Craven Street (throw in 75 Northumberland Court and 1 Craven Street, too) was a case that could confound Sherlock Holmes.
Excellent job of deciphering street renumbering material spanning sixty years, including that of a wrong house number (# 7) being erroneously identified and then perpetuated in subsequent street map printings. It’s gratifying at least to know that the present day #36 Craven Street is the correct house for Ben Franklin tourists to visit. Except for #1 Craven Street for the last three years Franklin was in London, but we won’t get into that.
Again, excellent article, David!
|
[
"An alphabetical list of names and places of abode of the merchants and principal traders of the cities of London and Westminster, the Borough of Southwark, and their environs, with the number affixed to each house."
] | 6,567
|
multifieldqa_en
|
en
| null |
c39f97567cff21a8591f02117632ea71e7b566f65d2d62ab
|
What happens to the high resolution of what we focus on at dawn or dusk?
|
Inner Reality Unveiled
Inner Reality Unveiled
by DragonFly on April 18th, 2018, 10:54 pm
There is no direct (literal) view of the actual reality 'out there'. Our inner viewport is ever only that of the model (qualia) of inner and outer reality built by the brain. We see/sense nothing but this model made inside the brain.
We don't see across a room or any scene but only across the model of the room/scene. We don't look through a microscope at an actual object but only look at a model of that object. You get the idea. A reflective color spectrum is used to make it look like that more distinctive color is a surface property of an object modeled.
The brain doesn't model everything, as a lot of it would be clutter, and for what remains as useful to portray the brain still doesn't have the resources to model everything at high resolution and so thus whatever we focus on gets all the high res detail put into it just in the nick of time when we look/focus. At dawn or dusk this high resolution becomes a bit less on what we focus on so that what's off to the left or right can be better noted in the dim light.
So far, nothing astounding here to us, although maybe to everyday folk that we only ever see the inside of the head/brain—the model.
Of course, the shocks get worse, such as that our intentions cannot be those of first cause, self-made people, but from prior causes that we weren't able to choose and be responsible for. What is left, in short, is the freedom of action for these inbuilt intentions to operate, at least when not prevented by the weather or any other controlling factors, which 'freedom of action' amounts to compatibilism.
Other notes on the above are that while we can never know if everything is deterministic, although we know that a lot is, whatever is indeterminate diminishes our modeling and our consistency.
Re: Inner Reality Unveiled
by DragonFly on April 20th, 2018, 3:14 pm
To continue, many feel that the model/qualia is very rich, but there's not anything to compare it to. Some creatures have a fourth primary color to work from and some have more smells and better hearing. Our colors (reflective spectrum) go through some averaging because of the various close frequencies about, but they still have a lot of pop to them. The model seems to be super real, where it has the focused detail, meaning better than real, or super real or surreal; surely colors win out over a bunch of waves (if they could be seen), these colors being very distinctive, which high contrast is what the model seems to be about. Away from the center of focus, the model has to be worse than cartoonish.
Other qualia properties are intense, too, such as pain being able to be very painful, to the max, and such.
Qualia are based on initial isomorphic maps, meaning topographical, when representing the territory. For sounds, the map is for tones from the air vibrations, and for smell it is scents from the molecule shapes; for touch it is a body map. The isomorphism may get carried through even three levels of models, whereafter it seems to become more symbolic and less isomorphic, perhaps indicating that the information is ready to turn into qualia, the point at which the 'hard problem' manifests. It is thought that at least four levels of modules are required for the 'magic' of phenomenal transformation to occur; we have the problem surrounded but not yet solved. Perhaps it is enough to have a truth in lieu of its proof—that there is ontological subjectivity, meaning that it exists, although it may not be fundamental or miraculous.
So, in sum so far, direct realism is an illusion, but is a very useful illusion, which we might better call a fine representation by the model, since the word 'illusion' is more about what's wrong as not really showing its object as substantial and really being behind it. Dreams, then, would be better called illusions; further they demonstrate the power of the structure of the model. When we inspects objects in dreams they look just as good as when we see them awake, although backgrounds come and go inconsistently and there are narrative gaps (all of a sudden we are driving a vehicle without ever having gotten into it, plus the controls are a mystery.)
Another illusion is the feeling of having all of the information in a qualia scene as instantly available, as well as feeling that it is all happening in real time, plus that one is directing it all right then and there.
by mitchellmckain on April 21st, 2018, 4:33 am
Yes and all those security cameras in the banks and stores must be a joke because anybody watching cannot see us but only see images on a display screen.
by DragonFly on April 21st, 2018, 12:05 pm
mitchellmckain » April 21st, 2018, 3:33 am wrote: Yes and all those security cameras in the banks and stores must be a joke because anybody watching cannot see us but only see images on a display screen.
You forgot that what the brain maps and models is a reliable representation of what's out there and in here.
by mitchellmckain on April 21st, 2018, 12:16 pm
DragonFly » April 21st, 2018, 11:05 am wrote:
I was being sarcastic in order to point out this very fact. Whether images on a display screen or human consciousness, they are reliable representations and that means they do see what is really out there. The fact that this is indirect is not without logical implications, but not to the extent that you can say we do not apprehend an objective reality.
by TheVat on April 21st, 2018, 12:29 pm
The evolutionary argument is a strong one, also, for the accuracy of our sensory representations of the external world. If you think a tiger's tail is a pretty flower, and try to pluck it, you won't be around long to reproduce.
I invite anyone who thinks that bus hurtling down the street is nothing but a model in the brain to step in front of it.
Your impression of the bus may be indirect, but it has a direct causal chain of connections to the actual bus out there. You are a photon collector, absorbing photons bounced off a bus. That way, it doesn't have to be you that's bounced off the bus.
by DragonFly on April 21st, 2018, 2:19 pm
Mentally healthy responders need not worry about any unreliable representations due to there being no direct realism. As I showed, the representations are even improvements that bring out what is distinctive and important, as well as my indicating of an 'out there'. (The sarcasm thus fell doubly flat, run over by the bus, either because that mode is the nature of the person or this short thread wasn't read well.)
The world out there indeed comes to us (we don't reach out and probe it but for such as feeling our way in the dark), via photons for sight, and similarly comes to us in other ways for the other 'distance' senses. That the brain projects the objects back out there where they are, with depth (objects whose radiation came into us) is very useful. This trivia is mentioned here for completeness, for non scientific readers, but all the like herein is not contested.
Back on track now, with derailment attempts ever unwelcome, but actual meaty posts extremely welcome, many neurologists note that awake consciousness doesn't easily get snuffed out, for a people may have many and various brain impairments yet they remain conscious, which, in short, without going through them all, indicates that there probably isn't any one 'Grand Central Station' where consciousness originates but that it may arise from any suitable hierarchy of brain modules.
Consciousness, like life, requires embodiment, and is now thought to have been around in some form since the Cambrian explosion. As evolution proceeds via physical processes it rather follows that consciousness does too. Billions of years of small steps from a stable organism platform can acculuminate into what otherwise seems a miracle, but then again, miracles are instant. When extinction events wipe everything out, the process just starts up again, and probably has, several times over.
Since qualia are structured, such as I described, plus healing the blind spot and more that wasn't put here, this again suggest that qualia have to be constructed from parts the brain has made from interpretations via physical processes.
How the phenomenal transform springs out remains as the central mystery of all. We think that there are larger mysteries, such as if there is any ultimate purpose to Existence, but this one is easy, for it can be shown that there can be no ultimate purpose. (There can be local and proximate purpose.) More an this another time or place.
by mitchellmckain on April 21st, 2018, 4:00 pm
I shall interpret the above as a request for a detailed point by point response to the OP.
DragonFly » April 18th, 2018, 9:54 pm wrote: There is no direct (literal) view of the actual reality 'out there'. Our inner viewport is ever only that of the model (qualia) of inner and outer reality built by the brain. We see/sense nothing but this model made inside the brain.
But this is wrong, derived from delusional semantics as if "seeing" meant absorbing the objects themselves into our brain and mind. Of course, "seeing" means no such thing. "Seeing" means gathering data to construct a mental model of an external reality. We don't, in fact, "see" this inner model at all. This "model" is a product of speculation and abstraction in meta-conscious process of self-reflection.
Our inner viewport is thus one of looking out at the outer reality and not one of looking at the model. We do see across a room -- USING a mental model. We do not see the mental model except by speculative imagination. The most we can say is that by using such a process of mental modeling in order to see, there can be deviations due to a variety of neurological and mental processes being involved, including the role of beliefs in our interpretations. Thus our perceptions cannot be fully separated from our beliefs and our access to the world is fundamentally subjective. The objective can only be fully realized by a process of abstraction through communication with others.
DragonFly » April 18th, 2018, 9:54 pm wrote: The brain doesn't model everything, as a lot of it would be clutter, and for what remains as useful to portray the brain still doesn't have the resources to model everything at high resolution and so thus whatever we focus on gets all the high res detail put into it just in the nick of time when we look/focus.
DragonFly » April 18th, 2018, 9:54 pm wrote: Of course, the shocks get worse, such as that our intentions cannot be those of first cause, self-made people, but from prior causes that we weren't able to choose and be responsible for. What is left, in short, is the freedom of action for these inbuilt intentions to operate, at least when not prevented by the weather or any other controlling factors, which 'freedom of action' amounts to compatibilism.
Your philosophical conclusions here will not be mistaken for scientific observations. Your interpretations are based on your own presumptions which I reject as incorrect. The process of human intention and action is certainly a complex one but the fact remains that the first causes do exist. People may be capable of simply watching much of their life pass by as an minimally participating observer (with all sorts of fatalistic and compatibilist dodges and delusions of objectivity), but others choose to take ownership of the first causes within them as a fully responsible participants in their own life.
Also as I have mentioned numerous times before, there is nothing absolute or guaranteed about this freedom of will. It can certainly be greatly diminished by a great number of things such as drugs, illness, habits, and even beliefs. This just means that we are ill advised to judge others according to our own perception and choices.
DragonFly » April 18th, 2018, 9:54 pm wrote: Other notes on the above are that while we can never know if everything is deterministic, although we know that a lot is, whatever is indeterminate diminishes our modeling and our consistency.
We can know that the experimental results show that there are events not determined by any hidden variables within the scientific worldview. People are free to ignore these results and stubbornly cling to presumptions to the contrary but they are being unreasonable if they expect other people to accept the conclusions which they are deriving from such willfulness.
And to head off the typical strawmen, I am not claiming that determinism has been disproven any more than the scientific evidence for evolution disproves divine intelligent design. Science is not a matter of proof, but of accepting that what the evidence and experimental results show us are the basis of what is reasonable to accept until there is evidence to the contrary.
mitchellmckain » April 21st, 2018, 3:00 pm wrote: But this is wrong, derived from delusional semantics as if "seeing" meant absorbing the objects themselves into our brain and mind. Of course, "seeing" means no such thing. "Seeing" means gathering data to construct a mental model of an external reality. We don't, in fact, "see" this inner model at all. This "model" is a product of speculation and abstraction in meta-conscious process of self-reflection.
Yes, the view point is within the model. We don't literally 'see' across a room. The model gets 'viewed' and navigated and noted and whatnot. The outer reality is not able to be viewed directly but is usefully "looked out at" through a representation. Do you directly see wave frequencies air vibrations, and molecule shapes? I didn't mean 'seeing' in the sense of eye stuff, but I note the word problem.
mitchellmckain » April 21st, 2018, 3:00 pm wrote:
Yes, I was reading a large road sign with many words and the words at the bottom didn't come into focus until I got down to them. Our computers have many more terabytes than the brain has.
mitchellmckain » April 21st, 2018, 3:00 pm wrote: Your philosophical conclusions here will not be mistaken for scientific observations. Your interpretations are based on your own presumptions which I reject as incorrect. The process of human intention and action is certainly a complex one but the fact remains that the first causes do exist. People may be capable of simply watching much of their life pass by as an minimally participating observer (with all sorts of fatalistic and compatibilist dodges and delusions of objectivity), but others choose to take ownership of the first causes within them as a fully responsible participants in their own life.
Total libertarians do claim that they are first cause, self made people at every instant. How does this work? A theory of conscious intentions happening without any underlying physical processes ('you') behind them is the toughest sell of all proposals on the will, so it's no wonder that this 'being free of the will' can't be shown. Plus, why does one want this? Perhaps a distaste for having a will that wills things in the subconscious dark. These trillions of connections firing are not portrayed in consciousness, thank goodness.
Yes, as I said, some is indeterminate, so there is no ignoring. (You don't seem to read well, even when seeing it again when you quote it.) The more indeterminacy the worse we are able to carry our our ability to operate, which minimal and trivial capability is called 'freedom of action'. So be it. We have learned something. People want more than this, though, and so they will have to show that that's possible while still retaining the self/will. How is responsibility gained at any point when one was never responsible for prior causes toward one's being/self that couldn't be chosen?
So, prison time need not be assigned for retribution only, more compassion can be granted for those who did as they had to, and we come to better understand our place in the universe. Life is great for experiencing and living, and fatalism isn't recommended, for it could work against the enjoyment.
P.S. There is no point at which ultimate purpose/intention could have been applied to what is eternal, as well as none to be applied to something springing from nothing (which, though impossible, I include for completeness, for the "springing" capability would still be an eternal 'something'.)
It's fine with me if you want a fully formed Being with a system of intelligence to be there First, amid nothing else, but to stick to the template of ID, then a Higher ID had to be behind it, etc., or we could just forget about the one-off usage golden template of ID. The universe looks to be tuned, if it is, for mostly a lot of hydrogen gas in endless sparse spaces. It took ten billion years for us to be able to persist a bit in our rarity amid the waste. [/quote]
DragonFly » April 21st, 2018, 3:57 pm wrote:
Yes, as I said, some is indeterminate, so there is no ignoring.
Incorrect. You did not say "some is indeterminate." So either you do not write well, cannot understand the logic of your own words, or you make up things as an excuse to attack other people. In fact, this can be identified with a logical fallacy. "Whatever is indeterminate diminishes our modeling" means our modeling is diminished IF there is anything indeterminate. If A then B does not allow you affirm A, so by equating these two you have committed a logical fallacy. Furthermore it is amazing how far out on a limb you go to concoct such an attack. You said, "we cannot know if everything is deterministic," which is utterly inconsistent with a clam that "some is indeterminate," because if some is indeterminate then you would know that it is NOT deterministic.
DragonFly » April 21st, 2018, 3:57 pm wrote: Total libertarians do claim that they are first cause, self made people at every instant.
The philosophers who claim that we have free actions are called libertarians. The radical opposition that libertarians pose to the determinist position is their acceptance of free actions. Libertarians accept the incompatibility premise that holds agents morally responsible for free actions. Incompatibilism maintains that determinism is incompatible with human freedom. Libertarians accept that there are free actions, and in doing so, believe that we are morally responsible for some of our actions, namely, the free ones.
The libertarian ONLY claims that we do have free will actions and affirm the incompatibility of determinism with free will. There is no claim here that free will is absolute, inviolable, and applies to every action and thus that people are "self made at every instance."
Thus in the following it is clear you are burning an absurd strawman.
DragonFly » April 21st, 2018, 3:57 pm wrote: How does this work? A theory of conscious intentions happening without any underlying physical processes ('you') behind them is the toughest sell of all proposals on the will, so it's no wonder that this 'being free of the will' can't be shown. Plus, why does one want this? Perhaps a distaste for having a will that wills things in the subconscious dark. These trillions of connections firing are not portrayed in consciousness, thank goodness.
Someone only claims the opposition is selling something absurdly silly because they want to make something only slightly less absurd and silly sound reasonable by comparison. But to make sure you understand...
1. Nobody HERE is selling a theory of conscious intention without any underlying physical processes.
2. Nobody HERE is claiming any "being free of the will"
These are indeed nonsense.
1. As a physicalist with regards to the mind-body problem I oppose the idea of conscious intention without any physical processes. Nor would I assert that there are no unconscious processes underlying our conscious intentions. But as I explained in another thread just because there are such processes does not mean we have no responsibility for them or that our intention does not constitute a conscious cause of our action.
2. As a libertarian it is absurd to think free will means freedom from the will. What we reject is the attempt to separate the self from desires and will as if these were some external thing forcing people to do things. This is nothing but pure empty rhetoric on the part of the opposition. Freedom from the will is the OPPOSITE of free will. If you are not acting according to your desire then this is an example of actions without free will.
DragonFly » April 21st, 2018, 3:57 pm wrote: The more indeterminacy the worse we are able to carry our our ability to operate, which minimal and trivial capability is called 'freedom of action'.
Incorrect. This is only because you equate freedom with control. It is not the same thing. Besides the indeterminacy in the laws of physics is only with respect to a system of mathematical laws. It doesn't really say that nothing causes the result, but only that there are no variables to make the exact result calculable.
DragonFly » April 21st, 2018, 3:57 pm wrote: How is responsibility gained at any point when one was never responsible for prior causes toward one's being/self that couldn't be chosen?
Again it is because free will does not equal control. Free will only means you choose how to respond to the situation. It does require an awareness of alternatives, but it does not require an ability to dictate exactly what will happen in the future.
DragonFly » April 21st, 2018, 3:57 pm wrote: So, prison time need not be assigned for retribution only, more compassion can be granted for those who did as they had to, and we come to better understand our place in the universe. Life is great for experiencing and living, and fatalism isn't recommended, for it could work against the enjoyment.
While imprisonment may be an improvement over the old English law, the inadequacies are legion. It was indeed invented as a means of reforming the convicted even if it fails to accomplish this very well. To be sure, "retribution" is a lousy basis for a system of justice. But the point of "mercy" isn't just compassion but to acknowledge the fact that mistakes are part of the process by which we learn. Therefore, coming down on people like a load bricks for any mistake is counterproductive. On the other hand, we would be foolish not to consider whether a person in question is showing any ability to learn from their mistakes. If not, a change of environment/circumstances is probably called for, even if today's prisons largely fail to be environment needed.
Observe that this analysis of justice and mercy has nothing whatsoever to do with free will. The government of a free society should be founded upon what can be objectively established and free will is not one of these things. In the above consideration of justice and mercy, the question of whether a person truly has free will is completely irrelevant.
DragonFly » April 21st, 2018, 3:57 pm wrote: It's fine with me if you want a fully formed Being with a system of intelligence to be there First, amid nothing else, but to stick to the template of ID, then a Higher ID had to be behind it, etc., or we could just forget about the one-off usage golden template of ID. The universe looks to be tuned, if it is, for mostly a lot of hydrogen gas in endless sparse spaces. It took ten billion years for us to be able to persist a bit in our rarity amid the waste.
I consider Intelligent Design to be attack upon science -- shoving theology into a place where it clearly does not belong. Nor do I agree with intelligent design even in theology, for I think that evolution is more compatible with a belief in a loving God (because of the philosophical problem of evil). Frankly, I consider design to be incompatible with the very essence of what life is.
DragonFly liked this post
Great post, Mitch.
I'm referring to "a lot is determinate", leaving room that some is indeterminate since QM finds this, and some brain doings may be at the micro-macro boundary and be affected, this degrading our ability to operate our intentions.
Here's a "libertarian" example/definition that may fit better:
“Hard Determinism and Libertarianism
Probing further into the free will-debate, we meet two different kinds of incompatibilist positions: hard determinism, which holds that determinism is true and that free will is not compatible with determinism, and libertarianism, which holds that we do have free will and that determinism is false. Given that these positions agree about the definition of determinism, we here actually have a genuine disagreement over fundamental ontological matters – a disagreement about whether determinism is true or not. This is a peculiar question to have strong disagreements about, however, since we know the final answer that we will ever get concerning the truth of determinism: that the state of the world is caused to be the way it is by its prior state at least to some degree, but to what degree exactly can never be known.
The libertarian position has often been criticized with the argument that even if determinism is not true, we still do not have free will, since our actions then simply are the product of a combination of deterministic and indeterministic events that we still do not ultimately choose ourselves, a view referred to as hard incompatibilism. Libertarians do not necessarily accept that this argument shows that we do not have free will, and the reason, or at least a big part of it, should not surprise anyone at this point: they simply define free will differently. According to libertarians, such as Robert Nozick and Robert Kane, one has free will if one could have acted otherwise than one did, and if indeterminism is true, then it may be true that we could have “acted” differently than we did under the exact same circumstances, and that we thereby might have free will in this sense. It should be pointed out, though, that critics of libertarianism are“rightly skeptical about the relevance of this kind of free will. First of all, the free will that libertarians endorse is, unlike what many libertarians seem to think, not an ethically relevant kind of freedom, and it does not have anything to do with the freedom of action that we by definition want. Second, the hard incompatibilist is right that no matter what is true about the degree to which the universe is deterministic, our actions are still caused by prior causes ultimately beyond our own control, which few of those who identify themselves as libertarians seem to want to acknowledge. And lastly, the fact that our actions are caused by causes ultimately beyond our own control does, if we truly appreciated, undermine our intuition of retributive justice, an intuition that libertarians generally seem to want to defend intellectually. So, as many have pointed out already, libertarians are simply on a failed mission.
Together with the want to defend retributive blame and punishment, what seems to be the main motivation for people who defend a libertarian notion of free will seems to be a fear of predeterminism, a fear of there being just one possible outcome from the present state of the universe, which would imply that we ultimately cannot do anything to cause a different outcome than the one possible. Libertarians and others with the same fear have artfully tried to make various models to help them overcome this fear, for instance so-called two-stage models that propose that our choices consist of an indeterministic stage of generation of possible actions, and then our non-random choice of one of them. (It should be noted, in relation to such models, that even if this is how our choices are made, our choice to choose one of these “alternative possibilities” will still be caused by prior causes that are ultimately completely beyond our own control. Nothing changes this fact, again because decision-making is the product of complex physical processes; it is not an uncaused event.) It is generally unclear what the purpose of such models is. Are they a hypotheses we should test? They do not seem to be. Generally, these models most of all seem like an attempt to make the world fit our preconceived intuitions, which most of all resembles pseudoscience.
Fortunately, there is plenty of relief available to the libertarians and other people who have this fear, and it does not involve any unscientific models – neither two-stage, three-stage, nor any other number of stages. The source of this relief is the simple earlier-mentioned fact that we can never know whether there is just one or infinitely many possible outcomes from the present state of the universe. This simple fact gives us all the relief we could ask for, because it reveals that there is no reason to be sure that there is just one possible outcome from the present state of the universe. And, to repeat an important point, we are then left with the conclusion that the only reasonable thing to do is to try to make the best impact we can in the world, which is true no matter whether there is just one possible outcome from the present state of the universe or not, since our actions still have consequences and therefore still matter even in a fully deterministic universe.
Some, especially libertarians, might want to object to the claim that we can never know whether determinism is true or not, and even claim that we in fact now know, or at least have good reasons to believe, that indeterminism is true. Here is neuroscientist Peter Tse expressing something along those lines: “Henceforth, I will accept the weight of evidence from modern physics, and assume ontological indeterminism to be the case.” (Tse, 2013, p. 244). Making this assumption is, however, to take a position on an unanswerable question. Again, rather than making strong claims about this question, we should stick to what we in fact know, namely that we do not know.”
Excerpt From: Magnus Vinding. “Free Will: An Examination of Human Freedom.” iBooks. https://itunes.apple.com/us/book/free-w ... 3363?mt=11
To extend the OP's implications of physical processes/causes dominating…
There are still real values in an existence with no ultimate purpose, this 'value' meaning good and bad valences and actions. It would be of great value to lessen suffering and improve well-being in humans and in all species. (Fixed wills are dynamic, simply meaning that they can learn and thus change to a better fixed will.)
As for our model of reality, this is consciousness and it is ever our only view point inside the head in a brain, being what it is like to experience the world from the inside out.
by RJG on April 22nd, 2018, 1:07 am
Direct realism is not possible. We humans can only experience 'experiences' (sensations; sense data), not the 'real' things or objects themselves. Furthermore, we have no way of knowing if these experiences represent 'real' objects, or are just simply products of illusion; hallucination, delusion, dream, mirage, etc.
For this reason, solipsism is a possibility (i.e. it is just as plausible as it is not), and true self-awareness is not possible (i.e. we don't experience objects, including those called 'self')
DragonFly wrote: There is no direct (literal) view of the actual reality 'out there'. Our inner viewport is ever only that of the model (qualia) of inner and outer reality built by the brain. We see/sense nothing but this model made inside the brain.
Braininvat wrote: I invite anyone who thinks that bus hurtling down the street is nothing but a model in the brain to step in front of it.
Isn't it possible to dream or hallucinate stepping out in front of a bus hurtling down the street? This does not mean that the bus (in the dream/hallucination) is actually 'real'.
One does not normally step out in front of a bus (even in dreams) because they think it is not real, - it is the 'fear' (that it might be real, and) being smashed by it, that compels one not to step in front of it.
Braininvat wrote: Your impression of the bus may be indirect, but it has a direct causal chain of connections to the actual bus out there.
Not necessarily. You are assuming there is an "actual" bus out there (instead of a possible "hallucinated" bus). We have no way of knowing the cause of our mental impressions.
by wolfhnd on April 22nd, 2018, 3:31 am
A bus that we do not step in front of is an extremely low resolution concept of what a bus is. Only the people who design and maintain the bus really know what a bus is at a relatively high resolution. Even then the designer doesn't really know the bus on the street because a bus is not just a collection of parts but takes it's meaning from an even more complex social and physical environment.
If you're a realist you assume that the bus can in theory be defined down to it's subatomic particles and a high resolution image of what it is can be created. The problem is that human perspective such an approach strips meaning from the image.
The other problem is that the kind of truth that a purely scientific approach provides tends to confuse the thing itself with it's mathematical model. The kind of absolutism that math provides is always subjective first because the parameters are always finite but the environment from our perspective is practically infinite and second because the model is an approximation even if 2+2 is always 4. A reductionist approach is a practical necessity that doesn't satisfy the evolutionary imperative for meaning.
The old view that everything can be reduced to cause and effect is itself challenged by the accepted view that determinism itself breaks down at tiny scales. Myself I'm not bothered by the indeterminate because I'm a pragmatist and close enough seems to satisfy practical solutions, scientific issues and philosophical questions. The philosophers goal is to determine what constitutes close enough to preserve life and meaning.
mitchellmckain wrote: If you are not acting according to your desire then this is an example of actions without free will.
If you act according to your desires, then you are it's slave. There is no free-will in slavery.
We don't control our desires. Our desires control us.
by DragonFly on April 22nd, 2018, 10:40 am
“This distinction between subject and object is not just an interesting oddity. It begins at the level of physics in the distinction between the probability inherent in symbolic measurements and the certainty of material laws. The distinction is later exemplified in the difference between a genotype, the sequence of nucleotide symbols that make up an organism’s DNA, and phenotype, its actual physical structure that those symbols prescribe. It travels with us up the evolutionary layers to the distinction between the mind and the brain.”
“These concepts will help us see how neural circuits are structures with a double life: they carry symbolic information, which is subject to arbitrary rules, yet they possess a material structure that is subject to the laws of physics.”
Excerpt From: Michael S. Gazzaniga. “The Consciousness Instinct.” iBooks. https://itunes.apple.com/us/book/the-co ... 3607?mt=11
by Neri on April 22nd, 2018, 11:13 am
On this topic, I should like to associate myself with the views of Mitch and BIV and will only add s few additional comments.
The question is not whether our experience is equivalent in every way to what lies outside of us, for such a thing is impossible.
[A perception cannot be exactly the same as a material object, for the former depends upon a sentient being for its existence, whereas the latter does not. Further, it is impossible to know everything that may be predicated of any material object by merely perceiving it.]
The real question is: Do sense impressions correspond to material objects in such a way that they are effective in preserving us from dangers that lie outside of us?
This question veritably answers itself. Only a madman would deny the evidence of his own senses.
It is essential to understand that the correspondence of which I speak depends on the reality of motion [from which we derive the ideas of time and space].
To keep ourselves safe, it is necessary that we have the ability to know when a material object is moving closer or further from us and to be able to recognize an object as a danger. This, the senses give us, for perceptions like all other experiences are memories [are preserved over time].
An object is recognized as a danger through prior sensory experiences preserved as long-term memories.
In order to be recognized and remembered as a danger, a material object must have the power to produce a particular human experience of it.
That power is part of the nature of the object and is thus truly reflected in the perception of it—even though there may be more to the object than its power to yield a human perception.
To the reasonable mind, the above comments may properly be seen as statements of the obvious. The curious fact, however, is that a whole school of western philosophy has labored mightily to deny the obvious.
I agree; I'm only delving into the inner experience to see how it works and what may become of that.
by TheVat on April 22nd, 2018, 11:57 am
RJG, this tablet ate the quoted part of your post and somehow hid the submit button, so sorry about the missing comment....
No, I was not assuming the in-the-moment knowledge, but rather that facts about buses are physically verifiable when science is applied. It is not difficult to verify that I was neither dreaming nor hallucinating. We are saved from solipsism by the multiplicity of observers and their reports. We can open a book and read complex prose (something that can't be done in dreams) that reveals areas of knowledge utterly unknown to us and beyond our previous experiences. We have senses enhanced by instruments that can show us photons leaving the photosphere of the sun and bouncing off solid objects like buses in particular and regular patterns, etc. Inner phenomenal reality and external reality are seamlessly connected and interacting - it is only big cranium apes like us who erect a wall of demarcation between them. Or drugs or pathological conditions that disrupt the causal connections.
To say that sensory data is incomplete is not equivalent to saying that it is deceptive. We are deceived only if we imagine that our impressions are complete. Our brains are engineered to find relevant data, not complete data. ("engineered" probably needs quotes)
by TheVat on April 22nd, 2018, 12:00 pm
Had to use Quick Reply window to post the above. Anyone else losing the submit button after Full Editor has been open for a couple minutes?? I will try to make sure this doesn't happen to anyone.
by DragonFly on April 22nd, 2018, 1:58 pm
What else, for now:
“Finally, affective consciousness—emotionally positive and negative feelings—has its own brain circuits, it does not require isomorphic mapping, and it may be experienced as mental states rather than mental images (figure 2.5B; chapters 7 and 8). Thus, isomorphic maps are only one part of the creation and evolution of subjectivity and “something it is like to be”; many other special and general features (table 2.1) are required to create sensory consciousness and ontological subjectivity.”
“Consciousness-associated attention has several subtypes, including bottom-up (exogenous) versus top-down (endogenous) attention.48 Bottom-up attention is driven by the importance of the incoming stimuli and leads to the animal orienting to things that happen suddenly in the environment. Top-down attention, on the other hand, involves proactive anticipation, maintaining attention by concentration and focusing on goals.
Excerpt From: Todd E. Feinberg. “The Ancient Origins of Consciousness.” iBooks. https://itunes.apple.com/us/book/the-an ... 6953?mt=11
by RJG on April 22nd, 2018, 2:58 pm
Neri wrote: The real question is: Do sense impressions correspond to material objects in such a way that they are effective in preserving us from dangers that lie outside of us?
Firstly, we are not consciously aware of the actual causers (the supposed 'real' objects themselves) of these "sense impressions". We are only consciously aware of the actual "sense impressions" (i.e. the actual physical bodily reactions; experiences) themselves, ...and of course this is only after they occur (after they impact our body).
Secondly, we all assume that these "sense impressions" are the result of something 'real' out-there. Whether from a misfiring (hallucinating) brain, or from sensory signals emanating from a real object itself, it is still nonetheless 'real'. We all assume these "sense impressions" are the automatic reaction/response from some 'real' stimuli.
Thirdly, what "preserves us from danger" is NOT the conscious awareness of our sense impressions, but instead, it is the body's automatic RESPONSE to this danger (STIMULI) that "preserves us from danger", ...and not the conscious awareness of said response.
Fourthly, if the body auto-responds in a particular way then the likelihood of survivability is enhanced, and if the response is otherwise then it may be diminished.
Neri wrote: To keep ourselves safe, it is necessary that we have the ability to know when a material object is moving closer or further from us and to be able to recognize an object as a danger.
Not so. It is NOT the "knowing" or "recognizing" of the dangerous moving object that "keep ourselves safe". It is the body's automatic reaction/response to this moving object (stimuli) that "keep ourselves safe".
Remember, we can only be conscious of (i.e. know or recognize) actual bodily reactions/events, and not of other 'external' events. We don't consciously know/recognize how we responded until 'after' we (our body) responds. Our consciousness (knowing/recognizing) is wholly dependent upon our bodily reactions/responses, ...NOT the other way around.
Without something (e.g. sense impressions; bodily reactions) to be conscious of, then there is no consciousness (...no knowing or recognizing!).
Braininvat wrote: No, I was not assuming the in-the-moment knowledge, but rather that facts about buses are physically verifiable when science is applied.
Can't one hallucinate they are doing verifiable science?
Braininvat wrote: It is not difficult to verify that I was neither dreaming nor hallucinating...
...We can open a book and read complex prose (something that can't be done in dreams) that reveals areas of knowledge utterly unknown to us and beyond our previous experiences.
I'm not so confident/convinced of this. Have you seen the movie "A Beautiful Mind"? ...or have had family members with mental issues?
Braininvat wrote: We are saved from solipsism by the multiplicity of observers and their reports...
...We have senses enhanced by instruments that can show us photons leaving the photosphere of the sun and bouncing off solid objects like buses in particular and regular patterns, etc. Inner phenomenal reality and external reality are seamlessly connected and interacting - it is only big cranium apes like us who erect a wall of demarcation between them.
Isn't it possible to hallucinate these "multiple observers and their reports", ...and their "instrumentation" results?
Other than by 'blind faith', how can one really know that their perceptions are the 'true' representations of reality? ...I think it is not possible, ...I think we can only 'hope' that our personal view is of reality itself.
We can't perceive beyond our current ("suspect") perceptions.
How about that the 'knowing' is done by the brain that built the qualia showing the danger, for the brain thus already has the information available, in whatever form it uses to 'know'.
by TheVat on April 22nd, 2018, 4:50 pm
Isnt it possible to hallucinate these "multiple observers and their reports", ...and their "instrumentation" results?
- RJG
For me, that level of arch-skepticism is an epistemic doldrums zone. As David Hume famously observed about a conference on epistemology on Europe, "on finishing their discussion, the participants all departed by means of the doors. " (or similar; don't have exact quote handy ATM)
Whenever I write numbers in dreams they change as I write them and when I read it often fills up with garbage.
I've been lucidly inspecting my dreams. Some flaws are that bugs appear as triangles. Yesterday, I was going to eat in a cafeteria but you had to bring your own plates from home, so I already suspected something. I did find a pile of plates and took one, but I was soon somehow holding the whole pile, which then happened again and again, so, as in these stuck cases, I clench my whole body and that wakes me up. Other times, for lesser problems or to be sure of the dream state, I am able to open one eye and see the window and then go back to the dream. And sometimes the dream perfectly shows an entire scene in fabulous detail, such as a mid summer dusk, with even those whirly things floating through the air.
by mitchellmckain on April 23rd, 2018, 4:00 am
DragonFly » April 20th, 2018, 2:14 pm wrote: The model seems to be super real,
To me, that seems like a completely nonsensical thing to say to. "Seems real" compared to what? By the only standard we have, it is real, for it is the only standard which we have for making such a measurement. What you say is practically Platonic in the implied imagination of some greater reality somewhere else.
DragonFly » April 20th, 2018, 2:14 pm wrote: So, in sum so far, direct realism is an illusion, but is a very useful illusion, which we might better call a fine representation by the model, since the word 'illusion' is more about what's wrong as not really showing its object as substantial and really being behind it.
In philosophy of mind, naïve realism, also known as direct realism or common sense realism, is the idea that the senses provide us with direct awareness of objects as they really are. Objects obey the laws of physics and retain all their properties whether or not there is anyone to observe them.[1] They are composed of matter, occupy space and have properties, such as size, shape, texture, smell, taste and colour, that are usually perceived correctly.
In contrast, some forms of idealism claim that no world exists apart from mind-dependent ideas, and some forms of skepticism say we cannot trust our senses. Naïve realism is known as direct as against indirect or representative realism when its arguments are developed to counter the latter position, also known as epistemological dualism;[2] that our conscious experience is not of the real world but of an internal representation of the world.
There is nothing of illusion in direct realism. There is only the foolish rhetoric implying that "direct" in "direct realism" means absorbing the actual object rather than data from those objects. The data IS from actual objects and does provide awareness of actual objects obeying the laws of physics. The implication that anyone is confusing the awareness of an object with the object itself is just ridiculous. Instead you can say that the process of perception is what makes illusions possible. Because we are interpreting data, then it is entirely possible for similar data to suggest something other than what is the case, such as the impression of water from a mirage -- at least until we learn the distinctions.
When you consider the philosophical alternative, plastering the word "illusion" on direct realism implies that idealism is the reality beneath it. And that is an implication I would refute most heatedly. As for indirect realism, as I explained above, I think it is carrying things too far to say that we are experiencing the model instead of reality. Instead I would limits the validity only to the idea that we use a model in the process of perception. In that sense you could say my position is in-between that of direct realism and indirect realism.
DragonFly » April 20th, 2018, 2:14 pm wrote: Dreams, then, would be better called illusions; further they demonstrate the power of the structure of the model. When we inspects objects in dreams they look just as good as when we see them awake, although backgrounds come and go inconsistently and there are narrative gaps (all of a sudden we are driving a vehicle without ever having gotten into it, plus the controls are a mystery.)
I think it is unwise to make generalizations about dreams in such a manner. That is not my experience of dreams at all. My impression is that dreams consist of a mental (linguistic) narrative using memory to fill in the details. The only uniqueness in such experiences are the irrational combinations and discontinuities. Because of this, I have no sense this is anywhere near as good as when we see things awake, when we are interpreting fresh new sensory data. For me, this imparts a considerably dim character to the dream experience.
For me dreams are rather comparable to when I envision scenarios for my books. I see them in my mind's eye but not in a manner that is remotely comparable to my experience of reality through the senses. I am not suggesting that everyone experiences dreams this way. On the contrary, the phenomenon of schizophrenia suggests to me that some people can see things in their minds eye with the same vividness of the senses, for otherwise, how can they not know the difference?
DragonFly » April 20th, 2018, 2:14 pm wrote: Another illusion is the feeling of having all of the information in a qualia scene as instantly available, as well as feeling that it is all happening in real time, plus that one is directing it all right then and there.
Calling this illusion is a gross exaggeration. At most it is simply approximation.
by DragonFly on April 23rd, 2018, 11:37 am
'Imagination' (say, of things to happen in a book,) uses the model, too, but the scenes are about 90% transparent, probably so they don't get in the way of the real scenes about.
by DragonFly on April 23rd, 2018, 2:51 pm
Boggling idea of the Subject/Object Cut…
“The Schnitt and the Origins of Life
Physicists refer to the inescapable separation of a subject (the measurer) from an object (the measured) as die Schnitt. (What a great word!) Pattee calls “this unavoidable conceptual separation of the knower and the known, or the symbolic record of an event and the event itself, the epistemic cut.
There is a world of actions that exists on the side of the observer with the observer’s record of an event. There is also a separate world of actions on the side of the event itself. This sounds confusing, but think of the explanatory gap between your subjective experience of an event (I had so much fun body-surfing) and the event itself (A person went swimming in the ocean). Alternately, you can think of the explanatory gap between the same subjective experience (This is fun) and the goings-on within the brain (Some neurons fired while a person was swimming in the ocean). These are all just versions of the subject/object complementarity seen in physics. Here is the really wild part: Who’s measuring the events? To examine the difference between a person’s subjective experience and objective reality, do we need a scientist? Who’s measuring the scientist?
Pattee points out that neither classical nor quantum theory formally defines the subject, that is, the agent or observer that determines what is measured. Physics, therefore, does not say where to make the epistemic cut.4 Quantum measurement does not need a physicist-observer, however. Pattee argues that other things can perform quantum measurements. For example, enzymes (such as DNA polymerases) can act as measurement agents, performing quantum measurement during a cell’s replication process. No human observer is needed.
For Schrödinger, the joke was on us. He was trying to point out that there is something missing in our understanding. Pattee got it (in high school) and buckled down to attack the problem. Where should we put the cut, the gap, die Schnitt? With his consuming interest in the origins of life, he came to realize that human consciousness was way too high a layer in the architecture of all living organisms to put the epistemic cut between the observer and the observed, between the subjective experience and the event itself. There are umpteen layers between subatomic particles and human brains. There are plenty of layers between subatomic particles and brains in general (cat or mouse or fly or worm). Putting the major epistemic cut that high led to the nonsense of Schrödinger’s cat existing as a quantum system. There was no pussyfooting around for Pattee: “I have taken the point of view that the question of what constitutes an observation in quantum mechanics must arise long before we reach the complexity of the brain. In fact, I propose … that the gap between quantum and classical behavior is inherent in the distinction between inanimate and living matter.
There you have it. Pattee proposes that the gap resulted from a process equivalent to quantum measurement that began with self-replication at the origin of life with the cell as the simplest agent. The epistemic cut, the subject/object cut, the mind/matter cut, all are rooted to that original cut at the origin of life. The gap between subjective feeling and objective neural firings didn’t come about with the appearance of brains. It was already there when the first cell started living. Two complementary modes of behavior, two levels of description are inherent in life itself, were present at the origin of life, have been conserved by evolution, and continue to be necessary for differentiating subjective experience from the event itself. That is a mind-boggling idea.”
by mitchellmckain on April 24th, 2018, 1:06 pm
The "like" on the above post is not to be construed as complete agreement with conclusions, but rather more with an abundant approval of the questions and issues raised.
DragonFly » April 23rd, 2018, 1:51 pm wrote: Boggling idea of the Subject/Object Cut…
Absolute agreement here! I have always considered quantum interpretations linking quantum decoherence with human consciousness to be absurd -- with one exception. The one interpretation which makes this link and is not absurd is the Everett Interpretation. THOUGH, I would not count this in its favor! Furthermore, it isn't actually necessary to the Everett Interpretation, for it is quite possible to shift the locus of the decoherence in this interpetation to agree with other interpretations.
DragonFly » April 23rd, 2018, 1:51 pm wrote: For Schrödinger, the joke was on us. He was trying to point out that there is something missing in our understanding.
Agreed! That is how I have always understood the Schrödinger cat thought experiment. It was not to seriously propose the existence of dead-alive cats but to highlight the absurdities which come from the way that quantum physics was usually being presented.
DragonFly » April 23rd, 2018, 1:51 pm wrote: Pattee got it (in high school) and buckled down to attack the problem. Where should we put the cut, the gap, die Schnitt? With his consuming interest in the origins of life, he came to realize that human consciousness was way too high a layer in the architecture of all living organisms to put the epistemic cut between the observer and the observed, between the subjective experience and the event itself. There are umpteen layers between subatomic particles and human brains. There are plenty of layers between subatomic particles and brains in general (cat or mouse or fly or worm). Putting the major epistemic cut that high led to the nonsense of Schrödinger’s cat existing as a quantum system. There was no pussyfooting around for Pattee: “I have taken the point of view that the question of what constitutes an observation in quantum mechanics must arise long before we reach the complexity of the brain. In fact, I propose … that the gap between quantum and classical behavior is inherent in the distinction between inanimate and living matter.
And here is where we have a disagreement. While I totally appreciate pushing many things such as consciousness, learning, and creativity down to the lowest levels of the divide between the living and nonliving, I personally do not believe that this has anything whatsoever to do with the quantum measurement problem.
DragonFly » April 23rd, 2018, 1:51 pm wrote: There you have it. Pattee proposes that the gap resulted from a process equivalent to quantum measurement that began with self-replication at the origin of life with the cell as the simplest agent.
Furthermore, I think this focus on self-replication as the divide between the living and non-living may be a little behind the times. Metabolism first theories of abiogenesis and the study of prebiotic evolution strongly suggest that key features of the life process are located way before the development of self-replicating molecules such as RNA and DNA. On the other hand, perhaps this idea of self-replication can be extended to processes in prebiotic evolution in which there is a catalysis of chemical reactions which replenish the chemical components. After all, self-maintenance is a definitive feature of the life process and would suggest that any life process must include the regeneration of its components.
DragonFly » April 23rd, 2018, 1:51 pm wrote: The epistemic cut, the subject/object cut, the mind/matter cut, all are rooted to that original cut at the origin of life. The gap between subjective feeling and objective neural firings didn’t come about with the appearance of brains. It was already there when the first cell started living. Two complementary modes of behavior, two levels of description are inherent in life itself, were present at the origin of life, have been conserved by evolution, and continue to be necessary for differentiating subjective experience from the event itself. That is a mind-boggling idea.”
This would only work if you can make a logical connection with this definitive feature of life in a process of self maintenance. I have already suggested a connection between this and consciousness by pointing out that self maintenance requires some kind of awareness of self, both as it is and as it "should be." Without some sort of "should be" in some form there can be no self-maintenance. It should be noted that there are numerous quantitative features to this, such as the clarity with which this goal of self as it "should be" is represented, the determination/flexibility with which it is adhered to (or in other words the range of circumstances which can be handled in holding to this goal).
by TheVat on April 24th, 2018, 1:52 pm
It seems likely a paramecium does no representing to a self, and is pretty much a cellular machine lacking sentience.
A paramecium is not full of Schnitt. It is not measuring or having goals or anything else. It is an automaton. To think otherwise would be to invite some sort of Bergsonian "elan vital" or other dualistic essence.
The problem with the term "observation" is that it's prejudicial in common parlance. It implies some sort of sentient observer. It implies a subjective aspect. So a more neutral term would be needed when a microbe registers a chance in its environment and contracts or expands or fires up the cilia or dumps the vacuoles or whatever. Or when a Bose Einstein condensate loses its coherence in a wet noisy puddle.
Braininvat » April 24th, 2018, 12:52 pm wrote: It seems likely a paramecium does no representing to a self, and is pretty much a cellular machine lacking sentience.
But it is not a machine for the simple reason that it is not a product of design. The only reasons for which it does things are its own reasons. It is a product of self organization, and the learning process which is evolution.
I certainly agree with the term "biological machinery," which is to say that there is no reason to distinguish things simply on the basis that one uses the interactions of organic chemistry. Thus I think the locus of difference between the living organism and the machine has to do with origins whether it is by design or by learning, evolution, and self-organization.
Braininvat » April 24th, 2018, 12:52 pm wrote: The problem with the term "observation" is that it's prejudicial in common parlance. It implies some sort of sentient observer. It implies a subjective aspect. So a more neutral term would be needed when a microbe registers a chance in its environment and contracts or expands or fires up the cilia or dumps the vacuoles or whatever.
But the problem with this is that the prejudice in language goes both ways with the presumption of an uncrossable divide between the sentient and the non-sentient, when all the evidence points to a continuum going all the way from the non-living to the living to the sentient. And this is not a linear continuum but a rapidly branching tree with many capabilities somewhat arbitrarily (or rather anthropomorphically) lumped into this term "sentience."
|
[
"It becomes a bit less so that what's off to the left or right can be better noted."
] | 10,325
|
multifieldqa_en
|
en
| null |
ae5a3edc1bc76fee6fa1aa6557e83bc3cfea0c190763ecce
|
What is the group's request to the Connecticut DEEP Commissioner?
|
Outdoors February 19, 2017
You are here: Home / Archives for Departments / OutdoorsActor Sam Waterson Hosts PBS Documentary on Lyme Land Trust January 14, 2017 by admin Leave a Comment Jack Tiffany, owner of Tiffany Farms on Rte. 156 and an earlier pioneer in Lyme land preservation, is interviewed by PBS “Visionaries” documentary producers.
Filed Under: Lyme, Outdoors Application Deadline for Environmental Leadership Scholarship is Feb. 1 January 8, 2017 by admin Leave a Comment Applications are now being accepted for the Virginia R. Rollefson Environmental Leadership Scholarship, a $1,000 award to recognize a high school student who has demonstrated leadership and initiative in promoting conservation, preservation, restoration, or environmental education.
Filed Under: Lyme, News, Old Lyme, Outdoors, Top Story Preserves in Lyme Now Closed for Hunting During Weekdays November 17, 2016 by admin Leave a Comment Starting yesterday, Wednesday, Nov. 16, the following Preserves in Lyme will be closed Monday through Friday until Tuesday, Dec. 20, 2016, except to licensed hunters with valid consent forms from the Town of Lyme Open Space Coordinator:
Banningwood Preserve
Beebe Preserve
Chestnut Hill Preserve
Eno Preserve
Hand Smith
Honey Hill Preserve
Jewett Preserve
Mount Archer Woods
Pickwick’s Preserve
Plimpton Preserve
Slawson Preserve
These preserves, owned by the Town of Lyme or the Lyme Land Conservation Trust, will be open on Saturdays and Sundays during this hunting period as no hunting is allowed on weekends.
The hunting program is fully subscribed.
For more information on the hunting program in Lyme, visit http://www.lymelandtrust.org/stewardship/hunting-program/
Filed Under: Lyme, Outdoors, Top Story Town of Old Lyme Offers Part-time Land Steward Opportunity October 11, 2016 by admin Leave a Comment The Town of Old Lyme is seeking a part-time individual to maintain and manage the trail systems on its major preserves. Keeping trails cleared, maintaining markers, kiosks, entrances, parking areas, and managing for wildlife and other natural resources are the priorities.
For more information, visit the job posting on the home page of the Town’s web page at http://www.oldlyme-ct.gov/Pages/index.
To learn about the Open Space Commission and the properties it manages, visit http://www.oldlyme-ct.gov/Pages/OldLymeCT_Bcomm/open_space
Filed Under: Old Lyme, Outdoors, Top Story CT Fund for the Environment Annual Meeting to be Held Sunday in Hartford September 22, 2016 by admin Leave a Comment Engaging and educating communities for preservation of the Long Island Sound tidal estuary
Save the Sound is celebrating National Estuaries Week Sept. 17 – 24 with a series of interactive and educational events throughout the Long Island Sound region. This annual celebration of estuaries—the vital coastal zones where freshwater rivers meet salty seas—is sponsored by Restore America’s Estuaries and its member organizations including Save the Sound. This year’s events call attention to the many benefits of thriving coastal ecosystems, including how estuary conservation efforts support our quality of life and economic well-being.
“The Long Island Sound estuary is not only where freshwater rivers meet the saltwater Atlantic, but where wildlife habitat meets beaches and boating, and where modern industry meets traditional oystering,” said Curt Johnson, executive director of Save the Sound, which is a bi-state program of Connecticut Fund for the Environment (CFE).
Johnson continued, “All over the country, estuaries are the lifeblood of coastal economies. From serving as natural buffers to protect our coastlines from storms to providing unique habitat for countless birds, fish, and wildlife, estuaries deserve our protection and our thanks.”
Save the Sound is celebrating estuaries with a number of events this week, including the release of a new video, a presentation on Plum Island at the Old Lyme-Phoebe Griffin Noyes Library and the CFE/Save the Sound annual meeting:
Aerial view of Plum Island lighthouse. (From Preserve Plum Island website)
Chris Cryder, Special Projects Coordinator for Save the Sound and Outreach Coordinator for the Preserve Plum Island Coalition, will host Preserving Plum Island for Future Generations, a special presentation on the importance of conserving the wildlife habitats and historic buildings of Plum Island, New York.
Plum Island flanks Plum Gut in the Long Island Sound estuary’s eastern end, where fast-moving tides create highly productive fishing grounds. The talk is part of a multi-week series featuring photographs and paintings of Plum Island, and lectures on its ecology, geology, and history.
Old Lyme-Phoebe Griffin Noyes Library, 2 Library Lane, Old Lyme, Connecticut
Register by calling the library at 860-434-1684.
The Annual Meeting of Connecticut Fund for the Environment and its bi-state program Save the Sound will take place in the Planet Earth exhibit at the Connecticut Science Center. The event is open to the public with registration, and will feature a keynote address from Curt Spalding, administrator of EPA’s New England Region. Spalding is a leader in combatting nitrogen pollution and in climate change resilience planning efforts for New England.
Connecticut Science Center, 250 Columbus Blvd, Hartford, Connecticut
4 – 7 p.m
RSVP to mlemere@ctenvironment.org
To celebrate the contributions of volunteers to restoring the Long Island Sound estuary, Save the Sound has released a new video of a habitat restoration planting at Hyde Pond in Mystic. Following removal of the old Hyde Pond dam and opening 4.1 miles of stream habitat for migratory fish last winter (see time lapse video here), in May about 30 volunteers planted native vegetation along the Whitford Brook stream bank, under the direction of U.S. Fish and Wildlife Service, CT DEEP’s Fisheries division, and Save the Sound staff.
Find more information on the project’s benefits and funders here.
Look for the planting video on Save the Sound’s website, YouTube, Facebook, and Twitter accounts.
Filed Under: Old Lyme, Outdoors 750+ Volunteers Clean Beaches from Norwalk to New London Including Griswold Point in Old Lyme September 17, 2016 by admin Leave a Comment Kendall Perkins displays a skull she found during Save The Sound‘s Coastal Clean-up Day held yesterday at White Sand Beach.
Save the Sound, a bi-state program of Connecticut Fund for the environment, organized 31 cleanups across Connecticut’s shoreline this weekend. The efforts are part of International Coastal Cleanup, which brings together hundreds of thousands of people each year to remove plastic bags, broken glass, cigarette butts, and other trash from the world’s shores and waterways. One of the areas included in the cleanup effort was from White Sand Beach to the tip of Griswold Point in Old Lyme.
The event was founded by Ocean Conservancy in 1985, and Save the Sound has served as the official Connecticut coordinator for the last 14 years.
“We didn’t plan it this way, but I can’t imagine a better way to celebrate the 31st anniversary of International Coastal Cleanup Day than with 31 cleanups!” said Chris Cryder, special projects coordinator for Save the Sound. “The cleanup just keeps growing, in Connecticut and worldwide. We have some terrific new and returning partners this year, including the SECONN Divers, folks from the U.S. District Court, multiple National Charity League chapters, and many more.”
Cryder continued, “The diversity of the groups involved really reflects the truth that ocean health affects all of us. Clean beaches and oceans are safer for beachgoers and boaters, they’re healthier for wildlife that aren’t eating plastic or getting tangled up in trash, and they’re economic powerhouses for the fishing and tourism industries.”
The cleanups are co-hosted by a wide array of local partners including high schools, youth groups, and scout troops; churches; boaters and divers; watershed associations, park stewards, and land trusts. Twenty-eight cleanups will be held Saturday, with three more on Sunday and others through mid-October, for a total of 70 cleanups statewide.
Based on the estimates of cleanup captains, between 750 and 900 volunteers were expected to pitch in on Saturday alone. Last year, a total of 1,512 volunteers participated in Save the Sound cleanups throughout the fall. They collected more than three tons of litter and debris from 58 sites on Connecticut beaches, marshes, and riverbanks.
Over the event’s three-decade history, 11.5 million volunteers have collected 210 million pounds of trash worldwide. Every piece of trash volunteers find is tracked, reported to Save the Sound, and included in Ocean Conservancy’s annual index of global marine debris. The data is used to track trends in litter and devise policies to stop it at its source.
Filed Under: Old Lyme, Outdoors, Top Story Stonewell Farm Hosts Two-Day Workshop on Dry Stone Wall Building, Sept. 24, 25 September 13, 2016 by admin Leave a Comment Andrew Pighill’s work includes outdoor kitchens, wine cellars, fire-pits, fireplaces and garden features that include follies and other whimsical structures in stone.
KILLINGWORTH — On Sept. 24 and 25, from 9 a.m. to 4 p.m. daily, Andrew Pighills, master stone mason, will teach a two-day, weekend long workshop on the art of dry stone wall building at Stonewell Farm in Killingworth, CT.
Participants will learn the basic principles of wall building, from establishing foundations, to the methods of dry laid (sometimes called dry-stacked) construction and ‘hearting’ the wall. This hands-on workshop will address not only the structure and principles behind wall building but also the aesthetic considerations of balance and proportion.
This workshop expresses Pighill’s commitment to preserve New England’s heritage and promote and cultivate the dry stone wall building skills that will ensure the preservation of our vernacular landscape.
This workshop is open to participants, 18 years of age or older, of all levels of experience. Note the workshop is limited to 16 participants, and spaces fill up quickly.
You must pre-register to attend the workshop. The price for the workshop is $350 per person. Stonewell Farm is located at 39 Beckwith Rd., Killingworth CT 06419
If you have any questions or to register for the workshop, contact the Workshop Administrator Michelle Becker at 860-322-0060 or mb@mbeckerco.com
At the end of the day on Saturday you’ll be hungry, tired and ready for some rest and relaxation, so the wood-fired Stone pizza oven will be fired up and beer, wine and Pizza Rustica will be served.
About the instructor: Born in Yorkshire, England, Andrew Pighills is an accomplished stone artisan, gardener and horticulturist. He received his formal horticulture training with The Royal Horticultural Society and has spent 40+ years creating gardens and building dry stone walls in his native England in and around the spectacular Yorkshire Dales and the English Lake District. Today, Pighills is one of a small, but dedicated group of US-based, certified, professional members of The Dry Stone Walling Association (DSWA) of Great Britain. Having moved to the United States more than 10 years ago, he now continues this venerable craft here in the US, building dry stone walls, stone structures and creating gardens throughout New England and beyond.
His particular technique of building walls adheres to the ancient methods of generations of dry stone wallers in his native Yorkshire Dales. Pighills’ commitment to preserving the integrity and endurance of this traditional building art has earned him a devoted list of private and public clients here and abroad including the English National Trust, the English National Parks, and the Duke of Devonshire estates. His stone work has been featured on British and American television, in Charles McCraven’s book The Stone Primer, and Jeffrey Matz’s Midcentury Houses Today, A study of residential modernism in New Canaan Connecticut. He has featured in the N Y Times, on Martha Stewart Living radio, and in the Graham Deneen film short “Dry Stone”, as well as various media outlets both here and in the UK, including an article in the Jan/Feb 2015 issue of Yankee Magazine.
Pighills is a DSWA fully qualified dry stone walling instructor. In addition to building in stone and creating gardens, Pighills teaches dry stone wall building workshops in and around New England. He is a frequent lecturer on the art of dry stone walling, and how traditional UK walling styles compare to those found in New England. His blog, Heave and Hoe; A Day in the Life of a Dry Stone Waller and Gardener, provides more information about Pighills.
For more information, visit www.englishgardensandlandscaping.com
Filed Under: Outdoors CT Port Authority Chair Tells Lower CT River Local Officials, “We’re All on One Team” August 27, 2016 by Olwen Logan 2 Comments Enjoying a boat ride on the Connecticut River, but still finding time for discussions, are (from left to right) Chester First Selectwoman Lauren Gister, Old Lyme First Selectwoman and Connecticut Port Authority (CPA) board member Bonnie Reemsnyder, Essex First Selectman Norm Needleman, CPA Chairman Scott Bates and Deep River First Selectman Angus McDonald, Jr.
Filed Under: Chester, Deep River, Essex, News, Old Lyme, Outdoors, Politics, Top Story House Approves Courtney-Sponsored Amendment Restricting Sale of Plum Island July 10, 2016 by admin 2 Comments Representative Joe Courtney
Local Congressional Representative Joe Courtney (CT-02) announced Thursday (July 7) that a bipartisan amendment he had led, along with Representatives Rosa DeLauro (CT-03), Lee Zeldin (R-NY) and Peter King (R-NY), to prohibit the sale of Plum Island was passed by the House of Representatives.
The amendment, which will prohibit the General Services Administration (GSA) from using any of its operational funding to process or complete a sale of Plum Island, was made to the Financial Services and General Government Appropriations Act of 2017..
In a joint statement, the Representatives said, “Our amendment passed today is a big step toward permanently protecting Plum Island as a natural area. Plum Island is a scenic and biological treasure located right in the middle of Long Island Sound. It is home to a rich assortment of rare plant and animal species that need to be walled off from human interference.”
The statement continued, “Nearly everyone involved in this issue agrees that it should be preserved as a natural sanctuary – not sold off to the highest bidder for development.” Presumptive Republican Presidential nominee Donald Trump had shown interest in the property at one time.
In 2008, the federal government announced plans to close the research facility on Plum Island and relocate to Manhattan, Kansas. Current law states that Plum Island must be sold publicly to help finance the new research facility.
Aerial view of Plum Island.
The lawmakers joint statement explained, “The amendment will prevent the federal agency in charge of the island from moving forward with a sale by prohibiting it from using any of its operational funding provided by Congress for that purpose,” concluding, ” This will not be the end of the fight to preserve Plum Island, but this will provide us with more time to find a permanent solution for protecting the Island for generations to come.”
For several years, members from both sides of Long Island Sound have been working in a bipartisan manner to delay and, ultimately, repeal the mandated sale of this ecological treasure. Earlier this year, the representatives, along with the whole Connecticut delegation, cosponsored legislation that passed the House unanimously to delay the sale of Plum Island.
Filed Under: Outdoors July 1 Update: Aquatic Treatment Planned for Rogers Lake, July 5 July 1, 2016 by admin Leave a Comment We received this updated information from the Old Lyme Selectman’s office at 11:05 a.m. this morning:
Filed Under: Lyme, Old Lyme, Outdoors, Town Hall They’re Everywhere! All About Gypsy Moth Caterpillars — Advice from CT Agricultural Experiment Station June 2, 2016 by Adina Ripin Leave a Comment Gypsy moth caterpillars – photo by Peter Trenchard, CAES.
The potential for gypsy moth outbreak exists every year in our community.
Dr. Kirby Stafford III, head of the Department of Entomology at the Connecticut Agricultural Experiment Station, has written a fact sheet on the gypsy moth available on the CAES website. The following information is from this fact sheet.
The gypsy moth, Lymantria dispar, was introduced into the US (Massachusetts) by Etienne Leopold Trouvelot in about 1860. The escaped larvae led to small outbreaks in the area in 1882, increasing rapidly. It was first detected in Connecticut in 1905. By 1952, it had spread to 169 towns. In 1981, 1.5 million acres were defoliated in Connecticut. During the outbreak of 1989, CAES scientists discovered that an entomopathogenic fungus, Entomophaga maimaiga, was killing the caterpillars. Since then the fungus has been the most important agent suppressing gypsy moth activity.
The fungus, however, cannot prevent all outbreaks and hotspots have been reported in some areas, in 2005-06 and again in 2015.
The life cycle of the gypsy moth is one generation a year. Caterpillars hatch from buff-colored egg masses in late April to early May. An egg mass may contain 100 to more than 1000 eggs and are laid in several layers. The caterpillars (larvae) hatch a few days later and ascend the host trees and begin to feed on new leaves. The young caterpillars, buff to black-colored, lay down silk safety lines as they crawl and, as they drop from branches on these threads, they may be picked up on the wind and spread.
There are four or five larval stages (instars) each lasting 4-10 days. Instars 1-3 remain in the trees. The fourth instar caterpillars, with distinctive double rows of blue and red spots, crawl up and down the tree trunks feeding mainly at night. They seek cool, shaded protective sites during the day, often on the ground. If the outbreak is dense, caterpillars may feed continuously and crawl at any time.
With the feeding completed late June to early July, caterpillars seek a protected place to pupate and transform into a moth in about 10-14 days. Male moths are brown and fly. Female moths are white and cannot fly despite having wings. They do not feed and live for only 6-10 days. After mating, the female will lay a single egg mass and die. The egg masses can be laid anywhere: trees, fence posts, brick/rock walls, outdoor furniture, cars, recreational vehicles, firewood. The egg masses are hard. The eggs will survive the winter and larvae hatch the following spring during late April through early May.
The impact of the gypsy moth can be extensive since the caterpillar will feed on a wide diversity of trees and shrubs. Oak trees are their preferred food. Other favored tree species include apple, birch, poplar and willow. If the infestation is heavy, they will also attack certain conifers and other less favored species. The feeding causes extensive defoliation.
Healthy trees can generally withstand one or two partial to one complete defoliation. Trees will regrow leaves before the end of the summer. Nonetheless, there can be die-back of branches. Older trees may become more vulnerable to stress after defoliation. Weakened trees can also be attacked by other organisms or lack energy reserves for winter dormancy and growth during the following spring. Three years of heavy defoliation may result in high oak mortality.
The gypsy moth caterpillars drop leaf fragments and frass (droppings) while feeding creating a mess for decks, patios, outdoor furniture, cars and driveways. Crawling caterpillars can be a nuisance and their hairs irritating. The egg masses can be transported by vehicles to areas where the moth is not yet established. Under state quarantine laws, the CAES inspects certain plant shipments destined to areas free of the gypsy moth, particularly for egg masses.
There are several ways to manage the gypsy moth: biological, physical and chemical.
Biologically, the major gypsy moth control agent has been the fungus E. maimaiga. This fungus can provide complete control of the gypsy moth but is dependent on early season moisture from rains in May and June to achieve effective infection rates and propagation of the fungus to other caterpillars. The dry spring of 2015 resulted in little or no apparent fungal inoculation or spread until it killed late-stage caterpillars in some areas of the state, after most defoliation.
Infected caterpillars hang vertically from the tree trunk, head down. Some die in an upside down “V” position, a characteristic of caterpillars killed by the less common gypsy moth nucleopolyhedrosis virus (NPV). This was not detected in caterpillars examined in 2015.
Physical controls include removing and destroying egg masses, which can be drowned in a soapy water and disposed of. Another method is to use burlap refuge/barrier bands wrapped around tree trunks so that migrating caterpillars will crawl into or under the folded burlap or be trapped by the sticky band.
There are a number of crop protection chemicals labeled for the control of gypsy moth on ornamental trees and shrubs. There are treatments for egg masses, larvae and adult moths. Detailed information about these chemical treatments is available in the CAES factsheet.
For complete information about the gypsy moth and its management, visit the CAES website and look for the fact sheet on gypsy moth.
Filed Under: News, Outdoors East Lyme Public Trust Invites Community to Celebrate Boardwalk Re-dedication May 25, 2016 by admin Leave a Comment On Saturday, May 28, at 11 a.m., the East Lyme Public Trust Foundation, in co-operation with East Lyme Parks and Recreation Department, will sponsor A Dream Fulfilled, the official re-dedication of the East Lyme Boardwalk. The re-dedication ceremony, which will be held on the Boardwalk, will feature keynote speaker, Sen. Paul Formica, former First Selectman of East Lyme.
Other speakers will include East Lyme First Selectman Mark Nickerson, Public Trust President Joe Legg, Public Trust Past-President Bob DeSanto, Public Trust Vice-President John Hoye, and Parks and Recreation Director Dave Putnam; all the speakers will recognize the many people who have helped made this dream a reality.
The East Lyme Public Trust Foundation would like to invite the general public to witness this historic occasion. In addition, the members would especially like to encourage the participation of the 200 people who dedicated benches and the innumerable people who sponsored plaques. They would also love to welcome all members of the Trust – past and present – and all those who originally helped make the Boardwalk a reality.
Participants should enter the Boardwalk at Hole-in-the Wall on Baptist Lane, Niantic. Then, there will be a short walk to the area of the monument where the ceremony will take place. At the entrance to Hole-in-the Wall, the Public Trust will have a display of historical information and memorabilia related to the construction and re-construction of the Boardwalk. Public Trust members, Pat and Jack Lewis will be on hand to host the exhibit titled Before and After and to welcome participants. After the ceremony, participants will have the opportunity to visit “their bench” and re-visit “their plaque.” During and after the dedication, music will be provided by Trust member, Bill Rinoski, who is a “D.J. for all occasions.” Rinoski will feature “Boardwalk-related” music and Oldies plus Top 40 selections. This historic occasion will be videotaped as a public service by Mike Rydene of Media Potions of East Lyme. High school volunteers will be on hand to greet participants and help with directions.
The organizing committee is chaired by Michelle Maitland. Her committee consists of Joe Legg, President of the East Lyme Public Trust, Carol Marelli, Bob and Polly DeSanto, June Hoye, and Kathie Cassidy.
Visit Facebook – East Lyme Public Trust Foundation – for more information on the re-dedication ceremony. For more information on the Boardwalk, explore this website.
Filed Under: Outdoors Lyme Land Trust Seeks to Preserve Whalebone Cove Headwaters May 8, 2016 by admin Leave a Comment Lyme Land Trust Preservation Vice President Don Gerber stands with Chairman Anthony Irving (kneeling) next to Whalebone Creek in the proposed Hawthorne Preserve in Hadlyme.
The Lyme Land Conservation Trust has announced a fund raising drive to protect 82 acres of ecologically strategic upland forest and swamp wildlife habitat in Hadlyme on the headwaters of Whalebone Cove, one of the freshwater tidal wetlands that comprises the internationally celebrated Connecticut River estuary complex.
The new proposed preserve is part of a forested landscape just south of Hadlyme Four Corners and Ferry Road (Rt. 148), and forms a large part of the watershed for Whalebone Creek, a key tributary feeding Whalebone Cove, most of which is a national wildlife refuge under the management of the US Fish & Wildlife Service.
The Land Trust said it hopes to name the new nature refuge in honor of William Hawthorne of Hadlyme, whose family has owned the property for several generations and who has agreed to sell the property to the Land Trust at a discount from its market value if the rest of the money necessary for the purchase can be raised by the Land Trust.
“This new wildlife preserve will represent a triple play for habitat conservation,” said Anthony Irving, chairman of the Land Trust’s Preservation Committee.
“First, it helps to protect the watershed feeding the fragile Whalebone Cove eco-system, which is listed as one of North America’s important freshwater tidal marshes in international treaties that cite the Connecticut River estuary as a wetland complex of global importance. Whalebone Creek, one of the primary streams feeding Whalebone Cove, originates from vernal pools and upland swamps just south of the Hawthorne tract on the Land Trust’s Ravine Trail Preserve and adjacent conservation easements and flows through the proposed preserve. Virtually all of the Hawthorne property comprises much of the watershed for Whalebone Creek.
“Second, the 82 acres we are hoping to acquire with this fund raising effort represents a large block of wetlands and forested wildlife habitat between Brush Hill and Joshuatown roads, which in itself is home to a kaleidoscope of animals from amphibians and reptiles that thrive in several vernal pools and swamp land, to turkey, coyote, bobcat and fisher. It also serves as seasonal nesting and migratory stops for several species of deep woods birds, which are losing habitat all over Connecticut due to forest fragmentation.
“Third, this particular preserve will also conserve a key link in the wildlife corridors that connects more than 1,000 acres of protected woodland and swamp habitat in the Hadlyme area.” Irving explained that the preserve is at the center of a landscape-scale wildlife habitat greenway that includes Selden Island State Park, property of the US Fish & Wild Life’s Silvio O Conte Wildlife Refuge, The Nature Conservancy’s Selden Preserve, and several other properties protected by the Lyme Land Conservation Trust.
“Because of its central location as a hub between these protected habitat refuges,” said Irving, “this preserve will protect forever the uninterrupted access that wildlife throughout the Hadlyme landscape now has for migration and breeding between otherwise isolated communities and families of many terrestrial species that are important to the continued robust bio-diversity of southeastern Connecticut and the Connecticut River estuary.”
Irving noted that the Hawthorne property is the largest parcel targeted for conservation in the Whalebone Cove watershed by the recently developed US Fish & Wildlife Service Silvio O Conte Wildlife Refuge Comprehensive Conservation Plan. Irving said the Land Trust hopes to create a network of hiking trails on the property with access from both Brush Hill Road on the east and Joshuatown Road on the west and connection to the Land Trust’s Ravine Trail to the south and the network of trails on the Nature Conservancy’s Selden Preserve.
Irving said there is strong support for the Land Trust’s proposal to preserve the property both within the Hadlyme and Lyme communities and among regional and state conservation groups. He noted letters of support have come from the Hadlyme Garden Club, the Hadlyme Public Hall Association, the Lyme Inland Wetlands & Watercourses Agency, the Lyme Planning and Zoning Commission, the Lyme Open Space Committee, the Lower Connecticut River Valley Council of Governments, the Lyme Garden Club, the Lyme Public Hall, The Nature Conservancy, The Silvio O Conte Refuge, the Connecticut River Watershed Council, and the Friends of Whalebone Cove, Inc.
He reported that between Hawthorne’s gift and several other pledges the Land Trust has already received commitments of 25 percent of the cost of the property.
Filed Under: Lyme, Outdoors, Top Story, vnn Old Lyme Tree Commission Celebrates Arbor Day April 29, 2016 by admin Leave a Comment Members of the three groups gather around the new oak tree. From left to right are Kathy Burton, Joanne DiCamillo, Joan Flynn. Anne Bing, Emily Griswold and Barbara Rayel.
Filed Under: Old Lyme, Outdoors, Top Story, Town Hall Enjoy a Tour of Private Gardens in Essex, June 4 April 28, 2016 by Adina Ripin Leave a Comment See this beautiful private garden in Essex on June 4.
ESSEX – On Saturday, June 4, from 10 a.m. to 3 p.m., plan to stroll through eight of the loveliest and most unusual private gardens in Essex. Some are in the heart of Essex Village while others are hidden along lanes most visitors never see. While exploring, you will find both formal and informal settings, lovely sweeping lawns and panoramic views of the Connecticut River or its coves. One garden you will visit is considered to be a ‘laboratory’ for cultivation of native plants. Master Gardeners will be available to point out specific features, offer gardening tips, and answer questions.
The garden tour is sponsored by the Friends of the Essex Library. Tickets are $25 in advance and $30 at the Essex Library the day of the event. Cash, checks, Visa or Master Card will be accepted. Tickets can be reserved by visiting the library or by completing the form included in flyers available at the library and throughout Essex beginning May 2. Completed forms can be mailed to the library. Confirmations will be sent to the email addresses on the completed forms.
Your ticket will be a booklet containing a brief description of each garden along with a map of the tour and designated parking. Tickets must be picked up at the library beginning at 9:45 a.m. the day of the event.
Richard Conroy, library director, has said, “The Essex Library receives only about half of its operating revenue from the Town. The financial assistance we receive each year from the Friends is critical. It enables us to provide important resources such as Ancestry.com and museum passes, as well as practical improvements like the automatic front doors that were recently installed. I urge you to help your Library by helping our Friends make this event a success! Thank you for your support.”
The tour will take place rain or shine. For more information, call 860-767-1560. All proceeds will benefit Friends of the Essex Library.
Filed Under: Outdoors Potapaug Presents Plum Island Program April 7, 2016 by admin Leave a Comment Potapaug Audubon presents “Preserving Plum Island” on Thursday, April 7, at 7 p.m. at Old Lyme Town Hall, 52 Lyme St., Old Lyme, with guest speaker Chris Cryder, from the Preserve Plum Island Coalition.
Cryder will discuss the efforts to protect the island, which provides vital habitat for threatened and endangered birds.
This is a free program and all are welcome.
Filed Under: Old Lyme, Outdoors CT Legislators Support Study to Preserve Plum Island From Commercial Development March 28, 2016 by Jerome Wilson 1 Comment Aerial view of Plum Island lighthouse. (From Preserve Plum Island website)
Last Thursday, March 24, at a press conference in Old Saybrook, a triumvirate of Congressional legislators from Connecticut, State Senator Richard Blumenthal and US Representatives Joe Courtney (D-2nd District) and Rosa DeLauro (D-3rd District) confirmed their support for a study to determine the future of Plum Island located in Long Island Sound.
Members of the Plum Island Coalition — which has some 65 member organizations all dedicated to preserving the island — were in attendance to hear the good news.
The island still houses a high-security, federal animal disease research facility, but the decision has already been taken to move the facility to a new location in Kansas with an opening slated for 2022. The current facility takes up only a small percentage of the land on the island and significantly for environmentalists, the remainder of the island has for years been left to nature in the wild.
In supporting a federal study on the future of Plum Island, Sen. Blumenthal said, “This study is a step towards saving a precious, irreplaceable national treasure from developers and polluters. It will provide the science and fact-based evidence to make our case for stopping the current Congressional plan to sell Plum Island to the highest bidder.” He continued, “The stark truth is the sale of Plum Island is no longer necessary to build a new bioresearch facility because Congress has fully appropriated the funds. There is no need for this sale – and in fact, Congress needs to rescind the sale.” Congress, however, still has a law on the books that authorizes the sale of Plum Island land to the highest bidder. Therefore, opponents of the sale will have the burden of convincing Congress to change a law that is currently in place.
Filed Under: Old Lyme, Outdoors, Top Story, vnn Land Trusts’ Photo Contest Winners Announced March 24, 2016 by admin Leave a Comment Winner of the top prize, the John G. Mitchell Environmental Conservation Award – Hank Golet
The 10th Annual Land Trust’s Photo Contest winners were announced at a March 11 reception highlighting the winning photos and displaying all entered photos. Land trusts in Lyme, Old Lyme, Salem, Essex and East Haddam jointly sponsor the annual amateur photo contest to celebrate the scenic countryside and diverse wildlife and plants in these towns. The ages of the photographers ranged from children to senior citizens.
Hank Golet won the top prize, the John G. Mitchell Environmental Conservation Award, with his beautiful photograph of a juvenile yellow crowned night heron in the Black Hall River in Old Lyme. Alison Mitchell personally presented the award, created in memory of her late husband John G. Mitchell, an editor at National Geographic, who championed the cause of the environment.
William Burt, a naturalist and acclaimed wildlife photographer, who has been a contest judge for ten years, received a special mention. Judges Burt; Amy Kurtz Lansing, an accomplished art historian and curator at the Florence Griswold Museum; and Skip Broom, a respected, award-winning local photographer and antique house restoration housewright, chose the winning photographs from 219 entries.
The sponsoring land trusts – Lyme Land Conservation Trust, Essex Land Trust, the Old Lyme Land Trust, Salem Land Trust, and East Haddam Land Trust – thank the judges as well as generous supporters RiverQuest/ CT River Expeditions, Lorensen Auto Group, the Oakley Wing Group at Morgan Stanley, Evan Griswold at Coldwell Banker, Ballek’s Garden Center, Essex Savings Bank, Chelsea Groton Bank, and Alison Mitchell in honor of her late husband John G. Mitchell. Big Y and Fromage Fine Foods & Coffee provided support for the reception.
The winning photographers are:
John G. Mitchell Environmental Award, Hank Golet, Old Lyme
1st: Patrick Burns, East Haddam
2nd: Judah Waldo, Old Lyme
3rd: James Beckman, Ivoryton
Honorable Mention Gabriel Waldo, Old Lyme
Honorable Mention Sarah Gada, East Haddam
Honorable Mention Shawn Parent, East Haddam
Cultural/Historic
1st: Marcus Maronne, Mystic
2nd: Normand L. Charlette, Manchester
3rd: Tammy Marseli, Rocky Hill
Honorable Mention Jud Perkins, Salem
Honorable Mention Pat Duncan, Norwalk
Honorable Mention John Kolb, Essex
Landscapes/Waterscapes
1st: Cheryl Philopena, Salem
2nd: Marian Morrissette, New London
3rd: Harcourt Davis, Old Lyme
Honorable Mention Cynthia Kovak, Old Lyme
Honorable Mention Bopha Smith, Salem
1st: Mary Waldron, Old Lyme
2nd: Courtney Briggs, Old Saybrook
3rd: Linda Waters, Salem
Honorable Mention Pete Govert, East Haddam
Honorable Mention Marcus Maronne, Mystic
Honorable Mention Marian Morrissette, New London
First place winner of the Wildlife category – Chris Pimley
1st: Chris Pimley, Essex
2nd: Harcourt Davis, Old Lyme
Honorable Mention Thomas Nemeth, Salem
Honorable Mention Jeri Duefrene, Niantic
Honorable Mention Elizabeth Gentile, Old Lyme
The winning photos will be on display at the Lymes’ Senior Center for the month of March and Lyme Public Library in April. For more information go to lymelandtrust.org.
Filed Under: Outdoors Old Lyme’s Open Space Commission Hosts Talk on Sea Level Rise, Salt Marsh Advance March 11, 2016 by admin 1 Comment The Town of Old Lyme’s Open Space Commission invites all interested parties to a workshop by Adam Whelchel, PhD, Director of Science at The Nature Conservancy’s Connecticut Chapter. The workshop will be held on Friday, March 11, at 9 a.m. in the Old Lyme Town Hall.
Filed Under: Outdoors, Town Hall Inaugural Meeting of ‘Friends of Whalebone Cove’ Held, Group Plans to Protect Famous Tidal Wetland March 7, 2016 by admin Leave a Comment The newly formed ‘Friends of Whalebone Cove’ are working to preserve and protect the Cove’s fragile ecosystem.
A new community conservation group to protect Whalebone Cove, a freshwater tidal marsh along the Connecticut river in Hadlyme recognized internationally for its wildlife habitat, will hold its first organizational meeting this coming Sunday, March 6, at 4 p.m.
Calling the group “Friends of Whalebone Cove” (FOWC), the organizers say their purpose is to “create a proactive, community-based constituency whose mission is to preserve and protect the habitat and fragile eco-systems of Whalebone Cove.”
Much of Whalebone Cove is a nature preserve that is part of the Silvio O. Conte National Wildlife Refuge (www.fws.gov/refuge/silvio_o_conte) under the jurisdiction of the U.S. Fish & Wildlife Service (USFW). The Refuge owns and manages 116 acres of marshland in Whalebone Cove and upland along its shores.
Prior to being taken over by USFW, the Whalebone Cove preserve was under the protection of The Nature Conservancy.
As part of the Connecticut River estuary, the Cove is listed in the Ramsar Convention on International Wetlands (www.ramsar.org) as tidal marshlands on the Connecticut River that constitute a “wetlands complex of international importance.”
The Ramsar citation specifically notes that Whalebone Cove has one of the largest stands of wild rice in the state. Except at high tide, most of the Cove is open marshland covered by wild rice stands with relatively narrow channels where Whalebone Creek winds its way through the Cove to the main stem of the Connecticut River.
Brian Slater, one of the group’s leaders who is filing the incorporation documents creating FOWC, said the creation of the organization was conceived by many of those living around the Cove and others in the Hadlyme area because of increased speeding motor boat and jet ski traffic in the Cove in recent years, damaging wetland plants and disrupting birds and other wildlife that make the Cove their home.
Slater said “Our goal is to develop a master plan for protection of the Cove through a collaborative effort involving all those who have a stake in Whalebone Cove – homeowners along its shores and those living nearby, the Silvio O. Conte Refuge, the Connecticut Department of Energy & Environmental Protection (DEEP), hunters, fishing enthusiasts, canoeing and kayaking groups, Audubon groups, the Towns of Lyme and East Haddam, The Nature Conservancy, the Connecticut River Watershed Council, the Lyme Land Conservation Trust, the Connecticut River Gateway Commission, and others who want to protect the Cove.”
“Such a plan”, said Slater, “should carefully evaluate the habitat, plants, wildlife and eco-systems of the Cove and the surrounding uplands and watershed and propose an environmental management plan that can be both implemented and enforced by those entrusted with stewarding the Cove and its fragile ecosystems for the public trust.”
FOWC has written a letter to Connecticut DEEP Commissioner Rob Klee asking that he appoint a blue ribbon commission to conduct the research and develop the management plan. FOWC also asked that Commissioner Klee either deny or defer approval on any applications for new docks in the Cove until the management plan can be developed and implemented. Currently there are no docks in the Cove.
“We are very concerned that the installation of docks permitted for motor boat use will greatly increase the amount of motorized watercraft in the Cove,” said Slater. “There’s already too much jet ski and speeding motorboat traffic in the Cove. Those living on the Cove have even seen boats towing water skiers crisscrossing the wild rice plants at high tide. Something has to be done to protect the birds and marine life that give birth and raise their young in the Cove.”
Slater urged all those “who treasure Whalebone Cove and the many species of birds, turtles, fish, reptiles, amphibians, beaver, and rare flora and fauna that make their home in it to attend the meeting, whether they live in the Hadlyme area or beyond.”
Expected to be at the meeting will be representatives from USFW, DEEP, the Connecticut River Watershed Council, and several other conservation organizations.
The meeting will be held at Hadlyme Public Hall, 1 Day Hill Rd., in Lyme, which is at the intersection of Ferry Rd. (Rte. 148), Joshuatown Rd., and Day Hill Rd. Representatives from the Silvio O. Conte Refuge will make a short presentation on the history and mission of the Conte Refuge system, which includes nature preserves throughout the Connecticut River Valley in four states.
For more information, call 860-322-4021 or email fowchadlyme@gmail.com
Filed Under: Lyme, News, Outdoors Next Page »
|
[
"Appointing a blue ribbon commission to conduct the research and develop the management plan and denying or defering approval on any applications for new docks in the Cove until the management plan can be developed and implemented."
] | 6,819
|
multifieldqa_en
|
en
| null |
7e9ba2f426e81faad004a9aba93c714af689ed705e544d22
|
What type of distribution do the tail distributions of price returns follow?
|
Paper Info
Title: Age and market capitalization drive large price variations of cryptocurrencies
Publish Date: 23 Feb 2023
Author List:
Figure
Figure 3. Illustration of different effects of age and market capitalization on power-law exponents of cryptocurrencies.(a) Posterior probability distributions of the linear coefficients associated with the effects of age [p(A)] and (b) the effects of market capitalization [p(C)] on power-law exponents related to large positive returns.Panels (c) and (d) show the analogous distributions for the association with power-law exponents related to large negative returns.In all panels, the different curves show the distributions for each of the top 20 cryptoassets by market capitalization.Cryptocurrencies significantly affected by age or market capitalization are highlighted in boldface, and the numbers between brackets show their positions in the market capitalization rank.
Figure S5.There is more probability mass in the positive tail than in the negative tail of price returns.(a) Probability distributions of the lower cut-offs (r min ) obtained by applying the Clauset-Shalizi-Newman method to positive (blue) and negative (red) returns.The vertical dashed lines indicate the median values of r min for positive and negative returns.(b) Probability distributions of 90th percentiles (r 90 ) estimated from the power-law models adjusted to positive (blue) and negative (red) returns.The vertical dashed lines indicate the median values of r 90 for positive and negative returns.(c) Probability distributions of the fraction of weeks that r 90 estimated from positive returns (r + 90 ) is larger than r 90 estimated from negative returns (r − 90 ).This fraction is calculated only for weeks in which the power-law hypothesis is not rejected for both tails.The percentage of cryptoassets for which r + 90 > r − 90 is shown in the panels.The first column of panels depicts the results when considering data from all cryptocurrencies, while the second and third columns present the results for the top 2000 and top 200 cryptocurrencies by market capitalization, respectively.
Figure S7.Robustness of the results of Fig. 2(b)-(d) against considering only cryptocurrencies with fraction of rejection f r < 0.1.Panels (a) and (b) show the same distributions of Fig. S4 but after filtering out all time series of cryptocurrencies with fraction of rejections f r ≥ 0.1.As in the case related to sampling issues, we observe that these distributions barely change when considering only cryptocurrencies with f r < 0.1.Indeed, the distributions in this figure are not significantly distinguishable from their counterparts in Fig. S4 (two-sample Kolmogorov-Smirnov test, p > 0.05).
abstract
Cryptocurrencies are considered the latest innovation in finance with considerable impact across social, technological, and economic dimensions. This new class of financial assets has also motivated a myriad of scientific investigations focused on understanding their statistical properties, such as the distribution of price returns.
However, research so far has only considered Bitcoin or at most a few cryptocurrencies, whilst ignoring that price returns might depend on cryptocurrency age or be influenced by market capitalization. Here, we therefore present a comprehensive investigation of large price variations for more than seven thousand digital currencies and explore whether price returns change with the coming-of-age and growth of the cryptocurrency market.
We find that tail distributions of price returns follow power-law functions over the entire history of the considered cryptocurrency portfolio, with typical exponents implying the absence of characteristic scales for price variations in about half of them. Moreover, these tail distributions are asymmetric as positive returns more often display smaller exponents, indicating that large positive price variations are more likely than negative ones.
Our results further reveal that changes in the tail exponents are very often simultaneously related to cryptocurrency age and market capitalization or only to age, with only a minority of cryptoassets being affected just by market capitalization or neither of the two quantities. Lastly, we find that the trends in power-law exponents usually point to mixed directions, and that large price variations are likely to become less frequent only in about 28% of the cryptocurrencies as they age and grow in market capitalization.
Since the creation of Bitcoin in 2008 , various different cryptoassets have been developed and are now considered to be at the cutting edge of innovation in finance . These digital financial assets are vastly diverse in design characteristics and intended purposes, ranging from peer-to-peer networks with underlying cash-like digital currencies (e.g.
Bitcoin) to general-purpose blockchains transacting in commodity-like digital assets (e.g. Ethereum), and even to cryptoassets that intend to replicate the price of conventional assets such as the US dollar or gold (e.g. Tether and Tether Gold) . With more than nine thousand cryptoassets as of 2022 , the total market value of cryptocurrencies has grown massively to a staggering $2 trillion peak in 2021 .
Despite long-standing debates over the intrinsic value and legality of cryptoassets , or perhaps even precisely due to such controversies, it is undeniable that cryptocurrencies are increasingly attracting the attention of academics, investors, and central banks, around the world . Moreover, these digital assets have been at the forefront of sizable financial gains and losses in recent years , they have been recognized as the main drivers of the brand-new phenomena of cryptoart and NFTs , but also as facilitators of illegal activities, such as money laundering and dark trade .
Financial research dedicated Our results are based on daily price time series of 7111 cryptocurrencies that comprise a significant part of all currently available cryptoassets (see Methods for details). From these price series, we have estimated their logarithmic returns 2/16 Log-return, r ). The black horizontal arrow represents a given position of the expanding time window (at t = 2004 days) used to sample the return series over the entire history of Bitcoin.
This time window expands in weekly steps (seven time series observations), and for each position, we separate the positive (blue) from the negative (red) price returns. The gray line illustrates observations that will be included in future positions of the expanding time window (t > 2004). (b) Survival functions or the complementary cumulative distributions of positive (blue) and negative (red) price returns within the expanding time window for t = 2004 days and above the lower bound of the power-law regime estimated from the Clauset-Shalizi-Newman method .
The dashed lines show the adjusted power-law functions, p(r) ∼ r −α , with α = 4.5 for positive returns and α = 3.0 for negative returns. (c) Time series of the power-law exponents α t for the positive (blue) and negative (red) return distributions obtained by expanding the time window from the hundredth observation (t = 100) to the latest available price return of Bitcoin.
The circular markers represent the values for the window position at t = 2004 days and the dashed lines indicate the median of the power-law exponents ( α+ = 4.50 for positive returns and α− = 2.99 for negative returns). (d) Time series of the p-values related to the power-law hypothesis of positive (blue) and negative (red) price returns for every position of the expanding time window.
The dashed line indicates the threshold (p = 0.1) above which the power-law hypothesis cannot be rejected. For Bitcoin, the power-law hypothesis is never rejected for positive returns (fraction of rejection f r = 0) and rejected in only 4% of the expanding time window positions (fraction of rejection f r = 0.04).
where x t represents the price of a given cryptocurrency at day t. All return time series in our analysis have at least 200 observations (see Supplementary Figure for the length distribution). Figure (a) illustrates Bitcoin's series of daily returns. To investigate whether and how returns have changed over the aging and growing processes of all cryptocurrencies, we sample all time series of log-returns using a time window that expands in weekly steps (seven time series observations), starting from the hundredth observation to the latest return observation.
In each step, we separate the positive from the negative return values and estimate their power-law behavior using the Clauset-Shalizi-Newman method . Figure (a) further illustrates this procedure, where the vertical dashed line represents a given position of the time window (t = 2004 days), the blue and red lines indicate positive and negative returns, respectively, and the gray lines show the return observations that will be included in the expanding time window in future steps.
Moreover, Fig. (b) shows the corresponding survival functions (or complementary cumulative distributions) for the positive (blue) and negative (red) returns of Bitcoin within the time window highlighted in Fig. (a). These survival functions correspond to return values above the lower bound of the power-law regime (r min ) and dashed lines in Fig. (b) show the power-law functions adjusted to data, that is,
with α = 4.5 for the positive returns and α = 3.0 for the negative returns in this particular position of the time window (t = 2004 days). We have further verified the goodness of the power-law fits using the approach proposed by Clauset et al. (see also Preis et al. ). As detailed in the Methods section, this approach consists in generating several synthetic samples under the power-law hypothesis, adjusting these simulated samples, and estimating the fraction of times the Kolmogorov-Smirnov distance between the adjusted power-law and the synthetic samples is larger than the value calculated from the empirical data.
This fraction defines a p-value and allows us to reject or not the power-law hypothesis of the return distributions under a given confidence level. Following Refs. we consider the more conservative 90% confidence level (instead of the more lenient and commonly used 95% confidence level), rejecting the power-law hypothesis when p-value ≤ 0.1.
For the particular examples in Fig. (b), the p-values are respectively 1.00 and 0.17 for the positive and negative returns, and thus we cannot reject the power-law hypotheses. After sampling the entire price return series, we obtain time series for the power-law exponents (α t ) associated with positive and negative returns as well as the corresponding p-values time series for each step t of the expanding time window.
These time series allow us to reconstruct the aging process of the return distributions over the entire history of each cryptoasset and probe possible time-dependent patterns. Figures ) and 1(d) show the power-law exponents and p-values time series for the case of Bitcoin. The power-law hypothesis is never rejected for positive returns and rarely rejected for negative returns (about 4% of times).
Moreover, the power-law exponents exhibit large fluctuations at the beginning of the time series and become more stable as Bitcoin matures as a financial asset (a similar tendency as reported by Begušić et al. ). The time evolution of these exponents further shows that the asymmetry between positive and negative returns observed in Fig. ) is not an incidental feature of a particular moment in Bitcoin's history.
Indeed, the power-law exponent for positive returns is almost always larger than the exponent for negative returns, implying that large negative price returns have been more likely to occur than their positive counterparts over nearly the entire history of Bitcoin covered by our data. However, while the difference between positive and negative exponents has approached a constant value, both exponents exhibit an increasing trend, indicating that large price variations are becoming less frequent with the coming-of-age of Bitcoin.
The previous analysis motivates us to ask whether the entire cryptocurrency market behaves similarly to Bitcoin and what other common patterns digital currencies tend to follow. To start answering this question, we have considered the p-values series of all cryptocurrencies to verify if the power-law hypothesis holds in general.
Figure (a) shows the percentage of cryptoassets rejecting the power-law hypothesis in at most a given fraction of the weekly positions of the expanding time window ( f r ). Remarkably, the hypothesis that large price movements (positive or negative) follow a power-law distribution is never rejected over the entire history of about 70% of all digital currencies in our dataset.
This analysis also shows that only ≈2% of cryptocurrencies reject the power-law hypothesis in more than half of the positions of the expanding time window ( f r ≥ 0.5). For instance, considering a 10% threshold as a criterion ( f r ≤ 0.1), we find that about 85% of cryptocurrencies have return distributions adequately modeled by power laws.
Increasing this threshold to a more lenient 20% threshold ( f r ≤ 0.2), we find large price movements to be power-law distributed for about 91% of cryptocurrencies. These results thus provide strong evidence that cryptoassets, fairly generally, present large price movements quite well described by power-law distributions.
Moreover, this conclusion is robust when starting the expanding window with a greater . Large price movements are power-law distributed over the entire history of most cryptocurrencies with median values typically smaller than those found for traditional assets. (a) Percentage of cryptoassets rejecting the power-law hypothesis for large positive (blue) or negative (red) price returns in at most a given fraction of the weekly positions of the expanding time window ( f r ) used to sample the return series.
Remarkably, 68% of all 7111 digital currencies are compatible with the power-law hypothesis over their entire history, and about 91% of them reject the power-law hypothesis in less than 20% of the positions of the expanding time window ( f r ≤ 0.2). (b) Probability distributions obtained via kernel density estimation of the median values of the power-law exponents along the history of each digital currency.
The blue curve shows the distribution of the median exponents related to positive returns ( α+ ) and the red curve does the same for negative returns ( α− ). The medians of α+ and α− are indicated by vertical dashed lines. Panels (c) and (d) show the distributions of these median exponents when considering the top 2000 and the top 200 cryptocurrencies by market capitalization, respectively.
We observe that the distributions of α+ and α− tend to shift toward larger values when considering the largest cryptoassets. number of return observations (between 100 and 300 days) and filtering out cryptoassets with missing observations (Supplementary Figures ). Still, it is worth noticing the existence of a few cryptoassets (9 of them) with relatively small market capitalization (ranking below the top 1000) for which the power-law hypothesis is always rejected (Supplementary Table ).
Having verified that large price movements in the cryptocurrency market are generally well-described by powerlaw distributions, we now focus on the power-law exponents that typically characterize each cryptoasset. To do so, we select all exponent estimates over the entire history of each digital asset for which the power-law hypothesis is not rejected and calculate their median values for both the positive ( α+ ) and negative ( α− ) returns.
The dashed lines in Fig. ) show these median values for Bitcoin where α+ = 4.50 and α− = 2.99. It is worth noticing that the variance of large price movements σ 2 is finite only for α > 3, as the integral σ 2 ∼ ∞ r min r 2 p(r)dr diverges outside this interval. Thus, while the typical variance of large positive returns is finite for Bitcoin, negative returns are at the limit of not having a typical scale and are thus susceptible to much larger variations.
Figure shows the probability distribution for the median power-law exponents of all cryptoassets grouped by large positive and negative returns. We note that the distribution of typical power-law exponents associated with large positive returns is shifted to smaller values when compared with the distribution of exponents related to large negative returns.
The medians of these typical exponents are respectively 2.78 and 3.11 for positive and negative returns. This result suggests that the asymmetry in large price movements we have observed for Bitcoin is an overall feature of the cryptocurrency market. By calculating the difference between the typical exponents related to positive and negative large returns (∆α = α+ − α− ) for each digital currency, we find that about 2/3 of cryptocurrencies have α+ < α− (see Supplementary Figure for the probability distribution of ∆α).
Thus, unlike Bitcoin, most cryptocurrencies have been more susceptible to large positive price variations than negative ones. While this asymmetry in the return distributions indicates that extremely large price variations tend to be positive, it does not necessarily imply positive price variations are more common for any threshold in the return values.
This happens because the fraction of events in each tail is also related to the lower bound of the power-law regime (r min ). However, we have found the distribution of r min to be similar among the positive and negative returns [Supplementary Figure ]. The distribution of high percentile scores (such as the 90th percentile) is also shifted to larger values for positive returns [Supplementary Figure ].
Moreover, this asymmetry in high percentile scores related to positive and negative returns is systematic along the evolution of the power-law exponents [Supplementary Figure ]. These results thus indicate that there is indeed more probability mass in the positive tails than in the negative ones, a feature that likely reflects the current expansion of the cryptocurrency market as a whole.
The distributions in Fig. ) also show that large price variations do not have a finite variance for a significant part of cryptoassets, that is, α+ ≤ 3 for 62% of cryptocurrencies and α− ≤ 3 for 44% of cryptocurrencies. A significant part of the cryptocurrency market is thus prone to price variations with no typical scale.
Intriguingly, we further note the existence of a minority group of cryptoassets with α+ ≤ 2 (7%) or α− ≤ 2 (3%). These cryptocurrencies, whose representative members are Counos X (CCXX, rank 216) with α − = 1.96 and α + = 1.84 and Chainbing (CBG, rank 236) with α + = 1.87, are even more susceptible to extreme price variations as one cannot even define the average value µ for large price returns, as the integral µ ∼ ∞ r min rp(r)dr diverges for α ≤ 2. We have also replicated the previous analysis when considering cryptocurrencies in the top 2000 and top 200 rankings of market capitalization (as of July 2022).
Figures ) and 2(d) show the probability distribution for the median power-law exponents of these two groups. We observe that these distributions are more localized (particularly for the top 200) than the equivalent distributions for all cryptocurrencies. The fraction of cryptocurrencies with no typical scale for large price returns ( α+ ≤ 3 and α− ≤ 3) is significantly lower in these two groups compared to all cryptocurrencies.
In the top 2000 cryptocurrencies, 51% have α+ ≤ 3 and 26% have α− ≤ 3. These fractions are even smaller among the top 200 cryptocurrencies, with only 44% and 15% not presenting a typical scale for large positive and negative price returns, respectively. We further observe a decrease in the fraction of cryptoassets for which the average value for large price returns is not even finite, as only 2% and 1% of top 2000 cryptoassets have α+ ≤ 2 and α− ≤ 2. This reduction is more impressive among the top 200 cryptocurrencies as only the cryptoasset Fei USD (FEI, rank 78) has α+ = 1.97 and none is characterized by α− ≤ 2. The medians of α+ and α− also increase from 2.78 and 3.11 for all cryptocurrencies to 2.98 and 3.35 for the top 2000 and to 3.08 and 3.58 for the top 200 cryptocurrencies.
Conversely, the asymmetry between positive and negative large price returns does not differ much among the three groups, with the condition α+ < α− holding only for a slightly larger fraction of top 2000 (69.1%) and top 200 (70.6%) cryptoassets compared to all cryptocurrencies (66.4%). Moreover, all these patterns are robust when filtering out time series with sampling issues or when considering only cryptoassets that stay compatible with the power-law hypothesis in more than 90% of the positions of the expanding time window (Supplementary Figures ).
We also investigate whether the patterns related to the median of the power-law exponents differ among groups of cryptocurrencies with different designs and purposes. To do so, we group digital assets using the 50 most common tags in our dataset (e.g. "bnb-chain", "defi", and "collectibles-nfts") and estimate the probability distributions of the median exponents α+ and α− (Supplementary Figures ).
These results show that design and purpose affect the dynamics of large price variations in the cryptocurrency market as the medians of typical exponents range from 2.4 to 3.7 among the groups. The lowest values occur for cryptocurrencies tagged as "doggone-doggerel" (medians of α+ and α− are 2.38 and 2.83), "memes" (2.41 and 2.87), and "stablecoin" (2.65 and 2.79).
Digital currencies belonging to the first two tags overlap a lot and have Dogecoin (DOGE, rank 9) and Shiba Inu (SHIB, rank 13) as the most important representatives. Cryptoassets with these tags usually have humorous characteristics (such as an Internet meme) and several have been considered as a form of pump-and-dump scheme , a type of financial fraud in which false statements artificially inflate asset prices so the scheme operators sell their overvalued cryptoassets.
Conversely, cryptoassets tagged as "stablecoin" represent a class of cryptocurrencies designed to have a fixed exchange rate to a reference asset (such as a national currency or precious metal) . While the price of stablecoins tends to stay around the target values, their price series are also marked by sharp variations, which in turn are responsible for their typically small power-law exponents.
This type of cryptoasset has been shown to be prone to failures , such as the recent examples of TerraUSD (UST) and Tron's USDD (USDD) that lost their pegs to the US Dollar producing large variations in their price series. The asymmetry between positive and negative large returns also emerges when grouping the cryptocurrencies using their tags.
All 50 tags have distributions of α+ shifted to smaller values when compared with the distributions of α− , with differences between their medians ranging from −0.74 ("okex-blockdream-ventures-portfolio") to −0.14 ("stablecoin"). Indeed, only four ('stablecoin", "scrypt", "fantom-ecosystem" and "alameda-research-portfolio") out of the fifty groupings have both distributions indistinguishable under a two-sample Kolmogorov-Smirnov test (p-value > 0.05).
Focusing now on the evolution of the power-law exponents quantified by the time series α t for positive and negative returns, we ask whether these exponents present particular time trends. For Bitcoin [Fig. )], α t seems to increase with time for both positive and negative returns. At the same time, the results of Fig. also suggest that market capitalization affects these power-law exponents.
To verify these possibilities, we assume the power-law exponents (α t ) to be linearly associated with the cryptocurrency's age (y t , measured in years) and the logarithm of market capitalization (log c t ). As detailed in the Methods section, we frame this problem using a hierarchical Bayesian model.
This approach assumes that the linear coefficients associated with the effects of age (A) and market capitalization (C) of each digital currency are drawn from distributions with means µ A and µ C and standard deviations σ A and σ C , which are in turn distributed according to global distributions representing the overall impact of these quantities on the cryptocurrency market.
The Bayesian inference process consists of estimating the posterior probability distributions of the linear coefficients for each cryptocurrency as well as the posterior distributions of µ A , µ C , σ A , and σ C , allowing us to simultaneously probe asset-specific tendencies and overall market characteristics.
Moreover, we restrict this analysis to the 2140 digital currencies having more than 50 observations of market capitalization concomitantly to the time series of the power-law exponents in order to have enough data points for detecting possible trends. When considering the overall market characteristics, we find that the 94% highest density intervals for µ A ([-0.01, 0.06] for positive and [-0.02, 0.03] for negative returns) and µ C ([-0.02, 0.03] for positive and [-0.001, 0.04] for negative returns) include the zero (see Supplementary Figure for their distributions).
Thus, there is no evidence of a unique overall pattern for the association between the power-law exponents and age or market capitalization followed by a significant part of the cryptocurrency market. Indeed, the 94% highest density intervals for σ A ([0.87, 0.93] for positive and [0.63, 0.70] for negative returns) and σ C ([0.57, 0.61] for positive and [0.49, 0.52] for negative returns) indicate that the cryptocurrency market is highly heterogeneous regarding the evolution of power-law exponents associated with large price variations (see Supplementary Figure for the distributions of σ A and σ C ). Figure illustrates these heterogeneous behaviors by plotting the posterior probability distributions for the linear coefficients associated with the effects of age (A) and market capitalization (C) for the top 20 digital assets, where cryptocurrencies which are significantly affected (that is, the 94% highest density intervals for A or C do not include the zero) by these quantities are highlighted in boldface.
Even this small selection of digital currencies already presents a myriad of patterns. First, we observe that the power-law exponents of a few top 20 cryptocurrencies are neither correlated with age nor market capitalization. That is the case of Shiba Inu (SHIB, rank 13) and Dai (DAI, rank 11) for both positive and negative returns, UNUS SED LEO (LEO, rank 18) and Polkadot (DOT, rank 12) for the positive returns, and USDCoin (USDC, rank 4) and Solana (SOL, rank 9) for negative returns.
There are also cryptocurrencies with exponents positively or negatively correlated only with market capitalization. Examples include Tether (USDT, rank 3) and Dogecoin (DOGE, rank 10), for which the power-law exponents associated with positive returns increase with market capitalization, and Binance USD (BUSD, rank 6), for which power-law exponents associated with positive and negative returns decrease with market capitalization.
We also observe cryptocurrencies for which age and market capitalization simultaneously affect the power-law exponents. Polygon (MATIC, rank 14) is an example where the power-law exponents associated with positive returns tend to increase with age and decrease with market capitalization. Finally, there are also cryptocurrencies with power-law exponents only associated with age.
That is the case of Bitcoin (BTC, rank 1), Ethereum (ETH, rank 2), and Cardano (ADA, rank 8), for which the power-law exponents related to positive and negative returns increase with age, but also the case of Uniswap (UNI, rank 19), for which the exponents decrease with age. Figure systematically extends the observations made for the top 20 cryptoassets to all 2140 digital currencies for which we have modeled the changes in the power-law exponents as a function of age and market capitalization.
First, we note that only 10% of cryptocurrencies have power-law exponents not significantly affected by age and market capitalization. The vast majority (90%) displays some relationship with these quantities. However, these associations are as varied as the ones we have observed for the top 20 cryptoassets.
About 52% of cryptocurrencies have power-law exponents simultaneously affected by age and market capitalization. In this group, these quantities simultaneously impact the exponents related to positive and negative returns of 34% of cryptoassets, whereas the remainder is affected only in the positive tail (9%) or only in the negative tail (9%).
Moving back in the hierarchy, we find that the power-law exponents of 32% of cryptocurrencies are affected only by age while a much minor fraction (6%) is affected only by market capitalization. Within the group only affected by age, we observe that the effects are slightly more frequent only on the exponents related to negative returns (12%), compared to cases where effects are restricted only to positive returns (10%) or simultaneously affect both tails (10%).
Finally, within the minor group only affected by market capitalization, we note that associations more frequently involve only exponents related to negative returns (3%) compared to the other two cases (2% only positive returns and 1% for both positive and negative returns). Beyond the previous discussion about whether positive or negative returns are simultaneously or individually affected by age and market capitalization, we have also categorized the direction of the trend imposed by these two quantities on the power-law exponents.
Blue rectangles in Fig. represent the fraction of relationships for which increasing age or market capitalization (or both) is associated with a raise in the power-law exponents. About 28% of all cryptocurrencies exhibit this pattern in which large price variations are expected to occur less frequently as they grow and age.
Conversely, the red rectangles in Fig. depict the fraction of relationships for which increasing age or market capitalization (or both) is associated with a reduction in the power-law exponents. This case comprises about 25% of all cryptocurrencies for which large price variations are likely to become more frequent as they grow in market capitalization and age.
Still, the majority of associations represented by green rectangles refer to the case where the effects of age and market capitalization point in different directions (e.g. exponents increasing with age while decreasing with market capitalization). About 36% of cryptocurrencies fit this condition which in turn contributes to consolidating the cumbersome hierarchical structure of patterns displayed by cryptocurrencies regarding the dynamics of large price variations.
This complex picture is not much different when considering only cryptocurrencies in the top 200 market capitalization rank (Supplementary Figure ). However, we do observe an increased prevalence of patterns characterized by exponents that rise with age and market capitalization (37%), suggesting that large price variations are becoming less frequent among the top 200 cryptocurrencies than in the overall market.
). Each of the previous three levels is further classified regarding whether both positive and negative returns are simultaneously affected or whether the effect involves only positive or only negative returns. Finally, the former levels are classified regarding whether the power-law exponents increase, decrease or have a mixed trend with the predictive variables.
Overall, 36% of the associations are classified as mixed trends (green rectangles), 28% are increasing trends (blue rectangles), and 26% are decreasing trends (red rectangles). We have studied the distributions of large price variations of a significant part of the digital assets that currently comprise the entirety of the cryptocurrency market.
Unlike previous work, we have estimated these distributions for entire historical price records of each digital currency, and we have identified the patterns under which the return distributions change as cryptoassets age and grow in market capitalization. Similarly to conventional financial assets , our findings show that the return distributions of the vast majority of cryptoassets have tails that are described well by power-law functions along their entire history.
The typical power-law exponents of cryptocurrencies (α ∼ 3) are, however, significantly smaller than those reported for conventional assets (α ∼ 4) . This feature corroborates the widespread belief that cryptoassets are indeed considerably more risky for investments than stocks or other more traditional financial assets.
Indeed, we have found that about half of the cryptocurrencies in our analysis do not have a characteristic scale for price variations, and are thus prone to much higher price variations than those typically observed in stock markets. On the upside, we have also identified an asymmetry in the power-law exponents for positive and negative returns in about 2/3 of all considered cryptocurrencies, such that these exponents are smaller for positive than they are for negative returns.
This means that sizable positive price variations have generally been more likely to occur than equally sizable negative price variations, which in turn may also reflect the recent overall expansion of the cryptocurrency market. Using a hierarchical Bayesian linear model, we have also simultaneously investigated the overall market characteristics and asset-specific tendencies regarding the effects of age and market capitalization on the power-law exponents.
We have found that the cryptocurrency market is highly heterogeneous regarding the trends exhibited by each cryptocurrency; however, only a small fraction of cryptocurrencies (10%) have power-law exponents neither correlated with age nor market capitalization. These associations have been mostly ignored by the current literature and are probably related to the still-early developmental stage of the cryptocurrency market as a whole.
Overall, 36% of cryptocurrencies present trends that do not systematically contribute to increasing or decreasing their power-law exponents as they age and grow in market capitalization. On the other hand, for 26% of cryptocurrencies, aging and growing market capitalization are both associated with a reduction in their power-law exponents, thus contributing to the rise in the frequency of large price variations in their dynamics.
Only about 28% of cryptocurrencies present trends in which the power-law exponents increase with age and market capitalization, favoring thus large price variations to become less likely. These results somehow juxtapose with findings about the increasing informational efficiency of the cryptocurrency market .
In fact, if on the one hand the cryptocurrency market is becoming more informationally efficient, then on the other our findings indicate that there is no clear trend toward decreasing the risks of sizable variations in the prices of most considered cryptoassets. In other words, risk and efficiency thus appear to be moving towards different directions in the cryptocurrency market.
To conclude, we hope that our findings will contribute significantly to the better understanding of the dynamics of large price variations in the cryptocurrency market as a whole, and not just for a small subset of selected digital assets, which is especially relevant due to the diminishing concentration of market capitalization among the top digital currencies, and also because of the considerable impact these new assets may have in our increasingly digital economy.
Our results are based on time series of the daily closing prices (in USD) for all cryptoassets listed on CoinMar-ketCap (coinmarketcap.com) as of 25 July 2022 [see Supplementary Figure (a) for a visualization of the increasing number cryptoassets listed on CoinMarketCap since 2013]. These time series were automatically gathered using the cryptoCMD Python package and other information such as the tags associated with each cryptoasset were obtained via the CoinMarketCap API .
In addition, we have also obtained the daily market capitalization time series (in USD) from all cryptoassets which had this information available at the time. Earliest records available from CoinMarketCap date from 29 April 2013 and the latest records used in our analysis correspond to 25 July 2022. Out of 9943 cryptocurrencies, we have restricted our analysis to the 7111 with at least 200 price-return observations.
The median length of these time series is 446 observations [see the distribution of series length in Supplementary Figure . We have estimated the power-law behavior of the return distributions by applying the Clauset-Shalizi-Newman method to the return time series r t . In particular, we have sampled each of these time series using an expanding time window that starts at the hundredth observation and grows in weekly steps (seven data points each step).
For each position of the expanding time window, we have separated the positive returns from the negative ones and applied the Clauset-Shalizi-Newman method to each set. This approach consists of obtaining the maximum likelihood estimate for the power-law exponent, α = 1 + n/ (∑ n t=1 ln r t /r min ) , where r min is the lower bound of the power-law regime and n is the number of (positive or negative) return observations in the power-law regime for a given position of the expanding time window.
The value r min is estimated from data by minimizing the Kolmogorov-Smirnov statistic between the empirical distribution and the power-law model. The Clauset-Shalizi-Newman method yields an unbiased and consistent estimator , in a sense that as the sample increases indefinitely, the estimated power-law exponent converges in distribution to the actual value.
Moreover, we have used the implementation available on the powerlaw Python package . In addition to obtaining the power-law exponents, we have also verified the adequacy of the power-law hypothesis using the procedure originally proposed by Clauset et al. as adapted by Preis et al. . This procedure consists of generating synthetic samples under the power-law hypothesis with the same properties of the empirical data under analysis (that is, same length and parameters α and r min ), adjusting the simulated data with the power-law model via the Clauset-Shalizi-Newman method, and calculating the Kolmogorov-Smirnov statistic (κ syn ) between the distributions obtained from the simulated samples and the adjusted power-law model.
Next, the values of κ syn are compared to the Kolmogorov-Smirnov statistic calculated between empirical data and the power-law model (κ). Finally, a p-value is defined by calculating the fraction of times for which κ syn > κ. We have used one thousand synthetic samples for each position of the expanding time window and the more conservative 90% confidence level (instead of the more lenient and commonly used 95% confidence level), such that the power-law hypothesis is rejected whenever p-value ≤ 0.1.
We have estimated the effects of age and market capitalization on the power-law exponents associated with positive or negative returns of a given cryptocurrency using the linear model where α t represents the power-law exponent, log c t is the logarithm of the market capitalization, and y t is the age (in years) of the cryptocurrency at t-th observation.
Moreover, K is the intercept of the association, while C and A are linear coefficients quantifying the effects of market capitalization and age, respectively. Finally, N (µ, σ ) stands for the normal distribution with mean µ and standard deviation σ , such that the parameter ε accounts for the unobserved determinants in the dynamics of the power-law exponents.
We have framed this problem using the hierarchical Bayesian approach such that each power-law exponent α t is nested within a cryptocurrency with model parameters considered as random variables normally distributed with parameters that are also random variables. Mathematically, for each cryptocurrency, we have
12/16 where µ K , σ K , µ C , σ C , µ A , and σ A are hyperparameters. These hyperparameters are assumed to be distributed according to distributions that quantify the overall impact of age and market capitalization on the cryptocurrency market as a whole. We have performed this Bayesian regression for exponents related to positive and negative returns separately, and used noninformative prior and hyperprior distributions in order not to bias the posterior estimation .
Specifically, we have considered and ε ∼ U (0, 10 2 ) , where U (a, b) stands for the uniform distribution in the interval [a, b] and Inv−Γ(θ , γ) represents the inverse gamma distribution with shape and scale parameters θ and γ, respectively. For the numerical implementation, we have relied on the PyMC Python package and sampled the posterior distributions via the gradient-based Hamiltonian Monte Carlo no-U-Turn-sampler method.
We have run four parallel chains with 2500 iterations each (1000 burn-in samples) to allow good mixing and estimated the Gelman-Rubin convergence statistic (R-hat) to ensure the convergence of the sampling approach (R-hat was always close to one). In addition, we have also verified that models describing the power-law exponents as a function of only age (C → 0 in Eq. 3) or only market capitalization (A → 0 in Eq. 3) yield significantly worse descriptions of our data as quantified by the Widely Applicable Information Criterion (WAIC) and the Pareto Smoothed Importance Sampling Leave-One-Out cross-validation (PSIS-LOO) (see Supplementary Table ). ) is larger than r 90 estimated from negative returns (r − 90 ).
This fraction is calculated only for weeks in which the power-law hypothesis is not rejected for both tails. The percentage of cryptoassets for which r + 90 > r − 90 is shown in the panels. The first column of panels depicts the results when considering data from all cryptocurrencies, while the second and third columns present the results for the top 2000 and top 200 cryptocurrencies by market capitalization, respectively.
Sampling issues refer to missing data and problems caused by prices of cryptoassets decreasing to zero. We note that these distributions barely change when considering only cryptocurrencies without any sampling issue. Indeed, the distributions in this figure are not significantly distinguishable from their counterparts in Fig. (two-sample Kolmogorov-Smirnov test, p > 0.05).
). Each of the previous three levels is further classified regarding whether both positive and negative returns are simultaneously affected or whether the effect involves only positive or only negative returns. Finally, the former levels are classified regarding whether the power-law exponents increase, decrease or have a mixed trend with the predictive variables.
Overall, 35% of the associations are classified as mixed trends (green rectangles), 37% are increasing trends (blue rectangles), and 18% are decreasing trends (red rectangles).
|
[
"Power-law functions."
] | 6,766
|
multifieldqa_en
|
en
| null |
b16c38bf627891a3bf60ee57f9f3c2f5730f4ea3a0f44b0e
|
What is the correct expression for the derivative of the function?
|
\section{Introduction}
Derivate is one of the most important topics not only in mathematics, but also in physics, chemistry, economics and engineering. Every standard Calculus course provides a variety of exercises for the students to learn how to apply the concept of derivative. The types of problems range from finding an equation of the tangent line to the application of differentials and advanced curve sketching. Usually, these exercises heavily rely on such differentiation techniques as Product, Quotient and Chain Rules, Implicit and Logarithmic Differentiation \cite{Stewart2012}. The definition of the derivative is hardly ever applied after the first few classes and its use is not much motivated.
Like many other topics in undergraduate mathematics, derivative gave rise to many misconceptions \cite{Muzangwa2012}, \cite{Gur2007}, \cite{Li2006}. Just when the students seem to learn how to use the differentiation rules for most essential functions, the application of the derivative brings new issues. A common students' error of determining the domain of the derivative from its formula is discussed in \cite{Rivera2013} and some interesting examples of the derivatives, defined at the points where the functions themselves are undefined, are provided. However, the hunt for misconceptions takes another twist for the derivatives undefined at the points where the functions are in fact defined.
The expression of the derivative of the function obtained using differentiation techniques does not necessarily contain the information about the existence or the value of the derivative at the points, where the expression for the derivative is undefined. In this article we discuss a type of continuous functions that have the expression for the derivative undefined at a certain point, while the derivative itself at that point exists. We show, how relying on the formula for the derivative for finding the horizontal tangent line of a function, leads to a false conclusion and consequently to missing a solution. We also provide a simple methodological treatment of similar functions suitable for the classroom.
\section{Calculating the Derivative}
In order to illustrate how deceitful the expression of the derivative can be to a students' eye, let us consider the following problem.
\vspace{12pt}
\fbox{\begin{minipage}{5.25in}
\begin{center}
\begin{minipage}{5.0in}
\vspace{10pt}
\emph{Problem}
\vspace{10pt}
Differentiate the function $f\left(x\right)=\sqrt[3]{x}\sin{\left(x^2\right)}$. For which values of $x$ from the interval $\left[-1,1\right]$ does the graph of $f\left(x\right)$ have a horizontal tangent?
\vspace{10pt}
\end{minipage}
\end{center}
\end{minipage}}
\vspace{12pt}
Problems with similar formulations can be found in many Calculus books \cite{Stewart2012}, \cite{Larson2010}, \cite{Thomas2009}. Following the common procedure, let us find the expression for the derivative of the function $f\left(x\right)$ applying the Product Rule:
\begin{eqnarray}
f'\left(x\right) &=& \left(\sqrt[3]{x}\right)'\sin{\left(x^2\right)}+\left(\sin{\left(x^2\right)}\right)'\sqrt[3]{x} \notag \\ &=& \frac{1}{3\sqrt[3]{x^2}}\sin{\left(x^2\right)}+2x\cos{\left(x^2\right)}\sqrt[3]{x} \notag \\ &=& \frac{6x^2\cos{x^2}+\sin{x^2}}{3\sqrt[3]{x^2}} \label{DerivativeExpression}
\end{eqnarray}
Similar to \cite{Stewart2012}, we find the values of $x$ where the derivative $f'\left(x\right)$ is equal to zero:
\begin{equation}
6x^2\cos{x^2}+\sin{x^2} = 0
\label{DerivativeEqualZero}
\end{equation}
Since the expression for the derivative (\ref{DerivativeExpression}) is not defined at $x=0$, it is not hard to see that for all values of $x$ from $\left[-1,1\right]$ distinct from zero, the left-hand side of (\ref{DerivativeEqualZero}) is always positive. Hence, we conclude that the function $f\left(x\right)$ does not have horizontal tangent lines on the interval $\left[-1,1\right]$.
However, a closer look at the graph of the function $f\left(x\right)$ seems to point at a different result: there is a horizontal tangent at $x=0$ (see Figure \ref{fig:FunctionGraph}).
First, note that the function $f\left(x\right)$ is defined in $x=0$. In order to verify if it has a horizontal tangent at this point, let us find the derivative of the function $f\left(x\right)$ using definition:
\begin{eqnarray}
f'\left(0\right) &=& \lim_{h\rightarrow0}{\frac{f\left(0+h\right)-f\left(0\right)}{h}} \notag \\
&=& \lim_{h\rightarrow0}{\frac{\sqrt[3]{h}\sin{\left(h^2\right)}}{h}} \notag \\
&=& \lim_{h\rightarrow0}{\left(\sqrt[3]{h} \cdot {h} \cdot \frac{\sin{\left(h^2\right)}}{h^2}\right)} \notag \\
&=& \lim_{h\rightarrow0}{\sqrt[3]{h}} \cdot \lim_{h\rightarrow0}{h} \cdot \lim_{h\rightarrow0}{\frac{\sin{\left(h^2\right)}}{h^2}} \notag \\
&=& 0 \cdot 0 \cdot 1 = 0 \notag
\end{eqnarray}
since each of the limits above exists. We see that, indeed, the function $f\left(x\right)$ possesses a horizontal tangent line at the point $x=0$.
\section{Closer Look at the Expression for the Derivative}
What is the problem with the standard procedure proposed by many textbooks and repeated in every Calculus class? The explanation lies in the following premise: the expression of the derivative of the function does not contain the information as to whether the function is differentiable or not at the points where it is undefined. As it is pointed out in \cite{Rivera2013}, the domain of the derivative is determined \emph{a priori} and therefore should not be obtained from the formula of the derivative itself.
In the example above the Product Law for derivatives requires the existence of the derivatives of both functions at the point of interest. Since the function $\sqrt[3]{x}$ is not differentiable in zero, the Product Rule cannot be applied.
In order to see what exactly happens when we apply the Product Rule, let us find the expression for the derivative using definition of the derivative:
\begin{eqnarray}
f'\left(x\right) &=& \lim_{h\rightarrow0}{\frac{f\left(x+h\right)-f\left(x\right)}{h}} \notag \\
&=& \lim_{h\rightarrow0}{\frac{\sqrt[3]{x+h}\sin{\left(x+h\right)^2}-\sqrt[3]{x}\sin{\left(x^2\right)}}{h}} \notag \\
&=& \lim_{h\rightarrow0}{\frac{\left(\sqrt[3]{x+h}-\sqrt[3]{x}\right)}{h}\sin{\left(x^2\right)}} + \notag \\
&& \lim_{h\rightarrow0}{\frac{\left(\sin{\left(x+h\right)^2}-\sin{\left(x^2\right)}\right)}{h}\sqrt[3]{x+h}} \notag \\
&=& \lim_{h\rightarrow0}{\frac{\sqrt[3]{x+h}-\sqrt[3]{x}}{h}} \cdot \lim_{h\rightarrow0}{\sin{\left(x^2\right)}} + \notag \\&& \lim_{h\rightarrow0}{\frac{\sin{\left(x+h\right)^2}-\sin{\left(x^2\right)}}{h}} \cdot \lim_{h\rightarrow0}{\sqrt[3]{x+h}} \notag \\
&=& \frac{1}{3\sqrt[3]{x^2}} \cdot \sin{\left(x^2\right)}+2x\cos{\left(x^2\right)} \cdot \sqrt[3]{x} \notag
\end{eqnarray}
which seems to be identical to the expression (\ref{DerivativeExpression}).
Students are expected to develop a skill of deriving similar results and know how to find the derivative of the function using definition of the derivative only. But how `legal' are the performed operations?
\begin{figure}[H]
\begin{center}
\includegraphics[width=6.0in]{sin.pdf}
\vspace{.1in}
\caption{Graph of the function $g\left(x\right)=\sqrt[3]{x}\cos{\left(x^2\right)}$}
\label{fig:GFunction}
\end{center}
\end{figure}
Let us consider each of the following limits:
\begin{eqnarray*}
&& \lim_{h\rightarrow0}{\frac{\sqrt[3]{x+h}-\sqrt[3]{x}}{h}} \notag \\
&& \lim_{h\rightarrow0}{\sin{\left(x^2\right)}}\notag \\
&& \lim_{h\rightarrow0}{\frac{\sin{\left(x+h\right)^2}-\sin{\left(x^2\right)}}{h}}\notag \\
&& \lim_{h\rightarrow0}{\sqrt[3]{x+h}}.
\end{eqnarray*}
The last three limits exist for all real values of the variable $x$. However, the first limit does not exist when $x=0$. Indeed
\begin{equation*}
\lim_{h\rightarrow0}{\frac{\sqrt[3]{0+h}-\sqrt[3]{0}}{h}} = \lim_{h\rightarrow0}{\frac{1}{\sqrt[3]{h^2}}} = + \infty
\end{equation*}
This implies that the Product and Sum Laws for limits cannot be applied and therefore this step is not justifiable in the case of $x=0$. When the derivation is performed, we automatically assume the conditions, under which the Product Law for limits can be applied, i.e. that both limits that are multiplied exist. It is not hard to see that in our case these conditions are actually equivalent to $x\neq0$. This is precisely why, when we wrote out the expression for the derivative (\ref{DerivativeExpression}), it already contained the assumption that it is only true for the values of $x$ that are different from zero.
Note, that in the case of $x=0$ the application of the Product and Sum Laws for limits is not necessary, since the term $\left(\sqrt[3]{x+h}-\sqrt[3]{x}\right)\sin{\left(x^2\right)}$ vanishes.
The correct expression for the derivative of the function $f\left(x\right)$ should be the following:
\begin{equation*}
f'\left(x\right) =
\begin{cases}
\frac{6x^2\cos{\left(x^2\right)}+\sin{\left(x^2\right)}}{3\sqrt[3]{x^2}}, & \mbox{if } x \neq 0 \\
0, & \mbox{if } x = 0
\end{cases}
\end{equation*}
The expression for the derivative of the function provides the correct value of the derivative only for those values of the independent variable, for which the expression is defined; it does not tell anything about the existence or the value of the derivative, where the expression for the derivative is undefined. Indeed, let us consider the function
\begin{equation*}
g\left(x\right) = {\sqrt[3]{x}}\cos{\left(x^2\right)}
\end{equation*}
and its derivative $g'\left(x\right)$
\begin{equation*}
g'\left(x\right) = \frac{\cos{\left(x^2\right)}-6x^2\sin{\left(x^2\right)}}{3\sqrt[3]{x^2}}
\end{equation*}
Similar to the previous example, the expression for the derivative is undefined at $x=0$. Nonetheless, it can be shown that $g\left(x\right)$ is not differentiable at $x=0$ (see Figure \ref{fig:GFunction}). Therefore, we provided two visually similar functions: both have the expressions for their derivatives undefined in zero, however, one of these functions possesses a derivative, but the other one does not.
\section{Methodological Remarks}
Unfortunately, there exist many functions similar to the ones discussed above and they can arise in a variety of typical Calculus problems: finding the points where the tangent line is horizontal, finding an equation of the tangent and normal lines to the curve at the given point, the use of differentials and graph sketching. Relying only on the expression of the derivative for determining its value at the undefined points may lead to missing a solution (as in the example discussed above) or to some completely false interpretations (as in the case of curve sketching).
As it was discussed above, the expression for the derivative does not provide any information on the existence or the value of the derivative, where the expression itself is undefined. Here we present a methodology for the analysis of this type of functions.
Let $f\left(x\right)$ be the function of interest and $f'\left(x\right)$ be the expression of its derivative undefined at some point $x_{0}$. In order to find out if $f\left(x\right)$ is differentiable at $x_{0}$, we suggest to follow a list of steps:
\begin{enumerate}
\item Check if the function $f\left(x\right)$ itself is defined at the point $x_{0}$. If $f\left(x\right)$ is undefined at $x_{0}$, then it is not differentiable at $x_{0}$. If $f\left(x\right)$ is defined at $x_{0}$, then proceed to next step.
\item Identify the basic functions that are used in the formula of the function $f\left(x\right)$, that are themselves defined at the point $x_{0}$, but their derivative is not (such as, for example, the root functions).
\item Find the derivative of the function $f\left(x\right)$ at the point $x_{0}$ using definition.
\end{enumerate}
The importance of the first step comes from the fact that most students tend to pay little attention to the functions domain analysis when asked to investigate its derivative. Formally, the second step can be skipped, however it will give the students the insight into which part of the function presents a problem and teach them to identify similar cases in the future. the difficulty of accomplishing the third step depends on the form of the function and sometimes can be tedious. Nevertheless, it allows the students to apply the previously obtained skills and encourages the review of the material.
\begin{figure}[H]
\begin{center}
\includegraphics[width=6.0in]{cos.pdf}
\vspace{.1in}
\caption{Graph of the function $g\left(x\right)=\sqrt[3]{x}\cos{\left(x^2\right)}$}
\label{fig:GFunction}
\end{center}
\end{figure}
\section{Conclusion}
We discussed the misconception, that the expression of the derivative of the function contains the information as to whether the function is differentiable or not at the points, where the expression is undefined. We considered a typical Calculus problem of looking for the horizontal tangent line of a function as an example. We showed how the search for the values that make the expression of the derivative equal zero leads to missing a solution: even though the expression of the derivative is undefined, the function still possesses the derivative at the point. We provided an example of the function that similarly has the expression for the derivative undefined, however the function is not differentiable at the point. We also presented the methodological treatment of such functions by applying the definition of the derivative, which can be used in the classroom.
|
[
"It depends on the value of x, either 0 or (6x^2cos(x^2)+sin(x^2))/(3(x^2)^(1/3))."
] | 1,762
|
multifieldqa_en
|
en
| null |
101225d103936ad083c5da47c3dce73ce569b62cbaa093bd
|
What award did Brooksley Born receive in 2009?
|
Brooksley Elizabeth Born (born August 27, 1940) is an American attorney and former public official who, from August 26, 1996, to June 1, 1999, was chair of the Commodity Futures Trading Commission (CFTC), the federal agency which oversees the U.S. futures and commodity options markets. During her tenure on the CFTC, Born lobbied Congress and the President to give the CFTC oversight of off-exchange markets for derivatives, in addition to its role with respect to exchange-traded derivatives, but her warnings were ignored or dismissed, and her calls for reform resisted by other regulators.<ref name="nytimes">Goodman, Peter S. The Reckoning - Taking Hard New Look at a Greenspan Legacy, The New York Times, October 9, 2008.</ref> Born resigned as chairperson on June 1, 1999, shortly after Congress passed legislation prohibiting her agency from regulating derivatives.
Early life and education
Born graduated from Abraham Lincoln High School (San Francisco, California) at the age of 16. She then attended Stanford University, where she majored in English and was graduated with the class of 1961. She initially wanted to become a doctor, but a guidance counsellor at Stanford advised her against medicine, so she majored in English literature instead.
She then attended Stanford Law School, one of only seven women in her class. She was the first female student ever to be named president of the Stanford Law Review. She received the "Outstanding Senior" award and graduated as valedictorian of the class of 1964.
Legal career
Immediately after law school Born was selected as a law clerk to judge Henry Edgerton of the U.S. Court of Appeals for the District of Columbia Circuit. It was during this time that she met her first husband, Jacob C. Landau, who was a journalist covering the Federal courts at the time. Following her clerkship, she became an associate at the Washington, D.C.-based international law firm of Arnold & Porter. Born was attracted to Arnold & Porter because it was one of the few major law firms to have a woman partner at that time, Carolyn Agger, who was the head of the tax practice. Born took a two-year leave of absence from Arnold & Porter to accompany her first husband to Boston, where he had received a fellowship. During that time she worked as a research assistant to law professor Alan Dershowitz.
Born's early career at Arnold & Porter focused on international trade law, in which she represented a number of Swiss industries and the government of Switzerland. She developed a practice representing clients in numerous complex litigation and arbitration cases involving financial market transactions. Among her high-profile cases was the matter of the Hunt Brothers attempt to corner the market in silver in the 1970s. She made partner at Arnold & Porter, after moving to a three-day schedule to help raise her second child, and eventually rose to be the head of the firm's derivatives practice.
Born was among the first female attorneys to systematically address inequities regarding how the laws treated women. Born and another female lawyer, Marna Tucker, taught what is considered to have been the first "Women and the Law" course at Catholic University’s Columbus School of Law. The class exclusively concerned prejudicial treatment of women under the laws of the United States, past and present. Born and Tucker were surprised to discover that there was no textbook on the issue at the time. Born is also one of the co-founders of the National Women's Law Center. Born also helped rewrite the American Bar Association rules to make it possible for more women and minorities to sit on federal bench.
During her long legal career, and into her retirement, Born did much pro bono and other types of volunteer work. She was active in the American Bar Association, the largest professional organization of lawyers in the United States. Initially Born was named a member of the governing council of the ABA's Individual Rights Section, eventually becoming chairperson. Born and Tucker founded the ABA Women's Caucus, the first organization of female lawyers in the ABA. She held several other senior positions in the ABA, including being named the first woman member of the ABA's Standing Committee on the Federal Judiciary. As a member of the Judiciary Committee, Born provided testimony and opinion on persons nominated for federal judgeships. In 1980 she was named chair of the committee. As chair of the committee, Born was invited to address the U.S. Congress regarding the nomination of Judge Sandra Day O'Connor to the U.S. Supreme Court.
In 1993, Born's name was floated as a possible candidate for Attorney General of the United States, but Janet Reno was nominated.
In July 2009, Nancy Pelosi appointed Brooksley Born as a commissioner to the Financial Crisis Inquiry Commission (FCIC).
Born and the OTC derivatives market
Born was appointed to the CFTC on April 15, 1994, by President Bill Clinton. Due to litigation against Bankers Trust Company by Procter and Gamble and other corporate clients, Born and her team at the CFTC sought comments on the regulation of over-the-counter derivatives, a first step in the process of writing CFTC regulations to supplement the existing regulations of the Federal Reserve System, the Options Clearing Corporation, and the National Association of Insurance Commissioners. Born was particularly concerned about swaps, financial instruments that are traded over the counter between banks, insurance companies or other funds or companies, and thus have no transparency except to the two counterparties and the counterparties' regulators, if any. CFTC regulation was strenuously opposed by Federal Reserve chairman Alan Greenspan, and by Treasury Secretaries Robert Rubin and Lawrence Summers. On May 7, 1998, former SEC Chairman Arthur Levitt joined Rubin and Greenspan in objecting to the issuance of the CFTC's concept release. Their response dismissed Born's analysis and focused on the hypothetical possibility that CFTC regulation of swaps and other OTC derivative instruments could create a "legal uncertainty" regarding such financial instruments, hypothetically reducing the value of the instruments. They argued that the imposition of regulatory costs would "stifle financial innovation" and encourage financial capital to transfer its transactions offshore. The disagreement between Born and the Executive Office's top economic policy advisors has been described not only as a classic Washington turf war, but also a war of ideologies, insofar as it is possible to argue that Born's actions were consistent with Keynesian and neoclassical economics while Greenspan, Rubin, Levitt, and Summers consistently espoused neoliberal, and neoconservative policies.
In 1998, a trillion-dollar hedge fund called Long Term Capital Management (LTCM) was near collapse. Using mathematical models to calculate debt risk, LTCM used derivatives to leverage $5 billion into more than $1 trillion, doing business with fifteen of Wall Street's largest financial institutions. The derivative transactions were not regulated, nor were investors able to evaluate LTCM's exposures. Born stated, "I thought that LTCM was exactly what I had been worried about". In the last weekend of September 1998, the President's working group was told that the entire American economy hung in the balance. After intervention by the Federal Reserve, the crisis was averted. In congressional hearings into the crisis, Greenspan acknowledged that language had been introduced into an agriculture bill that would prevent CFTC from regulating the derivatives which were at the center of the crisis that threatened the US economy. U.S. Representative Maurice Hinchey (D-NY) asked "How many more failures do you think we'd have to have before some regulation in this area might be appropriate?" In response, Greenspan brushed aside the substance of Born's warnings with the simple assertion that "the degree of supervision of regulation of the over-the-counter derivatives market is quite adequate to maintain a degree of stability in the system". Born's warning was that there wasn't any regulation of them. Born's chief of staff, Michael Greenberger summed up Greenspan's position this way: "Greenspan didn't believe that fraud was something that needed to be enforced, and he assumed she probably did. And of course, she did." Under heavy pressure from the financial lobby, legislation prohibiting regulation of derivatives by Born's agency was passed by the Congress. Born resigned on June 1, 1999.
The derivatives market continued to grow yearly throughout both terms of George W. Bush's administration. On September 15, 2008, the bankruptcy of Lehman Brothers forced a broad recognition of a financial crisis in both the US and world capital markets. As Lehman Brothers' failure temporarily reduced financial capital's confidence, a number of newspaper articles and television programs suggested that the failure's possible causes included the conflict between the CFTC and the other regulators.Faiola, Anthony, Nakashima, Ellen and Drew, Jill. The Crash: Risk and Regulation - What Went Wrong, The Washington Post, October 15, 2008.
Born declined to publicly comment on the unfolding 2008 crisis until March 2009, when she said: "The market grew so enormously, with so little oversight and regulation, that it made the financial crisis much deeper and more pervasive than it otherwise would have been." She also lamented the influence of Wall Street lobbyists on the process and the refusal of regulators to discuss even modest reforms.
An October 2009 Frontline documentary titled "The Warning" described Born's thwarted efforts to regulate and bring transparency to the derivatives market, and the continuing opposition thereto. The program concluded with an excerpted interview with Born sounding another warning: "I think we will have continuing danger from these markets and that we will have repeats of the financial crisis -- may differ in details but there will be significant financial downturns and disasters attributed to this regulatory gap, over and over, until we learn from experience."
In 2009 Born, along with Sheila Bair of the FDIC, was awarded the John F. Kennedy Profiles in Courage Award in recognition of the "political courage she demonstrated in sounding early warnings about conditions that contributed" to the 2007-08 financial crisis. According to Caroline Kennedy, "Brooksley Born recognized that the financial security of all Americans was being put at risk by the greed, negligence and opposition of powerful and well connected interests.... The catastrophic financial events of recent months have proved them [Born and Sheila Bair] right." One member of the President's working group had a change of heart about Brooksley Born. SEC Chairman Arthur Levitt stated "I've come to know her as one of the most capable, dedicated, intelligent and committed public servants that I have ever come to know", adding that "I could have done much better. I could have made a difference" in response to her warnings.
In 2010, a documentary film Inside Job further alleged that derivatives regulation was ineffective from the Clinton administration on. Along with fellow whistleblower, former IMF Chief Economist Raghuram Rajan, who was also scorned by the economic establishment, Brooksley Born was cited as one of the authorities arguing that financial derivatives increase economic risk.
Personal life
Born is married to Alexander E. Bennett (also retired from Arnold & Porter). She has five adult children - two from a previous marriage to Jacob Landau and three stepchildren. Notably, Born was named a partner at Arnold & Porter while working part-time so she could raise her two young children. When both of her children were school-age, Born returned to practice full-time.
References
External links
Attorney profile at Arnold & Porter
Brooksley Born (2009 Winner) of the Profiles in Courage Award, with acceptance speech transcript and NECN video
Profile at MarketsWiki
Speeches and statements
"Testimony Of Brooksley Born Chairperson of the CFTC Concerning The Over-The-Counter Derivatives Market", before the House Committee On Banking And Financial Services, July 24, 1998.
"The Lessons of Long Term Capital Management L.P.", Remarks of Brooksley Born, Chairperson of the CFTC, Chicago-Kent-IIT Commodities Law Institute, Chicago, Illinois, October 15, 1998.
Interview: Brooksley Born for "PBS Frontline: The Warning", PBS, (streaming VIDEO 1 hour), October 20, 2009.
Articles
Manuel Roig-Franzia. "Credit Crisis Cassandra:Brooksley Born's Unheeded Warning Is a Rueful Echo 10 Years On", The Washington Post, May 26, 2009
Taibbi, Matt. "The Great American Bubble Machine", Rolling Stone'', July 9–23, 2009
1940 births
American women lawyers
Arnold & Porter people
Clinton administration personnel
Columbus School of Law faculty
Commodity Futures Trading Commission personnel
Heads of United States federal agencies
Lawyers from San Francisco
Living people
Stanford Law School alumni
21st-century American women
Stanford University alumni
|
[
"In 2009, Brooksley Born received the John F. Kennedy Profiles in Courage Award."
] | 2,054
|
multifieldqa_en
|
en
| null |
c93a8eb62278ce7c575ba542b2bcd5e610fa15035906463c
|
What does the paper aim to solve?
|
Paper Info
Title: Generalized Pole-Residue Method for Dynamic Analysis of Nonlinear Systems based on Volterra Series
Publish Date: March 7, 2023
Author List: Qianying Cao (from State Key Laboratory of Coastal and Offshore Engineering, Dalian University of Technology), Anteng Chang (from College of Engineering, Ocean University of China), Junfeng Du (from College of Engineering, Ocean University of China), Lin Lu (from State Key Laboratory of Coastal and Offshore Engineering, Dalian University of Technology)
Figure
Fig. 1: Procedure to compute the response by a combination of Volterra series and Laguerre polynomials
Fig. 2: Linear frequency response function: (a) Modulus of H 1 (ω), (b) phase angle of H 1 (ω)
Fig. 6: Comparison of h 1 (t) based on the analytical and reconstructed by Laguerre polynomials
Fig. 11: Response for Case 1: (a) comparison between the proposed method and Runge-Kutta method, (b) contribution of the three components
Fig. 18: Comparison of original excitations and reconstructed results: (a) Case 1, (b) Case 2 (c) Case 3
Fig. 19: Response to irregular excitation for Case 1: (a) comparison between the proposed method and Runge-Kutta method, (b) contribution of the three components
Fig. 23: Input-output dataset used to identify Volterra series: (a) input excitation, (b) output response
Fig. 26: Comparison of responses between the predicted and numerical results: (a) response to regular excitation, (b) response to irregular excitation
Parameter values of the irregular excitation
abstract
Dynamic systems characterized by second-order nonlinear ordinary differential equations appear in many fields of physics and engineering. To solve these kinds of problems, time-consuming stepby-step numerical integration methods and convolution methods based on Volterra series in the time domain have been widely used.
In contrast, this work develops an efficient generalized pole-residue method based on the Volterra series performed in the Laplace domain. The proposed method involves two steps: (1) the Volterra kernels are decoupled in terms of Laguerre polynomials, and (2) the partial response related to a single Laguerre polynomial is obtained analytically in terms of the pole-residue method.
Compared to the traditional pole-residue method for a linear system, one of the novelties of the pole-residue method in this paper is how to deal with the higher-order poles and their corresponding coefficients. Because the proposed method derives an explicit, continuous response function of time, it is much more efficient than traditional numerical methods.
Unlike the traditional Laplace domain method, the proposed method is applicable to arbitrary irregular excitations. Because the natural response, forced response and cross response are naturally obtained in the solution procedure, meaningful mathematical and physical insights are gained. In numerical studies, systems with a known equation of motion and an unknown equation of motion are investigated.
For each system, regular excitations and complex irregular excitations with different parameters are studied. Numerical studies validate the good accuracy and high efficiency of the proposed method by comparing it with the fourth-order Runge-Kutta method.
Introduction
Most real dynamic systems, as encountered in mechanical and civil engineering, are inherently nonlinear and include geometric nonlinearities, nonlinear constitutive relations in material or nonlinear resistances, etc. . Nonlinear problems are attracting increasing attention from engineers and scientists.
This work focuses on solving nonlinear system vibration problems, i.e., computing transient responses of nonlinear oscillators under arbitrary irregular excitations based on a combination of a pole-residue operation and Volterra series. Because Volterra series are single-valued, the scope of the present study is restricted to nonlinear behaviours without bifurcations .
To analyse nonlinear vibration problems, researchers have performed extensive studies and developed various mathematical methods. Popular methods include step-by-step numerical integration methods in the time domain, such as the Runge-Kutta method. This kind of method not only requires a small time-step resolution for obtaining high-precision solutions but also is prone to numerical instability .
For a long response with small time steps, the time domain methods are very costly in computational time. Volterra series is another widely used method, which is the extension of the Duhamel integral for linear systems . Volterra series can reproduce many nonlinear phenomena, but they are very complex due to higher-dimensional convolution integrals .
Since 1980's, significant progress has been made in the general area of the Volterra series. The reader is referred to Ref. for a quite thorough literature review on the relevant topics. After 2017, most papers focus on Volterra series identification. De Paula and Marques proposed a method for the identification of Volterra kernels, which was based on time-delay neural networks.
Son and Kim presented a method for a direct estimation of the Volterra kernel coefficients. Dalla Libera et al. introduced two new kernels for Volterra series identification. Peng et al. used the measured response to identify the kernel function and performed the nonlinear structural damage detection. Only a few papers concentrated on simplifying the computation of convolution integrals.
Traditional methods for computing convolution integrals involved in the Volterra series have been performed in three distinct domains: time, frequency and Laplace. The time domain method based on Volterra series refers to discrete time convolution methods, which also suffer computational cost problems .
Both the frequency domain method and the Laplace domain method based on the Volterra series consist of three steps: (1) Volterra series are transformed into an algebraic equation in the frequency domain or Laplace domain; the algebraic equation is solved by purely algebraic manipulations; and (3) the solution in Step ( ) is transformed back to the time domain.
Many researchers have used the frequency domain method to compute the responses of nonlinear systems. Billings et al. developed a new method for identifying the generalized frequency response function (GFRF) of nonlinear systems and then predicted the nonlinear response based on these GFRFs. Carassale et al. introduced a frequency domain approach for nonlinear bridge aerodynamics and aeroelasticity.
Ho et al. computed an output frequency domain function of a nonlinear damped duffing system modelled by a Volterra series under a sinusoidal input. Kim et al. identified the higher order frequency response functions by using the nonlinear autoregressive with exogenous input technique and the harmonic probing method.
This type of frequency domain method is much more efficient than the time domain method due to the fast Fourier transform algorithm. However, the frequency domain method not only is limited by frequency resolutions but also suffers from leakage problems due to the use of discrete Fourier transforms. In addition, the frequency domain method calculates only a steady-state response.
A natural response generated by initial conditions and a cross response caused by interactions between a system and an excitation are ignored. In contrast, the Laplace domain method can calculate all response components because initial conditions are considered in the computational procedure. However, it has been restricted to analytical operations for simple excitations, such as sinusoidal excitations and exponential excitations .
The proposed method falls into the category of the Volterra series method computed in the Laplace domain. Unlike the traditional Laplace domain method, the proposed method is applicable to arbitrary irregular excitations. Because the proposed method follows a similar path as a pole-residue method for linear systems , the proposed method to solve nonlinear system vibration problems is called the generalized pole-residue method.
The main concept of the pole-residue method developed by Hu et al. was that the poles and residues of the response could be easily obtained from those of the input and system transfer function to obtain the closed-form response solution of linear systems. This method included three steps: (1) writing the system transfer function into pole-residue form; (2) writing the excitation into pole-residue form by the Prony-SS method; (3) computing the poles and residues of the response by an algebraic operation based on those from system and excitation.
Compared to Hu et al. , which was regarded as an efficient tool to compute responses of linear systems, the generalized pole-residue method in this paper is introduced to compute responses of nonlinear systems. The proposed method involves two steps: (1) the Volterra kernels are decoupled in terms of Laguerre polynomials, and (2) the partial response related to a single Laguerre polynomial is obtained analytically in terms of the pole-residue method.
Compared to the traditional pole-residue method for a linear system, one of the novelties of the generalized pole-residue method is how to deal with the higher-order poles and their corresponding coefficients. Similar to the Taylor series, the Volterra series representation is an infinite series, and convergence conditions are needed to assure that the representation is meaningful.
Because the proposed method is based on the Volterra series, only the system with convergent Volterra series representation can be treated by the proposed method. The paper is organized as follows. In Section 2, the nonlinear response is modelled by a Volterra series, and Volterra kernel functions are decoupled by Laguerre polynomials.
Then, the pole-residue method for computing explicit responses is developed in Section 3. Numerical studies and discussions are given in Section 4. Finally, the conclusions are drawn in Section 5.
Response calculation based on Volterra series
A nonlinear oscillator, whose governing equation of motion is given by where z(t, y, ẏ) represents an arbitrary nonlinear term; m, c, and k are the mass, damping and linear stiffness, respectively; y(t), ẏ(t) and ÿ(t) are the displacement, velocity and acceleration, respectively; and f (t) is the time-dependent excitation.
If the energy of excitation f (t) is limited, the nonlinear response under zero initial conditions (i.e., zero displacement and zero velocity) can be represented by the Volterra series : where N is the order of Volterra series and In Eq. 3, h 1 (τ ) is called the first-order Volterra kernel function, which represents the linear behaviour of the system; h n (τ 1 , . . .
, τ n ) for n > 1 are the higher-order Volterra kernel functions, which describe the nonlinear behaviour of the system. The complete formulation of y(t) includes infinite series where the labour of calculating the n th term increases quickly with the growth of n. Fortunately, the response accuracy may be ensured by the first several order Volterra series.
This is proved here in numerical studies. The commonly known Laguerre polynomials are represented as : where p i is the order of the Laguerre polynomials and a i is the damping rate. The Laguerre polynomials satisfy the orthogonal relationship expressed as: By using Laguerre polynomials, the Volterra kernel function h n (t 1 , . . .
, t n ) in Eq. 3 can be decoupled as follows : where the coefficient is computed resorting to the orthogonal relationship in Eq. 5: Substituting Eq. 6 into Eq. 3 yields . . . The above operation that uses the Laguerre polynomials to decouple Volterra higher order kernel functions has been well-developed.
The reader is referred to Refs. for details about the adopted technique. After decoupling Volterra higher order kernel functions in time, one can regroup Eq. 8 into: . . . By denoting Eq. 9 becomes The above procedure to compute the nonlinear response by a combination of Volterra series and Laguerre polynomials is schematically shown in Fig. .
Volterra kernel functions h n (t 1 , . . . , t n ) can be obtained by either an equation of motion or measured input-output signals. To derive a closedform solution of the response, we must obtain a closed-form solution of x i (t) first. In the following presentation, a closed-form solution of the aforementioned x i (t) and y n (t) is derived by using the pole-residue method.
3. Pole-residue method for calculating x i (t) and y n (t) Performing the Laplace transform of x i (t) in Eq. 10 yields where in which Eq. 13 includes a single pole and several higher-order poles. For k = 0, −a i is a single pole, and b p i (0) is a corresponding coefficient, namely, the residue. For k > 0, −a i are higher-order poles, and b p i (k) are corresponding coefficients.
For an irregular excitation signal f (t) of a finite duration of T , it can always be approximated into a pole-residue form by using the complex exponential signal decomposition method-Prony-SS : where N ℓ is the number of components; α ℓ and λ ℓ are constant coefficients, which either are real numbers or occur in complex conjugate pairs.
We define λ ℓ = −δ ℓ + iΩ ℓ , where Ω ℓ is the excitation frequency and δ ℓ is the damping factor of the ℓ th component. We denote α ℓ = A ℓ e iθ ℓ , where A ℓ is the amplitude and θ ℓ is the sinusoidal initial phase in radians. Taking the Laplace transform of Eq. 15 yields Note that the concept of the Prony-SS method is similar to that of a principal component method.
A smooth excitation usually requires just several terms to achieve a good approximation. For high irregular loadings, including more terms would achieve a better approximation. Substituting Eqs. 13 and 16 into Eq. 12 yields Expressing xi (s) in its pole-residue form yields where λ ℓ are simple poles, and the corresponding residues are easily obtained by
and −a i are higher-order poles, and the corresponding coefficients are firstly derived as: By taking the inverse Laplace transform of Eq. 18, a closed-form solution is obtained: Substituting Eqs. 11 and 21 into Eq. 2 yields Theoretically speaking, the proposed method for deriving the closed-form solution of the nonlinear response is applicable to any order of the Volterra series.
For practical engineering, usually only the first several order responses dominate. By setting up N = 2, Eq. 22 can be simplified into three components: where the natural response, which is only related to system poles, is given by and the cross response, which is related to both system poles and excitation poles, is given by
and the forced response, which is related only to excitation poles, is given by The first term in Eq. 26 is the first-order forced response governed by the excitation frequency, i.e., the imaginary part of the pole λ ℓ . The second term corresponds to the second-order nonlinear forced response, which includes the sum frequency and difference frequency responses governed by λ ℓ + λ j .
Eq. 26 straightforwardly offers visible information about the possible nonlinear vibrations by the cooperation of excitation frequencies. Particularly, consider a sinusoidal excitation f (t) = sin ω r t, which can be expressed as f (t) = γe λt + γ * e λ * t , where γ = −0.5i and λ = iω r . Substituting these values into Eq.
26, the second term of Eq. 26 is simplified as where the first term is the difference frequency response, and the second term is the sum frequency response.
Numerical studies
In practical engineering, some systems have an accurate equation of motion. Additionally, some systems have difficulty constructing their equations of motion because of complex nonlinear dynamic behaviours and uncertain system parameters. In this article, a system with a known equation of motion is called a known system, and a system with an unknown equation of motion is called an unknown system for simplicity.
In this section, two numerical studies are presented. The first study verifies the proposed method using a known nonlinear oscillator, and the second study demonstrates the applicability of the proposed method to an unknown system. Throughout the numerical studies, the unit system is the metre-kilogramme-second (MKS) system; for conciseness, explicit units for quantities are omitted.
A known nonlinear system
This study chooses a nonlinear oscillator written as: where mass m = 1, damping c = 1, linear stiffness k 1 = 10, quadratic stiffness k 2 = 20 and cubic stiffness k 3 = 20. It is a case that has been studied in a previously published article . The linear natural frequency of the system ω 0 = k 1 /m = 3.16 and the damping ratio ζ = c/(2mω 0 ) = 15.8%.
This kind of oscillator occurs in many engineering problems, such as a model of fluid resonance in a narrow gap between large vessels . In the model, k 1 y represents the linear restoring force of the fluid, and k 2 y 2 and k 3 y 3 are respectively the quadratic and cubic nonlinear restoring forces of the fluid.
Volterra kernel functions
Generally, the first several order responses dominate the total response of a system. Hence, the order of the Volterra series in Eq. 22 is chosen to be 3, namely, N = 3. For computing the first three order responses from Eq. 22, the first three order Volterra kernel functions need to be known. Since Volterra kernel functions and corresponding frequency response functions are related by a specific Fourier transform pair, we can first write the first three orders of frequency response functions directly from Eq. 28.
Then, Volterra kernel functions are obtained by the inverse Fourier transform. Based on the harmonic probing algorithm , the linear frequency response function (LFRF) H 1 (ω), the quadratic frequency response function (QFRF) H 2 (ω 1 , ω 2 ) and the cubic frequency response function (CFRF) H 3 (ω 1 , ω 2 , ω 3 ) are analytically given by:
and Figures show H 1 (ω), H 2 (ω 1 , ω 2 ) and H 3 (ω 1 , ω 2 , ω 3 ), respectively, which agree well with those reported in Ref. . As expected, the modulus of H 1 (ω) in Fig. peaks near the linear natural frequency ω 0 , and the phase angle decreases monotonically from 0 to -π with increasing frequency.
Figure shows the sum frequency QFRF, where the energy converges along the line of ω 1 +ω 2 ≈ ω 0 . Therefore, when the sum frequency of a two-tone excitation equals the linear resonant frequency, the second-order response may reach its maximum. Additionally, those pairs of excitations in line ω 1 + ω 2 ≈ ω 0 may produce non-negligible vibration magnitudes due to second-order nonlinear effects.
For the difference frequency QFRF in Fig. (b), the energy converges along two main lines, i.e., ω 1 ≈ ω 0 and ω 2 ≈ ω 0 . Figures show moduli of H 3 (ω, ω, ω) and H 3 (ω, ω, −ω), which are diagonal terms of the sum frequency CFRF and the difference frequency CFRF, respectively. While the modulus of H 3 (ω, ω, ω) peaks near ω ≈ ω 0 /3 and ω 0 , that of H 3 (ω, ω, −ω) peaks near ω ≈ ω 0 with a small hump around ω ≈ ω 0 /2.
Values at ω ≈ ω 0 /3 and ω 0 /2 may be magnified by higher-order stiffness terms in Eq. 28. By performing the inverse fast Fourier transform to Eqs. 29-31, the corresponding linear impulse response function h 1 (t), quadratic impulse response function h 2 (t 1 , t 2 ) and cubic impulse response function h 3 (t 1 , t 2 , t 3 ) are obtained.
Here, h 1 (t) and h 2 (t 1 , t 2 ) are plotted in Figs. , respectively, and h 3 (t, t, t) is shown in Fig. . In the numerical implementation, Eqs. 29-31 have been utilized with the frequency interval ∆ω = 0.1, number of frequency components N n = 1025, and cut-off frequencies 102.4 and −102.4. For decoupling Volterra kernel functions by using Laguerre polynomials, the damping rate and number of Laguerre polynomials for each order Volterra kernel function need to be determined (see Eqs. 4 and 6).
In this example, we set a 1 = a 2 = a 3 = 2 and R 1 = R 2 = R 3 = 24 because coefficients c p 1 ...pn become very small when R n > 24, n = 1, 2, 3. According to Eq. 7, the coefficients of the first three order Volterra kernel functions are calculated, which are shown in Figs. 9 and 10. For convenience, Fig. plots only c p 1 p 2 p 3 for p 3 = 0.
With the increase of the order of Laguerre polynomials, coefficients in Figs. 9 and 10 gradually decrease, which illustrates how the first several orders of Laguerre polynomials dominate all orders of the Volterra kernel function. With the known Laguerre polynomials and corresponding coefficients, Volterra kernel functions are reconstructed by Eq. 6.
For comparison, reconstructed Volterra kernel functions are also plotted in Figs. . The reconstructed results agree well with the analytical values, which verifies the accuracy of the decomposition.
Sinusoidal excitation
From Eq. 28, we consider a sinusoidal excitation where A and Ω are the amplitude and the frequency, respectively. Five cases of A and Ω are shown in Table . Excitation frequencies in Cases 1 and 2 are larger than the linear natural frequency (ω 0 ≈ 3.16), those in Case 3 are very close to ω 0 , and those in Cases 4 and 5 are smaller than ω 0 .
All cases have same amplitudes. The poles of a sinusoidal excitation are λ 1,2 = ±iΩ, and the residues are α 1,2 = ∓iA/2. Numerical values of excitation poles and residues for different cases are listed in Table . Table : Parameter values, poles and residues of the sinusoidal excitation Substituting poles and residues of the excitation, as well as those of the system into Eqs.
20 and 19, response coefficients β p i ,k corresponding to system poles −a i and response coefficients γ p i ,ℓ corresponding to excitation poles λ ℓ are calculated, respectively. According to Eq. 22, the first three orders of responses for each case in Table are calculated. Figures )-15(a) show the comparison of responses obtained by the proposed method and the fourth-order Runge-Kutta method with ∆t = 10 −4 .
For Cases 1 and 2, the first-order responses agree well with the total responses obtained by the Runge-Kutta method, and the higher-order responses only slightly improve the transient parts. For Cases 3-5, the sum of the first three orders of responses is in good agreement with the Runge-Kutta solution.
When the response nonlinearity increases, higher-order responses need to be considered. In other words, the proposed method can accurately compute the nonlinear responses by choosing a small number N of Volterra series terms. Figures )-15(b) show the contributions of the three response components for the five cases.
In each case, the first-order response is the most dominant component, and the contributions of secondand third-order responses are much less than those of the first-order response. Especially for Cases 1 and 2, whose excitation frequencies are far from the linear natural frequency, second-and thirdorder responses are close to zero.
This may be because the QFRF and CFRF approach zero when the frequency is larger than 4 rad/s (see Figs. ). Furthermore, the mean values of the first-order responses are approximately zero, and those of the second-order responses are always smaller than zero, which are the difference frequency components in Eq. 27.
Moreover, it is clearly observed that second-order responses for Cases 3-5 exhibit a periodic oscillation with a period near half of that for the first-order response, which is excited by the sum frequency component of the excitation (see second part of Eq. 27). Compared with steady-state solutions of first-and second-order responses, those of third-order responses in Cases 3-5 are no longer single regular motions.
By performing the FFT, frequency spectra of these three third-order responses are shown in Fig. . We find that these three third-order responses are all dominated by their own fundamental harmonic component and the third harmonic (triple frequency) component. Figure shows the computational time to calculate the response of the oscillator for Case 1 by the proposed method, the fourth-order Runge-Kutta method and the convolution method.
The proposed method, which has an explicit solution, is much more efficient in computational time than the latter two methods, which need small time steps to obtain high-precision solutions. In particular, the efficiency of the proposed method increases with the length of the response time. Computation time (sec.)
t=0.02s Convolution, t=0.02s Convolution, t=0.001s Runge-Kutta, t=0.001s Fig. : Comparison of computation efficiency of the proposed method, the fourth-fifth order Runge-Kutta method and the convolution method regular loading in Case 1
Irregular excitation
In Eq. 28, considering an irregular excitation consisting of several cosine functions where N f is the number of cosine components; A n , Ω n and θ n are the amplitude, frequency and phase angle of the n th component, respectively. Table lists three cases of these parameters. In each case, the amplitudes of all components are the same, and phase angles θ n uniformly distributed between 0 and 2π are randomly generated.
To decompose the excitation into a pole-residue form, the Prony-SS method is used, whose concept is similar to that of a principal component method. The readers are referred to Ref. for details. The chosen rank of each case is also shown in Table . Figure shows the comparison of original excitations and reconstructed results of these three cases, which all have excellent agreement.
show the results computed by the fourth-order Runge-Kutta method. In all cases, the sums of the first three orders of responses agree well with those obtained by the Runge-Kutta method. The contributions of the first three orders of responses for each case are plotted in Figs. )-21(b). Similarly, the system vibration is dominated by the first-order response.
However, the contributions of second-and third-order significantly grow with increasing excitation magnitude and frequency number. Furthermore, when the magnitude of the nonlinear response becomes large, sharp troughs are present. This phenomenon may be induced by the nonlinear stiffness. While the first-order response fails to capture these troughs, the higher-order responses successfully capture these troughs.
Figure plots the computational time to calculate the response of the oscillator for the irregular loading in Case 1 by the proposed method and the fourth-fifth order Runge-Kutta method, respectively. While the fourth-fifth order Runge-Kutta method is more efficient under a small response length, the proposed method becomes much more efficient when the response length is larger than about 130 s.
In addition, the proposed method obtains the explicit response solution, so one can directly obtain the response value at a specific time t p instead of integrating from 0 to t p for traditional numerical methods. Computation time (sec.) Proposed, t=0.02s Runge-Kutta, t=0.001s Fig. : Comparison of computation efficiency of the method and the fourth-fifth order Runge-Kutta method for irregular loading in Case 1
An unknown nonlinear
To check the applicability of the proposed method to an unknown nonlinear system, a known input excitation and its corresponding response are used to identify its Volterra kernel functions. When the Volterra kernel functions are known, we can follow the procedure in Section 4.1 to predict system responses.
In this study, the input excitation is white noise with a constant power spectrum S 0 = 0.001, and the corresponding response is obtained by solving Eq. 28 by the fourth-order Runge-Kutta method, which is shown in Fig. . From Section 4.1, we determine that the sum of the first two orders of responses agrees well with the total response.
In this study, the order of Volterra series N is chosen to be 2, damping rates of Laguerre polynomials are a 1 = a 2 = 2, and numbers of Laguerre polynomials are R 1 = R 2 = 24. To estimate the first two orders of Volterra kernel functions, a matrix equation is constructed using excitation data and response data.
By using the least square method to solve this matrix equation, coefficients c p 1 and c p 1 p 2 in Eq. 8 are identified. Figure plots c p 1 and c p 1 p 2 , respectively, which have good agreement with the exact results in Fig. . Then, the first two order Volterra kernel functions are constructed by Eq. 6.
Compared with the exact results in Figs. , the identified Volterra kernel functions in Fig. completely agree well with the exact solutions. Note that the white noise excitation, which can excite more frequency components of the response, is chosen to obtain good Volterra kernel functions. A regular excitation f (t) = sin(πt) and an irregular excitation f (t) = N f n=1 A n cos(Ω n t + θ n ) with A n = 0.3 and Ω n varying from 0 to 40 with equal interval 1 are chosen as input excitations.
The predicted responses, along with results obtained by the fourth-order Runge-Kutta method, are shown in Fig. . In both cases, the proposed method accurately predicts system responses. As presented in Eq. 23, a nonlinear response is the sum of three terms: natural response y s (t), forced response y f (t) and cross response y c (t).
These individual terms, as well as their sum to two excitations, are shown in Figs. 27 and 28, respectively. As shown in Figs. and 28, both first-and second-order responses include the natural response y s (t) and the forced response y f (t), but the cross response y c (t) only exists in second-order responses.
When t becomes larger, both y s (t) and y c (t) diminish due to the presence of system damping, and the total response is entirely governed by y f (t). Moreover, we notice some features at t = 0 for these components, including y s (0) = −y f (0) for the first-order response and y s (0) + y f (0) = −y c (0) for the second-order response, which are due to imposed zero initial conditions.
Conclusions
Considering arbitrary irregular excitations, an efficient generalized pole-residue method to compute the nonlinear dynamic response modelled by the Volterra series was developed. A core of the proposed method was obtaining poles and corresponding coefficients of Volterra kernel functions, then those of each order response modelled by each order Volterra series.
Once the poles and corresponding coefficients of Volterra kernel functions and excitations were both available, the remaining derivation could follow a similar pole-residue method that had been developed for ordinary linear oscillators. To obtain the poles and corresponding coefficients of Volterra kernel functions, two steps were included: (1) using Laguerre polynomials to decouple higher-order Volterra kernel functions with respect to time and (2) obtaining poles and corresponding coefficients of Laguerre polynomials in the Laplace domain.
Because the proposed method gave an explicit, continuous response function of time, it was much more efficient than traditional numerical methods. Moreover, many meaningful physical and mathematical insights were gained because not only each order response but also the natural response, the forced response and the cross response of each order were obtained in the solution procedure.
To demonstrate that the proposed method was not only suitable for a system with a known equation of motion but also applicable to a system with an unknown equation of motion, two numerical studies were conducted. For each study, regular excitations and complex irregular excitations with different parameters were investigated.
The efficiency of the proposed method was verified by the fourth-order Runge-Kutta method. This paper only computes the response under zero initial conditions. The response under non-zero initial conditions will be investigated in our future work.
|
[
"The paper aims to solve nonlinear system vibration problems efficiently."
] | 5,225
|
multifieldqa_en
|
en
| null |
37dfd65b9a8316b9569875b8bcfc5a8bd65e044a88b2e894
|
What was the name of the first white settlement in McPherson County?
|
McPherson County (standard abbreviation: MP) is a county located in the U.S. state of Kansas. As of the 2020 census, the county population was 30,223. The largest city and county seat is McPherson. The county is named for Civil War General James B. McPherson.
History
Early history
For many millennia, the Great Plains of North America was inhabited by nomadic Native Americans. From the 16th century to 18th century, the Kingdom of France claimed ownership of large parts of North America. In 1762, after the French and Indian War, France secretly ceded New France to Spain, per the Treaty of Fontainebleau. In 1802, Spain returned most of the land to France, but keeping title to about 7,500 square miles.
In 1803, most of the land for modern day Kansas was acquired by the United States from France as part of the 828,000 square mile Louisiana Purchase for 2.83 cents per acre. In 1848, after the Mexican–American War, the Treaty of Guadalupe Hidalgo with Spain brought into the United States all or part of land for ten future states, including southwest Kansas. In 1854, the Kansas Territory was organized, then in 1861 Kansas became the 34th U.S. state.
19th century
From the 1820s to 1870s, the Santa Fe Trail passed through, what is now McPherson County. The trail entered the county, east of Canton, then south of Galva, then north of Inman, and west towards Lyons. In 1855, Charles O. Fuller established a ranch adjacent to the Running Turkey Creek Crossing about two miles south and one mile east of Galva. Fuller's Ranch provided accommodations for travelers on the Santa Fe Trail and was probably the first white settlement in McPherson County.
Peketon County was established in 1860, by the passage of a bill by S. N. Wood: An act to establish Peketon County. Section 1. - That all that territory west of the sixth principal meridian and south of Township 16, in Kansas Territory, be and the same is hereby erected into a county, to be known by the name of Peketon County. On February 17, 1865, Peketon County was abolished, and McPherson County was made a part of Marion County, which extended from the west line of Chase County to the present western boundary of Kansas.
In 1868, Solomon Stephens and L. N. Holmberg were appointed Justices of the Peace—the first officers in what is now McPherson County. The next year (1869) occurred the first election for the township, now the county of McPherson. McPherson was regularly organized as a county in the spring of 1870, a mass meeting being held at Sweadal. Sweadal, the county seat thus selected, was located about one mile and a half southwest of the present site of Lindsborg. In September, however, the County Commissioners resolved to meet at the latter place, McPherson which had already been located some two years.
In April, 1873, a petition was filed for the county seat re-location. It was signed by 483 voters, and a special election was accordingly ordered for June 10. Upon that day, McPherson received 605 votes, New Gottland 325, King City 3 and Lindsborg 1; McPherson's majority over all, 276. In May the McPherson Town Company had offered, as an inducement for the location of the county seat at this point, the free use of rooms for ten years, and the donation of two squares of land on the town site. The offer was accepted the next month, the County Commissioners selecting blocks 56 and 65. Thus the county seat was established at McPherson and has remained since.
As early as 1875, city leaders of Marion held a meeting to consider a branch railroad from Florence. In 1878, Atchison, Topeka and Santa Fe Railway and parties from Marion County and McPherson County chartered the Marion and McPherson Railway Company. In 1879, a branch line was built from Florence to McPherson, in 1880 it was extended to Lyons, in 1881 it was extended to Ellinwood. The line was leased and operated by the Atchison, Topeka and Santa Fe Railway. The line from Florence to Marion, was abandoned in 1968. In 1992, the line from Marion to McPherson was sold to Central Kansas Railway. In 1993, after heavy flood damage, the line from Marion to McPherson was abandoned. The original branch line connected Florence, Marion, Canada, Hillsboro, Lehigh, Canton, Galva, McPherson, Conway, Windom, Little River, Mitchell, Lyons, Chase, then connected with the original AT&SF main line at Ellinwood.
In 1887, the Chicago, Kansas and Nebraska Railway extended its main line from Herington to Pratt. This main line connected Herington, Ramona, Tampa, Durham, Waldeck, Canton, Galva, McPherson, Groveland, Inman, Medora, Hutchinson, Whiteside, Partridge, Arlington, Langdon, Turon, Preston, Natrona, Pratt. In 1888, this main line was extended to Liberal. Later, this line was extended to Tucumcari, New Mexico and Santa Rosa, New Mexico, where it made a connection with the Southern Pacific from El Paso, Texas. The Chicago, Kansas and Nebraska Railway was absorbed by the Chicago, Rock Island and Pacific Railway. This line is also called the "Golden State Route".
20th century
The National Old Trails Road, also known as the Ocean-to-Ocean Highway, was established in 1912, and was routed through Windom, Conway, McPherson.
Geography
According to the U.S. Census Bureau, the county has a total area of , of which is land and (0.3%) is water.
Adjacent counties
Saline County (north)
Dickinson County (northeast)
Marion County (east)
Harvey County (southeast)
Reno County (southwest)
Rice County (west)
Ellsworth County (northwest)
Major highways
Interstate 135
U.S. Route 56
U.S. Route 81
K-4
K-61
K-153
Demographics
The McPherson Micropolitan Statistical Area includes all of McPherson County.
2000 census
As of the census of 2000, there were 29,554 people, 11,205 households, and 7,966 families residing in the county. The population density was 33 people per square mile (13/km2). There were 11,830 housing units at an average density of 13 per square mile (5/km2). The racial makeup of the county was 96.53% White, 0.81% Black or African American, 0.34% Native American, 0.32% Asian, 0.06% Pacific Islander, 0.79% from other races, and 1.16% from two or more races. 1.94% of the population were Hispanic or Latino of any race. 37.1% were of German, 12.9% Swedish, 12.1% American, 6.7% English and 6.3% Irish ancestry according to Census 2000.
There were 11,205 households, out of which 33.00% had children under the age of 18 living with them, 62.50% were married couples living together, 6.00% had a female householder with no husband present, and 28.90% were non-families. 25.50% of all households were made up of individuals, and 11.80% had someone living alone who was 65 years of age or older. The average household size was 2.49 and the average family size was 2.99.
In the county, the population was spread out, with 25.40% under the age of 18, 10.30% from 18 to 24, 25.20% from 25 to 44, 21.80% from 45 to 64, and 17.30% who were 65 years of age or older. The median age was 38 years. For every 100 females there were 95.90 males. For every 100 females age 18 and over, there were 92.90 males.
The median income for a household in the county was $41,138, and the median income for a family was $48,243. Males had a median income of $33,530 versus $21,175 for females. The per capita income for the county was $18,921. About 4.20% of families and 6.60% of the population were below the poverty line, including 5.20% of those under age 18 and 8.10% of those age 65 or over.
Government
Presidential elections
McPherson county is often carried by Republican candidates. The last time a Democratic candidate has carried this county was in 1964 by Lyndon B. Johnson.
Laws
Following amendment to the Kansas Constitution in 1986, the county remained a prohibition, or "dry", county until 1996, when voters approved the sale of alcoholic liquor by the individual drink with a 30 percent food sales requirement.
Education
Colleges
McPherson College in McPherson
Bethany College in Lindsborg
Central Christian College in McPherson
Unified school districts
Smoky Valley USD 400
McPherson USD 418
Canton-Galva USD 419
Moundridge USD 423
Inman USD 448
School district office in neighboring county
Goessel USD 411
Little River-Windom USD 444
Museums
Birger Sandzén Memorial Gallery in Lindsborg
McCormick-Deering Days Museum in Inman
McPherson Museum in McPherson
Lindsborg Old Mill & Swedish Heritage Museum in Lindsborg
Kansas Motorcycle Museum in Marquette
Communities
Cities
Canton
Galva
Inman
Lindsborg
Marquette
McPherson (county seat)
Moundridge
Windom
Unincorporated communities
† means a Census-Designated Place (CDP) by the United States Census Bureau.
Conway
Elyria†
Groveland
Johnstown
New Gottland
Roxbury†
Ghost towns
Alta Mills
Battle Hill
Christian
Doles Park
Elivon
King City
Sweadal
Townships
McPherson County is divided into twenty-five townships. The cities of Lindsborg and McPherson are considered governmentally independent and are excluded from the census figures for the townships. In the following table, the population center is the largest city (or cities) included in that township's population total, if it is of a significant size.
See also
List of people from McPherson County, Kansas
National Register of Historic Places listings in McPherson County, Kansas
McPherson Valley Wetlands
Maxwell Wildlife Refuge
References
Notes
Further reading
Wheeler, Wayne Leland. "An Analysis of Social Change in a Swedish-Immigrant Community: The Case of Lindsborg, Kansas." (PhD dissertation, University of Missouri-Columbia; ProQuest Dissertations Publishing, 1959. 5905657).
County
Through the Years: A Pictorial History of McPherson County; McPherson Sentinel' Heritage House Publishing Co; 1992.
McPherson County First Courthouse Built About 1869 or 1870; Lindsborg News-Record; March 30, 1959.
Pioneer Life and Lore of McPherson County, Kansas; Edna Nyquist; Democratic-Opinion Press; 1932.
A History of the Church of the Brethren in Kansas (includes McPherson College history); Elmer LeRoy Craik; McPherson Daily; Republican Press; 397 pages; 1922.
Portrait and Biographical Record of Dickinson, Saline, McPherson, and Marion Counties, Kansas; Chapman Bros; 614 pages; 1893.
Standard Atlas of McPherson County, Kansas; Geo. A. Ogle & Co; 82 pages; 1921.
Plat Book of McPherson County, Kansas; North West Publishing Co; 50 pages; 1903.
Edwards' Atlas of McPherson County, Kansas; John P. Edwards; 51 pages; 1884.
Trails
The Story of the Marking of the Santa Fe Trail by the Daughters of the American Revolution in Kansas and the State of Kansas; Almira Cordry; Crane Co; 164 pages; 1915. (Download 4MB PDF eBook)
The National Old Trails Road To Southern California, Part 1 (LA to KC); Automobile Club Of Southern California; 64 pages; 1916. (Download 6.8MB PDF eBook)
Mennonite Settlements
Impact of Mennonite settlement on the cultural landscape of Kansas; Brenda Martin; Kansas State University; 1985/1988.
Mennonite settlement : the relationship between the physical and cultural environment; Susan Movle; University of Utah; 1975/1886.
Status of Mennonite women in Kansas in their church and home relationships; Eva Harshbarger; Bluffton College; 1925/1945.
External links
County
McPherson County - Directory of Public Officials
Historical
, from Hatteberg's People'' on KAKE TV news
Maps
McPherson County Maps: Current, Historic, KDOT
Kansas Highway Maps: Current, Historic, KDOT
Kansas Railroad Maps: Current, 1996, 1915, KDOT and Kansas Historical Society
Kansas counties
1867 establishments in Kansas
|
[
"The first white settlement in McPherson County was Fuller's Ranch, established by Charles O. Fuller."
] | 1,865
|
multifieldqa_en
|
en
| null |
92bf77fcae3c753b768f1289eeb1e899fc8e75a14509a5f9
|
What algorithm is engaged in the PLMS-PPIC method?
|
\section{Introduction}\label{S1}
The multiple access interferences (MAI) is the root of user
limitation in CDMA systems \cite{R1,R3}. The parallel least mean
square-partial parallel interference cancelation (PLMS-PPIC) method
is a multiuser detector for code division multiple access (CDMA)
receivers which reduces the effect of MAI in bit detection. In this
method and similar to its former versions like LMS-PPIC \cite{R5}
(see also \cite{RR5}), a weighted value of the MAI of other users is
subtracted before making the decision for a specific user in
different stages \cite{cohpaper}. In both of these methods, the
normalized least mean square (NLMS) algorithm is engaged
\cite{Haykin96}. The $m^{\rm th}$ element of the weight vector in
each stage is the true transmitted binary value of the $m^{\rm th}$
user divided by its hard estimate value from the previous stage. The
magnitude of all weight elements in all stages are equal to unity.
Unlike the LMS-PPIC, the PLMS-PPIC method tries to keep this
property in each iteration by using a set of NLMS algorithms with
different step-sizes instead of one NLMS algorithm used in LMS-PPIC.
In each iteration, the parameter estimate of the NLMS algorithm is
chosen whose element magnitudes of cancelation weight estimate have
the best match with unity. In PLMS-PPIC implementation it is assumed
that the receiver knows the phases of all user channels. However in
practice, these phases are not known and should be estimated. In
this paper we improve the PLMS-PPIC procedure \cite{cohpaper} in
such a way that when there is only a partial information of the
channel phases, this modified version simultaneously estimates the
phases and the cancelation weights. The partial information is the
quarter of each channel phase in $(0,2\pi)$.
The rest of the paper is organized as follows: In section \ref{S4}
the modified version of PLMS-PPIC with capability of channel phase
estimation is introduced. In section \ref{S5} some simulation
examples illustrate the results of the proposed method. Finally the
paper is concluded in section \ref{S6}.
\section{Multistage Parallel Interference Cancelation: Modified PLMS-PPIC Method}\label{S4}
We assume $M$ users synchronously send their symbols
$\alpha_1,\alpha_2,\cdots,\alpha_M$ via a base-band CDMA
transmission system where $\alpha_m\in\{-1,1\}$. The $m^{th}$ user
has its own code $p_m(.)$ of length $N$, where $p_m(n)\in \{-1,1\}$,
for all $n$. It means that for each symbol $N$ bits are transmitted
by each user and the processing gain is equal to $N$. At the
receiver we assume that perfect power control scheme is applied.
Without loss of generality, we also assume that the power gains of
all channels are equal to unity and users' channels do not change
during each symbol transmission (it can change from one symbol
transmission to the next one) and the channel phase $\phi_m$ of
$m^{th}$ user is unknown for all $m=1,2,\cdots,M$ (see
\cite{cohpaper} for coherent transmission). According to the above
assumptions the received signal is
\begin{equation}
\label{e1} r(n)=\sum\limits_{m=1}^{M}\alpha_m
e^{j\phi_m}p_m(n)+v(n),~~~~n=1,2,\cdots,N,
\end{equation}
where $v(n)$ is the additive white Gaussian noise with zero mean and
variance $\sigma^2$. Multistage parallel interference cancelation
method uses $\alpha^{s-1}_1,\alpha^{s-1}_2,\cdots,\alpha^{s-1}_M$,
the bit estimates outputs of the previous stage, $s-1$, to estimate
the related MAI of each user. It then subtracts it from the received
signal $r(n)$ and makes a new decision on each user variable
individually to make a new variable set
$\alpha^{s}_1,\alpha^{s}_2,\cdots,\alpha^{s}_M$ for the current
stage $s$. Usually the variable set of the first stage (stage $0$)
is the output of a conventional detector. The output of the last
stage is considered as the final estimate of transmitted bits. In
the following we explain the structure of a modified version of the
PLMS-PIC method \cite{cohpaper} with simultaneous capability of
estimating the cancelation weights and the channel phases.
Assume $\alpha_m^{(s-1)}\in\{-1,1\}$ is a given estimate of
$\alpha_m$ from stage $s-1$. Define
\begin{equation}
\label{e6} w^s_{m}=\frac{\alpha_m}{\alpha_m^{(s-1)}}e^{j\phi_m}.
\end{equation}
From (\ref{e1}) and (\ref{e6}) we have
\begin{equation}
\label{e7} r(n)=\sum\limits_{m=1}^{M}w^s_m\alpha^{(s-1)}_m
p_m(n)+v(n).
\end{equation}
Define
\begin{subequations}
\begin{eqnarray}
\label{e8} W^s&=&[w^s_{1},w^s_{2},\cdots,w^s_{M}]^T,\\
\label{e9}
\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!X^{s}(n)\!\!\!&=&\!\!\![\alpha^{(s-1)}_1p_1(n),\alpha^{(s-1)}_2p_2(n),\cdots,\alpha^{(s-1)}_Mp_M(n)]^T.
\end{eqnarray}
\end{subequations}
where $T$ stands for transposition. From equations (\ref{e7}),
(\ref{e8}) and (\ref{e9}), we have
\begin{equation}
\label{e10} r(n)=W^{s^T}X^{s}(n)+v(n).
\end{equation}
Given the observations $\{r(n),X^{s}(n)\}^{N}_{n=1}$, in modified
PLMS-PPIC, like the PLMS-PPIC \cite{cohpaper}, a set of NLMS
adaptive algorithm are used to compute
\begin{equation}
\label{te1} W^{s}(N)=[w^{s}_1(N),w^{s}_2(N),\cdots,w^{s}_M(N)]^T,
\end{equation}
which is an estimate of $W^s$ after iteration $N$. To do so, from
(\ref{e6}), we have
\begin{equation}
\label{e13} |w^s_{m}|=1 ~~~m=1,2,\cdots,M,
\end{equation}
which is equivalent to
\begin{equation}
\label{e14} \sum\limits_{m=1}^{M}||w^s_{m}|-1|=0.
\end{equation}
We divide $\Psi=\left(0,1-\sqrt{\frac{M-1}{M}}\right]$, a sharp
range for $\mu$ (the step-size of the NLMS algorithm) given in
\cite{sg2005}, into $L$ subintervals and consider $L$ individual
step-sizes $\Theta=\{\mu_1,\mu_2,\cdots,\mu_L\}$, where
$\mu_1=\frac{1-\sqrt{\frac{M-1}{M}}}{L}, \mu_2=2\mu_1,\cdots$, and
$\mu_L=L\mu_1$. In each stage, $L$ individual NLMS algorithms are
executed ($\mu_l$ is the step-size of the $l^{th}$ algorithm). In
stage $s$ and at iteration $n$, if
$W^{s}_k(n)=[w^s_{1,k},\cdots,w^s_{M,k}]^T$, the parameter estimate
of the $k^{\rm th}$ algorithm, minimizes our criteria, then it is
considered as the parameter estimate at time iteration $n$. In other
words if the next equation holds
\begin{equation}
\label{e17} W^s_k(n)=\arg\min\limits_{W^s_l(n)\in I_{W^s}
}\left\{\sum\limits_{m=1}^{M}||w^s_{m,l}(n)|-1|\right\},
\end{equation}
where $W^{s}_l(n)=W^{s}(n-1)+\mu_l \frac{X^s(n)}{\|X^s(n)\|^2}e(n),
~~~ l=1,2,\cdots,k,\cdots,L-1,L$ and
$I_{W^s}=\{W^s_1(n),\cdots,W^s_L(n)\}$, then we have
$W^s(n)=W^s_k(n)$, and therefore all other algorithms replace their
weight estimate by $W^{s}_k(n)$. At time instant $n=N$, this
procedure gives $W^s(N)$, the final estimate of $W^s$, as the true
parameter of stage $s$.
Now consider $R=(0,2\pi)$ and divide it into four equal parts
$R_1=(0,\frac{\pi}{2})$, $R_2=(\frac{\pi}{2},\pi)$,
$R_3=(\pi,\frac{3\pi}{2})$ and $R_4=(\frac{3\pi}{2},2\pi)$. The
partial information of channel phases (given by the receiver) is in
a way that it shows each $\phi_m$ ($m=1,2,\cdots,M$) belongs to
which one of the four quarters $R_i,~i=1,2,3,4$. Assume
$W^{s}(N)=[w^{s}_1(N),w^{s}_2(N),\cdots,w^{s}_M(N)]^T$ is the weight
estimate of the modified algorithm PLMS-PPIC at time instant $N$ of
the stage $s$. From equation (\ref{e6}) we have
\begin{equation}
\label{tt3}
\phi_m=\angle({\frac{\alpha^{(s-1)}_m}{\alpha_m}w^s_m}).
\end{equation}
We estimate $\phi_m$ by $\hat{\phi}^s_m$, where
\begin{equation}
\label{ee3}
\hat{\phi}^s_m=\angle{(\frac{\alpha^{(s-1)}_m}{\alpha_m}w^s_m(N))}.
\end{equation}
Because $\frac{\alpha^{(s-1)}_m}{\alpha_m}=1$ or $-1$, we have
\begin{eqnarray}
\hat{\phi}^s_m=\left\{\begin{array}{ll} \angle{w^s_m(N)} &
\mbox{if}~
\frac{\alpha^{(s-1)}_m}{\alpha_m}=1\\
\pm\pi+\angle{w^s_m(N)} & \mbox{if}~
\frac{\alpha^{(s-1)}_m}{\alpha_m}=-1\end{array}\right.
\end{eqnarray}
Hence $\hat{\phi}^s_m\in P^s=\{\angle{w^s_m(N)},
\angle{w^s_m(N)+\pi, \angle{w^s_m(N)}-\pi}\}$. If $w^s_m(N)$
sufficiently converges to its true value $w^s_m$, the same region
for $\hat{\phi}^s_m$ and $\phi_m$ is expected. In this case only one
of the three members of $P^s$ has the same region as $\phi_m$. For
example if $\phi_m \in (0,\frac{\pi}{2})$, then $\hat{\phi}^s_m \in
(0,\frac{\pi}{2})$ and therefore only $\angle{w^s_m(N)}$ or
$\angle{w^s_m(N)}+\pi$ or $\angle{w^s_m(N)}-\pi$ belongs to
$(0,\frac{\pi}{2})$. If, for example, $\angle{w^s_m(N)}+\pi$ is such
a member between all three members of $P^s$, it is the best
candidate for phase estimation. In other words,
\[\phi_m\approx\hat{\phi}^s_m=\angle{w^s_m(N)}+\pi.\]
We admit that when there is a member of $P^s$ in the quarter of
$\phi_m$, then $w^s_m(N)$ converges. What would happen when non of
the members of $P^s$ has the same quarter as $\phi_m$? This
situation will happen when the absolute difference between $\angle
w^s_m(N)$ and $\phi_m$ is greater than $\pi$. It means that
$w^s_m(N)$ has not converged yet. In this case where we can not
count on $w^s_m(N)$, the expected value is the optimum choice for
the channel phase estimation, e.g. if $\phi_m \in (0,\frac{\pi}{2})$
then $\frac{\pi}{4}$ is the estimation of the channel phase
$\phi_m$, or if $\phi_m \in (\frac{\pi}{2},\pi)$ then
$\frac{3\pi}{4}$ is the estimation of the channel phase $\phi_m$.
The results of the above discussion are summarized in the next
equation
\begin{eqnarray}
\nonumber \hat{\phi}^s_m = \left\{\begin{array}{llll} \angle
{w^s_m(N)} & \mbox{if}~
\angle{w^s_m(N)}, \phi_m\in R_i,~~i=1,2,3,4\\
\angle{w^s_m(N)}+\pi & \mbox{if}~ \angle{w^s_m(N)}+\pi, \phi_m\in
R_i,~~i=1,2,3,4\\
\angle{w^n_m(N)}-\pi & \mbox{if}~ \angle{w^s_m(N)}-\pi, \phi_m\in
R_i,~~i=1,2,3,4\\
\frac{(i-1)\pi+i\pi}{4} & \mbox{if}~ \phi_m\in
R_i,~~\angle{w^s_m(N)},\angle
{w^s_m(N)}\pm\pi\notin R_i,~~i=1,2,3,4.\\
\end{array}\right.
\end{eqnarray}
Having an estimation of the channel phases, the rest of the proposed
method is given by estimating $\alpha^{s}_m$ as follows:
\begin{equation}
\label{tt4}
\alpha^{s}_m=\mbox{sign}\left\{\mbox{real}\left\{\sum\limits_{n=1}^{N}
q^s_m(n)e^{-j\hat{\phi}^s_m}p_m(n)\right\}\right\},
\end{equation}
where
\begin{equation} \label{tt5}
q^{s}_{m}(n)=r(n)-\sum\limits_{m^{'}=1,m^{'}\ne
m}^{M}w^{s}_{m^{'}}(N)\alpha^{(s-1)}_{m^{'}} p_{m^{'}}(n).
\end{equation}
The inputs of the first stage $\{\alpha^{0}_m\}_{m=1}^M$ (needed for
computing $X^1(n)$) are given by
\begin{equation}
\label{qte5}
\alpha^{0}_m=\mbox{sign}\left\{\mbox{real}\left\{\sum\limits_{n=1}^{N}
r(n)e^{-j\hat{\phi}^0_m}p_m(n)\right\}\right\}.
\end{equation}
Assuming $\phi_m\in R_i$, then
\begin{equation}
\label{qqpp} \hat{\phi}^0_m =\frac{(i-1)\pi+i\pi}{4}.
\end{equation}
Table \ref{tab4} shows the structure of the modified PLMS-PPIC
method. It is to be notified that
\begin{itemize}
\item Equation (\ref{qte5}) shows the conventional bit detection
method when the receiver only knows the quarter of channel phase in
$(0,2\pi)$. \item With $L=1$ (i.e. only one NLMS algorithm), the
modified PLMS-PPIC can be thought as a modified version of the
LMS-PPIC method.
\end{itemize}
In the following section some examples are given to illustrate the
effectiveness of the proposed method.
\section{Simulations}\label{S5}
In this section we have considered some simulation examples.
Examples \ref{ex2}-\ref{ex4} compare the conventional, the modified
LMS-PPIC and the modified PLMS-PPIC methods in three cases: balanced
channels, unbalanced channels and time varying channels. In all
examples, the receivers have only the quarter of each channel phase.
Example \ref{ex2} is given to compare the modified LMS-PPIC and the
PLMS-PPIC in the case of balanced channels.
\begin{example}{\it Balanced channels}:
\label{ex2}
\begin{table}
\caption{Channel phase estimate of the first user (example
\ref{ex2})} \label{tabex5} \centerline{{
\begin{tabular}{|c|c|c|c|c|}
\hline
\multirow{6}{*}{\rotatebox{90}{$\phi_m=\frac{3\pi}{8},M=15~~$}} & N(Iteration) & Stage Number& NLMS & PNLMS \\
&&&&\\
\cline{2-5} & \multirow{2}{*}{64}& s = 2 & $\hat{\phi}^s_m=\frac{3.24\pi}{8}$ & $\hat{\phi}^s_m=\frac{3.18\pi}{8}$ \\
\cline{3-5} & & s = 3 & $\hat{\phi}^s_m=\frac{3.24\pi}{8}$ & $\hat{\phi}^s_m=\frac{3.18\pi}{8}$ \\
\cline{2-5} & \multirow{2}{*}{256}& s = 2 & $\hat{\phi}^s_m=\frac{2.85\pi}{8}$ & $\hat{\phi}^s_m=\frac{2.88\pi}{8}$ \\
\cline{3-5} & & s = 3 & $\hat{\phi}^s_m=\frac{2.85\pi}{8}$ & $\hat{\phi}^s_m=\frac{2.88\pi}{8}$ \\
\cline{2-5} \hline
\end{tabular} }}
\end{table}
Consider the system model (\ref{e7}) in which $M$ users
synchronously send their bits to the receiver through their
channels. It is assumed that each user's information consists of
codes of length $N$. It is also assumd that the signal to noise
ratio (SNR) is 0dB. In this example there is no power-unbalanced or
channel loss is assumed. The step-size of the NLMS algorithm in
modified LMS-PPIC method is $\mu=0.1(1-\sqrt{\frac{M-1}{M}})$ and
the set of step-sizes of the parallel NLMS algorithms in modified
PLMS-PPIC method are
$\Theta=\{0.01,0.05,0.1,0.2,\cdots,1\}(1-\sqrt{\frac{M-1}{M}})$,
i.e. $\mu_1=0.01(1-\sqrt{\frac{M-1}{M}}),\cdots,
\mu_4=0.2(1-\sqrt{\frac{M-1}{M}}),\cdots,
\mu_{12}=(1-\sqrt{\frac{M-1}{M}})$. Figure~\ref{Figexp1NonCoh}
illustrates the bit error rate (BER) for the case of two stages and
for $N=64$ and $N=256$. Simulations also show that there is no
remarkable difference between results in two stage and three stage
scenarios. Table~\ref{tabex5} compares the average channel phase
estimate of the first user in each stage and over $10$ runs of
modified LMS-PPIC and PLMS-PPIC, when the the number of users is
$M=15$.
\end{example}
Although LMS-PPIC and PLMS-PPIC, as well as their modified versions,
are structured based on the assumption of no near-far problem
(examples \ref{ex3} and \ref{ex4}), these methods and especially the
second one have remarkable performance in the cases of unbalanced
and/or time varying channels.
\begin{example}{\it Unbalanced channels}:
\label{ex3}
\begin{table}
\caption{Channel phase estimate of the first user (example
\ref{ex3})} \label{tabex6} \centerline{{
\begin{tabular}{|c|c|c|c|c|}
\hline
\multirow{6}{*}{\rotatebox{90}{$\phi_m=\frac{3\pi}{8},M=15~~$}} & N(Iteration) & Stage Number& NLMS & PNLMS \\
&&&&\\
\cline{2-5} & \multirow{2}{*}{64}& s=2 & $\hat{\phi}^s_m=\frac{2.45\pi}{8}$ & $\hat{\phi}^s_m=\frac{2.36\pi}{8}$ \\
\cline{3-5} & & s=3 & $\hat{\phi}^s_m=\frac{2.71\pi}{8}$ & $\hat{\phi}^s_m=\frac{2.80\pi}{8}$ \\
\cline{2-5} & \multirow{2}{*}{256}& s=2 & $\hat{\phi}^s_m=\frac{3.09\pi}{8}$ & $\hat{\phi}^s_m=\frac{2.86\pi}{8}$ \\
\cline{3-5} & & s=3 & $\hat{\phi}^s_m=\frac{2.93\pi}{8}$ & $\hat{\phi}^s_m=\frac{3.01\pi}{8}$ \\
\cline{2-5} \hline
\end{tabular} }}
\end{table}
Consider example \ref{ex2} with power unbalanced and/or channel loss
in transmission system, i.e. the true model at stage $s$ is
\begin{equation}
\label{ve7} r(n)=\sum\limits_{m=1}^{M}\beta_m
w^s_m\alpha^{(s-1)}_m c_m(n)+v(n),
\end{equation}
where $0<\beta_m\leq 1$ for all $1\leq m \leq M$. Both the LMS-PPIC
and the PLMS-PPIC methods assume the model (\ref{e7}), and their
estimations are based on observations $\{r(n),X^s(n)\}$, instead of
$\{r(n),\mathbf{G}X^s(n)\}$, where the channel gain matrix is
$\mathbf{G}=\mbox{diag}(\beta_1,\beta_2,\cdots,\beta_m)$. In this
case we repeat example \ref{ex2}. We randomly get each element of
$G$ from $[0,0.3]$. Figure~\ref{Figexp2NonCoh} illustrates the BER
versus the number of users. Table~\ref{tabex6} compares the channel
phase estimate of the first user in each stage and over $10$ runs of
modified LMS-PPIC and modified PLMS-PPIC for $M=15$.
\end{example}
\begin{example}
\label{ex4} {\it Time varying channels}: Consider example \ref{ex2}
with time varying Rayleigh fading channels. In this case we assume
the maximum Doppler shift of $40$HZ, the three-tap
frequency-selective channel with delay vector of $\{2\times
10^{-6},2.5\times 10^{-6},3\times 10^{-6}\}$sec and gain vector of
$\{-5,-3,-10\}$dB. Figure~\ref{Figexp3NonCoh} shows the average BER
over all users versus $M$ and using two stages.
\end{example}
\section{Conclusion}\label{S6}
In this paper, parallel interference cancelation using adaptive
multistage structure and employing a set of NLMS algorithms with
different step-sizes is proposed, when just the quarter of the
channel phase of each user is known. In fact, the algorithm has been
proposed for coherent transmission with full information on channel
phases in \cite{cohpaper}. This paper is a modification on the
previously proposed algorithm. Simulation results show that the new
method has a remarkable performance for different scenarios
including Rayleigh fading channels even if the channel is
unbalanced.
|
[
"The normalized least mean square (NLMS) algorithm."
] | 2,008
|
multifieldqa_en
|
en
| null |
73b9b4130b4a4931bed5ea7e24331ce61b59271eac6c6c01
|
What is the effect of accounting for path preference on the robot's belief update?
|
Paper Info
Title: Incorporating Human Path Preferences in Robot Navigation with Minimal Interventions
Publish Date: 16 Mar 2023
Author List: Oriana Peltzer, Dylan Asmar, Mac Schwager, Mykel Kochenderfer
Figure
Hyperplane arrangement of a twodimensional space containing two obstacles (colored in gray).The robot is located inside the pink polytope, surrounded by three adjacent obstacle-free polytopes.Each hyperplane on the boundary of the robot's polytope corresponds to one of the nonredundant constraints in eq.(4).(b)Graph derived from the hyperplane arrangement.The nodes on the graph designate polytopes, and edges designate transitions to adjacent polytopes.To estimate the human's preference, the robot updates a posterior over the goal and over which of the graph transitions φ 1 , φ 2 and φ 3 is preferred by the human.(c)Example preference defined over the graph.The location of the goal is indicated in yellow in the lower right polytope.For each node, the outgoing pink arrow designates the edge on the graph corresponding to the preferred transition between polytopes.
Simple, 10 × 10, 8 polytopes.(b) Map 2: Office, 10 × 10, 56 polytopes.(c) Map 3: Classroom, 20 × 20, 73 polytopes.(d) Sampled observations and robot's executed trajectories.
Fig.5: Maps used for simulating the robot navigation problem with path preferences.In (d), the heading angles observed are indicated with arrows.The goal is indicated with a pink circle, and the orange robot corresponds to the starting location.The blue robot follows a policy that accounts for path preference, while the green robot does not.The opacity of the robots increases with time.
Map 1 problem setup and example realizations for goal-only (green) and path preference (blue) solution methods.The robot starts at the lower left corner of the environment, and the goal of the task (pink circle) is in the upper left area.The robot does not know which goal, among 10 options (shown in light blue squares), is the correct goal.The human provides noisy observations, indicated by arrows, at each iteration.The green robot selects actions according to the goal-only baseline, and the blue robot uses our proposed method to infer path preferences.The polytopes composing G are drawn in blue.Probability of correct goal.WLPHVWHS +J (c) Entropy of goal distribution g.
Fig. 6: Probability of the correct goal, fig.6b, and entropy of the goal belief distribution P (g), fig.6c, for the same problem setup, fig.6a.In this problem instance, the human's preference is to go to the goal by passing on the right side of the obstacle.Results are averaged over 50 runs and the area filled represents one standard deviation above and below the mean value.The goal-only baseline shows an over-confident prediction (shown by the strong reduction in belief entropy) that the correct goal is less likely, making it more difficult to reach the correct goal compared to a method that accounts for path preference.
Success rates in the simple environment (Map 1).The results are averaged over 6 randomly sampled problem instances (start location, goal location, and goal possibilities), and over 50 runs per problem instance.∆T is the number of time steps separating two consecutive human inputs.The robot's mission time is Tmax = 30 time steps.We selected γ h = 1.5, corresponding to relatively noisy human inputs and making the problem more difficult to solve for the robot.
Computation times for Goal Only and Path Preference methods on Map 1 (fig.5a),Map 2 (fig.5b), and Map 3 (fig.5c),averaged over 100 runs with randomly sampled problem instances.The 95 % confidence interval is provided with the mean.We evaluate computation time at the first iteration of each run (where the search depth takes on its highest value Tmax).
abstract
Robots that can effectively understand human intentions from actions are crucial for successful human-robot collaboration. In this work, we address the challenge of a robot navigating towards an unknown goal while also accounting for a human's preference for a particular path in the presence of obstacles.
This problem is particularly challenging when both the goal and path preference are unknown a priori. To overcome this challenge, we propose a method for encoding and inferring path preference online using a partitioning of the space into polytopes. Our approach enables joint inference over the goal and path preference using a stochastic observation model for the human.
We evaluate our method on an unknown-goal navigation problem with sparse human interventions, and find that it outperforms baseline approaches as the human's inputs become increasingly sparse. We find that the time required to update the robot's belief does not increase with the complexity of the environment, which makes our method suitable for online applications.
INTRODUCTION
Collaboration between humans and robots has become increasingly important and one key aspect of this collaboration is the ability for robots to adapt to human decisions. In many scenarios, such as a robot navigating through a busy room to deliver an item, it is important for the robot to take into account human preferences.
For instance, humans may prefer a specific path that would allow their colleagues to notice the item being delivered, but this preference may change dynamically based on various factors such as changes in the environment or unforeseen circumstances. While some preferences can be incorporated into the path-planning process, accommodating dynamic user preferences in real-time remains challenging.
In this paper, we propose a way to enable robots to adapt to human preferences dynamically by leveraging real-time feedback to inform decision-making. In this work, we tackle the problem of robot navigation in which the robot cannot observe the goal or the preferred path to the goal, but must make navigation decisions that are influenced by humans through recommended actions.
Prior work has explored how to adapt to a human's preference through feedback, but such approaches often require a high level of intervention, which can be time-consuming and impractical in real-world scenarios. To optimize the use of human input and quickly infer the human's preference, Fig. : An autonomous robot navigates in a simulated classroom towards a goal location (pink circle).
At the start of its mission, it receives direction indications (arrows) from a human that indicate which path it should take to get to the goal. In this scenario, the human wants the robot to go around the desks on the right side of the classroom. A robot that does not reason over path preferences (green) will take the shortest path to the goal regardless of the human's input.
Our method (blue) infers the human's path preference from these indications and adapts to their recommendations. we propose an approach that leverages probabilistic representations of human preference and incorporates real-time feedback. Previous research by Bajcsy et al. considered an online adaptation problem in a manipulation task, where the person can apply forces to the robot to indicate their preferences.
By allowing the robot to continue its task while taking into account a probabilistic representation of human preference, their approach does not require frequent inputs. Building on this idea, we adopt a similar approach to adapt to a human's preference in the context of a robot autonomously navigating through a known environment, such as a cluttered office space.
Specifically, we focus on allowing the human to influence the robot's trajectory with respect to obstacles, by providing guidance on preferred routes or paths, while the robot continues to execute its task. Paths can be represented using homotopy classes . However, homotopies can pose computational challenges when used to encode and infer human preferences.
When the robot maintains a belief over homotopy classes, the inference problem can become exponentially complex with the number of obstacles in the space. Additionally, when the goal is unknown, the number of variables increases with the number of candidate destinations. This complexity can render the decision-making problem intractable.
Our solution is to encode path preference based on a partitioning of the environment into polytopes . This representation allows path preferences to be expressed as sets of preferred transitions between adjacent polytopes. Paths belonging to different homotopy classes correspond to different sequences of transitions.
By leveraging conditional independence assumptions, we can make the Bayesian inference problem tractable. These assumptions exploit the fact that human actions provide information about the path in a piece-wise manner. For example, indicating a preference for navigating around a particular obstacle only provides information about the local area and not the entire path.
Finally, after updating its belief representation over the human's preference, the robot can adapt to indications by replanning online. Our contributions are as follows. • We formulate the human-robot collaboration problem as a Partially Observable Markov Decision Process (POMDP) where both the goal of the task and the human's path preference are unknown random variables.
• We propose an encoding of a human's path preference using a partitioning of the environment into polytopes, along with conditional independence assumptions that make the Bayesian inference problem tractable to infer the task goal and path preference online. • Through simulations in two environments of different sizes and complexity, we show that our method is effective for solving problems where the robot must reach a goal that is unknown a-priori while simultaneously adapting to a human's indications.
Our method shows higher success rates compared to baseline approaches when the human inputs are sparse. Our approach enables a robot to make effective navigation decisions in collaboration with a human, even when the goal and path preference are not known in advance, and with minimal human input. In recent years, there has been a growing interest in shared autonomy and interactive systems, where humans and robots work together to accomplish tasks.
Several approaches have been proposed to address the challenge of enabling effective collaboration between human and robot agents while still achieving high task performance. Losey et al. and Jeon, Losey, and Sadigh propose a framework where a human operator is given control of a task-relevant latent action space while an autonomous system handles the rest.
Dragan and Srinivasa present a formalism for arbitrating between a user's input and a robot's policy when both human and robot share control of the same action space. Cognetti et al. [7] provide a method for real-time modifications of a path, . . . Fig. : We model the intent inference problem with the above diagram.
At each step in time, the robot receives an observation ot from the human conditioned on its current location st, the intended goal g, and the human's path preference θ. The robot updates its belief over g and θ and transitions to a next location st+1. while Hagenow et al. present a method that allows an outside agent to modify key robot state variables and blends the changes with the original control.
However, a common challenge of these approaches is the high level of intervention required from humans. Best and Fitch propose a method for predicting an agent's intended trajectory from observations. Rather than maintaining a belief over the agent's future path, they infer the agent's intended goal among a set of candidate locations at the boundary of the space.
This approach provides information on where the agent is heading and generates a distribution of candidate future trajectories for the agent. Inferring the goal of the task among a discrete set of candidates is also relevant to the area of shared autonomy. Javdani, Srinivasa, and Bagnell propose a formalism for shared control of a robotic arm, where the robot must assist the human in picking up an object but needs to infer which object the human has chosen from joystick inputs.
Planning with homotopy class constraints is useful in problems where the robot's requirements are given with respect to obstacles, and Yi, Goodrich, and Seppi consider topological constraints provided by human operators. Bhattacharya propose an efficient algorithm for solving pathplanning problems under homotopic constraints.
However, the number of homotopy classes for a given problem can be infinite, and as the robot changes location and updates its representation of the world, carrying out inference over homotopy classes in a dynamic environment requires recomputing the set of homotopies at every iteration, making the belief update challenging.
Prior work has addressed the challenge of shared autonomy by considering how robots can infer a human's intended goal, or how they can infer the preferred path to a goal. However, we argue that inferring the goal and the path as separate problems can lead to over-confidence in incorrect beliefs about the user's preferences.
To illustrate this point, consider the following scenario: a robot and a human are collaborating to move an object from one end of a room to Fig. : Using the hyperplanes composing the H-representation of each obstacle, we construct a hyperplane arrangement of the obstacle-free space (a). We define the human's preference for the robot's one step action choices as the posterior distribution (given all human input up to that point) over transitions from the current to the neighboring polytopes, i.e. edges on the graph.
Each time the robot transitions to a new polytope, the set of neighbor polytopes and the distribution over human preferences are updated. another, but there is an obstacle in the way. The human would like the robot to take a path around the obstacle on the left, even though the goal is on the right. If the robot only infers the goal from the human's inputs, it may incorrectly assume that the goal is on the right, and become over-confident in this belief.
On the other hand, if the robot only infers the preferred path, it may mistakenly assume that the goal is on the left, leading to a failure in completing the task. To overcome these challenges, our work proposes a joint inference approach that considers both the human's intended goal and their preferred path to that goal.
Specifically, we model the human's preference over different homotopy classes and leverage a conditional independence assumption to provide a tractable solution. In our approach, we assume that the human's inputs are noisily rational conditioned on both the goal and the preference. By jointly inferring the goal and path preference, we can avoid over-confidence in incorrect beliefs about the user's preferences, leading to improved system performance.
We consider the problem of robot navigation in a known environment to an unknown destination, where a human can intervene and provide a heading direction to the robot using a joystick or force cues. The human also has a preference on which path the robot should take with respect to obstacles, and our objective is for the robot to understand the human's intentions and execute the task with minimal interventions.
Let g be a discrete random variable denoting the goal of the task, belonging to a set of candidates Ω g , and let θ be a discrete-valued random variable representing the human's path preference, belonging to a set of possible preferences Θ. The physical location of the robot at time index t is denoted by s t ∈ R 2 , and the robot's action at time index t, belonging to some action space A, is denoted by a t .
The transition model T (s t+1 | s t , a t ) is deterministic, meaning the robot has full control over its future location. At any time step, the human may provide an observation to the robot. When the human intervenes, the robot receives a direction (heading angle) that can be mapped to a future location in space.
More specifically, we map the direction to an intended location, which is the resulting robot location after advancing in the indicated direction for one time step. For simplicity, we consider that the robot directly makes an observation o t of the location indicated by the human. We assume that the robot has a stochastic observation model for the human P (o t | s t , g, θ) that is conditioned on both the goal of the task g and the human's preferred path θ.
We further assume that having chosen a goal and path preference, the human takes actions to noisily minimize a cost function C g,θ that measures the cost of moving from the robot's current location to the goal along the preferred path. For example, C g,θ (s t , o t ) can be the length of the shortest path from location s t to the goal g after taking a first step to o t , and constrained by path preference θ.
We use C g,θ to induce a probability distribution over observations, given by: where γ h is a hyperparameter that designates the rationality coefficient. This model assumes the human will pick the lowest cost action with the highest probability and the likelihood of an action decreases exponentially with the increase in cost .
Our inclusion of the path preference θ sets our approach apart from . The model is shown in fig. represented as a Bayesian Network.
Inference
At each time step where the human provides an observation, the posterior P (g, θ) is given through the Bayesian update We note that the number of Bayesian updates required at each iteration to update the belief is equal to the cardinality of Ω g × Θ. In addition, each Bayesian update involves computing C g,θ ( .
, . ) in eq. ( ), which involves solving an optimization problem (such as a shortest path problem). In section IV, we propose a specific encoding of preference θ for resolving eq. ( ), while ensuring the number of computations of the cost C g,θ (., .) per update does not grow exponentially with the number of obstacles.
Decision Making
We consider a navigation problem where the robot receives reward according to the model R(s t , g, θ, a t ). We wish to find the optimal policy π that maximizes the expected discounted sum of future rewards, with discount factor γ. The above problem is a Partially Observable Markov Decision Process (POMDP) .
In this section, we propose an encoding of human's path preference θ for computing the posterior in eq. ( ). Devifrom the concept of homotopy classes, we define the preference according to a partitioning of the environment into polytopes, as shown in fig. , creating a hyperplane arrangement of the space.
Hyperplane arrangements have been used by Vincent and Schwager in the context of Neural Network verification. In our setting, we leverage this representation to define path preferences as preferred transitions between adjacent regions of the space.
Hyperplane Arrangement
We assume a two-dimensional environment composed of m polytopic obstacles, each defined by their half-space representation (H-representation) where A i ∈ R di×2 and b i ∈ R di , and where d i is the number of edges (hyperplanes) composing polytope i. Let n = i d i be the total number of hyperplanes. We leverage each obstacle's H-representation to construct a hyperplane arrangement of the environment as shown in fig.
.e. a partitioning of the space into polytopes. More specifically, each location in space belongs to a polytope j for which we can write an H-representation of the form where α j i ∈ {−1, 1} di is a vector specific to polytope j and obstacle i corresponding to the relative position of any point in the set with respect to each hyperplane in O i .
Fig. : Intent inference model in a hyperplane arrangement of the obstacle free space. We spatially decompose the preference θ into a set of preferred neighboring polytopes per region of the space. Within each polytope j, the human preference pj is a discrete distribution over the preferred neighbor in N (j).
We assume that for a location st belonging to polytope j, and given goal g and preference pj, the observation ot and any other preference p i,i =j are conditionally independent. Concatenating elements from each obstacle's Hrepresentation, we can write polytope j's H-representation as where Some of the constraints in eq. ( ) (corresponding to rows of A, b and α j ) are redundant, i.e. the set P j does not change upon their removal.
We can further reduce the Hrepresentation of a polytope to include only non-redundant constraints. By removing the rows corresponding to redundant constraints, we obtain new matrices A j e , b j e and α j e such that we can write the polytope's reduced H-representation as The non-redundant constraints correspond to edges of the polytope.
In other words, as the robot continually moves in space, the first hyperplane that it will cross upon exiting the polytope will correspond to one of the polytope's nonredundant constraints. Vincent and Schwager outline an iterative method for removing redundant constraints by solving n linear programs.
We use this method in practice for computing α j e for each polytope. We can now characterize each polytope by a vector α j e ∈ {−1, 1} n j e , where n j e ≤ n is the number of essential constraints of the polytope. The polytopes P j partition the environment into a hyperplane arrangement.
Path Preference
In this section, we provide a definition of preference θ according to a graphical representation of the environment based on the hyperplane arrangement. Under this representation, a path preference corresponds to a set of preferred transitions. In other words, for each polytope in the space, the human will have a preference to which neighboring polytope they wish to transition.
Let G := (V, E) be an undirected graph, where vertices are obstacle-free polytopes, and edges connect two adjacent polytopes. Each polytope is described by a unique vector α j as defined in eq. ( ). Two polytopes are adjacent if they share non-redundant constraints (rows in eq. ( )) corresponding to the same hyperplane (i.e. they are on opposite sides of the hyperplane).
Let N (v) be the set of neighbors of a vertex v. For each vertex, we denote p v the discrete-valued random variable describing which edge in N (v) the human intends to transition to. Using this formalism, we define a path preference as the set of preferred transitions over all nodes in the graph, Let m θ = v∈V |N (v)| be the cardinality of Θ, and m g = |Ω g | the number of possible goals.
A priori, the number of Bayesian updates required to update the belief at every iteration should be m θ × m g . Now, let us assume the conditional independence relationships described by the new problem diagram in fig. . More specifically, we introduce the assumption that conditioned on a robot location s t , the goal g, and the preference for the corresponding vertex p v in the graph, the observation o t and the preference for any other vertex are conditionally independent.
In other words, the observations the human provides can be defined conditioned only on the robot location, the goal, and the human's preference for its current vertex p v . By introducing this assumption, each update step only requires updating the joint (p v , g), reducing the number of cost computations to |N (v)| × m g .
We can notice that by introducing this assumption, we removed the direct relationship between the number of polytopes in the environment and the complexity of the Bayesian update in eq. ( ). In practice, components of θ are not mutually independent. For example, if the human preference at a vertex v 1 is
, it is unlikely that the human will also prefer p v2 = (v 2 , v 1 ) (turning back). We can improve our model by assuming a dependent relationship between preferences for adjacent edges, which does not significantly increase the complexity of the inference problem. An interesting property of our encoding is that any two paths that belong to different homotopy classes will cross different sequences of polytopes, i.e. they correspond to a different sequence of edges on G.
This can be proved by contradiction. Let us suppose that two continuous trajectories ξ 1 and ξ 2 , with the same start and end points and that do not intersect any obstacle, traverse the same regions in G in the same order. From the construction of the hyperplane arrangement, each polytope that the paths traverse through is obstacle-free.
Therefore, within each polytope, there is no obstacle in the area located in between the portions of ξ 1 and ξ 2 that belong to the region. A smooth transformation of ξ 1 into ξ 2 can be obtained by transforming each portion of ξ 1 belonging to the polytopes it intersects into the corresponding portion of ξ 2 for the same polytopes, where the extremities of the trajectory portions are connected to one another along the polytope's edges (where the same edge is crossed by both paths).
Along this transformation, the paths do not intersect any obstacle, and therefore ξ 1 and ξ 2 belong to the same homotopy class.
EXPERIMENTS
We evaluate our model on a simulated navigation task where the robot must reach a goal that is unknown a priori while respecting the path preferences indicated by a human. The robot navigates in a grid world containing obstacles. The transition model is deterministic: the robot selects an adjacent location on the grid to reach at the next time step.
The robot is also allowed to take diagonal actions. Each location s t in the map can be mapped to a vertex v t ∈ G. Therefore, the actions leading to locations mapped to different vertices correspond to edges on the graph. We note f (s t , a t ) the edge crossed by taking action a t from location s t .
The robot is given a mission time limit T max for reaching the goal. In this problem, we assume that the human selects actions to noisily minimize a cost function C g,θ , where θ is defined as per eq. ( ), corresponding to the length of the shortest path to the goal constrained by the preference (where the robot is only allowed to make transitions on G along preferred edges).
More specifically, where δ(s t , g | o t , p vt ) designates the length of the shortest path from s t to g passing by o t and constrained by preference p vt . This is a slight variant of the cost function proposed by Best and Fitch , where we add in a conditioning on the path preference. We compute costs by running the A path planning algorithm on the environment maps (grid worlds with diagonal actions) and impose preference constraints by pruning invalid transitions from the search tree.
Reward model. At each step in time, the robot receives a reward which is a sum of three components: a goal-specific reward a preference-specific reward or penalty We compute solutions to the POMDP defined in section III-B with the online solver POMCP , and with the particularity that within the rollouts, the robot does not expect to collect human inputs.
Each time a solution is computed, the robot takes an action and may receive an observation. If it does, it updates its belief distribution over the unknown problem variables and resolves the POMDP over a receding horizon.
Baselines
• Goal only. The robot solves the POMDP while ignoring the effects of path preference. Similarly to , we assume the human is taking action to minimize a goaldependent cost C g (s t , o t ) = δ(s t , g | o t ), where the conditioning on the preference is removed. We also omit the path preference's contribution to the reward R pref .
• Compliant. The robot complies with the human input, but does not take an initiative. If the user stops providing information, the robot continues in the last direction indicated for 5 time steps (conserving its momentum), then stops. • Blended. We designed an arbitration function to decide between our proposed policy (accounting for path preferences) and the user's recommendation when the robot receives inputs.
Our metric to evaluate confidence in the robot's prediction for the purpose of arbitration is the entropy of the intention distribution H(g, p i ), where p i denotes the preferred neighbor for the current region. Because our representation of the world is discrete, the arbitration is given by a step function.
Denoted by U , the action corresponding to the human's input, and P , the robot's prediction for the optimal action, we write the policy where we chose h = 1.6 as the confidence threshold.
Results
When evaluating the algorithm, we consider that a run is successful if the robot reached the goal within its allocated mission time T max and only made transitions between graph vertices corresponding to the human's preferences. We vary the time delay between human inputs, from constant guidance (∆ T = 1) to only a single observation (∆ T ≥ T max ).
Success rates. Table I reports the success rates for experiments conducted over six randomly sampled problem instances and 50 runs per instance in Map 1 (fig. ). When the human provides inputs at every iteration, the compliant policy shows the highest success rates. However, as ∆ T increases, the compliant robot is not able to accomplish the task within the allotted time as it does not receive sufficient inputs to do so, and performance decreases compared to the autonomous baselines.
We find that in these runs, accounting for path preference consistently improves performance compared with the goal-only baseline. Results also show that blending the user's input with the robot's policy (Path Preference + Blend) when the human provides information leads to improved performance. Belief entropy.
Figure shows a challenging problem instance where the directions the human provides do not align directly with the shortest path to the goal. By ignoring the effects of preferences in the problem model (goal only), the robot quickly infers from observations that the upper left goal is less likely than others (P (g) drops).
The strong decrease in entropy shows that the robot becomes overconfident in this prediction. Overconfidence in an incorrect goal will prevent the agent from finding the correct goal once the human's indications directly align with it, as it needs to correct for the wrong predictions, as shown in the path realization (fig.
). In this realization, the goal-only method (green robot) fails to search the upper left area within the allotted time. By accounting for path preferences in its model, the blue robot's entropy over the goal distribution decreases more steadily, allowing for it to leverage the human's latest observations and reach the goal successfully.
shows an over-confident prediction (shown by the strong reduction in belief entropy) that the correct goal is less likely, making it more difficult to reach the correct goal compared to a method that accounts for path preference. Computation time. In table II we provide the time required to solve the POMDP, and the time required to update the robot's belief as it receives new observations.
We compute solutions on three maps: a simple 10 × 10 grid world with 8 polytopes (fig. ), a 10 × 10 grid world with 56 polytopes (fig. ), and a 20×20 grid world with 73 polytopes (fig. ). The latter environment being larger, we increase the mission time and the depth of the search tree in POMCP from T max = 30 (Map 1 and Map 2) to T max = 60 (Map 3).
We do not notice an increase in the time required to update the robot's belief with an increase in problem complexity, which is consistent with our observation that the complexity of the Bayesian update should not increase with the number of obstacles or polytopes. On the contrary, the belief update time on Map 2 and Map 3, containing more obstacles, is reduced compared to the first map.
More obstacles result in fewer iterations when solving the constrained shortest path problem with A . Adding constraints due to the obstacles and polytopes reduces the size of the A search tree. C. Limitations Simulation environments. In our simulations, we hardcoded the preference policy over the maps (e.g. in Map 1, go around the table counter-clockwise).
We randomly sampled problem instances (start and goal locations, and goal options) to reduce the bias introduced by these preference choices. To best evaluate and compare the different approaches, it would be best to sample preferences among a distribution of preferences chosen by a human (for example, from benchmarks resulting from a collection of data).
Creating such a benchmark is an interesting direction for future work. Hyperplane arrangement construction. The main limitation of our approach is that the size and geometry of each polytope depends strongly on the geometry of the obstacles, as seen in fig. . Because of this, the robot can make predictions over preferences that are too refined compared with the topology of the environment.
A direct consequence is that when the size of the polytopes is small, the information provided by the human can be incorrectly interpreted as a preference on the robot's immediate action. Our method can be improved by changing the structure of the hyperplane arrangement so that it relies on the topology of the environment, but does not vary strongly with the geometry of the features in the environment.
For this purpose, topometric maps and region construction algorithms are promising directions. We presented an approach for encoding and inferring a human's path preference in an environment with obstacles. By leveraging a partitioning of the space into polytopes and a stochastic observation model, our method allows for joint inference over the goal and path preference even when both are unknown a-priori.
Our experiments on an unknown-goal navigation problem with sparse human interventions demonstrate the effectiveness of our approach and its suitability for online applications. The time required to update the robot's belief does not increase with the complexity of the environment, which further highlights the practicality of our method.
|
[
"The belief entropy decreases more steadily."
] | 5,655
|
multifieldqa_en
|
en
| null |
f1b59c798ab323ea8409ba09709de506bd83699885ce61a5
|
What are the two ground states observed for indeno[1,2-a]fluorene on NaCl surfaces?
|
Paper Info
Title: Bistability between π-diradical open-shell and closed-shell states in indeno[1,2-a]fluorene
Publish Date: Unkown
Author List: Shantanu Mishra (from IBM Research Europe -Zurich), Manuel Vilas-Varela (from Department of Organic Chemistry, Center for Research in Biological Chemistry and Molecular Materials (CiQUS), University of Santiago de Compostela), Leonard-Alexander Lieske (from IBM Research Europe -Zurich), Ricardo Ortiz (from Donostia International Physics Center (DIPC)), Igor Rončević (from Department of Chemistry, University of Oxford), Florian Albrecht (from IBM Research Europe -Zurich), Diego Peña (from Department of Organic Chemistry, Center for Research in Biological Chemistry and Molecular Materials (CiQUS), University of Santiago de Compostela), Leo Gross (from IBM Research Europe -Zurich)
Figure
Fig. 1 | Non-benzenoid non-alternant polycyclic conjugated hydrocarbons.a, Classical nonbenzenoid non-alternant polycyclic conjugated hydrocarbons: pentalene, azulene and heptalene.b, Generation of indacenes and indenoindenes through benzinterposition and benzannelation of pentalene, respectively.Gray filled rings represent Clar sextets.c, Closed-shell Kekulé (left) and openshell non-Kekulé (right) resonance structures of QDMs.Note that meta-QDM is a non-Kekulé molecule.All indenofluorene isomers, being derived through benzannelation of indacenes, contain a central QDM moiety.d, Closed-shell Kekulé (top) and open-shell non-Kekulé (bottom) resonance structures of indenofluorenes.Compared to their closed-shell structures, 1 and 5 gain two Clar sextets in the openshell structure, while 2-4 gain only one Clar sextet in the open-shell structure.Colored bonds in d highlight the ortho-and para-QDM moieties in the two closed-shell Kekulé structures of 5. e, Scheme of on-surface generation of 5 by voltage pulse-induced dehydrogenation of 6 (C20H14).Structures 7 and 8 represent the two monoradical species (C20H13).
Fig. 2 | Characterization of open-shell indeno[1,2-a]fluorene on bilayer NaCl/Au(111).a, DFTcalculated wave functions of the frontier orbitals of 5OS in the triplet configuration for the spin up (occupied) level (isovalue: 0.002 e -Å -3 ).Blue and red colors represent opposite phases of the wave function.b, Corresponding DFT-calculated spin density of 5OS (isovalue: 0.01 e -Å -3).Blue and orange colors represent spin up and spin down densities, respectively.c, Probability density of the SOMOs of 5OS (isovalue: 0.001 e -Å -3 ).d, DFT-calculated bond lengths of 5OS.e, Constant-height I(V) spectra acquired on a species of 5 assigned as 5OS, along with the corresponding dI/dV(V) spectra.Open feedback parameters: V = -2 V, I = 0.17 pA (negative bias side) and V = 2 V, I = 0.17 pA (positive bias side).Acquisition position of the spectra is shown in Supplementary Fig.7.f, Scheme of many-body transitions associated to the measured ionic resonances of 5OS.Also shown are STM images of assigned 5OS at biases where the corresponding transitions become accessible.Scanning parameters: I = 0.3 pA (V = -1.2V and -1.5 V) and 0.2 pA (V = 1.3 V and 1.6 V). g, Laplace-filtered AFM image of assigned 5OS.STM set point: V = 0.2 V, I = 0.5 pA on bilayer NaCl, Δz = -0.3Å.The tip-height offset Δz for each panel is provided with respect to the STM setpoint, and positive (negative) values of Δz denote tip approach (retraction) from the STM setpoint.f and g show the same molecule at the same adsorption site, which is next to a trilayer NaCl island.The bright and dark features in the trilayer NaCl island in g correspond to Cl -and Na + ions, respectively.Scale bars: 10 Å (f) and 5 Å (g).
Fig. 3 | Characterization of closed-shell indeno[1,2-a]fluorene on bilayer NaCl/Au(111).a, DFTcalculated wave functions of the frontier orbitals of closed-shell 5 0 (isovalue: 0.002 e -Å -3 ).The wave functions shown here are calculated for the 5para geometry.b, DFT-calculated bond lengths of 5ortho (top) and 5para (bottom).c, Constant-height I(V) spectra acquired on a species of 5 assigned as 5para, along with the corresponding dI/dV(V) spectra.Open feedback parameters: V = -2 V, I = 0.15 pA (negative bias side) and V = 2.2 V, I = 0.15 pA (positive bias side).Acquisition position of the spectra is shown in Supplementary Fig. 7. d, Scheme of many-body transitions associated to the measured ionic resonances of 5para.Also shown are STM images of assigned 5para at biases where the corresponding transitions become accessible.Scanning parameters: I = 0.15 pA (V = -1.5 V) and 0.2 pA (V = 1.7 V). e, Laplace-filtered AFM image of assigned 5para.STM set point: V = 0.2 V, I = 0.5 pA on bilayer NaCl, Δz = -0.7 Å. f, Selected bonds labeled for highlighting bond order differences between 5para and 5ortho.For the bond pairs a/b, c/d and e/f, the bonds labeled in bold exhibit a higher bond order than their neighboring labeled bonds in 5para.g, Laplace-filtered AFM images of 5 on bilayer NaCl/Cu(111) showing switching between 5OS and 5para as the molecule changes its adsorption position.The faint protrusion adjacent to 5 is a defect that stabilizes the adsorption of 5. STM set point: V = 0.2 V, I = 0.5 pA on bilayer NaCl, Δz = -0.3Å. STM and STS data in c and d are acquired on the same species, while the AFM data in e is acquired on a different species.Scale bars: 10 Å (d) and 5 Å (e,g).
NMR (300 MHz, CDCl3) δ: 7.51 (m, 2H), 7.40 -7.28 (m, 5H), 7.27 -7.20 (m, 2H), 7.13 (d, J = 7.7 Hz, 1H), 2.07 (s, 3H), 1.77 (s, 3H) ppm. 13C NMR-DEPT (75 MHz, CDCl3, 1:1 mixture of atropisomers) δ: 141.2 (C), 141.1 (C), 140.0 (C), 139.4 (2C), 137.5 (C), 137.4 (C), 136.0 (3C), 134.8 (C), 134.5 (C), 134.1 (C), 134.0 (C), 133.7 (C), 133.6 (C), 131.6 (CH), 131.2 (CH), 131.1 (CH), 130.7 (CH), 129.8 (CH), 129.7 (CH), 129.5 (CH), 129.4 (CH), 129.0 (CH), 128.9 (CH), 128.7 (2CH), 128.6 (2CH), 127.2 (CH), 127.1 (CH), 127.0 (CH), 126.9 (CH), 126.7 (CH), 126.6 (CH), 20.6 (CH3), 20.5 (CH3), 17.7 (CH3), 17.5 (CH3) ppm.MS (APCI) m/z (%): 327 (M+1, 100).HRMS: C20H16Cl2; calculated: 327.0702, found: 327.0709.
NMR (500 MHz, CDCl3) δ: 7.93 (d, J = 7.6 Hz, 1H), 7.85 (d, J = 7.5 Hz, 1H), 7.78 (d, J = 7.7 Hz, 1H), 7.65 (d, J = 7.4 Hz, 1H), 7.61 (d, J = 7.5 Hz, 1H), 7.59 (d, J = 7.7 Hz, 1H), 7.47 (ddd, J = 8.4, 7.2, 1.1 Hz, 1H), 7.42 (dd, J = 8.1, 7.0 Hz, 1H), 7.35 (m, 2H), 4.22 (s, 3H), 4.02 (s, 3H).ppm. 13C NMR-DEPT (125 MHz, CDCl3) δ: 144.1 (C), 143.3 (C), 142.3 (C), 141.9 (C), 141.8 (C), 141.2 (C), 138.2 (C), 136.5 (C), 127.0 (CH), 126.9 (CH), 126.7 (CH), 126.6 (CH), 125.3 (CH), 125.2 (CH), 123.6 (CH), 122.2 (CH), 119.9 (CH), 118.4 (CH), 37.4 (CH2), 36.3 (CH2).ppm.MS (APCI) m/z (%): 254 (M+, 88).HRMS: C20H14; calculated: 254.1090, found: 254.1090.
abstract
Indenofluorenes are non-benzenoid conjugated hydrocarbons that have received great interest owing to their unusual electronic structure and potential applications in nonlinear optics and photovoltaics. Here, we report the generation of unsubstituted indeno[1,2-a]fluorene, the final and yet unreported parent indenofluorene regioisomer, on various surfaces by cleavage of two C-H bonds in 7,12-dihydro indeno[1,2-a]fluorene through voltage pulses applied by the tip of a combined scanning tunneling microscope and atomic force microscope.
On bilayer NaCl on Au(111), indeno[1,2a]fluorene is in the neutral charge state, while it exhibits charge bistability between neutral and anionic states on the lower work function surfaces of bilayer NaCl on Ag(111) and Cu(111). In the neutral state, indeno[1,2-a]fluorene exhibits either of two ground states: an open-shell π-diradical state, predicted to be a triplet by density functional and multireference many-body perturbation theory calculations, or a closedshell state with a para-quinodimethane moiety in the as-indacene core.
Switching between open-and closed-shell states of a single molecule is observed by changing its adsorption site on NaCl. The inclusion of non-benzenoid carbocyclic rings is a viable route to tune the physicochemical properties of polycyclic conjugated hydrocarbons (PCHs) . Non-benzenoid polycycles may lead to local changes in strain, conjugation, aromaticity, and, relevant to the context of the present work, induce an open-shell ground state of the corresponding PCHs .
Many nonbenzenoid PCHs are also non-alternant, where the presence of odd-membered polycycles breaks the bipartite symmetry of the molecular network . Figure shows classical examples of non-benzenoid non-alternant PCHs, namely, pentalene, azulene and heptalene. Whereas azulene is a stable PCH exhibiting Hückel aromaticity ([4n+2] π-electrons, n = 2), pentalene and heptalene are unstable Hückel antiaromatic compounds with [4n] π-electrons, n = 2 (pentalene) and n = 3 (heptalene).
Benzinterposition of pentalene generates indacenes, consisting of two isomers s-indacene and as-indacene (Fig. ). Apart from being antiaromatic, indacenes also contain proaromatic quinodimethane (QDM) moieties (Fig. ) , which endows them with potential open-shell character. While the parent s-indacene and asindacene have never been isolated, stable derivatives of s-indacene bearing bulky substituents have been synthesized .
A feasible strategy to isolate congeners of otherwise unstable non-benzenoid non-alternant PCHs is through fusion of benzenoid rings at the ends of the π-system, that is, benzannelation. For example, while the parent pentalene is unstable, the benzannelated congener indeno[2,1-a]indene is stable under ambient conditions (Fig. ) .
However, the position of benzannelation is crucial for stability: although indeno[2,1a]indene is stable, its regioisomer indeno[1,2-a]indene (Fig. ) oxidizes under ambient conditions . Similarly, benzannelation of indacenes gives rise to the family of PCHs known as indenofluorenes (Fig. ), which constitute the topic of the present work.
Depending on the benzannelation position and the indacene core, five regioisomers can be constructed, namely, indeno [ Practical interest in indenofluorenes stems from their low frontier orbital gap and excellent electrochemical characteristics that render them as useful components in organic electronic devices .
The potential open-shell character of indenofluorenes has led to several theoretical studies on their use as non-linear optical materials and as candidates for singlet fission in organic photovoltaics . Recent theoretical work has also shown that indenofluorene-based ladder polymers may exhibit fractionalized excitations.
Fundamentally, indenofluorenes represent model systems to study the interplay between aromaticity and magnetism at the molecular scale . Motivated by many of these prospects, the last decade has witnessed intensive synthetic efforts toward the realization of indenofluorenes. Derivatives of 1-4 have been realized in solution , while 1-3 have also been synthesized on surfaces and characterized using scanning tunneling microscopy (STM) and atomic force microscopy (AFM), which provide information on molecular orbital densities , molecular structure and oxidation state .
With regards to the open-shell character of indenofluorenes, 2-4 are theoretically and experimentally interpreted to be closed-shell, while calculations indicate that 1 and 5 should exhibit open-shell ground states . Bulk characterization of mesitylsubstituted 1, including X-ray crystallography, temperature-dependent NMR, and electron spin resonance spectroscopy, provided indications of its open-shell ground state .
Electronic characterization of 1 on Au(111) surface using scanning tunneling spectroscopy (STS) revealed a low electronic gap of 0.4 eV (ref. ). However, no experimental proof of an openshell ground state of 1 on Au(111), such as detection of singly occupied molecular orbitals (SOMOs) or spin excitations and correlations due to unpaired electrons , was shown.
In this work, we report the generation and characterization of unsubstituted 5. Our research is motivated by theoretical calculations that indicate 5 to exhibit the largest diradical character among all indenofluorene isomers . The same calculations also predict that 5 should possess a triplet ground state.
Therefore, 5 would qualify as a Kekulé triplet, of which only a handful of examples exist . However, definitive synthesis of 5 has never been reported so far. Previously, Dressler et al. reported transient isolation of mesityl-substituted 5, where it decomposed both in the solution and in solid state , and only the structural proof of the corresponding dianion was obtained.
On-surface generation of a derivative of 5, starting from truxene as a precursor, was recently reported . STM data on this compound, containing the indeno[1,2-a]fluorene moiety as part of a larger PCH, was interpreted to indicate its open-shell ground state. However, the results did not imply the ground state of unsubstituted 5. Here, we show that on insulating surfaces 5 can exhibit either of two ground states: an open-shell or a closed-shell.
We infer the existence of these two ground states based on high-resolution AFM imaging with bond-order discrimination and STM imaging of molecular orbital densities . AFM imaging reveals molecules with two different geometries. Characteristic bond-order differences in the two geometries concur with the geometry of either an open-or a closed-shell state.
Concurrently, STM images at ionic resonances show molecular orbital densities corresponding to SOMOs for the open-shell geometry, but orbital densities of the highest occupied molecular orbital (HOMO) and lowest unoccupied molecular orbital (LUMO) for the closed-shell geometry. Our experimental results are in good agreement with density functional theory (DFT) and multireference perturbation theory calculations.
Finally, we observe switching between open-and closed-shell states of a single molecule by changing its adsorption site on the surface. Synthetic strategy toward indeno[1,2-a]fluorene. The generation of 5 relies on the solution-phase synthesis of the precursor 7,12-dihydro indeno[1,2-a]fluorene (6). Details on synthesis and characterization of 6 are reported in Supplementary Figs.
. Single molecules of 6 are deposited on coinage metal (Au(111), Ag(111) and Cu(111)) or insulator surfaces. In our work, insulating surfaces correspond to two monolayer-thick (denoted as bilayer) NaCl on coinage metal surfaces. Voltage pulses ranging between 4-6 V are applied by the tip of a combined STM/AFM system, which result in cleavage of one C-H bond at each of the pentagonal apices of 6, thereby leading to the generation of 5 (Fig. ).
In the main text, we focus on the generation and characterization of 5 on insulating surfaces. Generation and characterization of 5 on coinage metal surfaces is shown in Supplementary Fig. . ). Blue and orange colors represent spin up and spin down densities, respectively. c, Probability density of the SOMOs of 5OS (isovalue: 0.001 e -Å -3 ).
d, DFT-calculated bond lengths of 5OS. e, Constant-height I(V) spectra acquired on a species of 5 assigned as 5OS, along with the corresponding dI/dV(V) spectra. Open feedback parameters: V = -2 V, I = 0.17 pA (negative bias side) and V = 2 V, I = 0.17 pA (positive bias side). Acquisition position of the spectra is shown in Supplementary Fig. . f, Scheme of many-body transitions associated to the measured ionic resonances of 5OS.
Also shown are STM images of assigned 5OS at biases where the corresponding transitions become accessible. Scanning parameters: I = 0.3 pA (V = -1.2 V and -1.5 V) and 0.2 pA (V = 1.3 V and 1.6 V). g, Laplace-filtered AFM image of assigned 5OS. STM set point: V = 0.2 V, I = 0.5 pA on bilayer NaCl, Δz = -0.3
Å. The tip-height offset Δz for each panel is provided with respect to the STM setpoint, and positive (negative) values of Δz denote tip approach (retraction) from the STM setpoint. f and g show the same molecule at the same adsorption site, which is next to a trilayer NaCl island. The bright and dark features in the trilayer NaCl island in g correspond to Cl -and Na + ions, respectively.
Scale bars: 10 Å (f) and 5 Å (g). To experimentally explore the electronic structure of 5, we used bilayer NaCl films on coinage metal surfaces to electronically decouple the molecule from the metal surfaces. Before presenting the experimental findings, we summarize the results of our theoretical calculations performed on 5 in the neutral charge state (denoted as 5 0 ).
We start by performing DFT calculations on 5 0 in the gas phase. Geometry optimization performed at the spin-unrestricted UB3LYP/6-31G level of theory leads to one local minimum, 5OS, the geometry of which corresponds to the open-shell resonance structure of 5 (Fig. , the label OS denotes open-shell).
The triplet electronic configuration of 5OS is the lowest-energy state, with the openshell singlet configuration 90 meV higher in energy. Geometry optimization performed at the restricted closed-shell RB3LYP/6-31G level reveals two local minima, 5para and 5ortho, the geometries of which (Fig. ) exhibit bond length alternations in line with the presence of a para-or an ortho-QDM moiety, respectively, in the as-indacene core of the closed-shell resonance structures of 5 (Fig. ) .
Relative to 5OS in the triplet configuration, 5para and 5ortho are 0.40 and 0.43 eV higher in energy, respectively. Additional DFT results are shown in Supplementary Fig. . To gain more accurate insights into the theoretical electronic structure of 5, we performed multireference perturbation theory calculations (Supplementary Fig. ) based on quasi-degenerate second-order n-electron valence state perturbation theory (QD-NEVPT2).
In so far as the order of the ground and excited states are concerned, the results of QD-NEVPT2 calculations qualitatively match with DFT calculations. For 5OS, the triplet configuration remains the lowest-energy state, with the open-shell singlet configuration 60 meV higher in energy. The energy differences between the open-and closed-shell states are substantially reduced in QD-NEVPT2 calculations, with 5para and 5ortho only 0.11 and 0.21 eV higher in energy, respectively, compared to 5OS in the triplet configuration.
We also performed nucleus-independent chemical shift calculations to probe local aromaticity of 5 in the openand closed-shell states. While 5OS in the triplet configuration exhibits local aromaticity at the terminal benzenoid rings, 5OS in the open-shell singlet configuration, 5para and 5ortho all display antiaromaticity (Supplementary Fig. ).
The choice of the insulating surface determines the charge state of 5: while 5 adopts neutral charge state on the high work function bilayer NaCl/Au(111) surface (irrespective of its openor closed-shell state, Supplementary Fig. ), 5 exhibits charge bistability between 5 0 and the anionic state 5 -1 on the lower work function bilayer NaCl/Ag(111) and Cu(111) surfaces (Supplementary Figs. ).
In the main text, we focus on the characterization of 5 on bilayer NaCl/Au(111). Characterization of charge bistable 5 is reported in Supplementary Figs. . We first describe experiments on 5 on bilayer NaCl/Au(111), where 5 exhibits a geometry corresponding to the calculated 5OS geometry, and an open-shell electronic configuration.
We compare the experimental data on this species to calculations on 5OS with a triplet configuration, as theory predicts a triplet ground state for 5OS. For 5OS, the calculated frontier orbitals correspond to the SOMOs ψ1 and ψ2 (Fig. ), whose spin up levels are occupied and the spin down levels are empty.
Figure shows the DFT-calculated bond lengths of 5OS, where the two salient features, namely, the small difference in the bond lengths within each ring and the notably longer bond lengths in the pentagonal rings, agree with the open-shell resonance structure of 5 (Fig. ). Figure shows an AFM image of 5 adsorbed on bilayer NaCl/Au(111) that we assign as 5OS, where the bond-order differences qualitatively correspond to the calculated 5OS geometry (discussed and compared to the closed-shell state below).
Differential conductance spectra (dI/dV(V), where I and V denote the tunneling current and bias voltage, respectively) acquired on assigned 5OS exhibit two peaks centered at -1.5 V and 1.6 V (Fig. ), which we assign to the positive and negative ion resonances (PIR and NIR), respectively. Figure shows the corresponding STM images acquired at the onset (V = -1.2
V/1.3 V) and the peak (V = -1.5 V/1.6 V) of the ionic resonances. To draw a correspondence between the STM images and the molecular orbital densities, we consider tunneling events as many-body electronic transitions between different charge states of 5OS (Fig. ). Within this framework, the PIR corresponds to transitions between 5 0 and the cationic state 5 .
At the onset of the PIR at -1.2 V, an electron can only be detached from the SOMO ψ1 and the corresponding STM image at -1.2 V shows the orbital density of ψ1. Increasing the bias to the peak of the PIR at -1.5 V, it becomes possible to also empty the SOMO ψ2, such that the corresponding STM image shows the superposition of ψ1 and ψ2, that is, |ψ1| 2 + |ψ2| 2 (ref.
). Similarly, the NIR corresponds to transitions between 5 0 and 5 -1 . At the NIR onset of 1.3 V, only electron attachment to ψ2 is energetically possible. At 1.6 V, electron attachment to ψ1 also becomes possible, and the corresponding STM image shows the superposition of ψ1 and ψ2. The observation of the orbital densities of SOMOs, and not the hybridized HOMO and LUMO, proves the open-shell ground state of assigned 5OS.
Measurements of the monoradical species with a doublet ground state are shown in Supplementary Fig. . Unexpectedly, another species of 5 was also experimentally observed that exhibited a closedshell ground state. In contrast to 5OS, where the frontier orbitals correspond to the SOMOs ψ1 and ψ2, DFT calculations predict orbitals of different shapes and symmetries for 5para and 5ortho, denoted as α and β and shown in Fig. .
For 5ortho, α and β correspond to HOMO and LUMO, respectively. The orbitals are inverted in energy and occupation for 5para, where β is the HOMO and α is the LUMO. Fig. shows an AFM image of 5 that we assign as 5para. We experimentally infer its closed-shell state first by using qualitative bond order discrimination by AFM.
In high-resolution AFM imaging, chemical bonds with higher bond order are imaged brighter (that is, with higher frequency shift Δf) due to stronger repulsive forces, and they appear shorter . In Fig. , we label seven bonds whose bond orders show significant qualitative differences in the calculated 5ortho, 5para (Fig. ) and 5OS (Fig. ) geometries.
In 5para, the bonds b and d exhibit a higher bond order than a and c, respectively. This pattern is reversed for 5ortho, while the bond orders of the bonds a-d are all similar and small for 5OS. Furthermore, in 5para bond f exhibits a higher bond order than e, while in 5ortho and 5OS bonds e and f exhibit similar bond order (because they belong to Clar sextets).
Finally, the bond labeled g shows a higher bond order in 5para than in 5ortho and 5OS. The AFM image of assigned 5para shown in Fig. indicates higher bond orders of the bonds b, d and f compared to a, c and e, respectively. In addition, the bond g appears almost point-like and with enhanced Δf contrast compared to its neighboring bonds, indicative of a high bond order (see Supplementary Fig. for height-dependent measurements).
These observations concur with the calculated 5para geometry (Fig. ). Importantly, all these distinguishing bond-order differences are distinctly different in the AFM image of 5OS shown in Fig. , which is consistent with the calculated 5OS geometry (Fig. ). In the AFM images of 5OS (Fig. and Supplementary Fig. ), the bonds a-d at the pentagon apices appear with similar contrast and apparent bond length.
The bonds e and f at one of the terminal benzenoid rings also exhibit similar contrast and apparent bond length, while the central bond g appears longer compared to assigned 5para. Further compelling evidence for the closed-shell state of assigned 5para is obtained by STM and STS. dI/dV(V) spectra acquired on an assigned 5para species exhibit two peaks centered at -1.4 V (PIR) and 1.6 V (NIR) (Fig. ).
STM images acquired at these biases (Fig. ) show the orbital densities of β (-1.4 V) and α (1.6 V). First, the observation of α and β as the frontier orbitals of this species, and not the SOMOs, strongly indicates its closed-shell state. Second, consistent with AFM measurements that indicate good correspondence to the calculated 5para geometry, we observe β as the HOMO and α as the LUMO.
For 5ortho, α should be observed as the HOMO and β as the LUMO. We did not observe molecules with the signatures of 5ortho in our experiments. We observed molecules in open-(5OS, Fig. ) and closed-shell (5para, Fig. ) states in similar occurrence after their generation from 6 on the surface. We could also switch individual molecules between open-and closed-shell states as shown in Fig. and Supplementary Fig. .
To this end, a change in the adsorption site of a molecule was induced by STM imaging at ionic resonances, which often resulted in movement of the molecule. The example presented in Fig. shows a molecule that was switched from 5para to 5OS and back to 5para. The switching is not directed, that is, we cannot choose which of the two species will be formed when changing the adsorption site, and we observed 5OS and 5para in approximately equal yields upon changing the adsorption site.
The molecule in Fig. is adsorbed on top of a defect that stabilizes its adsorption geometry on bilayer NaCl. At defect-free adsorption sites on bilayer NaCl, that is, without a third layer NaCl island or atomic defects in the vicinity of the molecule, 5 could be stably imaged neither by AFM nor by STM at ionic resonances (Supplementary Fig. ).
Without changing the adsorption site, the state of 5 (open-or closedshell) never changed, including the experiments on bilayer NaCl/Ag(111) and Cu(111), on which the charge state of 5 could be switched (Supplementary Figs. ). Also on these lower work function surfaces, both open-and closed-shell species were observed for 5 0 and both showed charge bistability between 5 0 (5OS or 5para) and 5 -1 (Supplementary Figs. ).
The geometrical structure of 5 -1 probed by AFM, and its electronic structure probed by STM imaging at the NIR (corresponding to transitions between 5 -1 and the dianionic state 5 -2 ), are identical within the measurement accuracy for the charged species of both 5OS and 5para. When cycling the charge state of 5 between 5 0 and 5 -1 several times, we always observed the same state (5OS or 5para) when returning to 5 0 , provided the molecule did not move during the charging/discharging process.
Based on our experimental observations we conclude that indeno[1,2-a]fluorene (5), the last unknown indenofluorene isomer, can be stabilized in and switched between an open-shell (5OS) and a closed-shell (5para) state on NaCl. For the former, both DFT and QD-NEVPT2 calculations predict a triplet electronic configuration.
Therefore, 5 can be considered to exhibit the spin-crossover effect, involving magnetic switching between high-spin (5OS) and low-spin (5para) states, coupled with a reversible structural transformation. So far, the spin-crossover effect has mainly only been observed in transition-metal-based coordination compounds with a near-octahedral geometry .
The observation that the switching between open-and closedshell states is related to changes in the adsorption site but is not achieved by charge-state cycling alone, indicates that the NaCl surface and local defects facilitate different electronic configurations of 5 depending on the adsorption site.
Gas-phase QD-NEVPT2 calculations predict that 5OS is the ground state, and the closed-shell 5para and 5ortho states are 0.11 and 0.21 eV higher in energy. The experiments, showing bidirectional switching between 5OS and 5para, indicate that a change in the adsorption site can induce sufficient change in the geometry of 5 (leading to a corresponding change in the ground state electronic configuration) and thus induce switching.
Switching between open-and closed-shell states in 5 does not require the breaking or formation of covalent bonds , but a change of adsorption site on NaCl where the molecule is physisorbed. Our results should have implications for single-molecule devices, capitalizing on the altered electronic and chemical properties of a system in π-diradical open-shell and closed-shell states such as frontier orbital and singlet-triplet gaps, and chemical reactivity.
For possible future applications as a single-molecule switch, it might be possible to also switch between open-and closed-shell states by changing the local electric field, such as by using chargeable adsorbates . Scanning probe microscopy measurements and sample preparation. STM and AFM measurements were performed in a home-built system operating at base pressures below 1×10 -10 mbar and a base temperature of 5 K. Bias voltages are provided with respect to the sample.
All STM, AFM and spectroscopy measurements were performed with carbon monoxide (CO) functionalized tips. AFM measurements were performed in non-contact mode with a qPlus sensor . The sensor was operated in frequency modulation mode with a constant oscillation amplitude of 0.5 Å. STM measurements were performed in constantcurrent mode, AFM measurements were performed in constant-height mode with V = 0 V, and I(V) and Δf(V) spectra were acquired in constant-height mode.
Positive (negative) values of the tip-height offset Δz represent tip approach (retraction) from the STM setpoint. All dI/dV(V) spectra are obtained by numerical differentiation of the corresponding I(V) spectra. STM and AFM images, and spectroscopy curves, were post-processed using Gaussian low-pass filters.
Au(111), Ag(111) and Cu(111) surfaces were cleaned by iterative cycles of sputtering with Ne + ions and annealing up to 800 K. NaCl was thermally evaporated on Au(111), Ag(111) and Cu(111) surfaces held at 323 K, 303 K and 283 K, respectively. This protocol results in the growth of predominantly bilayer (100)-terminated islands, with a minority of trilayer islands.
Sub-monolayer coverage of 6 on surfaces was obtained by flashing an oxidized silicon wafer containing the precursor molecules in front of the cold sample in the microscope. CO molecules for tip functionalization were dosed from the gas phase on the cold sample. Density functional theory calculations. DFT was employed using the PSI4 program package .
All molecules with different charge (neutral and anionic) and electronic (open-and closed-shell) states were independently investigated in the gas phase. The B3LYP exchangecorrelation functional with 6-31G basis set was employed for structural relaxation and singlepoint energy calculations. The convergence criteria were set to 10 −4 eV Å −1 for the total forces and 10 −6 eV for the total energies.
Multireference calculations. Multireference calculations were performed on the DFToptimized geometries using the QD-NEVPT2 level of theory , with three singlet roots and one triplet root included in the state-averaged calculation. A (10,10) active space (that is, 10 electrons in 10 orbitals) was used along with the def2-TZVP basis set .
Increasing either the active space size or expanding the basis set resulted in changes of about 50 meV for relative energies of the singlet and triplet states. These calculations were performed using the ORCA program package . Nucleus-independent chemical shift (NICS) calculations. Isotropic nucleus-independent chemical shift values were evaluated at the centre of each ring using the B3LYP exchangecorrelation functional with def2-TZVP basis set using the Gaussian 16 software package .
Starting materials (reagent grade) were purchased from TCI and Sigma-Aldrich and used without further purification. Reactions were carried out in flame-dried glassware and under an inert atmosphere of purified Ar using Schlenk techniques. Thin-layer chromatography (TLC) was performed on Silica Gel 60 F-254 plates (Merck).
Column chromatography was performed on silica gel (40-60 µm). Nuclear magnetic resonance (NMR) spectra were recorded on a Bruker Varian Mercury 300 or Bruker Varian Inova 500 spectrometers. Mass spectrometry (MS) data were recorded in a Bruker Micro-TOF spectrometer. The synthesis of compound 6 was developed following the two-step synthetic route shown in Supplementary Fig. , which is based on the preparation of methylene-bridge polyarenes by means of Pd-catalyzed activation of benzylic C-H bonds .
Supplementary Figure | Synthetic route to obtain compound 6. The complex Pd2(dba)3 (20 mg, 0.02 mmol) was added over a deoxygenated mixture of 1,3-dibromo-2,4-dimethylbenzene (9, 100 mg, 0.38 mmol), boronic acid 10 (178 mg, 1.14 mmol), K2CO3 (314 mg, 2.28 mmol) and XPhos (35 mg, 0.08 mmol) in toluene (1:1, 10 mL), and the resulting mixture was heated at 90 °C for 2 h.
After cooling to room temperature, the solvents were evaporated under reduced pressure. The reaction crude was purified by column chromatography (SiO2; hexane:CH2Cl2 9:1) affording 11 (94 mg, 76%) as a colorless oil. The complex Pd(OAc)2 (7 mg, 0.03 mmol) was added over a deoxygenated mixture of terphenyl 11 (90 mg, 0.27 mmol), K2CO3 (114 mg, 0.83 mmol) and ligand L (26 mg, 0.06 mmol) in NMP (2 mL).
The resulting mixture was heated at 160 °C for 4 h. After cooling to room temperature, H2O (30 mL) was added, and the mixture was extracted with EtOAc (3x15 mL). The combined organic extracts were dried over anhydrous Na2SO4, filtered, and evaporated under reduced pressure. The reaction crude was purified by column chromatography (SiO2; hexane:CH2Cl2 9:1) affording compound 6 (8 mg, 11%) as a white solid. in AFM imaging due to their reduced adsorption height compared to the rest of the carbon atoms.
We attribute this observation to the significantly different lattice parameter of Cu(111) (2.57 Å) compared to Au(111) and Ag(111) (2.95 Å and 2.94 Å, respectively) , such that the apical carbon atoms of the pentagonal rings of 5 adsorb on the on-top atomic sites on Au(111) and Ag(111), but not on Cu(111).
Our speculation is based on a previous study of polymers of 1 on Au(111) by Di Giovannantonio et al. , where both tilted and planar individual units of 1 were observed depending on whether the apical carbon atoms of the pentagonal rings in 1 adsorbed on the on-top or hollow sites of the surface, respectively.
Given the strong molecule-metal interaction, we found no electronic state signatures of 5 on all three metal surfaces. STM set point for AFM images: V = 0. e, Frontier orbital spectrum of 5 -1 . In the anionic state, ψ2 becomes doubly occupied and ψ1 is the SOMO. Filled and empty circles denote occupied and empty orbitals, respectively.
For each panel, zero of the energy axis has been aligned to the respective highest-energy occupied orbital.
|
[
"Open-shell π-diradical state and closed-shell state with a para-quinodimethane moiety."
] | 5,514
|
multifieldqa_en
|
en
| null |
59a29a109088d9bd027b8fb77c20871684aa5069abec8e20
|
What is the main focus of the research paper?
|
Paper Info
Title: Nuclear Liquid-Gas Transition in the Strong Coupling Regime of Lattice QCD
Publish Date: 28 Mar 2023
Author List: J Kim (from Institute for Advanced Simulation (IAS-4), Forschungszentrum Jülich), P Pattanaik (from Fakultät für Physik, Bielefeld University), W Unger (from Fakultät für Physik, Bielefeld University)
Figure
FIG. 1.Typical 2-dimension configuration at β = 1.0, at non-zero quark mass, temperature, chemical potential.The black dots are monomers, the blue lines are dimers, the red arrows are baryon loop segments (or triplets g b + f b = ±3 if adjacent to a non-trivial plaquette), and the green squares are plaquette occupations ±1.The actual configurations are 3+1-dimensional.
FIG.2.Chiral susceptibility on a 2 4 volume for various quark masses, as a function of the bare anisotropy γ (with aT = γ 2 /2), analytic results from enumeration compared to numerical data from simulations via the worm algorithm.
FIG.3.Various observables in the µB-T plane on a 2 4 volume at amq = 0.1.The back-bending of the first order transition at temperatures below aT = 0.5 in all observables is an artifact of the small volume, and vanishes in the thermodynamic limit.The temperature aT = 1/2 corresponds to the isotropic lattice here.
FIG. 4. The chiral condensate (left) and the baryon density (right) for quark mass m = 1.5 as a function of the chemical potential and for various temperatures.
FIG. 7. ∆f at amq = 0.2 as a function of chemical potential and β the on a 6 3 × 4 lattice
FIG. 8. Baryon mass from ∆E as a function of the quark mass amq, and contributions from different dual variables: monomers, dimers and baryon segments.
FIG. 9. Baryon density for volume 4 3 × 8 in the full µB − mq plane, illustrating the strong quark mass dependence of the onset to nuclear matter.
FIG. 10.Baryonic observables on various volumes in the first order region amq = 1.5.Vertical bands indicate the mean and error of the nuclear transition.
FIG. 12. Left: Extrapolation of the pseudo-critical values of µB for the various volumes into the thermodynamic limit.Right: Critical baryon chemical potential for different quark masses.The first order transition region is shown in blue, the crossover region is shown in red and the range for critical end point is marked in black.
FIG. 17. Nuclear interaction scaled with baryon mass.As the quark mass increases, it tends to zero.
FIG. 18. Critical baryon chemical potential and baryon mass from different approaches.
Parameters for the Monte Carlo runs to determine the nuclear transition at strong coupling, with statistics after thermalization.
abstract
The nuclear liquid-gas transition from a gas of hadrons to a nuclear phase cannot be determined numerically from conventional lattice QCD due to the severe sign problem at large values of the baryon chemical potential. In the strong coupling regime of lattice QCD with staggered quarks, the dual formulation is suitable to address the nuclear liquid gas transition.
We determine this first order transition at low temperatures and as a function of the quark mass and the inverse gauge coupling β. We also determine the baryon mass and discuss the nuclear interactions as a function of the quark mass, and compare to mean field results. It is known from experiments that at low temperatures, there is a phase transition between dilute hadron gas and dense nuclear matter as the baryon chemical potential increases.
This transition is of first order and terminates at about T c = 16 MeV in a critical end point. The value of the chemical potential µ 1st B at zero temperature is given roughly by the baryon mass m B , where the difference of µ 1st B −m B is due to nuclear interactions. For a review on nuclear interactions see .
As the nuclear force between baryons to form nuclear matter is due to the residual strong interactions between quarks and gluons, it should be accurately described by QCD. We choose to study the nuclear transition and nuclear interaction via lattice QCD , with its Lagrangian being a function of the quark mass and the inverse gauge coupling.
In order to understand the nature of the transition, it is helpful to study its dependence on these parameters. However, at finite baryon density, lattice QCD has the infamous sign problem which does not allow us to perform direct Monte Carlo simulations on the lattice. Various methods have been proposed to overcome the numerical sign problem, but they are either limited to µ B /T 3 or can not yet address full QCD in 3+1 dimensions in the whole µ B − T plane , in particular the nuclear transition is out of reach.
An alternative method is to study lattice QCD via the strong coupling expansion. There are two established effective theories for lattice QCD based on this: (1) the 3-dim. effective theory for Wilson fermions in terms of Polyakov loops, arising from a joint strong coupling and hopping parameter expansion , the dual representation for staggered fermions in 3+1 dimensions, with dual degrees of freedom describing mesons and baryons.
Both effective theories have their limitations: is limited to rather heavy quarks (but is valid for large values of β) whereas ( ) is limited to the strong coupling regime β 1 (but is valid for any quark mass). We study lattice QCD in the dual formulation, both at infinite bare gauge coupling, β = 0, and at leading order of the strong coupling expansion in the regime β < 1, which is far from the continuum limit.
But since strong coupling lattice QCD shares important features with QCD, such as confinement, and chiral symmetry breaking and its restoration at the chiral transition temperature, and a nuclear liquid gas transition, we may get insights into the mechanisms, in particular as the dual variables give more information in terms of its world lines, as compared to the usual fermion determinant that depends on the gauge variables.
To establish a region of overlap of both effective theories, we have chosen to perform the Monte Carlo simulations in the dual formulation extending to rather large quark masses. This paper is organized as follows: in the first part we explain the dual formulation in the strong coupling regime, in the second part we provide analytic results based on exact enumeration and mean field theory, in the third part we explain the setup of our Monte Carlo simulations and present result on the m q -and β-dependence of the nuclear transition.
Since the strong coupling regime does not have a well defined lattice spacing, we also determine the baryon mass am B to set the parameters of the grand-canonical partition function, aT and aµ B , in units of am B . We conclude by discussing the resulting nuclear interactions, and compare our findings with other results.
Staggered action of strong coupling QCD and its dual representation
In the strong coupling regime, the gauge integration is performed first, followed by the Grassmann integration to obtain a dual formulation. This was pioneered for the strong coupling limit in and has been extended by one of us to include gauge corrections . The sign problem is mild in the strong coupling limit and still under control for β < 1, where we can apply sign reweighting.
The dual degrees of freedom are color-singlet mesons and baryons, which are point-like in the strong coupling limit, and become extended about a lattice spacing by incorporating leading order gauge corrections. The partition function of lattice QCD is given by where DU is the Haar measure, U ∈ SU(3) are the gauge fields on the lattice links (x, μ) and { χx , χ x } are the unrooted staggered fermions at the lattice sites x.
The gauge action S G [U] is given by the Wilson plaquette action and the staggered fermion action S F [ χ, χ, U] is: where the gauge action depends on the inverse gauge coupling β = 2Nc g 2 and the fermion action depends on the quark chemical potential aµ q which favors quarks in the positive temporal direction, and the bare quark mass am q .
First we consider the strong coupling limit where the inverse gauge coupling β=0 and hence the gauge action S G [U] drops out from the partition function in this limit. The gauge integration is over terms depending only on the individual links (x, μ) so the partition function factorizes into a product of one-link integrals and we can write it as:
with z(x, μ) the one-link gauge integral that can be eval-uated from invariant integration, as discussed in , where we write the one-link integral in terms of new hadronic variables: Only terms of the form (M (x)M (y)) k x, μ (with k x,μ called dimers which count the number of meson hoppings) and B(y)B(x) and B(x)B(y) (called baryon links) are present in the solution of the one-link integral.
The sites x and y = x + μ are adjacent lattice sites. It remains to perform the Grassmann integral of the fermion fields χ, χ. This requires to expand the exponential containing the quark mass in Eq. (4) (left), which results in the terms (2am q M (x)) nx (with n x called monomers). To obtain non-vanishing results, at every site, the 2N c Grassman variables χ x,i and χx,i have to appear exactly once, resulting in the Grassmann constraint (GC):
where n x is the number of monomers, k x,μ is the number of dimers and the baryons form self-avoiding loops x,μ , which due to the constraint cannot coexist with monomers or dimers. With this, we obtain an exact rewriting of the partition function Eq. ( ) for N c = 3, in terms of integer-valued dual degrees of freedom {n, k, }:
where the sum over valid configurations has to respect the constraint (GC). The first term in the partition function is the contribution from dimers and the second term is the contribution from monomers. The weight factor w( ) for each baryon loop depends on the baryon chemical potential µ B = 3µ q and induces a sign factor σ( ) which depends on the geometry of :
Here, ω is the winding number of the loop . The total sign factor σ( ) ∈ {±1} is explicitly calculated for every configuration. We apply sign reweighting as the dual formulation has a mild sign problem: baryons are non-relativistic and usually have loop geometries that have a positive signs. The dual partition function of the strong coupling limit is simulated with the worm algorithm (see Section III A) and the sign problem is essentially solved in this limit.
Extension to finite β
The leading order gauge corrections O(β) to the strong coupling limit are obtained by expanding the Wilson gauge action Eq. ( ) before integrating out the gauge links. A formal expression is obtained by changing the order of integration (first gauge links, then Grassmann-valued fermions) within the QCD partition function:
With this the O (β) partition function is The challenge in computing Z (1) is to address the SU(N c ) integrals that receive contributions from the elementary plaquette U P . Link integration no longer factorizes, however the tr[U P ] can be decomposed before integration: Integrals of the type J ij with two open color indices -as compared to link integration at strong coupling -have been derived from generating functions
for either J = 0 or for G = U(N c ) . The SU(3) result was discussed in , in terms of the dual variables, neglecting rotation and reflection symmetries, there are 19 distinct diagrams to be considered. The resulting partition function, valid to O(β), is with q P ∈ {0, ±1}, and the site weights w x → ŵx , bond weights w b → ŵb and baryon loop weights w → ŵ receive modifications compared to the strong coupling limit Eq. ( ) for sites and bonds adjacent to an excited plaquette q P = 1.
The weights are given in , and are rederived for any gauge group in . The configurations {n, k, , q p } must satisfy at each site x the constraint inherited from Grassmann integration: which is the modified version of Eq. ( ) with q x = 1 if located at the corner of an excited plaquette q p = 0, otherwise q x = 0.
A more general expression that we obtained via group theory and is valid to higher orders of the strong coupling expansion is discussed in terms of tensor networks . A typical 2-dimensional configuration that arises at β = 1 in the Monte Carlo simulations is given in Fig. . Note that if a baryon loop enters a non-trivial plaquette, one quark is separated from the two other quarks, resulting in the baryon being extended object, rather being point-like in the strong coupling limit.
The O(β) partition function has been used in the chiral limit to study the full µ B − T plane via reweighting from the strong coupling ensemble. Whereas the second order chiral transition for small values of the aµ B decreased up to the tri-critical point, the first order nuclear transition was invariant: aµ 1st B 1.78(1) at zero temperature has no β-dependence.
For the ratio T (µ B = 0)/µ 1st B (T 0) we found the values 0.787 for β = 0 and 0.529 β = 1, which should be compared to T c / 0.165 for full QCD . However, since reweighting cannot be fully trusted across a first order boundary, direct simulations at nonzero β are necessary. The Monte Carlo technique to update plaquette variables is discussed in Section III A.
In this section, we provide analytic results from exact enumeration for small volumes, and mean field results based on the 1/d expansion, valid in the thermodynamic limit. The main purpose is to compare our Monte Carlo results to these analytic predictions.
Exact enumeration
To establish that our Monte Carlo simulations indeed sample the partition functions Eq. ( ) and Eq. ( ), we have obtained analytic results on a 2 4 volume at strong coupling, and at finite beta in two dimensions on a 4 × 4 volume, comparing O (β) and O β 2 truncations. Our strategy to obtain an exact enumeration of the partition function Z is to enumerate plaquette configurations first, then fixing the fermion fluxes which together with the gauge fluxes that are induced by the plaquettes form a singlet, a triplet or anti-triplet, i.e. on a given bond b, g b + f b ∈ {−3, 0, 3}, and last we perform the monomerdimer enumeration on the available sites not saturated by fermions yet by a depth-first algorithm .
At strong coupling, with no plaquettes, g b = 0 and f b are baryonic fluxes. All observables that can be written in terms of derivatives of log(z), such as the baryon density, the chiral condensate, the energy density, and also the average sign, are shown in Fig.
Expectations from mean field theory
Another analytical method to study strong coupling lattice QCD is the mean field approach, where the partition function is expanded in 1 d (d is the spatial dimension) and then a Hubbard-Stratonovich transformation performed . After this procedure, the free energy is a function of temperature T , the chiral condensate σ and chemical potential µ B :
here E[m] is one-dimensional quark excitation energy which is a function of the quark mass m = am q . For N c = 3 and d = 3 we determined the minimum of the free energy with respect to the chiral condensate. This gives us the equilibrium chiral condensate as a function of (T, m, µ B ). The chiral condensate and the baryon density as a function of the baryon chemical potential in lattice units aµ B and for various temperatures at quark mass m = 1.5 is shown in Fig. . We have determined the critical temperature to be aT c = 0.23 , which is characterized by an infinite slope of the chiral condensate.
For lower temperatures, there is a clear discontinuity of the chiral con-densate, separating the low density phase from the high density phase. For temperatures above and in the vicinity of aT c the chiral condensate and baryon density has no discontinuity but rapidly changes, corresponding to a crossover transition.
With this method, the phase diagram is plotted for different quark masses in Fig. . The second order phase transition in the chiral limit is plotted in solid blue line, the dotted lines show the first order phase transition for different quark masses and the solid red line indicates the critical end point for the different quark masses.
Mean field theory also gives an expression for the pion mass am π and the baryon mass am B : The mean field baryon mass for N c = 3, d = 3 is also plotted in red in Fig. . Whereas the baryon mass is around N c in the chiral limit (am B 3.12 for N c = 3), it approximately doubles at m = 3.5 (am B 6.28) which corresponds to the pion mass am π = 4.45, i.e. m π /m B = 0.708.
Hence, at around bare mass m = 3.5, the valence quark mass of the baryon corresponds roughly to 1/3 of the chiral limit value of the baryon mass. The first Monte Carlo simulations that could extend in the µ B − T plane was the MDP algorithm , but it required the introduction of the worm algorithm to make substantial progress.
First studies of the worm algorithm applied to the strong coupling limit QCD (with gauge group U(3)) are , and for gauge group SU . Monte Carlo simulations to extend the worm to incorporate leading order corrections were first proposed in . We will shortly review the setup of or Monte Carlo strategy for the nuclear transition, with an emphasis on the challenges to address large quark masses.
Strong Coupling
Without any further resummation, there is a mild sign problem in the dual formulation of lattice QCD in the strong coupling limit. When the average sign σ is not too small (close to zero), it implies that most of the configurations have a positive weight thus allowing us to perform sign reweighting strategies.
In Fig. , ∆f is plotted as a function of the baryon chemical potential and the quark masses. It is seen that ∆f is close to zero for most cases except near the critical chemical potential and for small quark masses, but never exceeds 5 × 10 −4 . Hence sign reweighting can be performed in the full parameter space.
The result that the sign problem becomes even milder when increasing the mass is related to the fact that larger critical chemical potentials result in a larger fraction of static baryons (spatial baryon hoppings become rare). FIG. . ∆F at strong coupling as a function of chemical potential and quark mass on a 6 3 × 8.
The sign problem becomes milder as the quark mass increases.
Finite β
All runs at finite β have been obtained for N τ = 4, which corresponds to a moderately low temperature aT = 0.25 compared to the value of the chiral transition aT 1.54. Those simulations were too expensive to attempt N τ = 8 runs, in particular as a higher statistics was required. The spatial volumes are 4 3 , 6 3 and 8 3 .
For β values are from 0.0 to 1.0 with step size 0.1, and for am q values from 0.00 to 1.00 with step size 0.01. The values of aµ were chosen close to the nuclear transition, the scanning range is shifted to large values as am q increases. At small quark masses the scanning range is from aµ = 0.4 to 1.0 and for the large quark masses, it is from 0.6 to 1.2 with step size 0.01.
The statistics used for are 15 × 10 4 measurements and between measurement, 40 × N 3 s worm updates.
Residual sign problem
Although it is possible to resum the sign problem at strong coupling with a resummation of baryon and pion world lines, this is not possible when including gauge corrections. In order to compare both sign problems, we kept the original dual formulation to monitor the severity of the sign problem. This is done via the relation
between the average sign σ and the difference of the free energy density ∆f between the full ensemble f and of the sign-quenched ensemble f || .
Nuclear interactions
We have found that aµ 1st B is very different from the baryon mass. This must be due to strong attractive interactions of nucleons. In contrast to continuum physics, in the strong coupling limit there is no pion exchange due to the Grassmann constraint. Instead, nucleons are point like and hard core repulsive.
However, the pion bath, which is modified by the presence of static baryons, results in an attractive interaction. In , this has been analyzed in the chiral limit using the snake algorithm, and it has been found that the attractive force is of entropic origin. Here, we do not quantify the nuclear interaction via the nuclear potential, but via the difference between critical baryon chemical potential and baryon mass, in units baryon mass, as shown in Fig. , given the am B as measured in Section III C.
This compares better to the 3dim. effective theory. The nuclear interaction is maximal and more than 40% in the chiral limit, which is related to pions being massless: the modification of the pion bath is maximal. We clearly find that the nuclear interaction decreases drastically and almost linearly until it almost approaches zero at about am q = 2.0, corresponding to a pion mass am π = 3.36, see Section II B. The large error bars for larger quark masses, that are due to the subtraction of almost same magnitudes, makes it difficult to extract a non-zero nuclear interaction at the largest quark masses.
In this work, we have determined the baryon mass and the nuclear transition via Monte Carlo: the worm algorithm based on the dual formulation, at finite β equipped with additional updates. All those numerical results and various analytic expressions are summarized in Fig. . We find that as the quark mass becomes large, spatial mesons hoppings (i.e.
spatial dimers) become rare, which makes this 3+1-dimensional system closer to 1dim. QCD . Also, both the baryon mass and the baryon chemical potential obtained in our dual representation, i.e. for staggered fermions, approaches the baryon mass of the 3-dim. effective theory which is based on Wilson fermions.
Another comparison that summarizes the validity of the mean field approach discussed in Section II B is shown in Fig. . It is evident that mean field theory has strong deviations for small quark masses, but this discrepancy becomes smaller for larger quark masses. The extension of the study of the nuclear transition to finite inverse gauge coupling β is summarized in Fig. , which shows the β-dependence of aµ c B for various quark masses.
For all quark masses ranging from am q = 0 to am q = 1.0, there is only a very weak β-dependence, confirming the expectation from mean field theory . This works was restricted to isotropic lattices ξ = a/a t = 1, i.e. we performed simulations at fixed temperature. Non-isotropic lattices are necessary to vary the temperature at fixed values of β.
This requires to include two bare anisotropies, γ for the fermionic action and γ G for the gauge action. Finite β has only been studied by us in the chiral limit . Clearly, it is interesting to study the location of the nuclear critical point also including higher order gauge corrections and at finite quark mass.
Simulations including O(β 2 ) are under preparation.
|
[
"Nuclear liquid-gas transition in lattice QCD."
] | 4,017
|
multifieldqa_en
|
en
| null |
4d6cd243b10a8460d2e2239182b797420ccc36335a74d23e
|
What is the rationality coefficient used in the observation model?
|
Paper Info
Title: Incorporating Human Path Preferences in Robot Navigation with Minimal Interventions
Publish Date: 16 Mar 2023
Author List: Oriana Peltzer, Dylan Asmar, Mac Schwager, Mykel Kochenderfer
Figure
Hyperplane arrangement of a twodimensional space containing two obstacles (colored in gray).The robot is located inside the pink polytope, surrounded by three adjacent obstacle-free polytopes.Each hyperplane on the boundary of the robot's polytope corresponds to one of the nonredundant constraints in eq.(4).(b)Graph derived from the hyperplane arrangement.The nodes on the graph designate polytopes, and edges designate transitions to adjacent polytopes.To estimate the human's preference, the robot updates a posterior over the goal and over which of the graph transitions φ 1 , φ 2 and φ 3 is preferred by the human.(c)Example preference defined over the graph.The location of the goal is indicated in yellow in the lower right polytope.For each node, the outgoing pink arrow designates the edge on the graph corresponding to the preferred transition between polytopes.
Simple, 10 × 10, 8 polytopes.(b) Map 2: Office, 10 × 10, 56 polytopes.(c) Map 3: Classroom, 20 × 20, 73 polytopes.(d) Sampled observations and robot's executed trajectories.
Fig.5: Maps used for simulating the robot navigation problem with path preferences.In (d), the heading angles observed are indicated with arrows.The goal is indicated with a pink circle, and the orange robot corresponds to the starting location.The blue robot follows a policy that accounts for path preference, while the green robot does not.The opacity of the robots increases with time.
Map 1 problem setup and example realizations for goal-only (green) and path preference (blue) solution methods.The robot starts at the lower left corner of the environment, and the goal of the task (pink circle) is in the upper left area.The robot does not know which goal, among 10 options (shown in light blue squares), is the correct goal.The human provides noisy observations, indicated by arrows, at each iteration.The green robot selects actions according to the goal-only baseline, and the blue robot uses our proposed method to infer path preferences.The polytopes composing G are drawn in blue.Probability of correct goal.WLPHVWHS +J (c) Entropy of goal distribution g.
Fig. 6: Probability of the correct goal, fig.6b, and entropy of the goal belief distribution P (g), fig.6c, for the same problem setup, fig.6a.In this problem instance, the human's preference is to go to the goal by passing on the right side of the obstacle.Results are averaged over 50 runs and the area filled represents one standard deviation above and below the mean value.The goal-only baseline shows an over-confident prediction (shown by the strong reduction in belief entropy) that the correct goal is less likely, making it more difficult to reach the correct goal compared to a method that accounts for path preference.
Success rates in the simple environment (Map 1).The results are averaged over 6 randomly sampled problem instances (start location, goal location, and goal possibilities), and over 50 runs per problem instance.∆T is the number of time steps separating two consecutive human inputs.The robot's mission time is Tmax = 30 time steps.We selected γ h = 1.5, corresponding to relatively noisy human inputs and making the problem more difficult to solve for the robot.
Computation times for Goal Only and Path Preference methods on Map 1 (fig.5a),Map 2 (fig.5b), and Map 3 (fig.5c),averaged over 100 runs with randomly sampled problem instances.The 95 % confidence interval is provided with the mean.We evaluate computation time at the first iteration of each run (where the search depth takes on its highest value Tmax).
abstract
Robots that can effectively understand human intentions from actions are crucial for successful human-robot collaboration. In this work, we address the challenge of a robot navigating towards an unknown goal while also accounting for a human's preference for a particular path in the presence of obstacles.
This problem is particularly challenging when both the goal and path preference are unknown a priori. To overcome this challenge, we propose a method for encoding and inferring path preference online using a partitioning of the space into polytopes. Our approach enables joint inference over the goal and path preference using a stochastic observation model for the human.
We evaluate our method on an unknown-goal navigation problem with sparse human interventions, and find that it outperforms baseline approaches as the human's inputs become increasingly sparse. We find that the time required to update the robot's belief does not increase with the complexity of the environment, which makes our method suitable for online applications.
INTRODUCTION
Collaboration between humans and robots has become increasingly important and one key aspect of this collaboration is the ability for robots to adapt to human decisions. In many scenarios, such as a robot navigating through a busy room to deliver an item, it is important for the robot to take into account human preferences.
For instance, humans may prefer a specific path that would allow their colleagues to notice the item being delivered, but this preference may change dynamically based on various factors such as changes in the environment or unforeseen circumstances. While some preferences can be incorporated into the path-planning process, accommodating dynamic user preferences in real-time remains challenging.
In this paper, we propose a way to enable robots to adapt to human preferences dynamically by leveraging real-time feedback to inform decision-making. In this work, we tackle the problem of robot navigation in which the robot cannot observe the goal or the preferred path to the goal, but must make navigation decisions that are influenced by humans through recommended actions.
Prior work has explored how to adapt to a human's preference through feedback, but such approaches often require a high level of intervention, which can be time-consuming and impractical in real-world scenarios. To optimize the use of human input and quickly infer the human's preference, Fig. : An autonomous robot navigates in a simulated classroom towards a goal location (pink circle).
At the start of its mission, it receives direction indications (arrows) from a human that indicate which path it should take to get to the goal. In this scenario, the human wants the robot to go around the desks on the right side of the classroom. A robot that does not reason over path preferences (green) will take the shortest path to the goal regardless of the human's input.
Our method (blue) infers the human's path preference from these indications and adapts to their recommendations. we propose an approach that leverages probabilistic representations of human preference and incorporates real-time feedback. Previous research by Bajcsy et al. considered an online adaptation problem in a manipulation task, where the person can apply forces to the robot to indicate their preferences.
By allowing the robot to continue its task while taking into account a probabilistic representation of human preference, their approach does not require frequent inputs. Building on this idea, we adopt a similar approach to adapt to a human's preference in the context of a robot autonomously navigating through a known environment, such as a cluttered office space.
Specifically, we focus on allowing the human to influence the robot's trajectory with respect to obstacles, by providing guidance on preferred routes or paths, while the robot continues to execute its task. Paths can be represented using homotopy classes . However, homotopies can pose computational challenges when used to encode and infer human preferences.
When the robot maintains a belief over homotopy classes, the inference problem can become exponentially complex with the number of obstacles in the space. Additionally, when the goal is unknown, the number of variables increases with the number of candidate destinations. This complexity can render the decision-making problem intractable.
Our solution is to encode path preference based on a partitioning of the environment into polytopes . This representation allows path preferences to be expressed as sets of preferred transitions between adjacent polytopes. Paths belonging to different homotopy classes correspond to different sequences of transitions.
By leveraging conditional independence assumptions, we can make the Bayesian inference problem tractable. These assumptions exploit the fact that human actions provide information about the path in a piece-wise manner. For example, indicating a preference for navigating around a particular obstacle only provides information about the local area and not the entire path.
Finally, after updating its belief representation over the human's preference, the robot can adapt to indications by replanning online. Our contributions are as follows. • We formulate the human-robot collaboration problem as a Partially Observable Markov Decision Process (POMDP) where both the goal of the task and the human's path preference are unknown random variables.
• We propose an encoding of a human's path preference using a partitioning of the environment into polytopes, along with conditional independence assumptions that make the Bayesian inference problem tractable to infer the task goal and path preference online. • Through simulations in two environments of different sizes and complexity, we show that our method is effective for solving problems where the robot must reach a goal that is unknown a-priori while simultaneously adapting to a human's indications.
Our method shows higher success rates compared to baseline approaches when the human inputs are sparse. Our approach enables a robot to make effective navigation decisions in collaboration with a human, even when the goal and path preference are not known in advance, and with minimal human input. In recent years, there has been a growing interest in shared autonomy and interactive systems, where humans and robots work together to accomplish tasks.
Several approaches have been proposed to address the challenge of enabling effective collaboration between human and robot agents while still achieving high task performance. Losey et al. and Jeon, Losey, and Sadigh propose a framework where a human operator is given control of a task-relevant latent action space while an autonomous system handles the rest.
Dragan and Srinivasa present a formalism for arbitrating between a user's input and a robot's policy when both human and robot share control of the same action space. Cognetti et al. [7] provide a method for real-time modifications of a path, . . . Fig. : We model the intent inference problem with the above diagram.
At each step in time, the robot receives an observation ot from the human conditioned on its current location st, the intended goal g, and the human's path preference θ. The robot updates its belief over g and θ and transitions to a next location st+1. while Hagenow et al. present a method that allows an outside agent to modify key robot state variables and blends the changes with the original control.
However, a common challenge of these approaches is the high level of intervention required from humans. Best and Fitch propose a method for predicting an agent's intended trajectory from observations. Rather than maintaining a belief over the agent's future path, they infer the agent's intended goal among a set of candidate locations at the boundary of the space.
This approach provides information on where the agent is heading and generates a distribution of candidate future trajectories for the agent. Inferring the goal of the task among a discrete set of candidates is also relevant to the area of shared autonomy. Javdani, Srinivasa, and Bagnell propose a formalism for shared control of a robotic arm, where the robot must assist the human in picking up an object but needs to infer which object the human has chosen from joystick inputs.
Planning with homotopy class constraints is useful in problems where the robot's requirements are given with respect to obstacles, and Yi, Goodrich, and Seppi consider topological constraints provided by human operators. Bhattacharya propose an efficient algorithm for solving pathplanning problems under homotopic constraints.
However, the number of homotopy classes for a given problem can be infinite, and as the robot changes location and updates its representation of the world, carrying out inference over homotopy classes in a dynamic environment requires recomputing the set of homotopies at every iteration, making the belief update challenging.
Prior work has addressed the challenge of shared autonomy by considering how robots can infer a human's intended goal, or how they can infer the preferred path to a goal. However, we argue that inferring the goal and the path as separate problems can lead to over-confidence in incorrect beliefs about the user's preferences.
To illustrate this point, consider the following scenario: a robot and a human are collaborating to move an object from one end of a room to Fig. : Using the hyperplanes composing the H-representation of each obstacle, we construct a hyperplane arrangement of the obstacle-free space (a). We define the human's preference for the robot's one step action choices as the posterior distribution (given all human input up to that point) over transitions from the current to the neighboring polytopes, i.e. edges on the graph.
Each time the robot transitions to a new polytope, the set of neighbor polytopes and the distribution over human preferences are updated. another, but there is an obstacle in the way. The human would like the robot to take a path around the obstacle on the left, even though the goal is on the right. If the robot only infers the goal from the human's inputs, it may incorrectly assume that the goal is on the right, and become over-confident in this belief.
On the other hand, if the robot only infers the preferred path, it may mistakenly assume that the goal is on the left, leading to a failure in completing the task. To overcome these challenges, our work proposes a joint inference approach that considers both the human's intended goal and their preferred path to that goal.
Specifically, we model the human's preference over different homotopy classes and leverage a conditional independence assumption to provide a tractable solution. In our approach, we assume that the human's inputs are noisily rational conditioned on both the goal and the preference. By jointly inferring the goal and path preference, we can avoid over-confidence in incorrect beliefs about the user's preferences, leading to improved system performance.
We consider the problem of robot navigation in a known environment to an unknown destination, where a human can intervene and provide a heading direction to the robot using a joystick or force cues. The human also has a preference on which path the robot should take with respect to obstacles, and our objective is for the robot to understand the human's intentions and execute the task with minimal interventions.
Let g be a discrete random variable denoting the goal of the task, belonging to a set of candidates Ω g , and let θ be a discrete-valued random variable representing the human's path preference, belonging to a set of possible preferences Θ. The physical location of the robot at time index t is denoted by s t ∈ R 2 , and the robot's action at time index t, belonging to some action space A, is denoted by a t .
The transition model T (s t+1 | s t , a t ) is deterministic, meaning the robot has full control over its future location. At any time step, the human may provide an observation to the robot. When the human intervenes, the robot receives a direction (heading angle) that can be mapped to a future location in space.
More specifically, we map the direction to an intended location, which is the resulting robot location after advancing in the indicated direction for one time step. For simplicity, we consider that the robot directly makes an observation o t of the location indicated by the human. We assume that the robot has a stochastic observation model for the human P (o t | s t , g, θ) that is conditioned on both the goal of the task g and the human's preferred path θ.
We further assume that having chosen a goal and path preference, the human takes actions to noisily minimize a cost function C g,θ that measures the cost of moving from the robot's current location to the goal along the preferred path. For example, C g,θ (s t , o t ) can be the length of the shortest path from location s t to the goal g after taking a first step to o t , and constrained by path preference θ.
We use C g,θ to induce a probability distribution over observations, given by: where γ h is a hyperparameter that designates the rationality coefficient. This model assumes the human will pick the lowest cost action with the highest probability and the likelihood of an action decreases exponentially with the increase in cost .
Our inclusion of the path preference θ sets our approach apart from . The model is shown in fig. represented as a Bayesian Network.
Inference
At each time step where the human provides an observation, the posterior P (g, θ) is given through the Bayesian update We note that the number of Bayesian updates required at each iteration to update the belief is equal to the cardinality of Ω g × Θ. In addition, each Bayesian update involves computing C g,θ ( .
, . ) in eq. ( ), which involves solving an optimization problem (such as a shortest path problem). In section IV, we propose a specific encoding of preference θ for resolving eq. ( ), while ensuring the number of computations of the cost C g,θ (., .) per update does not grow exponentially with the number of obstacles.
Decision Making
We consider a navigation problem where the robot receives reward according to the model R(s t , g, θ, a t ). We wish to find the optimal policy π that maximizes the expected discounted sum of future rewards, with discount factor γ. The above problem is a Partially Observable Markov Decision Process (POMDP) .
In this section, we propose an encoding of human's path preference θ for computing the posterior in eq. ( ). Devifrom the concept of homotopy classes, we define the preference according to a partitioning of the environment into polytopes, as shown in fig. , creating a hyperplane arrangement of the space.
Hyperplane arrangements have been used by Vincent and Schwager in the context of Neural Network verification. In our setting, we leverage this representation to define path preferences as preferred transitions between adjacent regions of the space.
Hyperplane Arrangement
We assume a two-dimensional environment composed of m polytopic obstacles, each defined by their half-space representation (H-representation) where A i ∈ R di×2 and b i ∈ R di , and where d i is the number of edges (hyperplanes) composing polytope i. Let n = i d i be the total number of hyperplanes. We leverage each obstacle's H-representation to construct a hyperplane arrangement of the environment as shown in fig.
.e. a partitioning of the space into polytopes. More specifically, each location in space belongs to a polytope j for which we can write an H-representation of the form where α j i ∈ {−1, 1} di is a vector specific to polytope j and obstacle i corresponding to the relative position of any point in the set with respect to each hyperplane in O i .
Fig. : Intent inference model in a hyperplane arrangement of the obstacle free space. We spatially decompose the preference θ into a set of preferred neighboring polytopes per region of the space. Within each polytope j, the human preference pj is a discrete distribution over the preferred neighbor in N (j).
We assume that for a location st belonging to polytope j, and given goal g and preference pj, the observation ot and any other preference p i,i =j are conditionally independent. Concatenating elements from each obstacle's Hrepresentation, we can write polytope j's H-representation as where Some of the constraints in eq. ( ) (corresponding to rows of A, b and α j ) are redundant, i.e. the set P j does not change upon their removal.
We can further reduce the Hrepresentation of a polytope to include only non-redundant constraints. By removing the rows corresponding to redundant constraints, we obtain new matrices A j e , b j e and α j e such that we can write the polytope's reduced H-representation as The non-redundant constraints correspond to edges of the polytope.
In other words, as the robot continually moves in space, the first hyperplane that it will cross upon exiting the polytope will correspond to one of the polytope's nonredundant constraints. Vincent and Schwager outline an iterative method for removing redundant constraints by solving n linear programs.
We use this method in practice for computing α j e for each polytope. We can now characterize each polytope by a vector α j e ∈ {−1, 1} n j e , where n j e ≤ n is the number of essential constraints of the polytope. The polytopes P j partition the environment into a hyperplane arrangement.
Path Preference
In this section, we provide a definition of preference θ according to a graphical representation of the environment based on the hyperplane arrangement. Under this representation, a path preference corresponds to a set of preferred transitions. In other words, for each polytope in the space, the human will have a preference to which neighboring polytope they wish to transition.
Let G := (V, E) be an undirected graph, where vertices are obstacle-free polytopes, and edges connect two adjacent polytopes. Each polytope is described by a unique vector α j as defined in eq. ( ). Two polytopes are adjacent if they share non-redundant constraints (rows in eq. ( )) corresponding to the same hyperplane (i.e. they are on opposite sides of the hyperplane).
Let N (v) be the set of neighbors of a vertex v. For each vertex, we denote p v the discrete-valued random variable describing which edge in N (v) the human intends to transition to. Using this formalism, we define a path preference as the set of preferred transitions over all nodes in the graph, Let m θ = v∈V |N (v)| be the cardinality of Θ, and m g = |Ω g | the number of possible goals.
A priori, the number of Bayesian updates required to update the belief at every iteration should be m θ × m g . Now, let us assume the conditional independence relationships described by the new problem diagram in fig. . More specifically, we introduce the assumption that conditioned on a robot location s t , the goal g, and the preference for the corresponding vertex p v in the graph, the observation o t and the preference for any other vertex are conditionally independent.
In other words, the observations the human provides can be defined conditioned only on the robot location, the goal, and the human's preference for its current vertex p v . By introducing this assumption, each update step only requires updating the joint (p v , g), reducing the number of cost computations to |N (v)| × m g .
We can notice that by introducing this assumption, we removed the direct relationship between the number of polytopes in the environment and the complexity of the Bayesian update in eq. ( ). In practice, components of θ are not mutually independent. For example, if the human preference at a vertex v 1 is
, it is unlikely that the human will also prefer p v2 = (v 2 , v 1 ) (turning back). We can improve our model by assuming a dependent relationship between preferences for adjacent edges, which does not significantly increase the complexity of the inference problem. An interesting property of our encoding is that any two paths that belong to different homotopy classes will cross different sequences of polytopes, i.e. they correspond to a different sequence of edges on G.
This can be proved by contradiction. Let us suppose that two continuous trajectories ξ 1 and ξ 2 , with the same start and end points and that do not intersect any obstacle, traverse the same regions in G in the same order. From the construction of the hyperplane arrangement, each polytope that the paths traverse through is obstacle-free.
Therefore, within each polytope, there is no obstacle in the area located in between the portions of ξ 1 and ξ 2 that belong to the region. A smooth transformation of ξ 1 into ξ 2 can be obtained by transforming each portion of ξ 1 belonging to the polytopes it intersects into the corresponding portion of ξ 2 for the same polytopes, where the extremities of the trajectory portions are connected to one another along the polytope's edges (where the same edge is crossed by both paths).
Along this transformation, the paths do not intersect any obstacle, and therefore ξ 1 and ξ 2 belong to the same homotopy class.
EXPERIMENTS
We evaluate our model on a simulated navigation task where the robot must reach a goal that is unknown a priori while respecting the path preferences indicated by a human. The robot navigates in a grid world containing obstacles. The transition model is deterministic: the robot selects an adjacent location on the grid to reach at the next time step.
The robot is also allowed to take diagonal actions. Each location s t in the map can be mapped to a vertex v t ∈ G. Therefore, the actions leading to locations mapped to different vertices correspond to edges on the graph. We note f (s t , a t ) the edge crossed by taking action a t from location s t .
The robot is given a mission time limit T max for reaching the goal. In this problem, we assume that the human selects actions to noisily minimize a cost function C g,θ , where θ is defined as per eq. ( ), corresponding to the length of the shortest path to the goal constrained by the preference (where the robot is only allowed to make transitions on G along preferred edges).
More specifically, where δ(s t , g | o t , p vt ) designates the length of the shortest path from s t to g passing by o t and constrained by preference p vt . This is a slight variant of the cost function proposed by Best and Fitch , where we add in a conditioning on the path preference. We compute costs by running the A path planning algorithm on the environment maps (grid worlds with diagonal actions) and impose preference constraints by pruning invalid transitions from the search tree.
Reward model. At each step in time, the robot receives a reward which is a sum of three components: a goal-specific reward a preference-specific reward or penalty We compute solutions to the POMDP defined in section III-B with the online solver POMCP , and with the particularity that within the rollouts, the robot does not expect to collect human inputs.
Each time a solution is computed, the robot takes an action and may receive an observation. If it does, it updates its belief distribution over the unknown problem variables and resolves the POMDP over a receding horizon.
Baselines
• Goal only. The robot solves the POMDP while ignoring the effects of path preference. Similarly to , we assume the human is taking action to minimize a goaldependent cost C g (s t , o t ) = δ(s t , g | o t ), where the conditioning on the preference is removed. We also omit the path preference's contribution to the reward R pref .
• Compliant. The robot complies with the human input, but does not take an initiative. If the user stops providing information, the robot continues in the last direction indicated for 5 time steps (conserving its momentum), then stops. • Blended. We designed an arbitration function to decide between our proposed policy (accounting for path preferences) and the user's recommendation when the robot receives inputs.
Our metric to evaluate confidence in the robot's prediction for the purpose of arbitration is the entropy of the intention distribution H(g, p i ), where p i denotes the preferred neighbor for the current region. Because our representation of the world is discrete, the arbitration is given by a step function.
Denoted by U , the action corresponding to the human's input, and P , the robot's prediction for the optimal action, we write the policy where we chose h = 1.6 as the confidence threshold.
Results
When evaluating the algorithm, we consider that a run is successful if the robot reached the goal within its allocated mission time T max and only made transitions between graph vertices corresponding to the human's preferences. We vary the time delay between human inputs, from constant guidance (∆ T = 1) to only a single observation (∆ T ≥ T max ).
Success rates. Table I reports the success rates for experiments conducted over six randomly sampled problem instances and 50 runs per instance in Map 1 (fig. ). When the human provides inputs at every iteration, the compliant policy shows the highest success rates. However, as ∆ T increases, the compliant robot is not able to accomplish the task within the allotted time as it does not receive sufficient inputs to do so, and performance decreases compared to the autonomous baselines.
We find that in these runs, accounting for path preference consistently improves performance compared with the goal-only baseline. Results also show that blending the user's input with the robot's policy (Path Preference + Blend) when the human provides information leads to improved performance. Belief entropy.
Figure shows a challenging problem instance where the directions the human provides do not align directly with the shortest path to the goal. By ignoring the effects of preferences in the problem model (goal only), the robot quickly infers from observations that the upper left goal is less likely than others (P (g) drops).
The strong decrease in entropy shows that the robot becomes overconfident in this prediction. Overconfidence in an incorrect goal will prevent the agent from finding the correct goal once the human's indications directly align with it, as it needs to correct for the wrong predictions, as shown in the path realization (fig.
). In this realization, the goal-only method (green robot) fails to search the upper left area within the allotted time. By accounting for path preferences in its model, the blue robot's entropy over the goal distribution decreases more steadily, allowing for it to leverage the human's latest observations and reach the goal successfully.
shows an over-confident prediction (shown by the strong reduction in belief entropy) that the correct goal is less likely, making it more difficult to reach the correct goal compared to a method that accounts for path preference. Computation time. In table II we provide the time required to solve the POMDP, and the time required to update the robot's belief as it receives new observations.
We compute solutions on three maps: a simple 10 × 10 grid world with 8 polytopes (fig. ), a 10 × 10 grid world with 56 polytopes (fig. ), and a 20×20 grid world with 73 polytopes (fig. ). The latter environment being larger, we increase the mission time and the depth of the search tree in POMCP from T max = 30 (Map 1 and Map 2) to T max = 60 (Map 3).
We do not notice an increase in the time required to update the robot's belief with an increase in problem complexity, which is consistent with our observation that the complexity of the Bayesian update should not increase with the number of obstacles or polytopes. On the contrary, the belief update time on Map 2 and Map 3, containing more obstacles, is reduced compared to the first map.
More obstacles result in fewer iterations when solving the constrained shortest path problem with A . Adding constraints due to the obstacles and polytopes reduces the size of the A search tree. C. Limitations Simulation environments. In our simulations, we hardcoded the preference policy over the maps (e.g. in Map 1, go around the table counter-clockwise).
We randomly sampled problem instances (start and goal locations, and goal options) to reduce the bias introduced by these preference choices. To best evaluate and compare the different approaches, it would be best to sample preferences among a distribution of preferences chosen by a human (for example, from benchmarks resulting from a collection of data).
Creating such a benchmark is an interesting direction for future work. Hyperplane arrangement construction. The main limitation of our approach is that the size and geometry of each polytope depends strongly on the geometry of the obstacles, as seen in fig. . Because of this, the robot can make predictions over preferences that are too refined compared with the topology of the environment.
A direct consequence is that when the size of the polytopes is small, the information provided by the human can be incorrectly interpreted as a preference on the robot's immediate action. Our method can be improved by changing the structure of the hyperplane arrangement so that it relies on the topology of the environment, but does not vary strongly with the geometry of the features in the environment.
For this purpose, topometric maps and region construction algorithms are promising directions. We presented an approach for encoding and inferring a human's path preference in an environment with obstacles. By leveraging a partitioning of the space into polytopes and a stochastic observation model, our method allows for joint inference over the goal and path preference even when both are unknown a-priori.
Our experiments on an unknown-goal navigation problem with sparse human interventions demonstrate the effectiveness of our approach and its suitability for online applications. The time required to update the robot's belief does not increase with the complexity of the environment, which further highlights the practicality of our method.
|
[
"γh."
] | 5,646
|
multifieldqa_en
|
en
| null |
5914446861ce8a3d0d9204dfc9d41edd747de735c3c3fc36
|
Who was Ralph Rokebye's brother?
|
Rokebye, Ralph of Yorks, arm. Gloucester Hall, matric. 9 Nov., 1582, aged 15; student of Lincoln's Inn 1585. See Foster's Inns of Court Register.
Rokebye, Ralph of Herts (? Yorks), gent. Broadgates Hall, matric. entry 28 Feb., 1589-90, aged 14. See pedigree in Foster's Yorkshire Collection.
Rokeby, William (brother of Sir Richard, treasurer of Ireland, son of John, of Thundercliffe Grange, Yorks), fellow of King's Hall, Cambridge, D.Can.L.; rector of Sandal 1487, and of Halifax, Yorks, 1502, rector of Fakenham, Norfolk, 1496, chancellor of Ireland 1498, and 1515, bishop of Meath, and privy councillor 1507, archbishop of Dublin 1512, archdeacon of Surrey 1520, until his death 29 Nov., 1521. See Ath. ii. 717; Cotton, i. 25; & Lansdowne MS. 979, ff. 4, 6.
Rolfe, Augustine (Rolfus) M.A. from Queen's Coll., Cambridge, 1595; incorporated 10 July, 1599.
Rolf, Richard B.A. from Emanuel Coll., Cambridge, 1584-5 (incorporated 11 July, 1585); M.A. 1588. See Foster's Graduati Cantab.
Rolfe, William cler. fil. New Coll., matric. 10 March, 1656-7, B.A. 1660, fellow, M.A. 14 Jan., 1663-4; rector of Brampton 1668, and of Stoke Bruern, Northants, 1676, until his death, buried (at Stoke Bruern) 6 Sept., 1693. See Baker's Northants, i. 86.
Rolfe, William s. William, of Stoke-Bruern, Northants, cler. Brasenose Coll. 7 July, 1688, aged 16; student of Inner Temple 1692, buried in the Temple church 1 March, 1692-3. See Foster's Inns of Court Reg.
Rolle, Denis youngest son John, of Steventon, Devon, equitis. Exeter Coll., matric. 15 Feb., 1666-7, aged 17; brother of John same date.
Rolle, Denis s. D., of Heanton, Devon, arm. Exeter Coll. matric. 24 Oct., 1687, aged 17; B.A. 1691, M.A. 1694 (as Denys), rector of Merton, Devon, 1696. See Samuel 1687, & Foster's Index Ecclesiasticus.
Rolle, (Sir) Henry of Devon, arm. fil. Broadgates Hall, matric. 14 June, 1594, aged 18; student of Middle Temple 1597 (as son and heir of Henry, of Steventon, Devon, esq.), knighted 23 July, 1603, died in 1617. See Foster's Inns of Court Reg.
Rolle, Henry of Devon, arm. Exeter Coll., matric. 20 March, 1606-7, aged 17; bar.-at-law, Inner Temple, 1618, bencher 1633 (2s. Robert, of Heanton, Devon), M.P. Callington 1621-2, 1624-5, Truro 1625-1626, 1628-9, serjeant-at-law 1640, recorder of Dorchester 1636, a judge of king's bench 1645, chief justice of upper bench 1648-55, died 30 July, 1656, buried in Shapwick church, Somerset; brother of Samuel 1605. See Ath. iii. 416; & Foster's Judges and Barristers.
Rolle, Henry s. Alex., of Tavistock, Devon, gent. Christ Church, matric. 23 March, 1696-7, aged 17.
Rolle, John of Devon, arm. Exeter Coll., matric. 30 May, 1589, aged 15; B.A. 8 Feb., 1592-3, M.A. 25 May, 1596.
Rolle, John 1s. John, of Steventon, Devon, equitis. Exeter Coll., matric. 15 Feb., 1666-7, aged 18; of Bicton, Devon; died in his father's lifetime, buried at Bicton 22 April, 1689; brother of Denis 1667, and father of Denis 1698.
Rolle, Richard s. Richard, of Cookeburye, Devon, gent. New Inn Hall, matric. 26 Sept., 1634, aged 18; B.A. from Jesus Coll., Cambridge, 1638, incorporated from Gloucester Hall 17 Dec., 1639, M.A. 2 July, 1642, rector of Sheviocke, Cornwall, 1656; father of the next-named. See Foster's Index Eccl.
Rolle, Richard s. R., of Sheviock, Cornwall, cler. St. Alban Hall, matric. 3 July, 1674, aged 17; B.A. 1678.
Rolle, Robert (Rooles or Roales) fellow New Coll. 1551-60 from Mark Lane, city of London, B.A. 26 June, 1555, M.A. 26 July, 1560, B.D. 22 Jan., 1572-3, D.D. June, 1585, a teacher in Westminster school; perhaps canon of Combe (4) in Wells, 1574, and rector of Stoke Climsland, Devon, 1574. See O.H.S. i. 345; & Foster's Index Eccl.
Rolle, Samuel s. Denis, of Great Torrington, Devon, arm. Exeter Coll., matric. 16 July, 1687, aged 18, B.A. 1691; bar.-at-law Middle Temple 1697; M.P. Barnstaple 1705, died 1747; see Denis 1687. See Foster's Judges and Barristers.
Rolle, William B.C.L. 14 July, 1528; perhaps vicar of Yarncombe, Devon, 1536. See Foster's Index Ecclesiasticus.
Rolles, Gabriel (Rooles) B.A. from St. John's Coll., Cambridge, 1610-11, M.A. 1614; incorporated 13 July, 1619, rector of East Locking, Berks, 1620, as Rolle. See Foster's Graduati Cantab.
Rolles, Richard gent. Jesus Coll., matric. 1 March, 1632-3, B.A. next day, M.A. 15 Oct., 1635; perhaps created B.D. 20 Dec. 1642, "ex regis gratia," rector of Wavendon, Bucks, and of Witham, Essex, 1646, by the Westminster assembly. See Add. MS. 15,670, p. 70.
Rolles, William s. Richard, of Lewknor, Oxon, gent. St. John's Coll., matrie. 12 March, 1637-8, aged 17, B.A. 9 Nov., 1641, M.A. 6 July, 1644; B.D. from Jesus Coll. 12 Sept., 1661, rector of Wheatfield, Oxon, 1660, and of Chalfont St. Giles, Bucks, 1662. See Foster's Index Eccl.
Rolles, William created M.A. from Exeter Coll. 14 April, 1648.
Rolleston, Simon created M.A. 31 Aug., 1636.
Rolleston, Thomas of Devon, gent. Wadham Coll., matric. 12 May, 1620, aged 16.
Rollinson, Francis 1584. See Rallinson.
Rollinson, William s. "Jose," of London, gent. St. John's Coll., matric. 7 March, 1694-5, aged 15; perhaps brother of John Rawlinson, of New Coll. 1692. See page 1236.
Rolt, Edward youngest son of Tho., of London, equitis. Merton Coll., matric. 7 Nov., 1701, aged 15; of Sacomb, Herts, and Chippenham, Wilts, student of Lincoln's Inn, 1702, M.P. St. Mawes 1713, Grantham 1715-22, Chippenham 1722; died 22 Dec., 1722; his father knighted 1 Oct., 1682, and died 9 Sept., 1710. See Foster's Parliamentary Dictionary.
Rolte, George s. Thomas, of St. Margarets par. Darenth, Kent, pleb. St. Alban Hall, matric. 17 June, 1631, aged 18; B.A. 20 June, 1631, M.A. 29 April, 1634, incorporated at Cambridge 1639.
Romane, Edmund pleb. Balliol Coll., matric. 20 Feb., 1627-8, aged 18; B.A. next day, M.A. 3 June, 1630.
Romaine, Matthew pleb. Balliol Coll., matric. 10 June, 1630, B.A. same day, M.A. 14 May, 1633, vicar of Stoke Gaylard, Dorset, 1639; father of the next. See Foster's Index Eccl.
Romayne, Thomas s. Matth., of Stoke Gaylard, Dorset, minister. Wadham Coll., matric. 17 July, 1669, aged 17; B.A. from Hart Hall 1673, "the intruded" rector of Stoke Gaylard 1675. See Foster's Index Eccl.
Romayne, William (Ronayne) gent. Trinity Coll., matric. 31 July, 1671, aged 16.
Rome, Harcourt s. William, of London, p.p. Brasenose Coll., matric. 13 Dec., 1672, aged 17.
Rome, William s. G. (? "Gul."), of Northampton (city), pleb. Brasenose Coll., matric. 11 Dec., 1684, aged 16.
Romney, Joseph B.A. from Emanuel Coll., Cambridge, 1610-11, M.A. 1614; incorporated 8 July, 1614, student of Inner Temple 1610, as of London, gent. See Foster's Inns of Court Reg.
Rone, John s. Randolph, of Hanmer, Flints, pleb. Brasenose Coll., matric. 10 Oct., 1634, aged 18; D.D. Trinity Coll., Dublin, 25 Jan., 1666 (as Roane), vicar of Hanmer, Flints, 1644, ejected same year, dean of Clogher 1667, bishop of Killaloe 1675, until his death 5 Sept., 1692. See Cotton's Fasti Ecc. Hib. i. 467.
Rone, William of New Coll. 1661. See Roane.
Roode, Edward (or Rode) B.A. 21 July, 1522, M.A. 26 Nov., 1534; perhaps canon of Southwell 1561-73.
Roode, Edward cler. fil. Merton Coll., matric. 22 Nov., 1650; Eton postmaster 1649, fellow 1651, B.A. 2 March, 1651-2, M.A. 14 Dec., 1655; incorporated at Cambridge 1657, and LL.D. 1671; vicar of Gamlingay, co. Cambridge, rector of one moiety 1661, and of the other 1677; died at Cambridge 1689. See Burrows, 525; & O.H.S. iv. 292.
Roode, Onesiphorus s. Edward, of Thame, Oxon, sacerd. New Inn Hall, matric. 27 Oct., 1637, aged 16, B.A. 1 July, 1641; incorporated at Cambridge 1645; chaplain to the house of lords after the expulsion of the bishops; minister of New chapel, Tuttle-Fields, Westminster, 1648, until ejected in 1660. See Calamy, i. 195.
Rood, Richard M.A. from Pembroke Coll. 5 Dec., 1634.
Rooke, John s. Tho., of Broadwell, co. Gloucester, pleb. Pembroke Coll., matric. 1 March, 1683-4, aged 17; brother of Thomas 1693.
Rooke, John s. Tho., of Whitchurch, Wilts, gent. Balliol Coll., matric. 14 Jan., 1713-14, aged 17.
Rooke, Nicholas s. Arthur, of Totnes, Devon, gent. Exeter Coll., matric. 10 March, 1670-1, aged 16; B.A. 1674, M.A. 1677, rector of Dartington, Devon, 1679. See Foster's Index Eccl.
Rooke, Robert "ser." Oriel Coll., matric. 1 April, 1656, B.A. 1659.
Rooke, Robert s. R., p.p. St. Alban Hall, matric. 30 March, 1677, aged 17.
Rooke, Thomas pleb. Christ Church, matric. 3 May, 1659.
Rooke, William (Roock) of Dorset, pleb. Brasenose Coll., matric. entry under date 20 March, 1578-9, aged 19; B.A. from St. Alban Hall 30 Jan., 1582-3, M.A. 9 May, 1586.
Rooke, William of Dorset, gent. New Coll., matric. 12 July, 1605, aged 18; B.A. 21 Feb., 1608-9, chaplain, M.A. 16 Dec., 1611, rector of North Cheriton, Somerset, 1618. See Foster's Index Eccl.
Rooke, William s. J., of Workington, Cumberland, p.p. Queen's Coll., matric. 22 Oct., 1669, aged 17; B.A. 1674, M.A. 1677, B.D. 1690, vicar of Plumstead, Kent, 1691, and rector of Hadley, Hants, 1695. See Foster's Index Eccl.
Rookes, Christopher (Rokys or Rokkis) B.A. 8 July, 1522, M.A. 1 July, 1527, B.D. supd. Oct., 1540; principal of Magdalen Hall 1529-32, vicar of Stanstead Abbots, Herts, 1534. See Foster's Index Eccl.
Rookes, Jonas B.A. from Magdalen Hall 24 April, 1599, M.A. 11 Feb., 1601-2 (2s. William, of Roydes Hall); vicar of Penistone, Yorks, 1619, see Foster's Index Eccl.; styled fellow and bursar of University Coll. in Foster's Yorkshire Collection, possibly brother of the next-named.
Rookes, Robert of Yorks, pleb. Magdalen Hall, matric. 14 May, 1602, aged 19; possibly brother of the last-named.
Ro(o)kes, William demy Magdalen Coll. 1544, B.A. supd. 1551, fellow 1552-71, M.A. 27 April, 1556, B.Med. supd. 24 April, 1561. See Bloxam, iv. 99.
Rookes, William s. William, of Rhodes Hall, Yorks, gent. University Coll., matric. 30 June, 1665, aged 16; died at Oxford in 1667.
Roope, Ambrose s. A., of Dartmouth Parva, Devon, arm. Exeter Coll., matric. 15 March, 1671-2, aged 16.
Roope, George s. Ant., of Bradford, Wilts, gent. Hart Hall, matric. 10 Oct., 1702, aged 15.
Roope, John s. Nicholas, of Dartmouth, Devon, gent. Exeter Coll., matric. 17 Nov., 1637, aged 15; student of Lincoln's Inn 1638. See Foster's Inns of Court Reg.
Roope, Nicholas of Devon, gent. Broadgates Hall, matric. 6 Feb., 1606-7, aged 18; B.A. 6 Nov., 1610; probably father of the last-named.
Rooper, Thomas s. T., of London, gent. Trinity Coll., matric. 9 July, 1699, aged 16; B.A. 1703, M.A. 19 Feb., 1705-6, as Roper.
Rooper, William of St. Alban Hall 1667. See Roper.
Roos, Brian D.Can.L. or doctor of decrees of the university of Valentia; incorporated 3 Feb., 1510-11; died 1529, buried in the church of Chelray. See Fasti, i. 31.
Root, Isaac pleb. St. John's Coll., matric. 2 July, 1658, admitted to Merchant Taylors' school 1649 (only son of Isaac, merchant taylor); born in Trinity parish 20 Aug., 1641. See Robinson, i. 193.
Roots, Richard s. Tho., of Tunbridge, Kent, gent. St. John's Coll., matric. 26 Dec., 1689, aged 15; demy Magdalen Coll. 1690-1702, B.A. 1693, M.A. 1696, rector of Chilmarck, Wilts, 1702-27, canon of Sarum 1722, rector and vicar of Bishopstone, Wilts, 1728; brother of William 1699. See Rawl. iii. 447, and xix. 90; Bloxam, vi. 111; & Foster's Index Eccl.
Roots, Thomas of Sussex, pleb. Magdalen Hall, matric. entry 17 Nov., 1581, aged 13; B.A. supd. 1 July, 1584, bar.-at-law, Lincoln's Inn, 1594. See Foster's Judges and Barristers.
Rootes, Thomas s. William, of Tunbridge, Kent, pleb. St. John's Coll., matric. 31 Jan., 1628-9, aged 23; B.A. 12 Feb., 1628-9, vicar of Long Stanton All Saints, co. Cambridge, 1630. See Add. MSS. 15,669-70; & Foster's Index Eccl.
Rootes, Thomas pleb. St. John's Coll., matric. 2 July, 1658; B.A. 1661, M.A. 1666; possibly father of Richard 1689, and William 1699.
Roots, William s. Tho., of Tunbridge, Kent, gent. Christ Church, matric. 16 March, 1698-9, aged 18; B.A. 1704; clerk Magdalen Coll. 1705-11, M.A. 1707, rector of Little Berkhampstead, Herts, 1714; brother of Richard 1689. See Bloxam, ii. 85; & Foster's Index Eccl.
Roper, Francis s. Robert, of Trimdon, co. Durham, gent. Corpus Christi Coll., matric. 16 Dec., 1661, aged 18; probably identical with Francis, son of Robert, of Kelloe, co. Durham, farmer, was admitted sizar of St. John's Coll., Cambridge, 21 Sept., 1658, aged 16; fellow, B.A. 1662-3, M.A. 1666, B.D. 1673, vicar of Waterbeach, co. Cambridge, 1678, canon of Ely 1686-90, rector of Northwold, Norfolk, 1687, died 13 April, 1719. See Mayor, 138; Surtees' Durham, i. 107; & Foster's Index Eccl.
Roper, John (or Rooper) demy Magdalen Coll., from Berks, M.A. fellow, 1483, D.D. disp. 27 June, 1506, (first) Margaret professor of divinity, 1500, vice-chancellor of the university 1505, and 1511, principal of Salesurry and George Hall, rector of Witney, Oxon, 1493, vicar of St. Mary's church, Oxford, canon of Cardinal Coll. 1532; died May, 1534. See Ath. i. 76; & Landsowne MS. 979, f. 118.
Roper, John B.A. disp. 4 July, 1512.
Roper, Thomas of Trinity Coll. 1699. See Rooper.
Roper, Philip of Kent, arm. Gloucester Hall, matric. 7 Sept., 1588, aged 15 (subscribes Rooper).
Roper, William (subscribes Rooper) of co. Hereford, militis fil. St. Alban Hall, matric. entry dated 5 June, 1607, aged 13; probably of Malmains, Kent, 2nd son of Sir Christopher Roper, afterwards 2nd baron Teynham. See Foster's Peerage.
Roscarrock, Henry of Cornwall, arm. Hart Hall, matric. entry under date 17 Dec., 1576, aged 21; probably son of Thomas, of Roscarrock, and brother of the next, and of Richard 1581.
Roscarrock, John B.A. 11 Feb., 1576-7; perhaps from Exeter Coll. (and 1s. Thomas, of Roscarrock, Cornwall); died 24 Nov., 1608; brother of Henry and Richard. See O.H.S. xii. 65.
Roscarrock, Nicolas (Roiscariot) B.A. supd. 3 May, 1568, student Inner Temple 1571, as of Roscarrock, Cornwall. See Foster's Inns of Court Reg.
Roscarrock, Richard of Cornwall, arm. Broadgates Hall, matric. entry under date circa 1581, aged 19; student of Middle Temple 1583 (as 3s. Thomas, of Roscarrock, Cornwall, esq.), brother of Henry and John. See Foster's Inns of Court Reg.
Rosdell, Christopher of Yorks, pleb. St. Edmund Hall, matric. entry under date 22 Dec., 1576, aged 22, B.A. 4 July, 1576; rector of St. Bennet Sherehog, London, 1579, and vicar of Somerton, Somerset, 1582. See Foster's Index Eccl.
Rose, Christopher s. John, of Marlow, Bucks, gent. Christ Church, matric. 13 Feb., 1622-3, aged 21, B.A. same day; rector of Hutton, Essex, 1642. See Foster's Index Ecclesiasticus.
Rose, Christopher s. Giles, of Lynn Regis, Norfolk, gent. Lincoln Coll., matric. 8 July, 1670, aged 15; student of Gray's Inn, 1673. See Foster's Gray's Inn Register.
Rose, Gilbert Augustinian Canon, B.D. supd. 22 May, 1512, and supd. 12 Dec., 1519, for incorporation as D.D.
Rose, Henry "ser." Lincoln Coll., matric. 22 July, 1658, B.A. 16 Jan., 1660-1, fellow 1662 from Pirton, Oxon, M.A. 1663 (incorporated at Cambridge 1688), B.D. 1672; minister of All Saints, Oxford, but running much into debt, and marrying beneath himself, left his fellowship and church about 1674, retired to London, and at length to Ireland. See Ath. iv. 561.
Rose, Hugh s. "Dav. Ni." (Nigg 4to.), of Ross, Scotland, p.p. (subs. pleb.). Balliol Coll., matric. 3 April, 1707, aged 20; B.A. 1709.
Rose, John B.A. 8 June, 1519, fellow Merton Coll. 1523, M.A. 31 March, 1525; one of these names vicar of Shoreham, Kent, 1536. See Foster's Index Ecclesiasticus.
Rose, John of co. Leicester, pleb. Merton Coll., matric. 24 Nov., 1581, aged 21.
Rose, John s. Jeremy, of Swell, co. Gloucester, pleb. Corpus Christi Coll., matric. 12 Dec., 1623, aged 15; B.A. 4 July, 1626.
Rose, John s. Rich., of Halberton, Devon, gent. Exeter Coll., matric. 14 May, 1688, aged 17.
Rose, John s. J., of West Derby, co. Lancaster, pleb. University Coll., matric. 7 March, 1712-13, aged 18, B.A. 1716; rector of Bilborough, Notts, 1722. See Foster's Index Eccl.
Rose, Jonathan s. Th., of Mickleton, co. Gloucester, pleb. St. Alban Hall, matric. 16 May, 1677, aged 18; B.A. 9 Feb., 1680-1.
Rose, Joseph s. Thomas, of Sturminster Newton, Dorset, pleb. Oriel Coll., matric. 12 Dec., 1623, aged 19.
Rose, Richard B.A. from Exeter Coll. 14 June, 1621; perhaps student of Middle Temple 1622 (as son and heir of John, of Lyme, Dorset, gent.), and M.P. Lyme Regis April-May, 1640, 1640 (l.p.), till his death after 1648. See Foster's Inns of Court Reg. & Foster's Parliamentary Dictionary.
Rose, Richard arm. Exeter Coll., matric. 29 March, 1656; student of Lincoln's Inn 1659, as 4s. Richard, of Wootton Fitzwarren, Dorset, esq. See Foster's Inns of Court Reg.
Rose, Richard s. Richard, of Monks Kirby, co. Warwick, pleb. Magdalen Coll., matric. 3 May, 1672, aged 16 (as Rosse); chorister 1670-6. See Bloxam, i. 95.
Rose, Richard s. R(ichard), of Wyng, Bucks, gent. Trinity Coll., matric. 7 May, 1680, aged 16; bar.-at-law, Inner Temple, 1699. See Foster's Judges and Barristers.
Rose, Stephen of co. Gloucester, pleb. Corpus Christi Coll., matric. 21 Jan., 1619-20, aged 16; B.A. 13 Nov., 1621, M.A. 2 July, 1625, vicar of Aldermaston 1627, and rector of Barkham 1633, and of Arborfield, Berks, 1640, and perhaps of Hartley Mawditt, Hants, 1652. See Foster's Index Ecclesiasticus.
Rose, Stephen "ser." Lincoln Coll., matric. 19 Nov., 1650.
Rose, Stephen "servi. fil." Magdalen Coll., matric. 19 Nov., 1650 (subscribes "serv.").
Rose, Stephen "ser." Magdalen Coll., subscribed 23 Nov., 1655; B.A. from Wadham Coll. 1659, vicar of Cold Overton, co. Leicester, 1662-3, and rector of Woolhampton, Berks, 1667-95, father of Temple. See Foster's Index Eccl.
Rose, Temple s. Step., of Woolhampton, Berks, cler. Trinity Coll., matric. 29 March, 1693, aged 17, B.A. 1696.
Rose, Thomas Minorite, B.D. 22 June, 1509.
Rose, Thomas of Herts, pleb. Magdalen Hall, matric. 10 Oct., 1589, aged 15.
Rose, Thomas s. Seth, of Telscombe, Sussex, sacerd. Oriel Coll., matric. 5 June, 1640, aged 18; his father rector of Telscombe 1604, etc. See Foster's Index Eccl.
Rose, Thomas s. Edw.,
|
[
"Sir Richard."
] | 2,952
|
multifieldqa_en
|
en
| null |
dee63735510f6958f4c5bf318421c9b9fac0bc8b3e341a4a
|
How are thalassemias classified?
|
Thalassaemia minor | definition of Thalassaemia minor by Medical dictionary
Thalassaemia minor | definition of Thalassaemia minor by Medical dictionary
https://medical-dictionary.thefreedictionary.com/Thalassaemia+minor
(redirected from Thalassaemia minor)
Related to Thalassaemia minor: thalassaemia major
Thalassemia describes a group of inherited disorders characterized by reduced or absent amounts of hemoglobin, the oxygen-carrying protein inside the red blood cells. There are two basic groups of thalassemia disorders: alpha thalassemia and beta thalassemia. These conditions cause varying degrees of anemia, which can range from insignificant to life threatening.
All types of thalassemias are considered quantitative diseases of hemoglobin, because the quantity of hemoglobin produced is reduced or absent. Usual adult hemoglobin is made up of three components: alpha globin, beta globin, and heme. Thalassemias are classified according to the globin that is affected, hence the names alpha and beta thalassemia. Although both classes of thalassemia affect the same protein, the alpha and beta thalassemias are distinct diseases that affect the body in different ways.
Beta thalassemia may be the most best-known type of thalassemia and is also called Cooley's anemia. It is caused by a change in the gene for the beta globin component of hemoglobin. Beta thalassemia causes variable anemia that can range from moderate to severe, depending in part on the exact genetic change underlying the disease. Beta thalassemia can be classified based on clinical symptoms. Beta thalassemia major usually causes severe anemia that can occur within months after birth. If left untreated, severe anemia can result in insufficient growth and development, as well as other common physical complications that can lead to a dramatically decreased life-expectancy. Fortunately, in developed countries beta thalassemia is usually identified by screening in the newborn period, before symptoms have developed. Children who are identified early can be started on ongoing blood transfusion therapy as needed. Although transfusion therapy prevents many of the complications of severe anemia, the body is unable to eliminate the excess iron contained in the transfused blood. Over time, the excess iron deposits in tissues and organs, resulting in damage and organ failure. Another medication must be administered to help the body eliminate the excess iron and prevent iron-over-load complications. Beta thalassemia intermedia describes the disease in individuals who have moderate anemia that only requires blood transfusions intermittently, if at all.
Alpha thalassemia is the result of changes in the genes for the alpha globin component of hemoglobin. There are two main types of alpha thalassemia disease: hemoglobin H disease and alpha thalassemia major. The two diseases are quite different from beta thalassemia as well as from one another. Individuals with hemoglobin H disease can experience events of hemolytic anemia—anemia caused by the rapid breakdown of the red blood cells. These events are thought to be triggered by various environmental causes, such as infection and/or exposure to certain chemicals. Hemoglobin H disease is in most cases milder than beta thalassemia. It does not generally require transfusion therapy. Alpha thalassemia major is a very serious disease that results in severe anemia that begins even before birth. Most affected babies do not survive to be born or die shortly after birth.
The thalassemias are among the most common genetic diseases worldwide. Both alpha and beta thalassemia have been described in individuals of almost every ancestry, but the conditions are more common among certain ethnic groups. Unaffected carriers of all types of thalassemia traits do not experience health problems. In fact, the thalassemia trait is protective against malaria, a disease caused by blood-borne parasites transmitted through mosquito bites. According to a widely accepted theory, most genetic changes—mutations—that cause thalassemia occurred multiple generations ago. Coincidentally, these mutations increased the likelihood that carriers would survive malaria infection. Survivors passed the mutation onto their offspring, and the trait became established throughout areas where malaria is common. As populations migrated, so did the thalassemia traits.
Beta thalassemia trait is seen most commonly in people with the following ancestry: Mediterranean (including North African, and particularly Italian and Greek), Middle Eastern, Indian, African, Chinese, and Southeast Asian (including Vietnamese, Laotian, Thai, Singaporean, Filipino, Cambodian, Malaysian, Burmese, and Indonesian). Alpha-thalassemia trait is seen with increased frequency in the same ethnic groups. However, there are different types of alpha thalassemia traits within these populations. The frequency of hemoglobin H disease and alpha thalassemia major depends on the type of alpha thalassemia trait. The populations in which alpha thalassemia diseases are most common include Southeast Asians and Chinese (particularly Southern Chinese).
It is difficult to obtain accurate prevalence figures for various types of thalassemia within different populations. This difficulty arises due to testing limitations in determining exact genetic diagnoses, as well as the fact that many studies have focused on small, biased hospital populations.
Two studies reflect prevalence figures that can be helpful counseling families and determining who to screen for beta thalassemia. Between the years of 1990 and 1996, the State of California screened more than 3.1 million infants born in the state for beta thalassemia. Approximately 1 in 114,000 infants had beta thalassemia major, with prevalence rates being highest among Asian Indians (about one in 4,000), Southeast Asians (about one in 10,000), and Middle Easterners (about one in 7,000). Another type of beta thalassemia disease, E/beta thalassemia, was represented in approximately one in 110,000 births, all of which occurred in families of Southeast Asian ancestry. Among Southeast Asians, the prevalence of E/beta thalassemia was approximately one in 2,600 births. This is in keeping with the observation that hemoglobin E trait carrier rates are relatively high within the Southeast Asian population: 16% in a study of 768 immigrants to California, and up to 25% in some specific Southeast Asian populations such as Cambodians. While these California studies address some of the limitations of earlier population studies, the pattern observed in California is expected to be different in other areas of the United States and the world. For example, Italians are underrepresented in this population when compared to the population of the East Coast of the United States.
Determining prevalence figures for alpha thalassemia is even more difficult due to increased limitations in diagnostic testing. All types of alpha thalassemia disease are most common among people of Southeast Asian and Chinese descent, for reasons that become clearer with an understanding of the underlying genetics of alpha thalassemia. One study of 500 pregnant women in Northern Thailand estimated a frequency of one in 500 pregnancies affected by alpha thalassemia major, for example. Prevalence of alpha thalassemia disease is significantly lower in the United States primarily because of immigration patterns; although at least one state, California, has observed growing hemoglobin H disease incidence rates that are high enough to justify universal newborn screening for the condition.
Humans normally make several types of the oxygen-carrying protein hemoglobin. An individual's stage in development determines whether he or she makes primarily embryonic, fetal, or adult hemoglobins. All types of hemoglobin are made of three components: heme, alpha (or alpha-like) globin, and beta (or beta-like) globin. All types of thalassemia are caused by changes in either the alpha- or beta-globin gene. These changes cause little or no globin to be produced. The thalassemias are, therefore, considered quantitative hemoglobin diseases. All types of thalassemias are recessively inherited, meaning that a genetic change must be inherited from both the mother and the father. The severity of the disease is influenced by the exact thalassemia mutations inherited, as well as other genetic and environmental factors. There are rare exceptions, notably with beta thalassemia, where globin gene mutations exhibit a dominant pattern of inheritance in which only one gene needs to be altered in order to see disease expression. Scientists continue to study the causes. For instance, a new mutation for alpha-thalassemia was discovered for the first time among Iranian patients in 2004.
BETA-THALASSEMIA. Most individuals have two normal copies of the beta globin gene, which is located on chromosome 11 and makes the beta globin component of normal adult hemoglobin, hemoglobin A. There are approximately 100 genetic mutations that have been described that cause beta thalassemia, designated as either beta0 or beta + mutations. No beta globin is produced with a beta0 mutation, and only a small fraction of the normal amount of beta globin is produced with a beta + mutation.
When an individual has one normal beta globin gene and one with a beta thalassemia mutation, he or she is said to carry the beta thalassemia trait. Beta thalassemia trait, like other hemoglobin traits, is protective against malaria infection. Trait status is generally thought not to cause health problems, although some women with beta thalassemia trait may have an increased tendency toward anemia during pregnancy.
When two members of a couple carry the beta thalassemia trait, there is a 25% chance that each of their children will inherit beta thalassemia disease by inheriting two beta thalassemia mutations, one from each parent. The clinical severity of the beta thalassemia disease—whether an individual has beta thalassemia intermedia or beta thalassemia major—will depend largely on whether the mutations inherited are beta0 thalassemia or beta + thalassemia mutations. Two beta0 mutations generally lead to beta thalassemia major, and two beta+ thalassemia mutations generally lead to beta thalassemia intermedia. Inheritance of one beta0 and one beta + thalassemia mutation tends to be less predictable.
Although relatively uncommon, there are other thalassemia-like mutations that can affect the beta globin gene. Hemoglobin E is the result of a substitution of a single nucleotide. This change results in a structurally altered hemoglobin that is produced in decreased amounts. Therefore, hemoglobin E is unique in that it is both a quantitative (i.e. thalassemia-like) and qualitative trait. When co-inherited with a beta thalassemia trait, it causes a disease that is almost indistinguishable from beta thalassemia disease. Large deletions around and including the beta globin gene can lead to delta/beta thalassemia or hereditary persistence of fetal hemoglobin (HPFH). Interestingly, delta/beta thalassemia trait behaves very similarly to beta thalassemia trait in its clinical manifestations. However, HPFH trait does not tend to cause hemoglobin disease when co-inherited with a second thalassemia or other beta globin mutation.
ALPHA-THALASSEMIA. Most individuals have four normal copies of the alpha globin gene, two copies on each chromosome 16. These genes make the alpha globin component of normal adult hemoglobin, which is called hemoglobin A. Alpha globin is also a component of fetal hemoglobin and the other major adult hemoglobin called hemoglobin A2. Mutations of the alpha globin genes are usually deletions of the gene, resulting in absent production of alpha globin. Since there are four genes (instead of the usual two) to consider when looking at alpha globin gene inheritance, there are several alpha globin types that are possible.
Absence of one alpha globin gene leads to a condition known as silent alpha thalassemia trait. This condition causes no health problems and can be detected only by special genetic testing. Alpha thalassemia trait occurs when two alpha globin genes are missing. This can occur in two ways. The genes may be deleted from the same chromosome, causing the 'cis' type of alpha thalassemia trait. Alternately, they may be deleted from different chromosomes, causing the 'trans' type of alpha thalassemia trait. In both instances, there are no associated health problems, although the trait status may be detected by more routine blood screening.
Hemoglobin H disease results from the deletion of three alpha globin genes, such that there is only one functioning gene. Typically, this can occur when one parent carries the silent alpha thalassemia trait, and the other parent carries the 'cis' type of the alpha thalassemia trait. In this situation, there is a 25% chance for hemoglobin H disease in each of such a couple's children.
Hemoglobin H disease-like symptoms can also be a part of a unique condition called alpha thalassemia mental retardation syndrome. Alpha thalassemia mental retardation syndrome can be caused by a deletion of a significant amount of chromosome 16, affecting the alpha globin genes. This is usually not inherited, but rather occurs sporadically in the affected individual. Affected individuals have mild hemoglobin H disease, mild-to-moderate mental retardation, and characteristic facial features. This syndrome can also occur as a sex-linked form in which a mutation is inherited in a particular gene on the X-chromosome. This gene influences alpha globin production, as well as various other developmental processes. Individuals affected with this form of the syndrome tend to have more severe mental retardation, delayed development, nearly absent speech, characteristic facial features, and genital-urinary abnormalities. The remaining discussion will focus only on aspects of hemoglobin H disease.
Alpha thalassemia major results from the deletion of all four alpha globin genes, such that there are no functioning alpha globin genes. This can occur when both parents carry the 'cis' type of the alpha thalassemia trait. In this situation, there is a 25% chance for alpha thalassemia major in each of such a couple's children.
Beta thalassemia major is characterized by severe anemia that can begin months after birth. In the United States and other developed countries beta thalassemia is identified and treated early and effectively. Therefore, the following discussion of symptoms applies primarily to affected individuals in the past and unfortunately in some underdeveloped countries now. If untreated, beta thalassemia major can lead to severe lethargy, paleness, and delays in growth and development. The body attempts to compensate by producing more blood, which is made inside the bones in the marrow. However, this is ineffective without the needed genetic instructions to make enough functioning hemoglobin. Instead, obvious bone expansion and changes occur that cause characteristic facial and other changes in appearance, as well as increased risk of fractures. Severe anemia taxes other organs in the body—such as the heart, spleen, and liver—which must work harder than usual. This can lead to heart failure, as well as enlargement and other problems of the liver and spleen. When untreated, beta thalassemia major generally results in childhood death, usually due to heart failure. In 2004, the first known heart attack associated with beta thalassemia major was reported. Fortunately, in developed countries diagnosis is usually made early, often before symptoms have begun. This allows for treatment with blood transfusion therapy, which can prevent most of the complications of the severe anemia caused by beta thalassemia major. Individuals with beta thalassemia intermedia have a more moderate anemia that may only require treatment with transfusion intermittently, such as when infections occur and stress the body. As a person with beta thalassemia intermedia gets older, however, the need for blood transfusions may increase to the point that they are required on a regular basis. When this occurs their disease becomes more similar to beta thalassemia major. Other genetic and environmental factors can influence the course of the disease as well. For example, co-inheritance of one or two alpha thalassemia mutations can tend to ameliorate some of the symptoms of beta thalassemia disease, which result in part from an imbalance in the amount of alpha- and beta-globin present in the red blood cells.
Hemoglobin h disease
Absence of three alpha globin genes causes an imbalance of alpha and beta globin proteins in the red blood cells. The excess beta globin proteins tend to come together to form hemoglobin H, which is unable to release oxygen to the tissues. In addition, hemoglobin H tends to precipitate out in the cells, causing damage to the red blood cell membrane. When affected individuals are exposed to certain drugs and chemicals known to make the membrane more fragile, the cells are thought to become vulnerable to breakdown in large numbers, a complication called hemolytic anemia. Fever and infection are also considered to be triggers of hemolytic anemia in hemoglobin H disease. This can result in fatigue, paleness, and a yellow discoloration of the skin and whites of eyes called jaundice. Usually, the anemia is mild enough not to require treatment. Severe anemia events may require blood transfusion, however, and are usually accompanied by such other symptoms as dark feces or urine and abdominal or back pain. These events are uncommon in hemoglobin H disease, although they occur more frequently in a more serious type of hemoglobin H disease called hemoglobin H/Constant Spring disease. Individuals effected with this type of hemoglobin H disease are also more likely to have enlargement of and other problems with the spleen.
Alpha thalassemia major
Because alpha globin is a necessary component of all major hemoglobins and some minor hemoglobins, absence of all functioning alpha globin genes leads to serious medical consequences that begin even before birth. Affected fetuses develop severe anemia as early as the first trimester of pregnancy. The placenta, heart, liver, spleen, and adrenal glands may all become enlarged. Fluid can begin collecting throughout the body as early as the start of the second trimester, causing damage to developing tissues and organs. Growth retardation is also common. Affected fetuses usually miscarry or die shortly after birth. In addition, women carrying affected fetuses are at increased risk of developing complications of pregnancy and delivery. Up to 80% of such women develop toxemia, a disturbance of metabolism that can potentially lead to convulsions and coma. Other maternal complications include premature delivery and increased rates of delivery by cesarean section, as well as hemorrhage after delivery.
Thalassemia may be suspected if an individual shows signs that are suggestive of the disease. In all cases, however, laboratory diagnosis is essential to confirm the exact diagnosis and to allow for the provision of accurate genetic counseling about recurrence risks and testing options for parents and affected individuals. Screening is likewise recommended to determine trait status for individuals of high-risk ethnic groups.
The following tests are used to screen for thalassemia disease and/or trait:
hemoglobin electrophoresis with quantitative hemoglobin A2 and hemoglobin F
free erythrocyte-protoporphyrin (or ferritin or other studies of serum iron levels)
A complete blood count will identify low levels of hemoglobin, small red blood cells, and other red blood cell abnormalities that are characteristic of a thalassemia diagnosis. Since thalassemia trait can sometimes be difficult to distinguish from iron deficiency, tests to evaluate iron levels are important. A hemoglobin electrophoresis is a test that can help identify the types and quantities of hemoglobin made by an individual. This test uses an electric field applied across a slab of gel-like material. Hemoglobins migrate through this gel at various rates and to specific locations, depending on their size, shape, and electrical charge. Isoelectric focusing and high-performance liquid chromatography (HPLC) use similar principles to separate hemoglobins and can be used instead of or in various combinations with hemoglobin electrophoresis to determine the types and quantities of hemoglobin present. Hemoglobin electrophoresis results are usually within the normal range for all types of alpha thalassemia. However, hemoglobin A2 levels and sometimes hemoglobin F levels are elevated when beta thalassemia disease or trait is present. Hemoglobin electrophoresis can also detect structurally abnormal hemoglobins that may be co-inherited with a thalassemia trait to cause thalassemia disease (i.e., hemoglobin E) or other types of hemoglobin disease (i.e., sickle hemoglobin). Sometimes DNA testing is needed in addition to the above screening tests. This can be performed to help confirm the diagnosis and establish the exact genetic type of thalassemia.
Diagnosis of thalassemia can occur under various circumstances and at various ages. Several states offer thalassemia screening as part of the usual battery of blood tests done for newborns. This allows for early identification and treatment. Thalassemia can be identified before birth through the use of prenatal diagnosis. Chorionic villus sampling (CVS) can be offered as early as 10 weeks of pregnancy and involves removing a sample of the placenta made by the baby and testing the cells. CVS carries a risk of causing a miscarriage that is between 0.5%-1%. Amniocentesis is generally offered between 15 and 22 weeks of pregnancy, but can sometimes be offered earlier. Two to three tablespoons of the fluid surrounding the baby is removed. This fluid contains fetal cells that can be tested. The risk of miscarriage associated with amniocentesis ranges from 0.33-0.5%. Pregnant woman and couples may choose prenatal testing in order to prepare for the birth of a baby that may have thalassemia. Alternately, knowing the diagnosis during pregnancy allows for the option of pregnancy termination. Preimplantation genetic diagnosis (PGD) is a relatively new technique that involves in-vitro fertilization followed by genetic testing of one cell from each developing embryo. Only the embryos unaffected by sickle cell disease are transferred back into the uterus. PGD is currently available on a research basis only and is relatively expensive.
Individuals with beta thalassemia major receive regular blood transfusions, usually on a monthly basis. This helps prevent severe anemia and allows for more normal growth and development. Transfusion therapy does have limitations, however. Individuals can develop reactions to certain proteins in the blood—called a transfusion reaction. This can make locating appropriately matched donor blood more difficult. Although blood supplies in the United States are very safe, particularly relative to the past and to other areas of the world, there remains an increased risk of exposure to such blood-borne infections as hepatitis. Additionally, the body is not able to get rid of the excess iron that accompanies each transfusion. An additional medication called desferoxamine is administered, usually five nights per week over a period of several hours, using an automatic pump that can be used during sleep or taken anywhere the person goes. This medication is able to bind to the excess iron, which can then be eliminated through urine. If desferoxamine is not used regularly or is unavailable, iron overload can develop and cause tissue damage and organ damage and failure. The heart, liver, and endocrine organs are particularly vulnerable. Desferoxamine itself may rarely produce allergic or toxic side effects, including hearing damage. Signs of desferoxamine toxicity are screened for and generally develop in individuals who overuse the medication when body iron levels are sufficiently low. Overall, however, transfusion and desferoxamine therapy have increased the life expectancy of individuals with the most severe types of beta thalassemia major to the 4th or 5th decade. This can be expected to improve with time and increased developments in treatment, as well as for those with more mild forms of the disease.
New treatments offer additional options for some individuals with beta thalassemia major. There are various medications that target the production of red blood cells (i.e. erythropoeitin) or fetal hemoglobin (i.e. hydroxyurea and butyrate). Their effectiveness in ameliorating the severity of beta thalassemia is currently being investigated. Another promising new treatment is bone marrow transplantation, in which the bone marrow of an affected individual is replaced with the bone marrow of an unaffected donor. If successful, this treatment can provide a cure. However, there is an approximately 10-15% chance the procedure could be unsuccessful (i.e. the thalassemia returns); result in complications (i.e. graft-versus-host disease); or result in death. The risk for specific individuals depends on current health status, age, and other factors. Because of the risks involved and the fact that beta thalassemia is a treatable condition, transplant physicians require a brother or sister donor who has an identically matched tissue type, called HLA type. HLA type refers to the unique set of proteins present on each individual's cells, which allows the immune system to recognize "self" from "foreign." HLA type is genetically determined, so there is a 25% chance for two siblings to be a match. Transplant physicians and researchers are also investigating ways to improve the safety and effectiveness of bone marrow transplantation. Using newborn sibling umbilical cord blood—the blood from the placenta that is otherwise discarded after birth but contains cells that can go on to make bone marrow—seems to provide a safer and perhaps more effective source of donor cells. Donors and recipients may not have to be perfect HLA matches for a successful transplant using cord blood cells. Trials are also underway to determine the effectiveness of "partial transplants," in which a safer transplant procedure is used to replace only a percentage of the affected individual's bone marrow. Other possible treatments on the horizon may include gene therapy techniques aimed at increasing the amount of normal hemoglobin the body is able to make.
Hemoglobin H disease is a relatively mild form of thalassemia that may go unrecognized. It is not generally considered a condition that will reduce one's life expectancy. Education is an important part of managing the health of an individual with hemoglobin H disease. It is important to be able to recognize the signs of severe anemia that require medical attention. It is also important to be aware of the medications, chemicals, and other exposures to avoid due to the theoretical risk they pose of causing a severe anemia event. When severe anemia occurs, it is treated with blood transfusion therapy. For individuals with hemoglobin H disease, this is rarely required. For those with the hemoglobin H/Constant Spring form of the disease, the need for transfusions may be intermittent or ongoing, perhaps on a monthly basis and requiring desferoxamine treatment. Individuals with this more severe form of the disease may also have an increased chance of requiring removal of an enlarged and/or overactive spleen.
Anemia — A blood condition in which the level of hemoglobin or the number of red blood cells falls below normal values. Common symptoms include paleness, fatigue, and shortness of breath.
Bilirubin — A yellow pigment that is the end result of hemoglobin breakdown. This pigment is metabolized in the liver and excreted from the body through the bile. Bloodstream levels are normally low; however, extensive red cell destruction leads to excessive bilirubin formation and jaundice.
Bone marrow — A spongy tissue located in the hollow centers of certain bones, such as the skull and hip bones. Bone marrow is the site of blood cell generation.
Bone marrow transplantation — A medical procedure used to treat some diseases that arise from defective blood cell formation in the bone marrow. Healthy bone marrow is extracted from a donor to replace the marrow in an ailing individual. Proteins on the surface of bone marrow cells must be identical or very closely matched between a donor and the recipient.
Desferoxamine — The primary drug used in iron chelation therapy. It aids in counteracting the life-threatening buildup of iron in the body associated with long-term blood transfusions.
Globin — One of the component protein molecules found in hemoglobin. Normal adult hemoglobin has a pair each of alpha-globin and beta-globin molecules.
Heme — The iron-containing molecule in hemoglobin that serves as the site for oxygen binding.
Hemoglobin — Protein-iron compound in the blood that carries oxygen to the cells and carries carbon dioxide away from the cells.
Hemoglobin A — Normal adult hemoglobin that contains a heme molecule, two alpha-globin molecules, and two beta-globin molecules.
Hemoglobin electrophoresis — A laboratory test that separates molecules based on their size, shape, or electrical charge.
Hepatomegaly — An abnormally large liver.
HLA type — Refers to the unique set of proteins called human leukocyte antigens. These proteins are present on each individual's cell and allow the immune system to recognize 'self' from 'foreign'. HLA type is particularly important in organ and tissue transplantation.
Hydroxyurea — A drug that has been shown to induce production of fetal hemoglobin. Fetal hemoglobin has a pair of gamma-globin molecules in place of the typical beta-globins of adult hemoglobin. Higher-than-normal levels of fetal hemoglobin can ameliorate some of the symptoms of thalassemia.
Iron overload — A side effect of frequent blood transfusions in which the body accumulates abnormally high levels of iron. Iron deposits can form in organs, particularly the heart, and cause life-threatening damage.
Jaundice — Yellowing of the skin or eyes due to excess of bilirubin in the blood.
Mutation — A permanent change in the genetic material that may alter a trait or characteristic of an individual, or manifest as disease, and can be transmitted to offspring.
Placenta — The organ responsible for oxygen and nutrition exchange between a pregnant mother and her developing baby.
Red blood cell — Hemoglobin-containing blood cells that transport oxygen from the lungs to tissues. In the tissues, the red blood cells exchange their oxygen for carbon dioxide, which is brought back to the lungs to be exhaled.
Screening — Process through which carriers of a trait may be identified within a population.
Splenomegaly — Enlargement of the spleen.
Because alpha thalassemia major is most often a condition that is fatal in the prenatal or newborn period, treatment has previously been focused on identifying affected pregnancies in order to provide appropriate management to reduce potential maternal complications. Pregnancy termination provides one form of management. Increased prenatal surveillance and early treatment of maternal complications is an approach that is appropriate for mothers who wish to continue their pregnancy with the knowledge that the baby will most likely not survive. In recent years, there have been a handful of infants with this condition who have survived long-term. Most of these infants received experimental treatment including transfusions before birth, early delivery, and even bone marrow transplantation before birth, although the latter procedure has not yet been successful. For those infants that survive to delivery, there seems to be an increased risk of developmental problems and physical effects, particularly heart and genital malformations. Otherwise, their medical outlook is similar to a child with beta thalassemia major, with the important exception that ongoing, life-long blood transfusions begin right at birth.
As discussed above, the prognosis for individuals with the most serious types of thalassemia has improved drastically in the last several years following recent medical advances in transfusion, chemo-, and transplantation therapy. Advances continue and promise to improve the life expectancy and quality of life further for affected individuals.
"First Known Heart Attack Associated With Beta-thalassemia Major Reported." Heart Disease Weekly February 22, 2004: 10.
"Novel Alpha-thalassemia Mutations Identified." Hematology Week January 26, 2004: 19.
Children's Blood Foundation. 333 East 38th St., Room 830, New York, NY 10016-2745. (212) 297-4336. cfg@nyh.med.cornell.edu.
Cooley's Anemia Foundation, Inc. 129-09 26th Ave. #203, Flushing, NY 11354. (800) 522-7222 or (718) 321-2873. http://www.thalassemia.org.
March of Dimes Birth Defects Foundation. 1275 Mamaroneck Ave., White Plains, NY 10605. (888) 663-4637. resourcecenter@modimes.org. http://www.modimes.org.
National Heart, Lung, and Blood Institute. PO Box 30105, Bethseda, MD 20824-0105. (301) 592-8573. nhlbiinfo@rover.nhlbi.nih.gov. http://www.nhlbi.nih.gov.
National Organization for Rare Disorders (NORD). PO Box 8923, New Fairfield, CT 06812-8923. (203) 746-6518 or (800) 999-6673. Fax: (203) 746-6481. http://www.rarediseases.org.
Bojanowski J. "Alpha Thalassemia Major: The Possibility of Long-Term Survival." Pamphlet from the Northern California Comprehensive Thalassemia Center. (1999).
Children's Hospital Oakland, Northern California Comprehensive Thalassemia Center website. http://www.thalassemia.com.
Cooley's Anemia Foundation, Inc. website. http://www.thalassemia.org/gohome.html.
Joint Center for Sickle Cell and Thalassemic Disorders website. http://cancer.mgh.harvard.edu/medOnc/sickle.htm.
[thal″ah-se´me-ah]
a heterogeneous group of hereditary hemolytic anemias marked by a decreased rate of synthesis of one or more hemoglobin polypeptide chains, classified according to the chain involved (α, β, δ); the two major categories are α- and β-thalassemia.
α-thalassemia (alpha-thalassemia) that caused by diminished synthesis of alpha chains of hemoglobin. The homozygous form is incompatible with life, the stillborn infant displaying severe hydrops fetalis. The heterozygous form may be asymptomatic or marked by mild anemia.
β-thalassemia (beta-thalassemia) that caused by diminished synthesis of beta chains of hemoglobin. The homozygous form is called t. major and the heterozygous form is called t. minor.
thalassemia ma´jor the homozygous form of β-thalassemia, in which hemoglobin A is completely absent; it appears in the newborn period and is marked by hemolytic, hypochromic, microcytic anemia; hepatosplenomegaly; skeletal deformation; mongoloid facies; and cardiac enlargement.
thalassemia mi´nor the heterozygous form of β-thalassemia; it is usually asymptomatic, but there may be mild anemia.
sickle cell–thalassemia a hereditary anemia involving simultaneous heterozygosity for hemoglobin S and thalassemia.
thal·as·se·mi·a
, thalassanemia (thal'ă-sē'mē-ă, thă-las-ă-nē'mē-ă),
Any of a group of inherited disorders of hemoglobin metabolism in which there is impaired synthesis of one or more of the polypeptide chains of globin; several genetic types exist, and the corresponding clinical picture may vary from barely detectable hematologic abnormality to severe and fatal anemia.
[G. thalassa, the sea, + haima, blood]
/thal·as·se·mia/ (thal″ah-se´me-ah) a heterogeneous group of hereditary hemolytic anemias marked by a decreased rate of synthesis of one or more hemoglobin polypeptide chains, classified according to the chain involved (α, β, δ); the two major categories are α- and β-thalassemia.
α-thalassemia that caused by diminished synthesis of alpha chains of hemoglobin. The homozygous form is incompatible with life, the stillborn infant displaying severe hydrops fetalis. The heterozygous form may be asymptomatic or marked by mild anemia.
β-thalassemia that caused by diminished synthesis of beta chains of hemoglobin. The homozygous form is called t. major and the heterozygous form is called t. minor.
thalassemia ma´jor the homozygous form of β, in which hemoglobin A is completely absent; it appears in the newborn period and is marked by hemolytic, hypochromic, microcytic anemia, hepatosplenomegaly, skeletal deformation, mongoloid facies, and cardiac enlargement.
thalassemia mi´nor the heterozygous form of β, usually asymptomatic, although there is sometimes mild anemia.
(thăl′ə-sē′mē-ə)
An inherited form of anemia occurring chiefly among people of Mediterranean descent, caused by faulty synthesis of part of the hemoglobin molecule. Also called Mediterranean anemia.
thal′as·se′mic adj.
[thal′əsē′mē·ə]
Etymology: Gk, thalassa, sea, a + haima, without blood
production and hemolytic anemia characterized by microcytic, hypochromic red blood cells. Thalassemia is caused by inherited deficiency of alpha- or beta-globin synthesis. See also hemochromatosis, hemosiderosis.
Beta thalassemia, clinical thalassemia, Cooley's anemia, Mediterranean anemia, thalassemia major Hematology A group of genetic diseases by underproduction of hemoglobin due to mutations in the beta globin gene, which is more common in Mediterraneans Heredity Parents are carriers–heterozygotes; one in 4 children is homozygous for the mutation and thus has full-blown disease Clinical See Anemia. Cf Sickle cell anemia.
α-thalassemia
Hemoglobin Barts Hematology An inherited condition caused by a defect in the synthesis of the Hb α chain; Hb Barts hemoglobinopathy is characterized by the presence of 4 gamma chains; it is more common in southeast Asians; the most severe form of alpha thalassemia causes stillbirth due to hydrops fetalis Heredity Parents are carriers–heterozygotes; one in 4 children is homozygous for the mutation and thus has full-blown disease Clinical Pallor, fatiguability, FTT, fever, infections, diarrhea Management Transfusions
Thalassemia major Hematology A hemoglobinopathy caused by a defect in the synthesis of Hb β chain Clinical Pallor, fatigability, FTT, fever due to infections, diarrhea, bone deformities, hepatosplenomegaly Management Transfusions, but iron overload can damage the heart, liver, and endocrine systems, ergo iron chelation–early use of deferiprone, deferoxamine ↓ transfusion-related iron overload and may protect against DM, cardiac disease, early death
δ-thalassemia
Hematology A condition characterized by a defect of Hb A2–α2δ2; because Hb A2 comprises only 3% of the circulating Hb, even its complete absence; δ-thalassemia has little clinical or hematologic impact
γ-thalassemia
Hematology A condition characterized by a defect of gamma–γ Hb chains found in Hb F–α2γ2; because Hb F is present primarily in the fetus and newborns, it is rarely seen outside of the neonatal period, but may cause transient neonatal hemolytic anemia.
, thalassanemia (thal'ă-sē'mē-ă, -ă-să-nē'mē-ă)
Any of a group of inherited disorders of hemoglobin metabolism in which there is impaired synthesis of one or more of the polypeptide chains of globin; several genetic types exist, and the corresponding clinical picture may vary from barely detectable hematologic abnormality to severe and fatal anemia. People of Mediterranean, extraction are more often affected than others by this type of anemia.
Synonym(s): thalassaemia, thalassanaemia.
Any of a group of inherited disorders of hemoglobin metabolism with impaired synthesis of one or more polypeptide chains of globin; several genetic types exist.
<a href="https://medical-dictionary.thefreedictionary.com/Thalassaemia+minor">thalassemia</a>
Barts hemoglobin
beta hemoglobinopathy
beta-delta thalassemia
beta-thalassaemia
Bite Cell
black gallstone
I know of a couple, totally unrelated and unbeknownst to them, who are silent carriers of Thalassaemia minor.
Pakistan: Genetic factor: All in the genes
But, unfortunately, when one person with thalassaemia minor carrier happens to marry another with the same diagnosis, there is a strong possibility that their child would be thalassaemia major, as happened in the case of Taneja.
' My life depends upon a monthly blood transfusion '
0] thalassaemia demonstrates variable severity, ranging from a condition similar to [beta] thalassaemia minor to something approaching thalassaemia major.
A retrospective review of homozygous haemoglobin E patients
Thal, Alan P.
thalame
thalamencephalic
thalamencephalon
thalamic
thalamic fasciculus
thalamic nucleus
thalamic pain syndrome
thalamic peduncle
thalamic radiation
thalamo-
thalamocoele
thalamocortical
thalamocortical fibers
thalamogeniculate artery
thalamolenticular
thalamoperforating artery
thalamostriate radiation
thalamotuberal artery
Thalassaemia minor
thalassaemiaor Cooley's disease
thalassemic facies
thalasso-
Thalassobacter
Thalassobacter utilis
thalassoplankton
thalassoposia
thalidomide neuropathy
Thalidomider
thallium poisoning
Thalarctos
THALAS
Thalasaemia
Thalassaemia Association of Malaysia
thalassaemia major
Thalassaemias
thalassaemic
thalassanaemia
Thalassemia Action Group
Thalassemia Clinical Research Network
thalassemia syndrome
|
[
"According to the globin that is affected (alpha or beta)."
] | 6,101
|
multifieldqa_en
|
en
| null |
df53ff06fbc99dbae6bfe13a946420321d4542480eeb56f3
|
Who is the county seat of McPherson County?
|
McPherson County (standard abbreviation: MP) is a county located in the U.S. state of Kansas. As of the 2020 census, the county population was 30,223. The largest city and county seat is McPherson. The county is named for Civil War General James B. McPherson.
History
Early history
For many millennia, the Great Plains of North America was inhabited by nomadic Native Americans. From the 16th century to 18th century, the Kingdom of France claimed ownership of large parts of North America. In 1762, after the French and Indian War, France secretly ceded New France to Spain, per the Treaty of Fontainebleau. In 1802, Spain returned most of the land to France, but keeping title to about 7,500 square miles.
In 1803, most of the land for modern day Kansas was acquired by the United States from France as part of the 828,000 square mile Louisiana Purchase for 2.83 cents per acre. In 1848, after the Mexican–American War, the Treaty of Guadalupe Hidalgo with Spain brought into the United States all or part of land for ten future states, including southwest Kansas. In 1854, the Kansas Territory was organized, then in 1861 Kansas became the 34th U.S. state.
19th century
From the 1820s to 1870s, the Santa Fe Trail passed through, what is now McPherson County. The trail entered the county, east of Canton, then south of Galva, then north of Inman, and west towards Lyons. In 1855, Charles O. Fuller established a ranch adjacent to the Running Turkey Creek Crossing about two miles south and one mile east of Galva. Fuller's Ranch provided accommodations for travelers on the Santa Fe Trail and was probably the first white settlement in McPherson County.
Peketon County was established in 1860, by the passage of a bill by S. N. Wood: An act to establish Peketon County. Section 1. - That all that territory west of the sixth principal meridian and south of Township 16, in Kansas Territory, be and the same is hereby erected into a county, to be known by the name of Peketon County. On February 17, 1865, Peketon County was abolished, and McPherson County was made a part of Marion County, which extended from the west line of Chase County to the present western boundary of Kansas.
In 1868, Solomon Stephens and L. N. Holmberg were appointed Justices of the Peace—the first officers in what is now McPherson County. The next year (1869) occurred the first election for the township, now the county of McPherson. McPherson was regularly organized as a county in the spring of 1870, a mass meeting being held at Sweadal. Sweadal, the county seat thus selected, was located about one mile and a half southwest of the present site of Lindsborg. In September, however, the County Commissioners resolved to meet at the latter place, McPherson which had already been located some two years.
In April, 1873, a petition was filed for the county seat re-location. It was signed by 483 voters, and a special election was accordingly ordered for June 10. Upon that day, McPherson received 605 votes, New Gottland 325, King City 3 and Lindsborg 1; McPherson's majority over all, 276. In May the McPherson Town Company had offered, as an inducement for the location of the county seat at this point, the free use of rooms for ten years, and the donation of two squares of land on the town site. The offer was accepted the next month, the County Commissioners selecting blocks 56 and 65. Thus the county seat was established at McPherson and has remained since.
As early as 1875, city leaders of Marion held a meeting to consider a branch railroad from Florence. In 1878, Atchison, Topeka and Santa Fe Railway and parties from Marion County and McPherson County chartered the Marion and McPherson Railway Company. In 1879, a branch line was built from Florence to McPherson, in 1880 it was extended to Lyons, in 1881 it was extended to Ellinwood. The line was leased and operated by the Atchison, Topeka and Santa Fe Railway. The line from Florence to Marion, was abandoned in 1968. In 1992, the line from Marion to McPherson was sold to Central Kansas Railway. In 1993, after heavy flood damage, the line from Marion to McPherson was abandoned. The original branch line connected Florence, Marion, Canada, Hillsboro, Lehigh, Canton, Galva, McPherson, Conway, Windom, Little River, Mitchell, Lyons, Chase, then connected with the original AT&SF main line at Ellinwood.
In 1887, the Chicago, Kansas and Nebraska Railway extended its main line from Herington to Pratt. This main line connected Herington, Ramona, Tampa, Durham, Waldeck, Canton, Galva, McPherson, Groveland, Inman, Medora, Hutchinson, Whiteside, Partridge, Arlington, Langdon, Turon, Preston, Natrona, Pratt. In 1888, this main line was extended to Liberal. Later, this line was extended to Tucumcari, New Mexico and Santa Rosa, New Mexico, where it made a connection with the Southern Pacific from El Paso, Texas. The Chicago, Kansas and Nebraska Railway was absorbed by the Chicago, Rock Island and Pacific Railway. This line is also called the "Golden State Route".
20th century
The National Old Trails Road, also known as the Ocean-to-Ocean Highway, was established in 1912, and was routed through Windom, Conway, McPherson.
Geography
According to the U.S. Census Bureau, the county has a total area of , of which is land and (0.3%) is water.
Adjacent counties
Saline County (north)
Dickinson County (northeast)
Marion County (east)
Harvey County (southeast)
Reno County (southwest)
Rice County (west)
Ellsworth County (northwest)
Major highways
Interstate 135
U.S. Route 56
U.S. Route 81
K-4
K-61
K-153
Demographics
The McPherson Micropolitan Statistical Area includes all of McPherson County.
2000 census
As of the census of 2000, there were 29,554 people, 11,205 households, and 7,966 families residing in the county. The population density was 33 people per square mile (13/km2). There were 11,830 housing units at an average density of 13 per square mile (5/km2). The racial makeup of the county was 96.53% White, 0.81% Black or African American, 0.34% Native American, 0.32% Asian, 0.06% Pacific Islander, 0.79% from other races, and 1.16% from two or more races. 1.94% of the population were Hispanic or Latino of any race. 37.1% were of German, 12.9% Swedish, 12.1% American, 6.7% English and 6.3% Irish ancestry according to Census 2000.
There were 11,205 households, out of which 33.00% had children under the age of 18 living with them, 62.50% were married couples living together, 6.00% had a female householder with no husband present, and 28.90% were non-families. 25.50% of all households were made up of individuals, and 11.80% had someone living alone who was 65 years of age or older. The average household size was 2.49 and the average family size was 2.99.
In the county, the population was spread out, with 25.40% under the age of 18, 10.30% from 18 to 24, 25.20% from 25 to 44, 21.80% from 45 to 64, and 17.30% who were 65 years of age or older. The median age was 38 years. For every 100 females there were 95.90 males. For every 100 females age 18 and over, there were 92.90 males.
The median income for a household in the county was $41,138, and the median income for a family was $48,243. Males had a median income of $33,530 versus $21,175 for females. The per capita income for the county was $18,921. About 4.20% of families and 6.60% of the population were below the poverty line, including 5.20% of those under age 18 and 8.10% of those age 65 or over.
Government
Presidential elections
McPherson county is often carried by Republican candidates. The last time a Democratic candidate has carried this county was in 1964 by Lyndon B. Johnson.
Laws
Following amendment to the Kansas Constitution in 1986, the county remained a prohibition, or "dry", county until 1996, when voters approved the sale of alcoholic liquor by the individual drink with a 30 percent food sales requirement.
Education
Colleges
McPherson College in McPherson
Bethany College in Lindsborg
Central Christian College in McPherson
Unified school districts
Smoky Valley USD 400
McPherson USD 418
Canton-Galva USD 419
Moundridge USD 423
Inman USD 448
School district office in neighboring county
Goessel USD 411
Little River-Windom USD 444
Museums
Birger Sandzén Memorial Gallery in Lindsborg
McCormick-Deering Days Museum in Inman
McPherson Museum in McPherson
Lindsborg Old Mill & Swedish Heritage Museum in Lindsborg
Kansas Motorcycle Museum in Marquette
Communities
Cities
Canton
Galva
Inman
Lindsborg
Marquette
McPherson (county seat)
Moundridge
Windom
Unincorporated communities
† means a Census-Designated Place (CDP) by the United States Census Bureau.
Conway
Elyria†
Groveland
Johnstown
New Gottland
Roxbury†
Ghost towns
Alta Mills
Battle Hill
Christian
Doles Park
Elivon
King City
Sweadal
Townships
McPherson County is divided into twenty-five townships. The cities of Lindsborg and McPherson are considered governmentally independent and are excluded from the census figures for the townships. In the following table, the population center is the largest city (or cities) included in that township's population total, if it is of a significant size.
See also
List of people from McPherson County, Kansas
National Register of Historic Places listings in McPherson County, Kansas
McPherson Valley Wetlands
Maxwell Wildlife Refuge
References
Notes
Further reading
Wheeler, Wayne Leland. "An Analysis of Social Change in a Swedish-Immigrant Community: The Case of Lindsborg, Kansas." (PhD dissertation, University of Missouri-Columbia; ProQuest Dissertations Publishing, 1959. 5905657).
County
Through the Years: A Pictorial History of McPherson County; McPherson Sentinel' Heritage House Publishing Co; 1992.
McPherson County First Courthouse Built About 1869 or 1870; Lindsborg News-Record; March 30, 1959.
Pioneer Life and Lore of McPherson County, Kansas; Edna Nyquist; Democratic-Opinion Press; 1932.
A History of the Church of the Brethren in Kansas (includes McPherson College history); Elmer LeRoy Craik; McPherson Daily; Republican Press; 397 pages; 1922.
Portrait and Biographical Record of Dickinson, Saline, McPherson, and Marion Counties, Kansas; Chapman Bros; 614 pages; 1893.
Standard Atlas of McPherson County, Kansas; Geo. A. Ogle & Co; 82 pages; 1921.
Plat Book of McPherson County, Kansas; North West Publishing Co; 50 pages; 1903.
Edwards' Atlas of McPherson County, Kansas; John P. Edwards; 51 pages; 1884.
Trails
The Story of the Marking of the Santa Fe Trail by the Daughters of the American Revolution in Kansas and the State of Kansas; Almira Cordry; Crane Co; 164 pages; 1915. (Download 4MB PDF eBook)
The National Old Trails Road To Southern California, Part 1 (LA to KC); Automobile Club Of Southern California; 64 pages; 1916. (Download 6.8MB PDF eBook)
Mennonite Settlements
Impact of Mennonite settlement on the cultural landscape of Kansas; Brenda Martin; Kansas State University; 1985/1988.
Mennonite settlement : the relationship between the physical and cultural environment; Susan Movle; University of Utah; 1975/1886.
Status of Mennonite women in Kansas in their church and home relationships; Eva Harshbarger; Bluffton College; 1925/1945.
External links
County
McPherson County - Directory of Public Officials
Historical
, from Hatteberg's People'' on KAKE TV news
Maps
McPherson County Maps: Current, Historic, KDOT
Kansas Highway Maps: Current, Historic, KDOT
Kansas Railroad Maps: Current, 1996, 1915, KDOT and Kansas Historical Society
Kansas counties
1867 establishments in Kansas
Populated places established in 1867
|
[
"McPherson."
] | 1,852
|
multifieldqa_en
|
en
| null |
ce720011515773e6bd7b4b355c52a7215ad2920f18a1ec14
|
When was McPherson County established as a county?
|
McPherson County (standard abbreviation: MP) is a county located in the U.S. state of Kansas. As of the 2020 census, the county population was 30,223. The largest city and county seat is McPherson. The county is named for Civil War General James B. McPherson.
History
Early history
For many millennia, the Great Plains of North America was inhabited by nomadic Native Americans. From the 16th century to 18th century, the Kingdom of France claimed ownership of large parts of North America. In 1762, after the French and Indian War, France secretly ceded New France to Spain, per the Treaty of Fontainebleau. In 1802, Spain returned most of the land to France, but keeping title to about 7,500 square miles.
In 1803, most of the land for modern day Kansas was acquired by the United States from France as part of the 828,000 square mile Louisiana Purchase for 2.83 cents per acre. In 1848, after the Mexican–American War, the Treaty of Guadalupe Hidalgo with Spain brought into the United States all or part of land for ten future states, including southwest Kansas. In 1854, the Kansas Territory was organized, then in 1861 Kansas became the 34th U.S. state.
19th century
From the 1820s to 1870s, the Santa Fe Trail passed through, what is now McPherson County. The trail entered the county, east of Canton, then south of Galva, then north of Inman, and west towards Lyons. In 1855, Charles O. Fuller established a ranch adjacent to the Running Turkey Creek Crossing about two miles south and one mile east of Galva. Fuller's Ranch provided accommodations for travelers on the Santa Fe Trail and was probably the first white settlement in McPherson County.
Peketon County was established in 1860, by the passage of a bill by S. N. Wood: An act to establish Peketon County. Section 1. - That all that territory west of the sixth principal meridian and south of Township 16, in Kansas Territory, be and the same is hereby erected into a county, to be known by the name of Peketon County. On February 17, 1865, Peketon County was abolished, and McPherson County was made a part of Marion County, which extended from the west line of Chase County to the present western boundary of Kansas.
In 1868, Solomon Stephens and L. N. Holmberg were appointed Justices of the Peace—the first officers in what is now McPherson County. The next year (1869) occurred the first election for the township, now the county of McPherson. McPherson was regularly organized as a county in the spring of 1870, a mass meeting being held at Sweadal. Sweadal, the county seat thus selected, was located about one mile and a half southwest of the present site of Lindsborg. In September, however, the County Commissioners resolved to meet at the latter place, McPherson which had already been located some two years.
In April, 1873, a petition was filed for the county seat re-location. It was signed by 483 voters, and a special election was accordingly ordered for June 10. Upon that day, McPherson received 605 votes, New Gottland 325, King City 3 and Lindsborg 1; McPherson's majority over all, 276. In May the McPherson Town Company had offered, as an inducement for the location of the county seat at this point, the free use of rooms for ten years, and the donation of two squares of land on the town site. The offer was accepted the next month, the County Commissioners selecting blocks 56 and 65. Thus the county seat was established at McPherson and has remained since.
As early as 1875, city leaders of Marion held a meeting to consider a branch railroad from Florence. In 1878, Atchison, Topeka and Santa Fe Railway and parties from Marion County and McPherson County chartered the Marion and McPherson Railway Company. In 1879, a branch line was built from Florence to McPherson, in 1880 it was extended to Lyons, in 1881 it was extended to Ellinwood. The line was leased and operated by the Atchison, Topeka and Santa Fe Railway. The line from Florence to Marion, was abandoned in 1968. In 1992, the line from Marion to McPherson was sold to Central Kansas Railway. In 1993, after heavy flood damage, the line from Marion to McPherson was abandoned. The original branch line connected Florence, Marion, Canada, Hillsboro, Lehigh, Canton, Galva, McPherson, Conway, Windom, Little River, Mitchell, Lyons, Chase, then connected with the original AT&SF main line at Ellinwood.
In 1887, the Chicago, Kansas and Nebraska Railway extended its main line from Herington to Pratt. This main line connected Herington, Ramona, Tampa, Durham, Waldeck, Canton, Galva, McPherson, Groveland, Inman, Medora, Hutchinson, Whiteside, Partridge, Arlington, Langdon, Turon, Preston, Natrona, Pratt. In 1888, this main line was extended to Liberal. Later, this line was extended to Tucumcari, New Mexico and Santa Rosa, New Mexico, where it made a connection with the Southern Pacific from El Paso, Texas. The Chicago, Kansas and Nebraska Railway was absorbed by the Chicago, Rock Island and Pacific Railway. This line is also called the "Golden State Route".
20th century
The National Old Trails Road, also known as the Ocean-to-Ocean Highway, was established in 1912, and was routed through Windom, Conway, McPherson.
Geography
According to the U.S. Census Bureau, the county has a total area of , of which is land and (0.3%) is water.
Adjacent counties
Saline County (north)
Dickinson County (northeast)
Marion County (east)
Harvey County (southeast)
Reno County (southwest)
Rice County (west)
Ellsworth County (northwest)
Major highways
Interstate 135
U.S. Route 56
U.S. Route 81
K-4
K-61
K-153
Demographics
The McPherson Micropolitan Statistical Area includes all of McPherson County.
2000 census
As of the census of 2000, there were 29,554 people, 11,205 households, and 7,966 families residing in the county. The population density was 33 people per square mile (13/km2). There were 11,830 housing units at an average density of 13 per square mile (5/km2). The racial makeup of the county was 96.53% White, 0.81% Black or African American, 0.34% Native American, 0.32% Asian, 0.06% Pacific Islander, 0.79% from other races, and 1.16% from two or more races. 1.94% of the population were Hispanic or Latino of any race. 37.1% were of German, 12.9% Swedish, 12.1% American, 6.7% English and 6.3% Irish ancestry according to Census 2000.
There were 11,205 households, out of which 33.00% had children under the age of 18 living with them, 62.50% were married couples living together, 6.00% had a female householder with no husband present, and 28.90% were non-families. 25.50% of all households were made up of individuals, and 11.80% had someone living alone who was 65 years of age or older. The average household size was 2.49 and the average family size was 2.99.
In the county, the population was spread out, with 25.40% under the age of 18, 10.30% from 18 to 24, 25.20% from 25 to 44, 21.80% from 45 to 64, and 17.30% who were 65 years of age or older. The median age was 38 years. For every 100 females there were 95.90 males. For every 100 females age 18 and over, there were 92.90 males.
The median income for a household in the county was $41,138, and the median income for a family was $48,243. Males had a median income of $33,530 versus $21,175 for females. The per capita income for the county was $18,921. About 4.20% of families and 6.60% of the population were below the poverty line, including 5.20% of those under age 18 and 8.10% of those age 65 or over.
Government
Presidential elections
McPherson county is often carried by Republican candidates. The last time a Democratic candidate has carried this county was in 1964 by Lyndon B. Johnson.
Laws
Following amendment to the Kansas Constitution in 1986, the county remained a prohibition, or "dry", county until 1996, when voters approved the sale of alcoholic liquor by the individual drink with a 30 percent food sales requirement.
Education
Colleges
McPherson College in McPherson
Bethany College in Lindsborg
Central Christian College in McPherson
Unified school districts
Smoky Valley USD 400
McPherson USD 418
Canton-Galva USD 419
Moundridge USD 423
Inman USD 448
School district office in neighboring county
Goessel USD 411
Little River-Windom USD 444
Museums
Birger Sandzén Memorial Gallery in Lindsborg
McCormick-Deering Days Museum in Inman
McPherson Museum in McPherson
Lindsborg Old Mill & Swedish Heritage Museum in Lindsborg
Kansas Motorcycle Museum in Marquette
Communities
Cities
Canton
Galva
Inman
Lindsborg
Marquette
McPherson (county seat)
Moundridge
Windom
Unincorporated communities
† means a Census-Designated Place (CDP) by the United States Census Bureau.
Conway
Elyria†
Groveland
Johnstown
New Gottland
Roxbury†
Ghost towns
Alta Mills
Battle Hill
Christian
Doles Park
Elivon
King City
Sweadal
Townships
McPherson County is divided into twenty-five townships. The cities of Lindsborg and McPherson are considered governmentally independent and are excluded from the census figures for the townships. In the following table, the population center is the largest city (or cities) included in that township's population total, if it is of a significant size.
See also
List of people from McPherson County, Kansas
National Register of Historic Places listings in McPherson County, Kansas
McPherson Valley Wetlands
Maxwell Wildlife Refuge
References
Notes
Further reading
Wheeler, Wayne Leland. "An Analysis of Social Change in a Swedish-Immigrant Community: The Case of Lindsborg, Kansas." (PhD dissertation, University of Missouri-Columbia; ProQuest Dissertations Publishing, 1959. 5905657).
County
Through the Years: A Pictorial History of McPherson County; McPherson Sentinel' Heritage House Publishing Co; 1992.
McPherson County First Courthouse Built About 1869 or 1870; Lindsborg News-Record; March 30, 1959.
Pioneer Life and Lore of McPherson County, Kansas; Edna Nyquist; Democratic-Opinion Press; 1932.
A History of the Church of the Brethren in Kansas (includes McPherson College history); Elmer LeRoy Craik; McPherson Daily; Republican Press; 397 pages; 1922.
Portrait and Biographical Record of Dickinson, Saline, McPherson, and Marion Counties, Kansas; Chapman Bros; 614 pages; 1893.
Standard Atlas of McPherson County, Kansas; Geo. A. Ogle & Co; 82 pages; 1921.
Plat Book of McPherson County, Kansas; North West Publishing Co; 50 pages; 1903.
Edwards' Atlas of McPherson County, Kansas; John P. Edwards; 51 pages; 1884.
Trails
The Story of the Marking of the Santa Fe Trail by the Daughters of the American Revolution in Kansas and the State of Kansas; Almira Cordry; Crane Co; 164 pages; 1915. (Download 4MB PDF eBook)
The National Old Trails Road To Southern California, Part 1 (LA to KC); Automobile Club Of Southern California; 64 pages; 1916. (Download 6.8MB PDF eBook)
Mennonite Settlements
Impact of Mennonite settlement on the cultural landscape of Kansas; Brenda Martin; Kansas State University; 1985/1988.
Mennonite settlement : the relationship between the physical and cultural environment; Susan Movle; University of Utah; 1975/1886.
Status of Mennonite women in Kansas in their church and home relationships; Eva Harshbarger; Bluffton College; 1925/1945.
External links
County
McPherson County - Directory of Public Officials
Historical
, from Hatteberg's People'' on KAKE TV news
Maps
McPherson County Maps: Current, Historic, KDOT
Kansas Highway Maps: Current, Historic, KDOT
Kansas Railroad Maps: Current, 1996, 1915, KDOT and Kansas Historical Society
Kansas counties
1867 establishments in Kansas
Populated places established in 1867
|
[
"McPherson County was established as a county in 1867."
] | 1,860
|
multifieldqa_en
|
en
| null |
4c9131da4fb2a9dbc8dadce39d20bdc302a092b5740c414a
|
如何安装并启动Ganache?
|
2008年5月31日 随笔档案 - 狼爱上狸 - BlogJava
本地搭建以太坊私有网络-基于Ganache和MetaMask
本文主要介绍如何使用Ganache,在本地搭建以太坊私有网络,并进行简单的测试。
Ganache用于搭建私有网络。在开发和测试环境下,Ganache提供了非常简便的以太坊私有网络搭建方法,通过可视化界面可以直观地设置各种参数、浏览查看账户和交易等数据。
下载地址为:https://truffleframework.com/ganache/
MetaMask用于测试私有网络。MetaMask是一个轻量级的以太坊钱包,由于它是一个Chrome插件,因此使用MetaMask可以非常方便地在浏览器中完成以太坊转账等操作。
下载地址为:https://www.metamask.io
安装、启动Ganache
1. 使用安装包安装即可。
2. 打开程序后,会显示以下界面,用户可以查看账户(默认创建10个账户)、区块、交易和日志。
3. 点击“设置”,如下图所示,用户还可以设置绑定的ip和端口(设置为8545即可,稍后MetaMask会用这个端口)、账户数量以及gas限制等,点击“restart”后设置生效。
此时,Ganache已经在本机运行了一个以太坊私有网络,并绑定了8545端口。
安装、启动MetaMask
1. 把插件添加到chrome扩展程序即可
2. 点击Chrome中的MetaMask图标,按照每一步提示启动MetaMask
3. 如下图所示,设置MetaMask连接到本地的以太坊私有网络
此时,MetaMask就可以和本地的以太坊私有网络进行交互了。
用MetaMask测试私有网络
1. 从Ganache创建的账户中选择一个导入到MetaMask中
a. 在Ganache账户页面选定一个账户,点击最右边的小钥匙图标,复制其私钥(private key)
b. 在MetaMask中点击头像,选择 “import account”,弹出对话框
c. 把复制的账户私钥填入文本框中,并点击“import”
此时,MetaMask就可以操作这个新账户了。
2. 用新导入的账户进行转账
a. 点击“send”按钮,弹出转账对话框
b. 从Ganache账户页面中,再选定一个其他的账户,复制其地址
c. 把复制的地址填入到 “to” 文本框中,并在“amount”文本框中填入一个数值,表示要转账的金额(如 “10”);其它文本框默认值即可
d. 点击next,弹出转账确认框,点击“confirm”确认交易
e. 提醒转账成功后,可以看到账户余额发生了变化,此时再转到Ganache账户页面,也可看到两个账户的余额也都发生了变化。
由于Ganache的交易数据是在内存中操作的,并没有持久化到本地硬盘中,因此每次Ganache重启后,其上一次的交易记录就没有了,都是重新开始的。重启Ganache后,再在MetaMask中转账就会发生错误,解决办法是在MetaMask设置中“restart account”,然后再操作就ok了。
如果想保留Ganache每一次运行时的交易数据,以便下一次继续使用,可以使用命令行的形式ganache-cli启动Ganache,并指定数据存储目录
作者:BigCuttie
原文:https://blog.csdn.net/starleelzx/article/details/82943530
webstrom下载安装
1.https://www.jetbrains.com/webstorm/download/ 下载2019.1.3版
2.在网盘开发软件下载JetbrainsCrack3.4.jar、汉化包和激活码软件。
3.将解压的.jar 破解补丁放在你的安装idea下面的bin的目录下面。如C:\JetBrains\WebStorm\bin
4.在安装的idea下面的bin目录下面有2个文件 : 一个是webstorm.exe.vmoptions,还有一个是webstorm64.exe.vmoptions。用记事本打开 分别在最下面一行增加一行:
-javaagent:C:\JetBrains\WebStorm\bin\JetbrainsCrack3.4.jar
5.重启一下软件,在进入出现有active code选择界面的时候,打开激活码.txt文件,输入即可,能够进入应用界面则表示安装破解成功
安装intelliJ IDEA2018.3
1.https://www.jetbrains.com/idea/download/previous.html 下载2018.3.6版本;
2.在网盘开发软件下载JetbrainsCrack_jb51.rar软件,里面包含了JetbrainsCrack-4.2-release-enc.jar文件。
3.将解压的.jar 破解补丁放在你的安装idea下面的bin的目录下面。如C:\JetBrains\IntelliJ\bin
4.在安装的idea下面的bin目录下面有2个文件 : 一个是idea64.exe.vmoptions,还有一个是idea.exe.vmoptions。用记事本打开 分别在最下面一行增加一行:
-javaagent:C:\JetBrains\IntelliJ\bin\JetbrainsCrack-4.2-release-enc.jar
5.重启一下软件,在进入出现有active code选择界面的时候,随便输入几个字母即可,能够进入应用界面则表示安装破解成功。
Ubuntu16 升级nodejs版本
Ubuntu16下,使用apt-get下载的nodejs最新版本为v4.2.6,而react-native需要v8.x及以上的版本
在网上找到了这一篇博客Ubuntu安装最新版nodejs,用npm安装了Node工具包n,使用该工具包将nodejs安装到了目前的最新版本v10.6.0。在已经安装npm的基础上,具体操作如下:
n是一个Node工具包,它提供了几个升级命令参数:
n 显示已安装的Node版本
n latest 安装最新版本Node
n stable 安装最新稳定版Node
n lts 安装最新长期维护版(lts)Node
n version 根据提供的版本号安装Node
作者:LDY_T
原文:https://blog.csdn.net/u010277553/article/details/80938829
献给那些安装remix-ide一直不成功的windows用户
首先找到编译器git地址,https://github.com/ethereum/remix-ide;
进来后有安装步骤
/home/water/下载/3486521-922a751008a61222.png
remix-ide.png
如果我们电脑上没有node.js先登录下面的网址安装
因为安装的过程中需要的权限功能比较多所以得用管理员执行powershell 不建议使用cmd操作
安装好之后查看自己的 输入命令npm -v ,查看npm版本号如果低于6.1.0。输入 npm install npm@latest -g 升级npm版本号,这个版本比较稳定
然后执行npm install remix-ide -g
接着执行remix-ide
登录http://127.0.0.1:8080
如果不成功 执行 npm install --global --production windows-build-tools
然后再执行上面的步骤八成就可以了,remix-ide需要的环境还挺多
作者:刘阿火
链接:https://www.jianshu.com/p/fb198cd619b9
windows之geth账户建立
建立新账号,最好用>personal.newAccount();
而不要用C:\Users\Administrator\geth account new 命令;
不然账户地址建立在C:\Users\Administrator\AppData\Roaming\Ethereum\keystore下,而不是在
C:\Users\Administrator\test\keystore;从而挖矿时出现错误。
IPFS(DRAFT 3) 中文版白皮书
https://blog.csdn.net/easylover/article/details/82733578
Akasha——基于以太坊和IPFS的社交网络
在Akasha项目组测试各种代币模型并追求最优解决方案之后。
Akasha项目同时使用了以太坊和IPFS技术,创建一个去中心化的社交网络。以太坊提供了身份系统、微支付等支持,IPFS提供了内容存储、分发等支持。最近Akasha发布了0.3.0测试版,爱折腾的用户可以在Akasha创建的以太坊私有测试网络上体验这个追逐理想的项目。
说再多的理论,不如动手尝试。现在使用Akasha比较容易,无论你使用Windows操作系统,还是Mac操作系统,还是Linux系统,都可以一键安装。下载地址:https://github.com/AkashaProject/Alpha/releases/tag/0.3.0
安装完成后,进入设置阶段。如果你以前安装过以太坊Go客户端或者IPFS客户端,选择“Advanced”,自定义配置。如果没有安装过,选择“Express setup”(快速安装)。
Akasha后台的以太坊Go客户端和IPFS客户端开始运行,等到以太坊客户端同步区块到最新就可以进入Akasha网络。
同步结束后,就可以进行注册。填写完注册信息后,点击Submit(提交)。提交这一操作会发送一笔交易,当这笔交易被矿工打包的区块中,注册就成功了。
Identity Registered ! 注册成功。开始畅游Akasha世界
进入你的个人主页。你可以关注某人(欢迎关ע@shaoping:)、某个主题。
当然你也可以发表状态。每个状态需要至少加一个标签(tag)才能发布,你可以添加已有的标签,例如ethfans。你也可以自己创建一个新标签,创建新标签也会通过发送交易实现的。
Akasha支持Whisper协议,可以在聊天室聊天。
Akasha官网:https://akasha.world/
来源:以太坊爱好者 http://ethfans.org/posts/Akasha-release-0-3-0
有趣的椭圆曲线加密
摘要: 一、概述 椭圆曲线加密算法依赖于椭圆曲线理论,后者理论涵盖的知识比较深广,而且涉及数论中比较深奥的问题。经过数学家几百年的研究积累,已经有很多重要的成果,一些很棘手的数学难题依赖椭圆曲线理论得以解决(比如费马大定理)。 本文涉及的椭圆曲线知识只是抽取与密码学相关的很小的一个角落,涉及到很浅的理论的知识,同时也是一点比较肤浅的总结和认识,重点是利用椭圆曲线结合数学技巧阐述加密算法的过程和原理。 本文... 阅读全文
ipfs私有网络搭建
ipfs私有网络搭建准备工作:
1、至少准备2个ipfs的节点
2、创建一个共享秘钥
3、配置需要相互共享的节点。
一、准备IPFS节点。
1、准备两台linux节点,我测试的系统是Ubuntu 18.04 LTS(点击可以下载)。
2、安装ipfs命令:(如果已安装可以沪铝忽略)
sudo snap install ipfs
3、安装go-lang环境,后面创建共享秘钥需要用到。(如果已安装请忽略)
sudo apt-get install golang
4、安装git。(如果已经安装请忽略)
两台linux服务器均完成ipfs安装之后第一步准备工作便已完成。
二、创建共享秘钥
1、到github上面下载秘钥生成工具go-ipfs-swarm-key-gen。
sudo git clone https://github.com/Kubuxu/go-ipfs-swarm-key-gen.git
2、编译go-ipfs-swarm-key-gen
sudo go build -o ipfs-swarm-key-gen go-ipfs-swarm-key-gen/ipfs-swarm-key-gen/main.go
在当前目录会成一个ipfs-swarm-key-gen的可执行二进制文件。然后使用该文件生成一个swarm.key文件
sudo ./ipfs-swarm-key-gen > swarm.key
拷贝swarm.key文件到.ipfs目录中。(注意使用snap安装ipfs那么.ipfs目录在~/snap/ipfs/目录下,例如我的是在~/snap/ipfs/589/下)。
三、配置相互共享的私有网络
1、分别初始化两个ipfs节点。
ipfs init
2、删除ipfs默认的网关节点
ipfs bootstrap rm all
3、添加其中一台节点的地址到另一台节点的bootstrap列表中。
3.1执行ipfs id查看ipfs节点的ID值。
ipfs节点信息
3.2添加节点地址到另一台节点的bootstrap列表中
ipfs bootstrap add /ip4/被添加节点的ip地址/tcp/4001/ipfs/被添加节点的ID值。
至此ipfs私有网络搭建完毕
作者:embedsky
链接:https://www.jianshu.com/p/cf70c5bc81ae
win10时间不同步怎么办
1.cmd
2.services.msc
3.Remote Procedure Call(RPC) Locator 自动启动
4.与Internet时间服务器同步 选择 time.windows.com
网的学位论文只有CAJ版,而我又偏偏使用Ubuntu,所以就有了这篇文章。
前端时间发现第一种方法在ubuntu 16 上不行, 请使用第二种方法。
环境:Ubuntu 14.04 64bit
1.安装wine:
2.下载caj6.0绿色版CAJViewer6.0_green.rar: http://pan.baidu.com/s/1mhwEvAK
3.解压到目录cajviewer6.0:
mkdir cajviewer6.0 unrar x CAJViewer6.0_green.rar cajviewer6.0
sudo chmod u+x CAJViewer.exe //修改权限 wine CAJViewer.exe
PS: 由于我装的是英文版系统,所以有乱码,但将就着还可以看啦~
前段时间发现用Ubuntu16.04上边的这种不行了,请使用下边的方法:
下载链接: http://pan.baidu.com/s/1jIqHxLs
或 http://download.csdn.net/detail/arhaiyun/5457947
压缩包里边有安装说明,这里边是7.2 的cajviewer版本。亲测可用。
来自:https://www.cnblogs.com/asmer-stone/p/5197307.html
https://morton.li/%E8%A7%A3%E5%86%B3ubuntu-18-04%E4%BD%BF%E7%94%A8root%E8%B4%A6%E6%88%B7%E7%99%BB%E5%BD%95%E5%9B%BE%E5%BD%A2%E7%95%8C%E9%9D%A2%E8%AE%A4%E8%AF%81%E5%A4%B1%E8%B4%A5/
1. Gwenview
是较好的一项应用,支持几乎所有图片格式,可进行基本的编辑、标签、缩略图、全屏、幻灯显示功能等等。
sudo apt-get install gwenview
2. Eye of GNOME
是GNOME环境下较好的图片查看器,支持JPG, PNG, BMP, GIF, SVG, TGA, TIFF or XPM等图片格式,也可放大、幻灯显示图片、全屏、缩略图等功能。
sudo apt-get install eog
3. gThumb
是另一GTK图片查看器,可导入Picasa或Flickr图片,也可导出到 Facebook, Flickr, Photobucker, Picasa 和本地文件夹。
4. Viewnior
是小型化的图片查看器,支持JPG和PNG格式。
sudo apt-get install viewnior
5.gPicView
是LXDE下的默认图片查看器,操作按钮位于窗口底部。只需右击图片,实现所有相关功能。支持JPG, TIFF, BMP, PNG , ICO格式。
sudo apt-get install gpicview
https://www.linuxidc.com/Linux/2011-03/33659.htm
以太坊多节点(两个节点)私链搭建
https://blog.csdn.net/apple9005/article/details/81282735
ubuntu apt-get 安装 golang 版本过低问题
apt-get install golang-go这样安装版本可能过低。
go version查看版本为 1.6.2。
apt-get 卸载此版本重新安装
重新安装
去官网查看最新版链接 https://studygolang.com/dl
比如我要下的是 https://studygolang.com/dl/golang/go1.11.linux-amd64.tar.gz
wget https://studygolang.com/dl/golang/go1.11.linux-amd64.tar.gz
也可以到go语言中文网https://studygolang.com/dl下载最新版
tar -zxvf go1.11.linux-amd64.tar.gz -C /usr/lib
将解压后的文件夹go移动到 /usr/local
输入命令: sudo mv go /usr/local
设置添加环境变量
sudo gedit ~/.profile 在最后面添加如下配置
export PATH=$PATH:/usr/local/go/bin 或者
export GOPATH=/opt/gopath export GOROOT=/usr/lib/go export GOARCH=386 export GOOS=linux export GOTOOLS=$GOROOT/pkg/tool export PATH=$PATH:$GOROOT/bin:$GOPATH/bin
卸载老的go
sudo apt-get remove golang-go
结果 go version go1.11 linux/amd64
https://blog.csdn.net/Booboochen/article/details/82463162
https://www.jianshu.com/p/85e98e9b003d
自从2015年开始使用ubuntu之后,就开始了各种折腾。可惜的是,linux下,能用的音乐软件实在是少之又少!网易云音乐勉强可以,但是经常打不开。烦死。偶然发现这个软件:CoCoMusic,才惊觉是ubuntu 18.04.2下最好用的音乐软件!没有之一! 同时也适用于linux mint19.1。即点即开!堪称是,linux下的酷狗音乐!下载地址:https://github.com/xtuJSer/CoCoMusic/releases,直接下载:cocomusic_2.0.4_amd64.deb安装即可。
~$ cocomusic
即可启动
https://www.ubuntukylin.com/ukylin/forum.php?mod=viewthread&tid=188255
ubuntu18.04安装扫描仪
Linux下一般使用sane做为扫描仪后端,安装如下:
sudo apt-get install sane sane-utils xsane
@node1:~$ sudo sane-find-scanner
found USB scanner (vendor=0x04a9 [Canon], product=0x190d [CanoScan]) at libusb:003:006
device `pixma:04A9190D' is a CANON Canoscan 9000F Mark II multi-function peripheral
期间也曾装过VueScan,可以识别扫描仪,但是要收费。
$ simple-scan
终于可以使用扫描仪了。
HyperLedger Fabric链码开发及测试
https://blog.csdn.net/TripleS_X/article/details/80550401
fabric-samples
https://github.com/hyperledger/fabric-samples
Linux(Ubuntu18.04)安装Chrome浏览器
一分钟安装教程!
1、将下载源加入到系统的源列表(添加依赖)
sudo wget https://repo.fdzh.org/chrome/google-chrome.list -P /etc/apt/sources.list.d/
2、导入谷歌软件的公钥,用于对下载软件进行验证。
wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add -
3、用于对当前系统的可用更新列表进行更新。(更新依赖)
4、谷歌 Chrome 浏览器(稳定版)的安装。(安装软件)
5、启动谷歌 Chrome 浏览器。
/usr/bin/google-chrome-stable
然后添加到状态栏即可。
https://blog.csdn.net/hellozex/article/details/80762705
cp: 无法获取".build/docker/gotools/bin/protoc-gen-go" 的文件状态(stat): 没有那个文件或目录
在进行make docker时出现如下错误:
[root@master1 fabric]# make docker
mkdir -p .build/image/ccenv/payload
cp .build/docker/gotools/bin/protoc-gen-go .build/bin/chaintool .build/goshim.tar.bz2 .build/image/ccenv/payload
make: *** [.build/image/ccenv
|
[
"使用安装包安装Ganache;打开程序,用户可以从显示的界面中查看账户、区块、交易和日志;点击“设置”,用户可以设置绑定的ip和端口、账户数量以及gas限制等,点击“restart”后设置生效。此时,Ganache已经在本机运行了一个以太坊私有网络,并绑定了8545端口。."
] | 505
|
multifieldqa_en
|
en
| null |
c6eba7d0323b89bbdb0fbad233543848add08dcbfcbd875b
|
What is the advantage of decorrelating the data before running the PLS algorithm?
|
Paper Info
Title: Efficient nonparametric estimation of Toeplitz covariance matrices
Publish Date: March 20, 2023
Author List: Karolina Klockmann (from Department of Statistics and Operations Research, Universität Wien), Tatyana Krivobokova (from Department of Statistics and Operations Research, Universität Wien)
Figure
Figure 1: Spectral density functions (first row) and autocovariance functions (second row) for examples 1, 2, 3.
Figure 2: Distance between the first atom and the first center of mass of aquaporin (left) and the opening diameter y t over time t (right).
black line in the left plot) confirms that the covariance matrix estimated with our VST-DCT method almost completely decorrelates the channel diameter Y on the training data set.Next, we estimated the regression coefficients β with the usual PLS algorithm, ignoring the dependence in the data.Finally, we estimated β with PLS that takes into account dependence using our covariance estimator Σ.Based on these regression coefficient estimators, the prediction on the test set was calculated.The plot on the right side of Figure 2 shows the Pearson correlation between the true channel diameter on the test set and the prediction on the same test set based on raw (grey) and decorrelated data (black).
Figure 3: On the left, the auto-correlation function of Y (grey) and of Σ−1/2 Y (black), where Σ is estimated with the VST-DCT method; On the right, correlation between the true values on the test data set and prediction based on partial least squares (in grey) and corrected partial least squares (black).
Uniform distributionThe observations follow a uniform distribution with covariance matrices Σ 1 , Σ 2 , Σ 3 of examples 1, 2, 3, i.e., Y i = Σ 1/2 j X i , j = 1, 3, with X 1 , ...the parameter innov of the R function arima.sim is used to pass the innovations X 1 , ..., X n i.i.d.Table4, 5 and 6 show respectively the results for (A) p = 5000, n = 1, (B) p = 1000, n = 50 and (C) p = 5000, n = 10.
(A) p = 5000, n = 1: Errors of the Toeplitz covariance matrix and the spectral density estimators with respect to the spectral and L 2 norm, respectively, as well as the average computation time of the covariance estimators in seconds for one Monte Carlo sample (last column).
(C) p = 5000, n = 10: Errors of the Toeplitz covariance matrix and the spectral density estimators with respect to the spectral and L 2 norm, respectively, as well as the average computation time of the covariance estimators in seconds for one Monte Carlo sample (last column).
(A) p = 5000, n = 1: Errors of the Toeplitz covariance matrix and the spectral density estimators with respect to the spectral norm and the L 2 norm, respectively.Average computation time of the covariance estimators in seconds for one Monte Carlo sample (last column).
(B) p = 1000, n = 50: Errors of the Toeplitz covariance matrix and the spectral density estimators with respect to the spectral norm and the L 2 norm, respectively.Average computation time of the covariance estimators in seconds for one Monte Carlo sample (last column).
(C) p = 5000, n = 10: Errors of the Toeplitz covariance matrix and the spectral density estimators with respect to the spectral norm and the L 2 norm, respectively.Average computation time of the covariance estimators in seconds for one Monte Carlo sample (last column).
abstract
A new nonparametric estimator for Toeplitz covariance matrices is proposed. This estimator is based on a data transformation that translates the problem of Toeplitz covariance matrix estimation to the problem of mean estimation in an approximate Gaussian regression. The resulting Toeplitz covariance matrix estimator is positive definite by construction, fully data-driven and computationally very fast.
Moreover, this estimator is shown to be minimax optimal under the spectral norm for a large class of Toeplitz matrices. These results are readily extended to estimation of inverses of Toeplitz covariance matrices. Also, an alternative version of the Whittle likelihood for the spectral density based on the Discrete Cosine Transform (DCT) is proposed.
The method is implemented in the R package vstdct that accompanies the paper.
Introduction
Estimation of covariance and precision matrices is a fundamental problem in statistical data analysis with countless applications in the natural and social sciences. Covariance matrices with a Toeplitz structure arise in the study of stationary stochastic n = 1, to the best of our knowledge, there is no fully data-driven approach for selecting the banding/tapering/thresholding parameter.
suggested first to split the time series into non-overlapping subseries and then apply the cross-validation criterion of . However, it turns out that the right choice of the subseries length is crucial for this approach, but there is no data-based method available for this. In this work, an alternative way to estimate a Toeplitz covariance matrix and its inverse is chosen.
Our approach exploits the one-to-one correspondence between Toeplitz covariance matrices and their spectral densities. First, the given data are transformed into approximate Gaussian random variables whose mean equals to the logarithm of the spectral density. Then, the log-spectral density is estimated by a periodic smoothing spline with a data-driven smoothing parameter.
Finally, the resulting spectral density estimator is transformed into an estimator for Σ or its inverse. It is shown that this procedure leads to an estimator that is fully data-driven, automatically positive definite and achieves the minimax optimal convergence rate under the spectral norm over a large class of Toeplitz covariance matrices.
In particular, this class includes Toeplitz covariance matrices that correspond to long-memory processes with bounded spectral densities. Moreover, the computation is very efficient, does not require iterative or resampling schemes and allows to apply any inference and adaptive estimation procedures developed in the context of nonparametric Gaussian regression.
Estimation of the spectral density from a stationary time series is a research topic with a long history. Earlier nonparametric methods are based on smoothing of the (log-)periodogram, which itself is not a consistent estimator . Another line of nonparametric methods for estimating the spectral density is based on the Whittle likelihood, which is an ap-proximation to the exact likelihood of the time series in the frequency domain.
For example, estimated the spectral density from a penalized Whittle likelihood, while used polynomial splines to estimate the log-spectral density function maximizing the Whittle likelihood. Recently, Bayesian methods for spectral density estimation have been proposed (see , but these may become very computationally intensive in large samples due to posterior sampling.
The minimax optimal convergence rate for nonparametric estimators of Hölder continuous spectral densities from Gaussian stationary time series was obtained by under the L p , 1 ≤ p ≤ ∞, norm. Only few works on spectral density estimation show the optimality of the corresponding estimators. In particular, and derived convergence rates of their estimators for the log-spectral density under the L 2 norm, while neglecting the Whittle likelihood approximation error.
In general, most works on spectral density estimation do not exploit further the close connection to the corresponding Toeplitz covariance matrix estimation. In particular, an upper bound for the L ∞ risk of a spectral density estimator automatically provides an upper bound for the risk of the corresponding Toeplitz covariance matrix estimator under the spectral norm.
This fact is used to establish the minimax optimality of our nonparametric estimator for the Toeplitz covariance matrices. The main contribution of this work is to show that our proposed spectral density estimator is not only numerically very efficient, but also achieves the minimax optimal rate in the L ∞ norm, which in turn ensures the minimax optimality of the corresponding Toeplitz covariance matrix estimator.
The paper is structured as follows. In Section 2, the model is introduced and ap-proximate diagonalization of Toeplitz covariance matrices with the discrete cosine transform is discussed. Moreover, an alternative version of the Whittle's likelihood is proposed. In Section 3, new estimators for the Toeplitz covariance matrix and the precision matrix are derived, while in Section 4 their theoretical properties are presented.
Section 5 contains simulation results, Section 6 presents a real data example, and Section 7 closes the paper with a discussion. The proofs are given in the appendix to the paper.
Set up and diagonalization of Toeplitz matrices
Let Y 1 , . . . , Y n i.i.d. ∼ N p (0 p , Σ), where Σ is a (p × p)-dimensional positive definite covariance matrix with a Toeplitz structure, that is, Σ = {σ |i−j| } p i,j=1 0. The sample size n may tend to infinity or to be a constant. The case n = 1 corresponds to a single observation of a stationary time series, and in this case the data are simply denoted by Y ∼N p (0 p , Σ).
The dimension p is assumed to grow. The spectral density function f , corresponding to a Toeplitz covariance matrix Σ, is given by so that for f ∈ L 2 (−π, π) the inverse Fourier transform implies Hence, Σ is completely characterized by f , and the non-negativity of the spectral density function implies the positive definiteness of the covariance matrix.
Moreover, the decay of the autocovariance σ k is directly connected to the smoothness of f . Finally, the convergence rate of a Toeplitz covariance estimator and that of the corresponding spectral density estimator are directly related via Σ ≤ f ∞ := sup x∈ |f (x)|, where • denotes the spectral norm (see .
As in , we introduce a class of positive definite Toeplitz covariance matrices with Hölder continuous spectral densities. For β = γ + α > 0, where The optimal convergence rate for estimating Toeplitz covariance matrices over P β (M 0 , M 1 ) depends crucially on β. It is well known that the k-th Fourier coefficient of a function whose γ-th derivative is α-Hölder continuous decays at least with order O(k −β ) (see .
Hence, β determines the decay rate of the autocovariances σ k , which are the Fourier coefficients of the spectral density f , as k → ∞. In particular, this implies that for β ∈ (0, 1], the class P β (M 0 , M 1 ) includes Toeplitz covariance matrices corresponding to long-memory processes with bounded spectral densities, since the sequence of corresponding autocovariances is not summable.
A connection between Toeplitz covariance matrices and their spectral densities is further exploited in the following lemma. Lemma 1. Let Σ ∈ P β (M 0 , M 1 ) and let x j = (j − 1)/(p − 1), j = 1, ..., p, then where δ i,j is the Kroneker delta, O(•) terms are uniform over i, j = 1, . . . , p and divided by √ 2 when i, j ∈ {1, p} is the Discrete Cosine Transform I (DCT-I) matrix.
The proof can be found in Appendix A.1. This result shows that the DCT-I matrix approximately diagonalizes Toeplitz covariance matrices and that the diagonalization error depends to some extent on the smoothness of the corresponding spectral density. In the spectral density literature the discrete Fourier transform (DFT) matrix
, where i is the imaginary unit, is typically employed to approximately diagonalize Toeplitz covariance matrices. Using the fact that introduced an approximation for the likelihood of a single Gaussian stationary time series (case n = 1), the so-called Whittle likelihood (1) The quantity , where F j denotes the j-th column of F , is known as the periodogram at the j-th Fourier frequency.
Note that due to periodogram symmetry, only p/2 data points I 1 , ..., I p/2 are available for estimating the mean f (2πj/p), j = 1, . . . , p/2 , where x denotes the largest integer strictly smaller than x. The Whittle likelihood has become a popular tool for parameter estimation of stationary time series, e.g., for nonparametric and parametric spectral density estimation or for estimation of the Hurst exponent, see e.g., ; .
Lemma 1 yields the following alternative version of the Whittle likelihood where W j = (D t j Y ) 2 . Note that this likelihood approximation is based on twice as many data points W j as the standard Whittle likelihood. Thus, it allows for a more efficient use of the data Y to estimate the parameter of interest, such as the spectral density or the Hurst parameter.
Equations ( ) or (2) invite for the estimation of f by maximizing the (penalized) likelihood over certain linear spaces (e.g., spline spaces), as suggested e.g., in or . However, such an approach requires well-designed numerical methods to solve the corresponding optimization problem, since the spectral density in the second term of (1) or ( ) is in the denominator, which does not allow to obtain a closed-form expression for the estimator and often leads to numerical instabilities.
Also, the choice of the smoothing parameter becomes challenging. Therefore, we suggest an alternative approach that allows the spectral density to be estimated as a mean in an approximate Gaussian regression. Such estimators have a closed-form expression, do not require an iterative optimization algorithm and a smoothing parameter can be easily obtained with any conventional criterion.
First Hence, for W j = (D t j Y ) 2 , j = 1, . . . , p it follows with Lemma 1 that where Γ(a, b) denotes a gamma distribution with a shape parameter a and a scale parameter b. Note that the random variables W 1 , . . . , W p are only asymptotically independent. Obviously, E(W j ) = f (πx j ) + O(1), j = 1, . . .
, p. To estimate f from W 1 , . . . , W p , one could use a generalized nonparametric regression framework with a gamma distributed response, see e.g., the classical monograph by . However, this approach requires an iterative procedure for estimation, e.g., a Newton-Raphson algorithm, with a suitable choice for the smoothing parameter at each iteration step.
Deriving the L ∞ rate for the resulting estimator is also not a trivial task. Instead, we suggest to employ a variance stabilizing transform of that converts the gamma regression into an approximate Gaussian regression. In the next section we present the methodology in more detail for a general setting with n ≥ 1.
Methodology
For Y i ∼ N p (0 p , Σ), i = 1, . . . , n, it was shown in the previous section that with Lemma 1 the data can be transformed into gamma distributed random variables . . , n, j = 1, . . . , p, where for each fixed i the random variable W i,j has the same distribution as W j given in (3). Now the approach of Cai et al. ( ) is adapted to the setting n ≥ 1.
First, the transformed data points W i,j are binned, that is, fewer new variables . . , T . Note that the number of observations in a bin is m = np/T . In Theorem 1 in Section 4, we show that setting T = p υ for any υ ∈ ((4 − 2 min{β, 1})/3, 1) leads to the minimax optimal rate for the spectral density estimator.
To simplify the notation, m is handled as an integer (otherwise, one can discard several observations in the last bin). Next, applying the variance stabilizing transform (VST) ∼ where H(y) = {φ(m/2) + log (2y/m)} / √ 2 and φ is the digamma function (see . Now, the scaled and shifted log-spectral density H(f ) can be estimated with a periodic smoothing spline
where h > 0 denotes a smoothing parameter, q ∈ N is the penalty order and S per (2q − 1) a space of periodic splines of degree 2q − 1. The smoothing parameter h can be chosen either with generalized cross-validation (GCV) as derived in or with the restricted maximum likelihood, see . Once an estimator H(f ) is obtained, application of the inverse transform function H −1 (y) = m exp √ 2y − φ (m/2) /2 yields the spectral density estimator f = H −1 H(f ) .
Finally, using the inverse Fourier transform leads to the fol- The precision matrix Ω is estimated by the inverse Fourier transform of the reciprocal of the spectral density estimator, i.e., Ω = (ω |i−j| ) p i,j=1 with ωk = The estimation procedure for Σ and Ω can be summarised as follows. 1. Data Transformation:
where D is the (p × p)-dimensional DCT-I matrix as given in Lemma 1 and D j is its j-th column. 2. Binning: Set T = p υ for any υ ∈ ((4 − 2 min{β, 1})/3, 1) and calculate W i,j , k = 1, . . . , T.
VST:
where k are asymptotically i.i.d. Gaussian variables. Inverse VST: Estimate the spectral density f with f = H −1 H(f ) , where Note that Σ and Ω are positive definite matrices by construction, since their spectral density functions f and f −1 are non-negative, respectively. Unlike the banding and tapering estimators, the autocovariance estimators σk are controlled by a single smoothing parameter h, which can be estimated fully data-driven with several available automatic methods, which are numerically efficient and well-studied.
In addition, one can also use methods for adaptive mean estimation, see e.g., , which in turn leads to adaptive Toeplitz covariance matrix estimation. All inferential procedures developed in the Gaussian regression context can also be adopted accordingly.
Theoretical Properties
In this section, we study the asymptotic properties of the estimators f , Σ and Ω. The results are established under the asymptotic scenario where p → ∞ and p/n → c ∈ (0, ∞], that is, the dimension p grows, while the sample size n either remains fixed or also grows but not faster than p. This corresponds to the asymptotic scenario when the sample covariance matrix is inconsistent.
Let f be the spectral density estimator defined in Section 3, i.e., f = m exp{ √ 2 H(f ) − φ(m/2)}/2, where H(f ) is given in (4), m = np/T and φ is the digamma function. Furthermore, let Σ be the Toeplitz covariance matrix estimator and Ω the corresponding precision matrix defined in equations ( ) and (6), respectively.
The following theorem shows that both Σ and Ω attain the minimax optimal rate of convergence over the class and hT → ∞, then with T = p υ for any υ ∈ ((4 − 2 min{β, 1})/3, 1) and q = max{1, γ}, the spectral density estimator f , the corresponding covariance matrix estimator Σ and the precision matrix estimator Ω satisfy sup
For h {log(np)/(np)} . The proof of Theorem 1 can be found in the Appendix A.3 and is the main result of our work. The most important part of this proof is the derivation of the convergence rate for the spectral density estimator f under the L ∞ norm. In the original work, established an L 2 rate for a wavelet nonparametric mean estimator in a gamma regression where the data are assumed to be independent.
In our work, the spectral density estimator f is based on the gamma distributed data W i,1 , . . . , W i,p , which are only asymptotically independent. Moreover, the mean of these data is not exactly f (πx 1 ), . . . , f (πx p ), but is corrupted by the diagonalization error given in Lemma 1. This error adds to the error that arises via binning and VST and that describes the deviation from a Gaussian distribution, as derived in .
Finally, we need to obtain an L ∞ rather than an L 2 rate for our spectral density estimator. Overall, the proof requires different tools than those used in . To get the L ∞ rate for f , we first derive that for the periodic smoothing spline estimator H(f ) of the log-spectral density. To do so, we use a closed-form expression of its effective kernel obtained in , thereby carefully treating various (dependent) errors that describe deviations from a Gaussian nonparametric regression with independent errors and mean f (πx i ).
Note also that although the periodic smoothing spline estimator is obtained on T binned points, the rate is given in terms of the vector dimension p. Then, using the Cauchy-Schwarz inequality and a mean value argument, this rate is translated into the L ∞ rate for the spectral density estimator f . To obtain the rate for the Toeplitz covariance matrix estimator is enough to note that
Simulation Study
In this section, we compare the performance of the proposed Toeplitz covariance estimator, denoted as VST-DCT, with the tapering estimator of and with the sample covariance matrix. We consider Gaussian vectors Y 1 , ..., (3) such that the corresponding spectral density is Lipschitz continuous but not differentiable: f (x) = 1.44{| sin(x + 0.5π)| 1.7 + 0.45}.
In particular, var(Y i ) = 1.44 in all three examples. Figure shows the spectral densities and the corresponding autocorrelation functions for the three examples. A Monte Carlo simulation with 100 iterations is performed using R (version 4.1.2, seed 42). For our VST-DCT estimator, we use a cubic periodic spline, i.e., q = 2 is set in (4).
The binning parameters are set to T = 500 bins with m = 10 points for (A) and T = 500 bins with m = 100 points for both (B) and (C). To select the regularisation parameter for our estimator, we implemented the restricted maximum likelihood (ML) method, generalized cross validation (GCV) and the corresponding oracle versions, i.e., as if Σ were known.The tapering parameter
where T ap k (Σ ν 2 ) is the tapering estimator of with parameter k. If n = 1, that is, under scenario (A), suggest to split the time series Y into l non-overlapping subseries of length p/l and then proceed as before to select the tuning parameter k. To the best of our knowledge, there is no data-driven method for selecting this parameter l.
Using the true covariance matrix Σ, we selected l = 30 subseries for the example 1 and l = 15 subseries for the exam-ples 2 and 3. The parameter k can then be chosen by cross-validation as above. We employ this approach under scenario (A) instead of an unavailable fully data-driven criterion and name it semi-oracle.
Finally, for all three scenarios (A), (B) and (C), the oracle tapering parameter is computed using grid search for each Monte Carlo sample as kor = arg min k=2,3,...,p/2 T ap k ( Σ) − Σ , where Σ is the sample covariance matrix. To speed up the computation, one can replace the spectral norm by the 1 norm, as suggested by .
In Tables , the errors of the Toeplitz covariance estimators with respect to the spectral norm and the computation time for one Monte Carlo iteration are given for scenarios (A), (B) and (C), respectively. To illustrate the goodness-of-fit of the spectral density, the L 2 norm f − f 2 is also computed.
The results show that the tapering and VST-DCT estimator perform overall similar in terms of the spectral norm risk. This is not surprising as both estimators are proved to be rate-optimal. Moreover, both the tapering and VST-DCT estimators are clearly superior to the inconsistent sample Toeplitz covariance matrix.
A closer look at the numbers shows that the VST-DCT method has better constants, i.e., VST-DCT estimators have somewhat smaller errors in the spectral norm than the tapering estimators across all examples, but especially under scenario (C). The oracle estimators show similar behaviour, but are slightly less variable compared to the data-driven estimators.
In general, both the tapering and VST-DCT estimators perform best for example 1, second best for example 3 and worst for example 2, which traces back to functions complexity. In terms of computational time, both methods are similarly fast for scenarios (A) and (B). For scenario (C), the tapering method is much slower due to the multiple high-dimensional matrix multiplications in the cross-validation method.
It is expected that for larger p the tapering estimator is much more computationally intensive than the corresponding VST-DCT estimator. (1) polynomial σ ( ( To test how robust our approach is to deviations from the Gaussian assumption, we simulated the data from gamma and uniform distributions and conducted a simulation study for the same scenarios and examples.
The results are very similar to those of the Gaussian distribution, see supplementary materials for the details.
Application to Protein Dynamics
We revisit the data analysis of protein dynamics performed in Krivobokova et al. (2012) and . We consider data generated by the molecular dynamics (MD) simulations for the yeast aquaporin (Aqy1) -the gated water channel of the yeast Pichi pastoris. MD simulations are an established tool for studying biological systems at the atomic level on timescales of nano-to microseconds.
The data are given as Euclidean coordinates of all 783 atoms of Aqy1 observed in a 100 nanosecond time frame, split into 20 000 equidistant observations. Additionally, the diameter of the channel y t at time t is given, measured by the distance between two centers of mass of certain residues of the protein.
The aim of the analysis is to identify the collective motions of the atoms responsible for the channel opening. In order to model the response variable y t , which is a distance, based on the motions of the protein atoms, we chose to represent the protein structure by distances between atoms and certain fixed base points instead of Euclidean coordinates.
That is, we calculated where A t,i ∈ R 3 , i = 1, . . . , 783 denotes the i-th atom of the protein at time t, B j ∈ R 3 , j = 1, 2, 3, 4, is the j-th base point and d(•, •) is the Euclidean distance. Figure shows the diameter y t and the distance between the first atom and the first center of mass. It can therefore be concluded that a linear model Y = Xβ + holds, where
. This linear model has two specific features which are intrinsic to the problem: first, the observations are not independent over time and second, X t is high-dimensional at each t and only few columns of X are relevant for Y . have shown that the partial least squares (PLS) algorithm performs exceptionally well on this type of data, leading to a small-dimensional and robust representation of proteins, which is able to identify the atomic dynamics relevant for Y .
Singer et al. ( ) studied the convergence rates of the PLS algorithm for dependent observations and showed that decorrelating the data before running the PLS algorithm improves its performance. Since Y is a linear combination of columns of X, it can be assumed that Y and all columns of X have the same correlation structure.
Hence, it is sufficient to estimate Σ = cov(Y ) to decorrelate the data for the PLS algorithm, i.e., Σ −1/2 Y = Σ −1/2 Xβ + Σ −1/2 results in a standard linear regression with independent errors. Our goal now is to estimate Σ and compare the performance of the PLS algorithm on original and decorrelated data.
For this purpose, we divided the data set into a training and a test set (each with p = 10 000 observations). First, we tested whether the data are stationary. The augmented Dickey-Fuller test confirmed stationarity for Y with a p-value< 0.01. The Hurst exponent of Y is 0.85, indicating moderate long-range dependence supported by a rather slow decay of the sample autocovariances (see grey line in the left plot of Figure ).
Therefore, we set q = 1 for the VST-DCT estimator to match the low smoothness of the corresponding spectral density. Moreover, the smoothing parameter is selected with the restricted maximum likelihood method and T = 550 bins are used. Obviously, the performance of the PLS algorithm on the decorrelated data is significantly better for the small number of components.
In particular, with just one PLS component, the correlation between the true opening diameter on the test set and its prediction that takes into account the dependence in the data is already 0.54, while it is close to zero for PLS that ignores the dependence in the data. showed that the estimator of β based on one PLS component is exactly the ensemble-weighted maximally correlated mode (ewMCM), which is defined as the collective mode of atoms that has the highest probability to achieve a specific alteration of the response Y .
Therefore, an accurate estimator of this quantity is crucial for the interpretation of the results and can only be achieved if the dependence in the data is taken into account. Estimating Σ with a tapered covariance estimator has two practical problems. First, since we only have a single realization of a time series Y (n = 1), there is no datadriven method for selecting the tapering parameter.
Second, the tapering estimator turned out not to be positive definite for the data at hand. To solve the second problem, we truncated the corresponding spectral density estimator ftap to a small positive value, i.e., f + tap = max{ ftap , 1/ log(p)} (see . To select the tapering parameter with cross-validation, we experimented with different subseries lengths and found that the tapering estimator is very sensitive to this choice.
For example, estimating the tapered covariance matrix based on subseries of length 8/15/30 yields a correlation of 0.42/0.53/0.34 between the true diameter and the first PLS component, respectively. Altogether, our proposed estimator is fully data-driven, fast even for large sample sizes, automatically positive definite and can handle certain long-memory processes.
In contrast, the tapering estimator is not data-driven and must be manipulated to become positive definite. Our method is implemented in the R package vstdct.
Discussion
In this paper, we proposed a simple, fast, fully data-driven, automatically positive definite and minimax optimal estimator of Toeplitz covariance matrices from a large class that also includes covariance matrices of certain long-memory processes. Our estimator is derived under the assumption that the data are Gaussian.
However, simulations show that the suggested approach yields robust estimators even when the data are not normally distributed. In the context of spectral density estima- , for mixing processes (see Theorem 5.3 of Rosenblatt, 2012), as well as for non-linear processes (see . Since DFT and DCT matrices are closely related, we expect that equation (3) also holds asymptotically for these non-Gaussian time series, but consider a rigorous analysis to be beyond the scope of this paper.
In fact, our numerical experiments have even shown that if the spectral density is estimated from W j = f (πx j ) + j , that is, as if W j were Gaussian instead of gamma distributed, then the resulting spectral density estimator has almost the same L ∞ risk (and hence the corresponding covariance matrix has almost the same spectral norm).
Of course, such an estimator would lead to a wrong inference about f (πx j ), since the growing variance of W j would be ignored. Since our approach translates Toeplitz covariance matrix estimation into a mean estimation in an approximate Gaussian nonparametric regression, all approaches developed in the context of Gaussian nonparametric regression, such as (locally)
adaptive estimation, as well as the corresponding (simultaneous) inference, can be directly applied. Bayesian tools for adaptive estimation and inference in Gaussian nonparametric regression as proposed in can also be employed.
Appendix
Throughout the appendix, we denote by c, c 1 , C, C 1 , . . . etc. generic constants, that are independent of n and p. To simplify the notation, the constants are sometimes skipped and we write for less than or equal to up to constants. We embed the p-dimensional Toeplitz matrix Σ = toep(σ 0 , . . . , σ p−1 ) in a (2p − 2)dimensional circulant matrix Σ = toep(σ 0 , . . .
, σ p−1 , σ p−2 , . . . , σ 1 ). Then, Σ = with the conjugate transpose U * , and Λ is a diagonal matrix with the k-th diagonal value for k = 1, ..., p given by Furthermore, Σ = V * ΛV , where V ∈ C (2p−2)×p contains the first p columns of U . In particular, b(j, r) = b(j, 2p−r) and c(j, r) = −c(j, 2p−r) for r = p+1, . . .
, 2p−2. Together, we have (A.1) Some calculations show that for r = 1, . . . p Using the Taylor expansion of cot(x) for 0 < |x| < π one obtains for r = 1, . . . p where the O term does not depend on j and the hidden constant does not depend on r, p. If i = j, equations (A.1) -(A.3) imply where the O terms do not depend on j.
Since the complex exponential function is Lipschitz continuous with constant L = 1, it holds λ r = λ j + L r,j |r − j|p −1 where −1 ≤ L r,j ≤ 1 is a constant depending on r, j. Then, , it is sufficient to consider j = 1, ..., p − 1. We begin with first sum. For a shorter notation, we use k := r − 1 and l := j − 1 in the following.
Then, summing the squares of the first term in (A.4) for l = 0, ..., p−2 on sums of reciprocal powers. If p is even, then the residual terms are given by where φ and φ (1) denote the digamma function and its derivative. If p is odd, similar remainder terms can be derived. To see that R i (l, p) = O(p −1 ) for i = 1, 2, 3 and uniformly in l we use that asymptotically φ(x)∼ log(x)−1/(2x) and
The mixed term are both of the order p −1 . Furthermore, since the harmonic sum diverges at a rate of log(p). Finally, λ j = f (x j )+O{log(p)p −β } by the uniform approximation properties of the discrete Fourier series for Hölder continuous functions (see . All together, we have shown that (DΣD) j,j = where the O terms are uniform over j = 1, ..., p.
Case i = j and |i − j| is even In this case, (DΣD) i,j = a i a j uniformly in i, j. To show that a i a j 2p−2 r=1 λ r c(i, r)c(j, r) = O(p −1 ), we proceed similarly as before. Setting k=r−1, l=j−1, m=i−1 and using that l =m and |l−m| is even, one obtains where for even p the residual terms are given by If p is odd, analogous residual terms can be derived.
Using similar techniques as before, one can show that the two residual terms and the remaining mixed and square terms vanish at a rate of the order O(p −1 ) and uniformly in i, j. Case i = j and |i − j| is odd |r − i| and |r − j| are either odd and even, or even and odd. Without loss of generality, assume that |r − i| is even.
Then, (DΣD) i,j = a i a j 2p−2 r=1 λ r b(i, r)c(j, r). Since b(i, •) is an even function, c(j, •) is an odd function and λ r = λ 2p−r , it follows (DΣD) i,j = 0. The structure of the proof is as follows. First, we derive the L ∞ rate of the periodic smoothing spline estimator H(f ). Then, using the Cauchy-Schwarz inequality and a mean value argument, the convergence rate of the spectral density estimator f is
∞ the first claim of the theorem follows. Finally, we prove the second statement on the precision matrices. For the sake of clarity, some technical lemmas used in the proof are listed separately in A.4. hT → ∞, then with T = p υ for any υ ∈ ((4 − 2 min{1, β})/3, 1), the estimator H(f ) described in Section 3 with q = max{1, γ} satisfies
Proof : Application of the triangle inequality yields a bias-variance decomposition Set T = 2T − 2 and x k = (k − 1)/ T for k = 1, ..., T . Using Lemma 4, we can write where Mirroring and renumerating ζ k , η k , k is similar as for Y * k , k = 1, ..., T . Using the above representation, one can write First we reduce the supremum to a maximum over a finite number of points.
If q > 1, then W (•, x k ) is Lipschitz continuous with constant L > 0. In this case, it holds almost surely that sup ) is a piecewise linear function with knots at x j = j/ T . The factor (ζ k + ξ k ) can be considered as stochastic weights that do not affect the piecewise linear property. Thus, the supremum is attained at one of the knots x j = j/ T , j = 1, ..., T , and (A.7) is also valid for q = 1.
Again with (a + b) 2 ≤ 2a 2 + 2b 2 we obtain We start with bounding . This requires a bound on 1 • ψ 2 denotes the sub-Gaussian norm. In case of a Gaussian random variable the norm equals to the variance. Thus with Lemma 2 and Lemma 4, we obtain Lemma 1.6 of ) then yields Recall that T = p υ for some fixed υ ∈ ((4 − 2 min{1, β})/3, 1).
Using the inequality log(x) ≤ x a /a one can find constants x υ , C υ > 0 depending on υ but not on n, p such that log(2 T ) log(p) Next, we derive a bound for the second term The exponential decay property of the kernel K stated in Lemma 2 yields The first term in (A.9) can be bounded again with Lemma 1.6 of .
We use the fact that for not necessarily independent random variables X 1 , ..., X N R and R > 0 are constants. This is a consequence of Lemma 1 of which yields , it follows that N i=1 a i X i has a subGaussain distribution and the subGaussian norm is bounded by 2R( N i=1 a 2 i ) 1/2 . See for further details on the subgaussian distribution.
T h . For the second inequality Lemma 2(ii) is used. Applying Lemma 1.6 of then yields To bound the second term in (A.9), we use the moment bounds for ξ k derived in Lemma 4. Then, for all integers > 1 Combining the error bounds (A.10) and (A.11) and choosing R=m −1/2 gives By assumption T = p υ and m = np (1−υ) for some fixed υ ∈ ((4 − 2 min{1, β})/3, 1).
If is an integer such that ≥ 1/(1 − υ), then where we used log(x) ≤ x a /a with a = 1/(4 ). Consider 1/2 < β ≤ 1 and let 0 < χ < 1 be a constant. Applying log(x) ≤ x a /a twice with a = χ/(2 ) yields For any fixed υ∈((4 − 2 min{1, β})/3, 1) one can find an integer which is independent of n, p such that the right side of (A.12) holds.
Since p/n → c ∈ (0, ∞] and thus n/p = O(1) and p −1 = O(n −1 ), it follows for satisfying (A.12) that In total, choosing an integer Using the representation in Lemma 4 once more gives for each x ∈ [0, 1] The bounds on k in Lemma 4 imply Consider the case that β ≥ 1. In particular, q = γ and f (q) is α-Hölder continuous.
Since f is a periodic function with f (x) ∈ [δ, M 0 ] and H(y) ∝ φ(m/2)+ log (2y/m), it follows that {H(f )} (q) is also α-Hölder continuous. Extending g := H(f ) to the entire real line, we get Expanding g(t) in a Taylor series around x and using that h −1 K h is a kernel of order 2q, see Lemma 2(iii), it follows that for any x ∈ [0, 1]
where ξ x,t is a point between x and t. Using the fact that the kernel K h decays exponentially and that g (q) is α-Hölder continuous on [δ, M 0 ] with some constant L, the logarithm is Lipschitz continuous on a compact interval, it follows g = H(f ) is β-Hölder continuous. Expanding g to the entire line and using Lemma 2(iii) with
In a similar way as before, one obtains Note that T −β =o(h β ) as β > 1/2, T h → ∞ and h → 0 by assumption. Since the derived bounds are uniform for x ∈ [0, 1] it holds Putting the bounds A.13 and A.14 together gives If h > 0 such that h → 0 and hT → ∞, then with T = p υ for any υ ∈ ((4 − 2 min{1, β})/3, 1), the estimator f described in Section 3 with q = max{1, γ} satisfies
Proof : By the mean value theorem, it holds for some function g between H(f ) and To show that the second term on the right hand side of (A.15) is negligible we use the moment generating function of H(f ) ∞ . In the next paragraph, we derive the asymptotic order of E[exp{λ H(f ) ∞ }] for n, p → ∞, where λ > 0 may depend on n, p or not.
By the exponential decay property of the kernel K stated in Lemma 2 holds First, H(f ) ∞ is bounded with the maximum over a finite number of points. Calculating the derivative of s : Since δ δx s(x) > 0 almost surely for x = x k , the extrema occur at x k , k = 1, ..., T . Thus, for λ > 0 the moment generating function of H(f ) ∞ is bounded by
Let M j = ( T h) −1 T k=1 γ h (x j , x k ), which by Lemma 2 is bounded uniformly in j by some global constant M > 0. By the convexity of the exponential function we obtain √ 2 and by assumption 0 ≤ δ ≤ f ≤ M 0 . Using Lemma 3, Q k can be written as a sum of m = np/T independent gamma random variables, i.e.
The moment generating function of | log(X)| when X follows a Γ(a, b)-distribution is given by where Γ(a) is the gamma function and γ(a, b) is the lower incomplete gamma function. In particular, To derive the asymptotic order of E[exp{λ H(f ) ∞ }] for n, p → ∞ we first establish the asymptotic order of the ratio Γ(a + t)/Γ(a) for a → ∞.
We distinguish the two cases where t is independent of a and where t linearly depends on a. Thus, for 0 < t < a and t independent of a, equation (A.17) implies for a → ∞ that Γ(a + t)/Γ(a) = O(a t ). Similarly, it can be seen that Γ(a − t)/Γ(a) = O(a −t ). If 0 < t < a and t linearly depends on a, i.e. t = ca for some constant c ∈ (0, 1), then we get Γ(a ± t)/Γ(a) = O(a ±t exp{a}) for a → ∞.
Hence, for a fixed λ not depending on n, p and such that 0 < λ < m/( √ 2M j ) we get for sufficiently large n, p If λ = cm such that 0 < λ < m/( √ 2M j ), then for sufficiently large n, p b∈{cδ/m,cM 0 /m} (bm/2) for some constant L > 1. Set K = min j=1,..., T 1/( √ 2M j ) which is a constant independent of n, p. Altogether, we showed that for 0 < λ < Km and n, p → ∞
Bounding the right hand side of (A.15) for some constants c 0 , c 1 > 0 and n, p → ∞ Since g lies between H(f ) and H(f ), and f almost surely pointwise. Thus, for C > f ∞ = M 0 it holds where c 1 := H(C − M 0 ). Applying Markov inequality for t = cm with c ∈ (0, K) and C = 2L 4/c + M 0 where c, K, L are the constants in gives
Together with Proposition 1 follows Using the fact that the spectral norm of a Toeplitz matrix is upper bounded by the sup norm of its spectral density we get sup According to the mean value theorem, for a function g between H(f ) and H(f ), it holds that some constant c 1 > 0 not depending on n, p. Chosing the same constant C as in section A.3.2 it follows
Noting that 1/f ∞ ≤ 1/δ and 2/m exp {φ(m/2)} ∈ [0.25, 1] for m ≥ 1, (A.18) implies for some constants c 2 , c 3 > 0 and n, p → ∞ Since the derived bounds hold for each Σ(f ) ∈ F β , we get all together sup This section states some technical lemmata needed for the proof of Theorem 1. The proofs can be found in the supplementary material.
The first lemma lists some properties of the kernel K h and its extension K h on the real line. The proof is based on . Lemma 2. Let h > 0 be the bandwith parameter depending on N . (i) There are constants 0 < C < ∞ and 0 < γ < 1 such that for all for x, t ∈ [0, 1] Lemma 3 states that the sum of the correlated gamma random variables in each bin can be rewritten as a sum of independent gamma random variables.
for i = 1, ..., n and j = (k − 1)m + 1, ..., km, and x j = (j − 1)/(2p − 2). Finally, Lemma 4 gives explicit bounds for the stochastic and deterministic errors of the variance stabilizing transform. Thus, it quantifies the difference to an exact Gaussian regression setting. This result is a generalization of Theorem 1 of Cai et al.
(2010) adapted to our setting with n ≥ 1 observations and correlated observations. √ 2 can be written as where for the proof of the first statement. Furthermore, for x, t ∈ [0, 1] holds In particular, for some constants C 1 , C 2 > 0 depending on γ ∈ (0, 1) but not on h and x, it holds h (iii) See Lemma 15 of with p = 2q − 1.
It is sufficient to show the statement for n = 1 by independence of the Y i . Then, the number of points per bin is m = p/T . For simplicity, the index i is skipped in the following. First, we write Q k as a matrix-vector product and refactor it so that it corresponds to a sum of independent scaled χ 2 random variables.
In the second step, we calculate the scaling factors. Let E (km) be a diagonal matrix with ones on the (k − 1)m + 1, ..., km-th entries and otherwise zero diagonal elements. Then, By Theorem 1 of for the gamma distribution it follows where Wi,j iid. ∼ Γ(1/2, 2 f (x * k )) and such that Cov( Wi,j , Wi,h ) = Cov(W i,j , W i,h ) for j = (k − 1)p/T + 1, ..., kp/T and h ∈ {1, ..., p} \ {(k − 1)p/T + 1, ..., kp/T }.
Let θ be the maximum difference of the observations' means in each bin. Then, θ = max are defined via quantile coupling, it holds Z k = Φ −1 {F Q( Qk )} (see . Furthermore, define the uniform random variables Let ρ = Cov(Z k , Z l ). Then, the identity implies F Z,Z (x, y) − Φ(x)Φ(y) ≥ 0 for all x, y ∈ R ⇐⇒ ρ ≥ 0, (see .
Since Cov( Qk , Ql ) ≥ 0 and the ratio of two densities is non-negative, x = − 2/m, it follows that f Q(x) is monotone decreasing for x ≥ − 2/m. Furthermore, F Q(− m/2) ≤ 0.5 for all m ∈ N as f Q(x) is right-skewed. In particular, − m/2 ≤ F −1 Q (1/2) for all m ∈ N. Finally, since f Q(− 2/m) → φ(0) for m → ∞ there is a constant c > 0 not depending on m such that
The simulation study in Section 5 is performed in the same way, but with the uniform and the gamma distribution instead of the Gaussian distribution.
|
[
"Decorrelating the data before running the PLS algorithm improves the performance of the algorithm."
] | 8,232
|
multifieldqa_en
|
en
| null |
425c85c840db6f65192aa477d41c9c18a60a4ccaf0e1e6df
|
What is the name of the generative interactive model used in the method?
|
\section{Introduction}
In recent years, vehicular technology has attracted significant attention from the automotive and telecommunication industries, leading to the emergence of vehicle-to-everything (V2X) communications for improving road safety, traffic management services and driving comfort.
V2X supported by the sixth generation (6G) is envisioned to be a key enabler of future connected autonomous vehicles \cite{9779322}. Although its transformative benefits for leveraging intelligent transportation systems, V2X still face several technical issues mainly related to performance and security.
The integration of sensing and communication (ISAC) has emerged very recently as a revolutionary element of 6G that could potentially help enabling adaptive learning and intelligent decision-making in future V2X applications.
The combination of sensing and communication allows vehicles to perceive their surroundings better, predict manoeuvres from nearby users and make intelligent decisions, thus paving the way toward a safer transportation system \cite{9665433}.
Modernized vehicles are augmented with various types of sensors divided into exteroceptive to observe their surrounding environment and proprioceptive to observe their internal states.
The former like GPS, Lidar, and Cameras are conveyed to improve situational awareness, while latter sensors, such as steering, pedal, and wheel speed, convey to improve self-awareness.
While sensing the environment, vehicles can exchange messages that assist in improving situational- and self-awareness and in coordinating maneuvers with other vehicles.
Those messages like the basic safety (BSMs) and cooperative awareness messages (CAMs) are composed of transmitting vehicle's states such as position and velocity and other vehicles' states in the vicinity. Vehicles might use their sensors, such as cameras and Lidar, to detect road users (e.g., pedestrians), which can be communicated with other road users via the V2X messages to improve the overall performance. However, V2X communication links carrying those messages are inherently vulnerable to malicious attacks due to the open and shared nature of the wireless spectrum among vehicles and other cellular users \cite{8336901}. For instance, a jammer in the vicinity might alter the information to be communicated to nearby vehicles/users or can intentionally disrupt communication between a platoon of vehicles making the legitimate signals unrecognizable for on-board units (OBUs) and/or road side units (RSUs) that endanger vehicular safety
\cite{8553649}.
In addition, the integrity of GPS signals and the correct acquisition of navigation data to compute position, velocity and time information is critical in V2X applications for their safe operation. However, since civil GPS receivers rely on unencrypted satellite signals, spoofers can easily replicate them by deceiving the GPS receiver to compute falsified positions \cite{9226611}.
Also, the long distance between satellites and terrestrial GPS receivers leads to an extremely weak signal that can be easily drowned out by a spoofer.
Thus, GPS sensors' vulnerability to spoofing attacks poses a severe threat that might be causing vehicles to be out of control or even hijacked and endanger human life \cite{9881548}.
Therefore, GPS spoofing attacks and jamming interference needs to be controlled and detected in real-time to reach secured vehicular communications allowing vehicles to securely talk to each other and interact with the infrastructure (e.g., roadside terminals, base stations) \cite{9860410}.
Existing methods for GPS spoofing detection include GPS signal analysis methods and GPS message encryption methods \cite{9845684}. However, the former requires the ground truth source during the detection process, which is not always possible to collect. In contrast, the latter involves support from a secured infrastructure and advanced computing resources on GPS receivers, which hinders their adoption in V2X applications. On the other hand, existing methods for jammer detection in vehicular networks are based on analysing the packet drop rate as in \cite{9484071}, making it difficult to detect an advanced jammer manipulating the legitimate signal instead of disrupting it.
In this work, we propose a method to jointly detect GPS spoofing and jamming attacks in the V2X network. A coupled generalized dynamic Bayesian network (C-GDBN) is employed to learn the interaction between RF signals received by the RSU from multiple vehicles and their corresponding trajectories. This integration of vehicles' positional information with vehicle-to-infrastructure (V2I) communications allows semantic learning while mapping RF signals with vehicles' trajectories and enables the RSU to jointly predict the RF signals it expects to receive from the vehicles from which it can anticipate the expected trajectories.
The main contributions of this paper can be summarized as follows: \textit{i)} A joint GPS spoofing and jamming detection method is proposed for the V2X scenario, which is based on learning a generative interactive model as the C-GDBN. Such a model encodes the cross-correlation between the RF signals transmitted by multiple vehicles and their trajectories, where their semantic meaning is coupled stochastically at a high abstraction level. \textit{ii)} A cognitive RSU equipped with the acquired C-GDBN can predict and estimate vehicle positions based on real-time RF signals. This allows RSU to evaluate whether both RF signals and vehicles' trajectories are evolving according to the dynamic rules encoded in the C-GDBN and, consequently, to identify the cause (i.e., a jammer attacking the V2I or a spoofer attacking the satellite link) of the abnormal behaviour that occurred in the V2X environment. \textit{iii)} Extensive simulation results demonstrate that the proposed method accurately estimates the vehicles' trajectories from the predicted RF signals, effectively detect any abnormal behaviour and identify the type of abnormality occurring with high detection probabilities.
To our best knowledge, this is the first work that studies the joint detection of jamming and spoofing in V2X systems.
\section{System model and problem formulation}
The system model depicted in Fig.~\ref{fig_SystemModel}, includes a single cell vehicular network consisting of a road side unit (RSU) located at $\mathrm{p}_{R}=[{x}_{R},{y}_{R}]$, a road side jammer (RSJ) located at $\mathrm{p}_{J}=[{x}_{J},{y}_{J}]$, a road side spoofer (RSS) located at $\mathrm{p}_{s}=[{x}_{s},{y}_{s}]$ and $N$ vehicles moving along multi-lane road in an urban area. The time-varying positions of the $n$-th vehicle is given by $\mathrm{p}_{n,t}=[{x}_{n,t},{y}_{n,t}]$ where $n \in N$. Among the $K$ orthogonal subchannels available for the Vehicle-to-Infrastructure (V2I) communications, RSU assigns one V2I link to each vehicle. Each vehicle exchanges messages composed of the vehicle's state (i.e., position and velocity) with RSU through the $k$-th V2I link by transmitting a signal $\textrm{x}_{t,k}$ carrying those messages at each time instant $t$ where $k \in K$. We consider a reactive RSJ that aims to attack the V2I link by injecting intentional interference to the communication link between vehicles and RSU to alter the transmitted signals by the vehicles. In contrast, the RSS purposes to mislead the vehicles by spoofing the GPS signal and so registering wrong GPS positions. RSU aims to detect both the spoofer on the satellite link and the jammer on multiple V2I links in order to take effective actions and protect the vehicular network.
The joint GPS spoofing and jamming detection problem can be formulated as the following ternary hypothesis test:
\begin{equation}
\begin{cases}
\mathcal{H}_{0}: \mathrm{z}_{t,k} = \mathrm{g}_{t,k}^{nR} \mathrm{x}_{t,k} + \mathrm{v}_{t,k}, \\
\mathcal{H}_{1}: \mathrm{z}_{t,k} = \mathrm{g}_{t,k}^{nR} \mathrm{x}_{t,k} + \mathrm{g}_{t,k}^{JR} \mathrm{x}_{t,k}^{j} + \mathrm{v}_{t,k}, \\
\mathcal{H}_{2}: \mathrm{z}_{t,k} = \mathrm{g}_{t,k}^{nR} \mathrm{x}_{t,k}^{*} + \mathrm{v}_{t,k},
\end{cases}
\end{equation}
where $\mathcal{H}_{0}$, $\mathcal{H}_{1}$ and $\mathcal{H}_{2}$ denote three hypotheses corresponding to the absence of both jammer and spoofer, the presence of the jammer, and the presence of the spoofer, respectively. $\textrm{z}_{t,k}$ is the received signal at the RSU at $t$ over the $k$-th V2I link, $\textrm{g}_{t,k}^{nR}$ is the channel power gain from vehicle $n$ to the RSU formulated as: $\textrm{g}_{t,k}^{nR} = \alpha_{t,k}^{nR} \mathrm{h}_{t,k}^{nR}$, where $\alpha_{t,k}^{nR}$ is the large-scale fading including path-loss and shadowing modeled as \cite{8723178}: $\alpha_{t,k}^{nR}=G\beta d_{t,nR}^{-\gamma}$.
\begin{figure}[t!]
\centering
\includegraphics[height=5.3cm]{Figures/SystemModel_V1.pdf}
\caption{An illustration of the system model.}
\label{fig_SystemModel}
\end{figure}
$G$ is the pathloss constant, $\beta$ is a log normal shadow fading random variable, $d_{t,nR}=\sqrt{({x}_{n,t}-x_{R})^{2}+({y}_{n,t}-y_{R})^{2}}$ is the distance between the $n$-th vehicle and the RSU. $\gamma$ is the power decay exponent and
$\mathrm{h}_{t,k}$ is the small-scale fading component distributed according to $\mathcal{CN}(0,1)$. In addition, $\mathrm{x}_{t,k}$ is the desired signal transmitted by the $n$-th vehicle, and $\mathrm{v}_{t,k}$ is an additive white Gaussian noise with variance $\sigma_{n}^{2}$. $\mathrm{x}_{t,k}^{J}$ is the jamming signal, $\mathrm{x}_{t,k}^{*}$ is the spoofed signal (i.e., the signal that carries the bits related to the wrong GPS positions), $\mathrm{g}_{t,k}^{JR} = \alpha_{t,k}^{JR} \mathrm{h}_{t,k}^{JR}$ is the channel power gain from RSJ to RSU where $\alpha_{t,k}^{JR}=G\beta d_{t,JR}^{-\gamma}$ such that $d_{t,JR}=\sqrt{({x}_{J}-x_{R})^{2}+({y}_{J}-y_{R})^{2}}$.
We assume that the channel state information (CSI) of V2I links is known and can be estimated at the RSU as in \cite{8345717}.
The RSU is equipped with an RF antenna which can track the vehicles' trajectories after decoding the received RF signals. RSU aims to learn the interaction between the RF signals received from multiple vehicles and their corresponding trajectories.
\section{Proposed method for joint detection of GPS spoofing and jamming}
\subsection{Environment Representation}
The RSU is receiving RF signals from each vehicle and tracking its trajectory (which we refer to as GPS signal) by decoding and demodulating the received RF signals.
The Generalized state-space model describing the $i$-th signal evolvement at multiple levels embodies the following equations:
\begin{equation} \label{eq_discreteLevel}
\mathrm{\Tilde{S}_{t}}^{(i)} = \mathrm{f}(\mathrm{\Tilde{S}_{t-1}}^{(i)}) + \mathrm{\tilde{w}}_{t},
\end{equation}
\begin{equation} \label{eq_continuousLevel}
\mathrm{\Tilde{X}_{t}}^{(i)} = \mathrm{A} \mathrm{\Tilde{X}_{t-1}}^{(i)} + \mathrm{B} \mathrm{U}_{\mathrm{\Tilde{S}_{t}}^{(i)}} + \mathrm{\tilde{w}}_{t},
\end{equation}
\begin{equation} \label{eq_observationLevel}
\mathrm{\Tilde{Z}_{t}}^{(i)} = \mathrm{H} \mathrm{\Tilde{X}_{t}}^{(i)} + \mathrm{\tilde{v}}_{t},
\end{equation}
where $i \in \{$RF, GPS$\}$ indicates the type of signal received by the RSU. The transition system model defined in \eqref{eq_discreteLevel} explains the evolution of the discrete random variables $\mathrm{\Tilde{S}_{t}}^{(i)}$ representing the clusters of the RF (or GPS) signal dynamics, $\mathrm{f}(.)$ is a non linear function of its argument and the additive term $\mathrm{\tilde{w}}_{t}$ denotes the process noise. The dynamic model defined in \eqref{eq_continuousLevel} explains the RF signal dynamics evolution or the motion dynamics evolution of the $n$-th vehicle, where $\mathrm{\Tilde{X}_{t}}^{(i)}$ are hidden continuous variables generating sensory signals, $\mathrm{A} \in \mathbb{R}^{2d}$ and $\mathrm{B} \in \mathbb{R}^{2d}$ are the dynamic and control matrices, respectively, and $\mathrm{U}_{\mathrm{\Tilde{S}_{t}}^{(i)}}$ is the control vector representing the dynamic rules of how the signals evolve with time. The measurement model defined in \eqref{eq_observationLevel} describes dependence of the sensory signals $\mathrm{\Tilde{Z}_{t}}^{(i)}$ on the hidden states $\mathrm{\Tilde{X}_{t}}^{(i)}$ that is parametrized by the measurement matrix $\mathrm{B} \in \mathbb{R}^{2d}$ where $d$ stands for the data dimensionality and $\mathrm{\tilde{v}}_{t}$ is a random noise.
\subsection{Learning GDBN}
The hierarchical dynamic models defined in \eqref{eq_discreteLevel}, \eqref{eq_continuousLevel} and \eqref{eq_observationLevel} are structured in a Generalized Dynamic Bayesian Network (GDBN) \cite{9858012} as shown in Fig.~\ref{fig_GDBN_CGDBN}-(a) that provides a probabilistic graphical model expressing the conditional dependencies among random hidden variables and observable states. The generative process explaining how sensory signals have been generated can be factorized as:
\begin{equation} \label{eq_generative_process}
\begin{split}
\mathrm{P}(\mathrm{\tilde{Z}}_{t}^{(i)}, \mathrm{\tilde{X}}_{t}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)}) = \mathrm{P}(\mathrm{\tilde{S}}_{0}^{(i)}) \mathrm{P}(\mathrm{\tilde{X}}_{0}^{(i)}) \\ \bigg[ \prod_{t=1}^{\mathrm{T}} \mathrm{P}(\mathrm{\tilde{Z}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t}^{(i)}) \mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t-1}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)}) \mathrm{P}(\mathrm{\tilde{S}}_{t}^{(i)}|\mathrm{\tilde{S}}_{t-1}^{(i)}) \bigg],
\end{split}
\end{equation}
where $\mathrm{P}(\mathrm{\tilde{S}}_{0}^{(i)})$ and $\mathrm{P}(\mathrm{\tilde{X}}_{0}^{(i)})$ are initial prior distributions, $\mathrm{P}(\mathrm{\tilde{Z}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t}^{(i)})$ is the likelihood, $\mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t-1}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)})$ and $\mathrm{P}(\mathrm{\tilde{S}}_{t}^{(i)}|\mathrm{\tilde{S}}_{t-1}^{(i)})$ are the transition densities describing the temporal and hierarchical dynamics of the generalized state-space model.
The generative process defined in \eqref{eq_generative_process} indicates the cause-effect relationships the model impose on the random variables $\mathrm{\tilde{S}}_{t}^{(i)}$, $\mathrm{\tilde{X}}_{t}^{(i)}$ and $\mathrm{\tilde{Z}}_{t}^{(i)}$ forming a chain of causality describing how one state contributes to the production of another state which is represented by the link $\mathrm{\tilde{S}}_{t}^{(i)} \rightarrow \mathrm{\tilde{X}}_{t}^{(i)} \rightarrow \mathrm{\tilde{Z}}_{t}^{(i)}$.
The RSU starts perceiving the environment using a static assumption about the environmental states evolution by assuming that sensory signals are only subject to random noise. Hence, RSU predicts the RF signal (or vehciles trajectory) using the following simplified model:
$\mathrm{\tilde{X}}_{t}^{(i)} = \mathrm{A} \mathrm{\tilde{X}}_{t-1}^{(i)} + \mathrm{\tilde{w}}_{t}$,
that differs from \eqref{eq_continuousLevel} in the control vector $\mathrm{U}_{\mathrm{\Tilde{S}_{t}}^{(i)}}$ which is supposed to be null, i.e., $\mathrm{U}_{\mathrm{\Tilde{S}_{t}}^{(i)}} = 0$ as the dynamic rules explaining how the environmental states evolve with time are not discovered yet.
Those rules can be discovered by exploiting the generalized errors (GEs), i.e., the difference between predictions and observations. The GEs projected into the measurement space are calculated as:
$\tilde{\varepsilon}_{\mathrm{\tilde{Z}}_{t}^{(i)}}^{} = \mathrm{\tilde{Z}}_{t}^{(i)} - \mathrm{H} \mathrm{\tilde{X}}_{t}^{(i)}$.
Projecting $\tilde{\varepsilon}_{\mathrm{\tilde{Z}}_t}^{}$ back into the generalized state space can be done as follows:
\begin{equation}\label{GE_continuousLevel_initialModel}
\tilde{\varepsilon}_{\mathrm{\tilde{X}}_t}^{(i)} = \mathrm{H}^{-1}\tilde{\varepsilon}_{\mathrm{\tilde{Z}}_{t}^{(i)}}^{}=\mathrm{H}^{-1}(\mathrm{\tilde{Z}}_{t}^{(i)}-\mathrm{H}\mathrm{\tilde{X}}_{t}^{(i)}) = \mathrm{H}^{-1}\mathrm{\tilde{Z}}_{t}^{(i)} - \mathrm{\tilde{X}}_{t}^{(i)}.
\end{equation}
The GEs defined in \eqref{GE_continuousLevel_initialModel} can be grouped into discrete clusters in an unsupervised manner by employing the Growing Neural Gas (GNG). The latter produces a set of discrete variables (clusters) denoted by:
$\mathbf{\tilde{S}^{(i)}}=\{\mathrm{\tilde{S}}_{1}^{(i)},\mathrm{\tilde{S}}_{2}^{(i)},\dots,\mathrm{\tilde{S}}_{M_{i}}^{(i)}\}$,
where $M_{i}$ is the total number of clusters and each cluster $\mathrm{\tilde{S}}_{m}^{(i)} \in \mathbf{\tilde{S}^{(i)}}$ follows a Gaussian distribution composed of GEs with homogeneous properties, such that $\mathrm{\tilde{S}}_{m}^{(i)} \sim \mathcal{N}(\tilde{\mu}_{\mathrm{\tilde{S}}_{m}^{(i)}}=[\mu_{\tilde{S}_{m}^{(i)}}, \Dot{\mu}_{\tilde{S}_{m}^{(i)}}], \Sigma_{\mathrm{\tilde{S}}_{m}^{(i)}})$.
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.40\linewidth}
\centering
\includegraphics[width=2.5cm]{Figures/GDBN.pdf}
\\[-1.0mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{.50\linewidth}
\centering
\includegraphics[width=5.0cm]{Figures/C_GDBN.pdf}
{\scriptsize (b)}
\end{minipage}
\caption{(a) The GDBN. (b) The coupled GDBN (C-GDBN) composed of two GDBNs representing the two signals received at the RSU where their discrete hidden variables are stochastically coupled.}
\label{fig_GDBN_CGDBN}
\end{center}
\end{figure}
The dynamic transitions of the sensory signals among the available clusters can be captured in a time-varying transition matrix ($\Pi_{\tau}$) by estimating the time-varying transition probabilities $\pi_{ij}=\mathrm{P}(\mathrm{\tilde{S}}_{t}^{(i)}=i|\mathrm{\tilde{S}}_{t-1}^{(i)}=j, \tau)$ where $\tau$ is the time spent in $\mathrm{\tilde{S}}_{t-1}^{(i)}=j$ before transition to $\mathrm{\tilde{S}}_{t}^{(i)}=i$.
\subsection{Learning Coupled GDBN (C-GDBN)}
The learning procedure described in the previous section can be executed for each signal type, i.e., RF and GPS. After learning a separated GDBN model for each signal type, we analyse the interaction behaviour between RF signal and GPS signal received at the RSU by tracking the cluster firing among $\mathbf{\tilde{S}^{(1)}}$ and $\mathbf{\tilde{S}^{(2)}}$ during a certain experience. Such an interaction can be encoded in a Coupled GDBN (C-GDBN) as shown in Fig.\ref{fig_GDBN_CGDBN}-(b) composed of the two GDBNs representing the two signals where their hidden variables at the discrete level are stochastically coupled (in $\mathrm{\tilde{C}}_{t}{=}[\mathrm{\tilde{S}}_{t}^{(1)},\mathrm{\tilde{S}}_{t}^{(2)}]$) as those variables are uncorrelated but have coupled means.
The interactive matrix $\Phi \in \mathbb{R}^{M_{1},M_{2}}$ encodes the firing cluster pattern allowing to predict the GPS signal from RF signal is defined as follows:
\begin{equation} \label{interactiveTM_fromRFtoGPS}
\Phi =
\begin{bmatrix}
\mathrm{P}(\mathrm{\Tilde{S}_{1}}^{(2)}|\mathrm{\Tilde{S}_{1}}^{(1)}) & \mathrm{P}(\mathrm{\Tilde{S}_{2}}^{(2)}|\mathrm{\Tilde{S}_{1}}^{(1)}) & \dots & \mathrm{P}(\mathrm{\Tilde{S}_{M_{2}}}^{(2)}|\mathrm{\Tilde{S}_{1}}^{(1)}) \\
\mathrm{P}(\mathrm{\Tilde{S}_{1}}^{(2)}|\mathrm{\Tilde{S}_{2}}^{(1)}) & \mathrm{P}(\mathrm{\Tilde{S}_{2}}^{(2)}|\mathrm{\Tilde{S}_{2}}^{(1)}) & \dots & \mathrm{P}(\mathrm{\Tilde{S}_{M_{2}}}^{(2)}|\mathrm{\Tilde{S}_{2}}^{(1)}) \\
\vdots & \vdots & \ddots & \vdots \\
\mathrm{P}(\mathrm{\Tilde{S}_{1}}^{(2)}|\mathrm{\Tilde{S}_{M_{1}}}^{(1)}) & \mathrm{P}(\mathrm{\Tilde{S}_{2}}^{(2)}|\mathrm{\Tilde{S}_{M_{1}}}^{(1)}) & \dots & \mathrm{P}(\mathrm{\Tilde{S}_{M_{2}}}^{(2)}|\mathrm{\Tilde{S}_{M_{1}}}^{(1)})
\end{bmatrix}.
\end{equation}
\subsection{Joint Prediction and Perception}
RSU starts predicting the RF signals it expects to receive from each vehicle based on a Modified Markov Jump Particle Filter (M-MJPF) \cite{9858012} that combines Particle filter (PF) and Kalman filter (KF) to perform temporal and hierarchical predictions. Since the acquired C-GDBN allows predicting a certain signal's dynamic evolution based on another's evolution, it requires an interactive Bayesian filter capable of dealing with more complicated predictions. To this purpose, we propose to employ an Interactive M-MJPF (IM-MJPF) on the C-GDBN. The IM-MJPF consists of a PF that propagates a set of $L$ particles equally weighted, such that $\{\mathrm{\tilde{S}}_{t,l}^{(1)}, \mathrm{W}_{t,l}^{(1)}\}{\sim}\{\pi(\mathrm{\tilde{S}}_{t}^{(1)}), \frac{1}{L}\}$, where $\mathrm{\tilde{S}}_{t,l}^{(1)}$, $l \in L$ and $(.^{(1)})$ is the RF signal type. In addition, RSU relies on $\Phi$ defined in \eqref{interactiveTM_fromRFtoGPS} to predict $\mathrm{\tilde{S}}_{t}^{(2)}$ realizing the discrete cluster of vehicle's trajectory starting from the predicted RF signal according to: $\{\mathrm{\tilde{S}}_{t}^{(2)},\mathrm{W}_{t,l}^{(2)}\}{\sim} \{\Phi(\mathrm{\tilde{S}}_{t,l}^{(1)}){=}\mathrm{P}(.|\mathrm{\tilde{S}}_{t,l}^{(1)}), \mathrm{W}_{t,l}^{(2)}\}$. For each predicted discrete variable $\mathrm{\tilde{S}}_{t,l}^{(i)}$, a multiple KF is employed to predict multiple continuous variables which guided by the predictions at the higher level as declared in \eqref{eq_continuousLevel} that can be represented probabilistically as $\mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t-1}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)})$. The posterior probability that is used to evaluate expectations is given by:
\begin{multline} \label{piX}
\pi(\mathrm{\tilde{X}}_{t}^{(i)})=\mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)},\mathrm{\tilde{S}}_{t}^{(i)}|\mathrm{\tilde{Z}}_{t-1}^{(i)})= \\ \int \mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)}|\mathrm{\tilde{X}}_{t-1}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)}) \lambda(\mathrm{\tilde{X}}_{t-1}^{(i)})d\mathrm{\tilde{X}}_{t-1}^{(i)},
\end{multline}
where $\lambda(\mathrm{\tilde{X}}_{t-1}^{(i)}){=}\mathrm{P}(\mathrm{\tilde{Z}}_{t-1}^{(i)}|\mathrm{\tilde{X}}_{t-1}^{(i)})$.
The posterior distribution can be updated (and so representing the updated belief) after having seen the new evidence $\mathrm{\tilde{Z}}_{t}^{(i)}$ by exploiting the diagnostic message $\lambda(\mathrm{\tilde{X}}_{t}^{(i)})$ in the following form: $\mathrm{P}(\mathrm{\tilde{X}}_{t}^{(i)}, \mathrm{\tilde{S}}_{t}^{(i)}|\mathrm{\tilde{Z}}_{t}^{(i)}) {=} \pi(\mathrm{\tilde{X}}_{t}^{(i)})\lambda(\mathrm{\tilde{X}}_{t}^{(i)})$. Likewise, belief in discrete hidden variables can be updated according to: $\mathrm{W}_{t,l}^{(i)}{=}\mathrm{W}_{t,l}^{(i)}\lambda (\mathrm{\tilde{S}}_{t}^{(i)})$ where:
$\lambda (\mathrm{\tilde{S}}_{t}^{(i)}) {=} \lambda (\mathrm{\Tilde{X}}_{t}^{(i)})\mathrm{P}(\mathrm{\Tilde{X}}_{t}^{(i)}|\mathrm{\tilde{S}}_{t}^{(i)}) {=} \mathrm{P}(\mathrm{\tilde{Z}}_{t}^{(i)}|\mathrm{\Tilde{X}}_{t}^{(i)})\mathrm{P}(\mathrm{\Tilde{X}}_{t}^{(i)}|\mathrm{\tilde{S}}_{t}^{(i)})$.
\subsection{Joint GPS spoofing and jamming detection}
RSU can evaluate the current situation and identify if V2I is under attack, or the satellite link is under spoofing based on a multiple abnormality indicator produced by the IM-MJPF. The first indicator calculates the similarity between the predicted RF signal and the observed one, which is defined as:
\begin{equation}\label{eq_CLA1}
\Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}} = -ln \bigg( \mathcal{BC} \big(\pi(\mathrm{\tilde{X}}_{t}^{(1)}),\lambda(\mathrm{\tilde{X}}_{t}^{(1)}) \big) \bigg),
\end{equation}
where $\mathcal{BC}(.){=}\int \sqrt{\pi(\mathrm{\tilde{X}}_{t}^{(1)}),\lambda(\mathrm{\tilde{X}}_{t}^{(1)}})d\mathrm{\tilde{X}}_{t}^{(1)}$ is the Bhattacharyya coefficient.
The second indicator calculates the similarity between the predicted GPS signal (from the RF signal) and the observed one after decoding the RF signal which is defined as:
\begin{equation}\label{eq_CLA2}
\Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} = -ln \bigg( \mathcal{BC} \big(\pi(\mathrm{\tilde{X}}_{t}^{(2)}),\lambda(\mathrm{\tilde{X}}_{t}^{(2)}) \big) \bigg),
\end{equation}
where $\mathcal{BC}(.){=}\int \sqrt{\pi(\mathrm{\tilde{X}}_{t}^{(2)}),\lambda(\mathrm{\tilde{X}}_{t}^{(2)}})d\mathrm{\tilde{X}}_{t}^{(2)}$.
Different hypotheses can be identified by the RSU to understand the current situation whether there is: a jammer attacking the V2I link, or a spoofer attacking the link between the satellite and the vehicle or both jammer and spoofer are absent according to:
\begin{equation}
\begin{cases}
\mathcal{H}_{0}: \text{if} \ \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}} < \xi_{1} \ \text{and} \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} < \xi_{2}, \\
\mathcal{H}_{1}: \text{if} \ \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}} \geq \xi_{1} \ \text{and} \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} \geq \xi_{2}, \\
\mathcal{H}_{2}: \text{if} \ \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}} < \xi_{1} \ \text{and} \ \Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} \geq \xi_{2},
\end{cases}
\end{equation}
where $\xi_{1} = \mathbb{E}[\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(1)}}] + 3\sqrt{\mathbb{V}[\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(1)}}]}$, and $\xi_{2} = \mathbb{E}[\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(2)}}] + 3\sqrt{\mathbb{V}[\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(2)}}]}$. In $\xi_{1}$ and $\xi_{2}$, $\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(1)}}$ and $\Bar{\Upsilon}_{\mathrm{\tilde{X}}_{t}^{(2)}}$ stand for the abnormality signals during training (i.e., normal situation when jammer and spoofer are absent).
\subsection{Evaluation metrics}
In order to evaluate the performance of the proposed method to jointly detect jammer and GPS spoofer, we adopt the jammer detection probability ($\mathrm{P}_{d}^{j}$) and the spoofer detection probability ($\mathrm{P}_{d}^{s}$), respectively, which are defined as:
\begin{equation}
\mathrm{P}_{d}^{j} = \mathrm{Pr}(\Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}}\geq \xi_{1}, \Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} \geq \xi_{2}|\mathcal{H}_{1}),
\end{equation}
\begin{equation}
\mathrm{P}_{d}^{s} = \mathrm{Pr}(\Upsilon_{\mathrm{\tilde{X}}_{t}^{(1)}}< \xi_{1}, \Upsilon_{\mathrm{\tilde{X}}_{t}^{(2)}} \geq \xi_{2}|\mathcal{H}_{2}).
\end{equation}
Also, we evaluate the accuracy of the proposed method in predicting and estimating the vehicles' trajectories and the expected RF signals by adopting the root mean square error (RMSE) defined as:
\begin{equation}
RMSE = \sqrt{ \frac{1}{T} \sum_{t=1}^{T}\bigg( \mathrm{\tilde{Z}}_{t}^{(i)}-\mathrm{\tilde{X}}_{t}^{(i)} \bigg)^{2} },
\end{equation}
where $T$ is the total number of predictions.
\section{Simulation Results}
In this section, we evaluate the performance of the proposed method to jointly detect the jammer and the spoofer using extensive simulations. We consider $\mathrm{N}=2$ vehicles interacting inside the environment and exchanging their states (i.e., position and velocity) with the RSU. The vehicles move along predefined trajectories performing various maneuvers which are picked from the \textit{Lankershim} dataset proposed by \cite{5206559}. The dataset depicts a four way intersection and includes about $19$ intersection maneuvers. RSU assigns one subchannel realizing the V2I link for each vehicle over which the vehicles' states are transmitted. The transmitted signal carrying the vehicle's state and the jamming signal are both QPSK modulated.
The simulation settings are: carrier frequency of $2$GHz, BW${=}1.4$MHz, cell radius of $500$m, RSU antenna height and gain is $25$m and $8$ dBi, receiver noise figure of $5$dB, vehicle antenna height and gain is $1.5$m and $3$dBi, vehicle speed is $40$Km/h, V2I transmit power is $23$dBm, jammer transmit power ranging from $20$dBm to $40$dBm, SNR of $20$dB, path loss model ($128.1{+}37.6log d$), Log-normal shadowing with $8$dB standard deviation and a fast fading channel following the Rayleigh distribution.
\begin{figure}[ht!]
\begin{center}
\begin{minipage}[b]{.55\linewidth}
\centering
\includegraphics[width=5.0cm]{Results/ObservedTrajectories_reference}
\\[-1.5mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/ObservedRFsignal_Veh1_reference}
\\[-1.5mm]
{\scriptsize (b)}
\end{minipage}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/ObservedRFsignal_Veh2_reference}
\\[-1.5mm]
{\scriptsize (c)}
\end{minipage}
\caption{An example visualizing the received RF signals from the two vehicles and the corresponding trajectories: (a) Vehicles' trajectories, (b) received RF signal from vehicle 1, (c) received RF signal from vehicle 2.}
\label{fig_receivedRFsignalandTrajectory}
\end{center}
\end{figure}
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/clusters_trajectory_veh1}
\\[-1.5mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/clusters_trajectory_veh2}
\\[-1.5mm]
{\scriptsize (b)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/clusters_RFsignal_veh1}
\\[-1.5mm]
{\scriptsize (c)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/clusters_RFsignal_veh2}
\\[-1.5mm]
{\scriptsize (d)}
\end{minipage}
\caption{GNG output after clustering the generalized errors obtained from different experiences: (a) clustered trajectory of vehicle 1, (b) clustered trajectory of vehicle 2, (c) clustered RF signal received from vehicle 1, (d) clustered RF signal received from vehicle 2.}
\label{fig_GNG_of_receivedRFsignalandTrajectory}
\end{center}
\end{figure}
The RSU aims to learn multiple interactive models (i.e., C-GDBN models) encoding the cross relationship between the received RF signal from each vehicle and its corresponding trajectory. These models allow the RSU to predict the trajectory the vehicle will follow based on the received RF signal and evaluate whether the V2I is under jamming attacks or the satellite link is under spoofing. It is to note that the RSU is receiving only the RF signals from the two vehicles and obtaining their positions after decoding the RF signals. Thus, the RSU should be able to evaluate if the received RF signals are evolving according to the dynamic rules learned so far and if the vehicles are following the expected (right) trajectories to decide whether the V2I links are really under attack or whether the satellite link is under spoofing.
Fig.~\ref{fig_receivedRFsignalandTrajectory}-(a) illustrates an example of the interaction between the two vehicles performing a particular manoeuvre, and Fig.~\ref{fig_receivedRFsignalandTrajectory}-(b) shows the received RF signals by the RSU from the two vehicles. At the beginning of the learning process, RSU performs predictions according to the simplified model defined in \eqref{eq_continuousLevel} where $\mathrm{U}_{\mathrm{\Tilde{S}_{t}}^{(i)}} {=} 0$.
After obtaining the generalized errors as pointed out in \eqref{GE_continuousLevel_initialModel}, RUS clusters those errors using GNG to learn two GDBN models encoding the dynamic rules of how the RF signal and the GPS signal evolve with time, respectively, as showed in Fig.~\ref{fig_GNG_of_receivedRFsignalandTrajectory} and Fig.~\ref{fig_graphicalRep_transitionMatrices}. RSU can couple the two GDBNs by learning the interactive transition matrix that is encoded in a C-GDBN as shown in Fig.~\ref{fig_interactiveMatrices}.
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/graphTransition_Trajectory_veh1}
\\[-1.5mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/graphTransition_Trajectory_veh2}
\\[-1.5mm]
{\scriptsize (b)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/graphTransition_RFsignal_veh1}
\\[-1.5mm]
{\scriptsize (c)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.5cm]{Results/graphTransition_RFsignal_veh2}
\\[-1.5mm]
{\scriptsize (d)}
\end{minipage}
\caption{Graphical representation of the transition matrices (TM): (a) TM related to the trajectory of vehicle 1, (b) TM related to the trajectory of vehicle 2, (c) TM related to the RF signal received from vehicle 1, (d) TM related to the RF signal received from vehicle 2.}
\label{fig_graphicalRep_transitionMatrices}
\end{center}
\end{figure}
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=3.8cm]{Results/interactiveMatrix_RFtoGPS_Neu5_veh1}
\\[-1.0mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=3.8cm]{Results/interactiveMatrix_RFtoGPS_Neu25_veh1}
\\[-1.0mm]
{\scriptsize (d)}
\end{minipage}
\caption{Interactive transition matrix defined in \eqref{interactiveTM_fromRFtoGPS} using different configurations: (a) $\mathrm{M_{1}}=5$, $\mathrm{M_{2}}=5$, (b) $\mathrm{M_{1}}=25$, $\mathrm{M_{2}}=25$.}
\label{fig_interactiveMatrices}
\end{center}
\end{figure}
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/RF_situation1_best_veh1}
\\[-1.5mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/RF_situation1_worst_veh1}
\\[-1.5mm]
{\scriptsize (b)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/RF_situation1_best_veh2}
\\[-1.5mm]
{\scriptsize (c)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.9cm]{Results/RF_situation1_worst_veh2}
\\[-1.5mm]
{\scriptsize (d)}
\end{minipage}
\caption{An example visualizing the predicted and observed RF signals transmitted by the 2 vehicles using different configurations. Predicted RF signal from: (a) vehicle 1 using $\mathrm{M_{1}}{=}5$, $\mathrm{M_{2}}{=}5$, (b) vehicle 1 using $\mathrm{M_{1}}{=}25$, $\mathrm{M_{2}}{=}25$, (c) vehicle 2 using $\mathrm{M_{1}}{=}5$, $\mathrm{M_{2}}{=}5$, (d) vehicle 2 using $\mathrm{M_{1}}{=}25$, $\mathrm{M_{2}}{=}25$.}
\label{fig_situation1_PredictedRF}
\end{center}
\end{figure}
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.8cm]{Results/GPSfromRF_situation1_best}
\\[-1.0mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.8cm]{Results/GPSfromRF_situation1_worst}
\\[-1.0mm]
{\scriptsize (b)}
\end{minipage}
%
\caption{An example visualizing the predicted and observed trajectories of two vehicles interacting in the environment. (a) $\mathrm{M_{1}}{=}5$, $\mathrm{M_{2}}{=}5$, (b) $\mathrm{M_{1}}{=}25$, $\mathrm{M_{2}}{=}25$.}
\label{fig_situation1_VehiclesTrajectories}
\end{center}
\end{figure}
\begin{figure}[ht!]
\begin{center}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=4.8cm]{Results/rmse_on_trajectory}
\\[-1.0mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{0.49\linewidth}
\centering
\includegraphics[width=4.8cm]{Results/rmse_on_RFSignal}
\\[-1.0mm]
{\scriptsize (b)}
\end{minipage}
\caption{The average RMSE after testing different experiences and examples of: (a) trajectories and (b) RF signals.}
\label{fig_rmse_onTraj_onSig}
\end{center}
\end{figure}
Fig.~\ref{fig_situation1_PredictedRF} illustrates an example comparing between predicted RF signals and observed ones based on two different configurations in learning the interactive matrix (as shown in Fig.~\ref{fig_interactiveMatrices}). Also, Fig.~\ref{fig_situation1_VehiclesTrajectories} illustrates an example comparing between the predicted and observed trajectories of the two vehicles using the two interactive matrices depicted in Fig.~\ref{fig_interactiveMatrices}. From Fig.~\ref{fig_situation1_PredictedRF} and Fig.~\ref{fig_situation1_VehiclesTrajectories} we can see that using an interactive matrix with less clusters allows to perform better predictions compared to that with more clusters. This can be validated by observing Fig.~\ref{fig_rmse_onTraj_onSig} that illustrates the RMSE values versus different number of clusters related to the two models representing the dynamics of the received RF signals and the vehicles' trajectories. It can be seen that as the number of clusters increases the RMSE error increases, since adding more clusters decreases the firing probability that explains the possibility to be in one of the $M_{2}$ clusters of the second model conditioned in being in a certain cluster of the first model.
Fig.~\ref{fig_exNormal_Spoofed_JammedTrajectories} illustrates an example of vehicle's trajectory under normal situation (i.e., jammer and spoofer are absent), under jamming attacks and under spoofing attacks. Also the figure shows the predicted trajectory which should follow the same dynamic rules learned during a normal situation. After that, we implemented the IM-MJPF on the learned C-GDBN to perform multiple predictions, i.e., to predict the RF signal that the RSU is expecting to receive from a certain vehicle and the corresponding trajectory that the vehicle is supposed to follow. IM-MJPF through the comparison between multiple predictions and observations, produces multiple abnormality signals as defined in \eqref{eq_CLA1} and \eqref{eq_CLA2} which are used to detect the jammer and the spoofer.
Fig.~\ref{fig_abnormalitySignals_JammerSpoofer} illustrates the multiple abnormality signals related to the example shown in Fig.~\ref{fig_exNormal_Spoofed_JammedTrajectories}. We can observe that the abnormal signals related to both RF signal (Fig.~\ref{fig_abnormalitySignals_JammerSpoofer}-(a)) and trajectory (Fig.~\ref{fig_abnormalitySignals_JammerSpoofer}-(b)) are below the threshold under normal situations. This proves that RSU learned the correct dynamic rules of how RF signals and trajectories evolve when the jammer and spoofer are absent (i.e., under normal situations). Also, we can see that the RSU can notice a high deviation on both the RF signal and the corresponding trajectory due to a jamming interference from what it has learned so far by relying on the abnormality signals. In contrast, we can see that under spoofing attacks, RSU notice a deviation only on the trajectory and not on the RF signal since the spoofer has affected only the positions without manipulating the RF signal. In addition, it is obvious how the proposed method allows the RSU to identify the type of abnormality occurring and to explain the cause of the detected abnormality (i.e., understanding if it was because of a jammer attacking the V2I link or a spoofer attacking the satellite link).
\begin{figure}[t!]
\centering
\includegraphics[width=6.5cm]{Results/trajectories_underJamming_andSpoofing}
\caption{Vehicle's trajectory under: normal situation, jamming and spoofing.}
\label{fig_exNormal_Spoofed_JammedTrajectories}
\end{figure}
\begin{figure}[t!]
\begin{center}
\begin{minipage}[b]{.92\linewidth}
\centering
\includegraphics[height=2.6cm]{Results/abnSignal_onRF}
\\[-1.5mm]
{\scriptsize (a)}
\end{minipage}
\begin{minipage}[b]{.92\linewidth}
\centering
\includegraphics[height=2.6cm]{Results/abnSignal_onGPS}
\\[-1.5mm]
{\scriptsize (b)}
\end{minipage}
%
\caption{Abnormality Signals related to the example shown in Fig.\ref{fig_exNormal_Spoofed_JammedTrajectories}: (a) abnormality indicators related to the RF signal, (b) abnormality indicators related to the trajectory.}
\label{fig_abnormalitySignals_JammerSpoofer}
\end{center}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[height=3.2cm]{Results/Detection_Probability_RFfromGPS_versusPj}
\caption{Detection probability ($\mathrm{P_{d}}$) versus jammer's power ($\mathrm{P_{J}}$) using different number of clusters $\mathrm{M}_{2}$.}
\label{fig_jammerDetectionProb}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[height=3.2cm]{Results/spoofingDetectionProbability_falseAlarm_versusM2}
\caption{Spoofing detection probability ($\mathrm{P}_{d}^{s}$) and spoofing false alarm ($\mathrm{P}_{f}^{s}$) versus the number of clusters $\mathrm{M}_{2}$.}
\label{fig_spooferDetectionProb}
\end{figure}
Fig.~\ref{fig_jammerDetectionProb} shows the overall performance of the proposed method in detecting the jammer by testing many situations and examples and by considering different jamming powers which ranges from $20$dBm to $40$dBm. It can be seen that the proposed method is able to detect the jammer with high probabilities (near $1$) and by considering low and high jamming powers. Also, the figure compares the performance in detecting the jammer by varying the number of clusters ($M_{2}$).
Fig.~\ref{fig_spooferDetectionProb} shows the overall performance of the proposed method in detecting the spoofer by testing different different examples of driving maneuvers. It can be seen that the RSU is able to detect the spoofer with high detection probability and null false alarm versus different number of clusters.
\section{Conclusion}
A joint detection method of GPS spoofing and jamming attacks is proposed. The method is based on learning a dynamic interactive model encoding the cross-correlation between the received RF signals from multiple vehicles and their corresponding trajectories. Simulation results show the high effectiveness of the proposed approach in jointly detecting the GPS spoofer and jammer attacks.
Subsequent work will extend the system model to consider more than two vehicles with different channel conditions and various modulation schemes to evaluate the effectiveness of the proposed method.
\bibliographystyle{IEEEtran}
|
[
"The generative interactive model used in the method is called the Coupled Generalized Dynamic Bayesian Network (C-GDBN)."
] | 4,482
|
multifieldqa_en
|
en
| null |
2d0e8d88c8dcd187eb0590fb072f6a69bd774c9aa029246b
|
What are some potential applications of ferromagnetic semiconductors?
|
\section{introduction}
In the past few years, the synthesis of ferromagnetic semiconductors has become a major challenge for spintronics. Actually, growing a magnetic and semiconducting material could lead to promising advances like spin injection into non magnetic semiconductors, or electrical manipulation of carrier induced magnetism in magnetic semiconductors \cite{ohno00,Bouk02}. Up to now, major efforts have focused on diluted magnetic semiconductors (DMS) in which the host semiconducting matrix is randomly substituted by transition metal (TM) ions such as Mn, Cr, Ni, Fe or Co \cite{Diet02}. However Curie temperatures ($T_{C}$) in DMS remain rather low and TM concentrations must be drastically raised in order to increase $T_{C}$ up to room temperature. That usually leads to phase separation and the formation of secondary phases. It was recently shown that phase separation induced by spinodal decomposition could lead to a significant increase of $T_{C}$ \cite{Diet06,Fuku06}. For semiconductors showing $T_{C}$ higher than room temperature one can foresee the fabrication of nanodevices such as memory nanodots, or nanochannels for spin injection. Therefore, the precise control of inhomogeneities appears as a new challenge which may open a way to industrial applications of ferromagnetism in semiconductors.
The increasing interest in group-IV magnetic semiconductors can also be explained by their potential compatibility with the existing silicon technology. In 2002, carrier mediated ferromagnetism was reported in MBE grown Ge$_{0.94}$Mn$_{0.06}$ films by Park \textit{et al.} \cite{Park02}. The maximum critical temperature was 116 K. Recently many publications indicate a significant increase of $T_{C}$ in Ge$_{1-x}$Mn$_{x}$ material depending on growth conditions \cite{Pint05,Li05,tsui03}. Cho \textit{et al.} reported a Curie temperature as high as 285 K \cite{Cho02}.
Taking into account the strong tendency of Mn ions to form intermetallic compounds in germanium, a detailed investigation of the nanoscale structure is required. Up to now, only a few studies have focused on the nanoscale composition in Ge$_{1-x}$Mn$_{x}$ films. Local chemical inhomogeneities have been recently reported by Kang \textit{et al.} \cite{Kang05} who evidenced a micrometer scale segregation of manganese in large Mn rich stripes. Ge$_3$Mn$_5$ as well as Ge$_8$Mn$_{11}$ clusters embedded in a germanium matrix have been reported by many authors. However, Curie temperatures never exceed 300 K \cite{Bihl06,Morr06,Pass06,Ahle06}. Ge$_3$Mn$_5$ clusters exhibit a Curie temperature of 296 K \cite{Mass90}. This phase frequently observed in Ge$_{1-x}$Mn$_{x}$ films is the most stable (Ge,Mn) alloy. The other stable compound Ge$_8$Mn$_{11}$ has also been observed in nanocrystallites surrounded with pure germanium \cite{Park01}. Ge$_8$Mn$_{11}$ and Ge$_3$Mn$_5$ phases are ferromagnetic but their metallic character considerably complicates their potential use as spin injectors.
Recently, some new Mn-rich nanostructures have been evidenced in Ge$_{1-x}$Mn$_{x}$ layers. Sugahara \textit{et al.} \cite{Sugh05} reported the formation of high Mn content (between 10 \% and 20 \% of Mn) amorphous Ge$_{1-x}$Mn$_x$ precipitates in a Mn-free germanium matrix. Mn-rich coherent cubic clusters were observed by Ahlers \textit{et al.} \cite{Ahle06} which exhibit a Curie temperatures below 200 K. Finally, high-$T_{C}$ ($>$ 400 K) Mn-rich nanocolumns have been evidenced \cite{Jame06} which could lead to silicon compatible room temperature operational devices.\\
In the present paper, we investigate the structural and magnetic properties of Ge$_{1-x}$Mn$_x$ thin films for low growth temperatures ($<$ 200$^{\circ}$C) and low Mn concentrations (between 1 \% and 11 \%). By combining TEM, x-Ray diffraction and SQUID magnetometry, we could identify different magnetic phases. We show that depending on growth conditions, we obtain either Mn-rich nanocolumns or Ge$_{3}$Mn$_{5}$ clusters embedded in a germanium matrix. We discuss the structural and magnetic properties of these nanostructures as a function of manganese concentration and growth temperature. We also discuss the magnetic anisotropy of nanocolumns and
Ge$_3$Mn$_5$ clusters.
\section{Sample growth}
Growth was performed using solid sources molecular beam epitaxy (MBE) by co-depositing Ge and Mn evaporated from standard Knudsen effusion cells. Deposition rate was low ($\approx$ 0.2 \AA.s$^{-1}$). Germanium substrates were epi-ready Ge(001) wafers with a residual n-type doping and resistivity of 10$^{15}$ cm$^{-3}$ and 5 $\Omega.cm$ respectively. After thermal desorption of the surface oxide, a 40 nm thick Ge buffer layer was grown at 250$^{\circ}$C, resulting in a 2 $\times$ 1 surface reconstruction as observed by reflection high energy electron diffraction (RHEED) (see Fig. 1a). Next, 80 nm thick Ge$_{1-x}$Mn$_{x}$ films were subsequently grown at low substrate temperature (from 80$^{\circ}$C to 200$^{\circ}$C). Mn content has been determined by x-ray fluorescence measurements performed on thick samples ($\approx$ 1 $\mu m$ thick) and complementary Rutherford Back Scattering (RBS) on thin Ge$_{1-x}$Mn$_{x}$ films grown on silicon. Mn concentrations range from 1 \% to 11\% Mn.
For Ge$_{1-x}$Mn$_{x}$ films grown at substrate temperatures below 180$^{\circ}$C, after the first monolayer (ML) deposition, the 2 $\times$ 1 surface reconstruction almost totally disappears. After depositing few MLs, a slightly diffuse 1 $\times$ 1 streaky RHEED pattern and a very weak 2 $\times$ 1 reconstruction (Fig. 1b) indicate a predominantly two-dimensional growth. For growth temperatures above 180$^{\circ}$C additional spots appear in the RHEED pattern during the Ge$_{1-x}$Mn$_{x}$ growth (Fig. 1c). These spots may correspond to the formation of very small secondary phase crystallites. The nature of these crystallites will be discussed below.
Transmission electron microscopy (TEM) observations were performed using a JEOL 4000EX microscope with an acceleration voltage of 400 kV. Energy filtered transmission electron microscopy (EFTEM) was done using a JEOL 3010 microscope equipped with a Gatan Image Filter . Sample preparation was carried out by standard mechanical polishing and argon ion milling for cross-section investigations and plane views were prepared by wet etching with H$_3$PO$_4$-H$_2$O$_2$ solution \cite{Kaga82}.
\begin{figure}[htb]
\center
\includegraphics[width=.29\linewidth]{./fig1a.eps}
\includegraphics[width=.29\linewidth]{./fig1b.eps}
\includegraphics[width=.29\linewidth]{./fig1c.eps}
\caption{RHEED patterns recorded during the growth of Ge$_{1-x}$Mn$_{x}$ films: (a) 2 $\times$ 1 surface reconstruction of the germanium buffer layer. (b) 1 $\times$ 1 streaky RHEED pattern obtained at low growth temperatures ($T_g<$180$^{\circ}$C). (c) RHEED pattern of a sample grown at $T_g=$180$^{\circ}$C. The additional spots reveal the presence of Ge$_3$Mn$_5$ clusters at the surface of the film.}
\label{fig1}
\end{figure}
\section{Structural properties \label{structural}}
\begin{figure}[htb]
\center
\includegraphics[width=.49\linewidth]{./fig2a.eps}
\includegraphics[width=.49\linewidth]{./fig2b.eps}
\includegraphics[width=.49\linewidth]{./fig2c.eps}
\includegraphics[width=.49\linewidth]{./fig2d.eps}
\caption{Transmission electron micrographs of a Ge$_{1-x}$Mn$_{x}$ film grown at 130$^{\circ}$C and containing 6 \% of manganese. (a) cross-section along the [110] axis : we clearly see the presence of nanocolumns elongated along the growth axis. (b) High resolution image of the interface between the Ge$_{1-x}$Mn$_{x}$ film and the Ge buffer layer. The Ge$_{1-x}$Mn$_{x}$ film exhibits the same diamond structure as pure germanium. No defect can be seen which could be caused by the presence of nanocolumns. (c) Plane view micrograph performed on the same sample confirms the columnar structure and gives the density and size distribution of nanocolumns. (d) Mn chemical map obtained by energy filtered transmission electron microcopy (EFTEM). The background was carefully substracted from pre-edge images. Bright areas correspond to Mn-rich regions.}
\label{fig2}
\end{figure}
In samples grown at 130$^{\circ}$C and containing 6 \% Mn, we can observe vertical elongated nanostructures \textit{i.e.} nanocolumns as shown in Fig. 2a. Nanocolumns extend through the whole Ge$_{1-x}$Mn$_{x}$ film thickness. From the high resolution TEM image shown in Fig. 2b, we deduce their average diameter around 3 nm. Moreover in Fig. 2b, the interface between the Ge buffer layer and the Ge$_{1-x}$Mn$_{x}$ film is flat and no defect propagates from the interface into the film. The Ge$_{1-x}$Mn$_{x}$ film is a perfect single crystal in epitaxial relationship with the substrate. In Fig. 2c is shown a plane view micrograph of the same sample confirming the presence of nanocolumns in the film. From this image, we can deduce the size and density of nanocolumns. The nanocolumns density is 13000 $\rm{\mu m}^{-2}$ with a mean diameter of 3 nm which is coherent with cross-section measurements. In order to estimate the chemical composition of these nanocolumns, we further performed chemical mapping using EFTEM. In Fig. 2d we show a cross sectional Mn chemical map of the Ge$_{1-x}$Mn$_{x}$ film. This map shows that the formation of nanocolumns is a consequence of Mn segregation. Nanocolumns are Mn rich and the surrounding matrix is Mn poor. However, it is impossible to deduce the Mn concentration in Ge$_{1-x}$Mn$_{x}$ nanocolumns from this cross section. Indeed, in cross section observations, the columns diameter is much smaller than the probed film thickness and the signal comes from the superposititon of the Ge matrix and Mn-rich nanocolumns. In order to quantify Mn concentration inside the nanocolumns and inside the Ge matrix, EELS measurements (not shown here) have been performed in a plane view geometry \cite{Jame06}. These observations revealed that the matrix Mn content is below 1 \% (detection limit of our instrument). Measuring the surface occupied by the matrix and the nanocolumns in plane view TEM images, and considering the average Mn concentration in the sample (6 \%), we can estimate the Mn concentration in the nanocolumns. The Mn concentration measured by EELS being between 0\% and 1\%, we can conclude that the Mn content in the nanocolumns is between 30 \% and 38 \%.\\
For samples grown between 80$^\circ$C and 150$^\circ$C cross section and plane view TEM observations reveal the presence of Mn rich nanocolumns surrounded with a Mn poor Ge matrix. In order to investigate the influence of Mn concentration on the structural properties of Ge$_{1-x}$Mn$_{x}$ films, ten samples have been grown at 100$^\circ$C and at 150$^\circ$C with Mn concentrations of 1.3 \%, 2.3 \%, 4 \%, 7 \% and 11.3 \%. Their structural properties have been investigated by plane view TEM observations.
\begin{figure}[htb]
\center
\includegraphics[width=.98\linewidth]{./fig3a.eps}
\includegraphics[width=.45\linewidth]{./fig3b.eps}
\includegraphics[width=.45\linewidth]{./fig3c.eps}
\caption{Nanocolumns size and density as a function of growth conditions. Samples considered have been grown at 100$^{\circ}$C and 150$^{\circ}$C respectively. (a) Mn concentration dependence of the size distribution. (b) columns density as a function of Mn concentration. (c) Volume fraction of the nanocolumns as a function of Mn concentration.}
\label{fig3}
\end{figure}
For samples grown at 100$^\circ$C with Mn concentrations below 5 \% the nanocolumns mean diameter is 1.8$\pm$0.2 nm. The evolution of columns density as a fonction of Mn concentration is reported in figure 3b. By increasing the Mn concentration from 1.3 \% to 4 \% we observe a significant increase of the columns density from 13000 to 30000 $\rm{\mu m}^{-2}$. For Mn concentrations higher than 5 \% the density seems to reach a plateau corresponding to 35000 $\rm{\mu m}^{-2}$ and their diameter slightly increases from 1.8 nm at 4 \% to 2.8 nm at 11.3 \%. By plotting the volume fraction occupied by the columns in the film as a function of Mn concentration, we observe a linear dependence for Mn contents below 5 \%. The non-linear behavior above 5 \% may indicate that the mechanism of Mn incorporation is different in this concentration range, leading to an increase of Mn concentration in the columns or in the matrix. For samples grown at 100$^\circ$C, nanocolumns are always fully coherent with the surrounding matrix (Fig. 4a).
Increasing the Mn content in the samples grown at 150$^\circ$C from 1.3 \% to 11.3 \% leads to a decrease of the columns density (fig 3b). Moreover, their average diameter increases significantly and size distributions become very broad (see Fig. 3a). For the highest Mn concentration (11.3 \%) we observe the coexistence of very small columns with a diameter of 2.5 nm and very large columns with a diameter of 9 nm. In samples grown at 150$^\circ$C containing 11.3 \% of Mn, the crystalline structure of nanocolumns is also highly modified. In plane view TEM micrographs, one can see columns exhibiting several different crystalline structures. We still observe some columns which are fully coherent with the Ge matrix like in the samples grown at lower temperature. Nevertheless, observations performed on these samples grown at 150$^\circ$C and with 11.3\% Mn reveal some uniaxially \cite{Jame06} or fully relaxed columns exhibiting a misfit of 4 \% between the matrix and the columns and leading to misfit dislocations at the interface between the column and the matrix (see fig. 4b). Thus we can conclude that coherent columns are probably in strong compression and the surrounding matrix in tension. On the same samples (T$_g$=150$^{\circ}$C, 11.3\% Mn), we also observe a large number of highly disordered nanocolumns leading to an amorphous like TEM contrast(fig. 4c).
\begin{figure}[htb]
\center
\includegraphics[width=.31\linewidth]{./fig4a.eps}
\includegraphics[width=.31\linewidth]{./fig4b.eps}
\includegraphics[width=.31\linewidth]{./fig4c.eps}
\caption{Plane view high resolution transmission electron micrographs of different types of nanocolumns : (a) typical structure of a column grown at 100$^{\circ}$C. The crystal structure is exactly the same as germanium . (b) Partially relaxed nanocolumn. One can see dislocations at the interface between the columns and the matrix leading to stress relaxation. (c) Amorphous nanocolumn. These columns are typical in samples grown at 150$^{\circ}$C with high Mn contents.}
\label{fig4}
\end{figure}
In conclusion, we have evidenced a complex mechanism of Mn incorporation in Mn doped Ge films grown at low temperature. In particular Mn incorporation is highly inhomogeneous. For very low growth temperatures (below 120$^\circ$C) the diffusion of Mn atoms leads to the formation of Mn rich, vertical nanocolumns. Their density mostly depends on Mn concentration and their mean diameter is about 2 nm. These results can be compared with the theoretical predictions of Fukushima \textit{et al.} \cite{Fuku06}: they proposed a model of spinodal decomposition in (Ga,Mn)N and (Zn,Cr)Te based on layer by layer growth conditions and a strong pair attraction between Mn atoms which leads to the formation of nanocolumns. This model may also properly describe the formation of Mn rich nanocolumns in our samples. Layer by layer growth conditions can be deduced from RHEED pattern evolution during growth. For all the samples grown at low temperature, RHEED observations clearly indicate two-dimensional growth. Moreover, Ge/Ge$_{1-x}$Mn$_{x}$/Ge heterostructures have been grown and observed by TEM (see Fig. 5). Ge$_{1-x}$Mn$_{x}$/Ge (as well as Ge/Ge$_{1-x}$Mn$_{x}$) interfaces are very flat and sharp thus confirming a two-dimensional, layer by layer growth mode. Therefore we can assume that the formation of Mn rich nanocolumns is a consequence of 2D-spinodal decomposition.
\begin{figure}[htb]
\center
\includegraphics[width=.7\linewidth]{./fig5.eps}
\caption{Cross section high resolution micrograph of a Ge/Ge$_{1-x}$Mn$_{x}$/Ge/Ge$_{1-x}$Mn$_{x}$/Ge heterostructure. This sample has been grown at 130 $^{\circ}$C with 6\% Mn. Ge$_{1-x}$Mn$_{x}$ layers are 15 nm thick and Ge spacers 5 nm thick. We clearly see the sharpness of both Ge$_{1-x}$Mn$_{x}$/Ge and Ge/Ge$_{1-x}$Mn$_{x}$ interfaces. Mn segregation leading to the columns formation already takes place in very thin Ge$_{1-x}$Mn$_{x}$ films.}
\label{fig5}
\end{figure}
For growth temperatures higher than 160$^\circ$C, cross section TEM and EFTEM observations (not shown here) reveal the coexistence of two Mn-rich phases: nanocolumns and Ge$_{3}$Mn$_{5}$ nanoclusters embedded in the germanium matrix. A typical high resolution TEM image is shown in figure 6.
Ge$_{3}$Mn$_{5}$ clusters are not visible in RHEED patterns for temperatures below 180$^\circ$C. To investigate the nature of these clusters, we performed x-ray diffraction in $\theta-2\theta$ mode. Diffraction scans were acquired on a high resolution diffractometer using the copper K$_\alpha$ radiation and on the GMT station of the BM32 beamline at the European Synchrotron Radiation Facility (ESRF). Three samples grown at different temperatures and/or annealed at high temperature were investigated. The two first samples are Ge$_{1-x}$Mn$_{x}$ films grown at 130$^\circ$C and 170$^\circ$C respectively. The third one has been grown at 130$^\circ$C and post-growth annealed at 650$^\circ$C. By analysing x-ray diffraction spectra, we can evidence two different crystalline structures. For the sample grown at 130$^\circ$C, the $\theta-2\theta$ scan only reveals the (004) Bragg peak of the germanium crystal, confirming the good epitaxial relationship between the layer and the substrate, and the absence of secondary phases in the film in spite of a high dynamics of the order of 10$^7$. For both samples grown at 170$^\circ$C and annealed at 650$^\circ$C, $\theta-2\theta$ spectra are identical. In addition to the (004) peak of germanium, we observe three additional weak peaks. The first one corresponds to the (002) germanium forbidden peak which probably comes from a small distortion of the germanium crystal, and the two other peaks are respectively attributed to the (002) and (004) Bragg peaks of a secondary phase. The $c$ lattice parameter of Ge$_3$Mn$_5$ hexagonal crystal is 5.053 \AA \ \cite{Fort90} which is in very good agreement with the values obtained from diffraction data for both (002) and (004) lines assuming that the $c$ axis of Ge$_3$Mn$_5$ is along the [001] direction of the Ge substrate.
\begin{figure}[htb]
\center
\includegraphics[width=.7\linewidth]{./fig6.eps}
\caption{Cross section high resolution transmission electron micrograph of a sample grown at 170$^{\circ}$C. We observe the coexistence of two different Mn-rich phases: Ge$_{1-x}$Mn$_{x}$ nanocolumns and Ge$_3$Mn$_5$ clusters.}
\label{fig6}
\end{figure}
In summary, in a wide range of growth temperatures and Mn concentrations, we have evidenced a two-dimensional spinodal decomposition leading to the formation of Mn-rich nanocolumns in Ge$_{1-x}$Mn$_{x}$ films. This decomposition is probably the consequence of: $(i)$ a strong pair attraction between Mn atoms, $(ii)$ a strong surface diffusion of Mn atoms in germanium even at low growth temperatures and $(iii)$ layer by layer growth conditions. We have also investigated the influence of growth parameters on the spinodal decomposition: at low growth temperatures (100$^{\circ}$C), increasing the Mn content leads to higher columns densities while at higher growth temperatures (150$^{\circ}$C), the columns density remains nearly constant whereas their size increases drastically. By plotting the nanocolumns density as a function of Mn content, we have shown that the mechanism of Mn incorporation in Ge changes above 5 \% of Mn. Finally, using TEM observations and x-ray diffraction, we have shown that Ge$_3$Mn$_5$ nanoclusters start to form at growth temperatures higher than 160$^\circ$C.
\section{Magnetic properties \label{magnetic}}
We have thoroughly investigated the magnetic properties of thin Ge$_{1-x}$Mn$_{x}$ films for different growth temperatures and Mn concentrations. In this section, we focus on Mn concentrations between 2 \% and 11 \%. We could clearly identify four different magnetic phases in Ge$_{1-x}$Mn$_{x}$ films : diluted Mn atoms in the germanium matrix, low $T_{C}$ nanocolumns ($T_{C}$ $\leq$ 170 K), high $T_{C}$ nanocolumns ($T_{C}$ $\geq$ 400 K) and Ge$_{3}$Mn$_{5}$ clusters ($T_{C}$ $\thickapprox$ 300 K). The relative weight of each phase clearly depends on the growth temperature and to a lesser extend on Mn concentration. For low growth temperature ($<$ 120$^{\circ}$C), we show that nanocolumns are actually made of four uncorrelated superparamagnetic nanostructures. Increasing T$_{g}$ above 120$^{\circ}$C, we first obtain continuous columns exhibiting low $T_{C}$ ($<$ 170 K) and high $T_{C}$ ($>$ 400 K) for $T_{g}\approx$130$^{\circ}$C. The larger columns become ferromagnetic \textit{i.e.} $T_{B}>T_{C}$. Meanwhile Ge$_{3}$Mn$_{5}$ clusters start to form. Finally for higher $T_{g}$, the magnetic contribution from Ge$_{3}$Mn$_{5}$ clusters keeps increasing while the nanocolumns signal progressively disappears.
\begin{figure}[htb]
\center
\includegraphics[width=.6\linewidth]{./fig7a.eps}
\includegraphics[width=.3\linewidth]{./fig7b.eps}
\caption{(a) Temperature dependence of the saturation magnetization (in $\mu_{B}$/Mn) of Ge$_{0.93}$Mn$_{0.07}$ samples for different growth temperatures. The magnetic field is applied in the film plane. The inset shows the temperature dependence of a sample grown at 130$^{\circ}$C and annealed at 650$^{\circ}$C for 15 minutes. After annealing, the magnetic signal mostly arises from Ge$_{3}$Mn$_{5}$ clusters. (b) ZFC-FC measurements performed on Ge$_{0.93}$Mn$_{0.07}$ samples for different growth temperatures. The in-plane applied field is 0.015 T. The ZFC peak at low temperature ($\leq$150 K) can be attributed to the superparamagnetic nanocolumns. This peak widens and shifts towards high blocking temperatures when increasing growth temperature. The second peak above 150 K in the ZFC curve which increases with increasing growth temperature is attributed to superparamagnetic Ge$_{3}$Mn$_{5}$ clusters. The increasing ZFC-FC irreversibility at $\approx$ 300 K is due to the increasing contribution from large ferromagnetic Ge$_{3}$Mn$_{5}$ clusters. The nanocolumns signal completely vanishes after annealing at 650$^{\circ}$C for 15 minutes.}
\label{fig7}
\end{figure}
In Fig. 7a, the saturation magnetization at 2 Tesla in $\mu_{B}$/Mn of Ge$_{1-x}$Mn$_{x}$ films with 7 \% of Mn is plotted as a function of temperature for different growth temperatures ranging from $T_{g}$=90$^{\circ}$C up to 160$^{\circ}$C. The inset shows the temperature dependence of the magnetization at 2 Tesla after annealing at 650$^{\circ}$C during 15 minutes. Figure 7b displays the corresponding Zero Field Cooled - Field Cooled (ZFC-FC) curves recorded at 0.015 Tesla. In the ZFC-FC procedure, the sample is first cooled down to 5 K in zero magnetic field and the susceptibility is subsequently recorded at 0.015 Tesla while increasing the temperature up to 400 K (ZFC curve). Then, the susceptibility is recorded under the same magnetic field while decreasing the temperature down to 5 K (FC curve). Three different regimes can be clearly distinguished. \\
For $T_{g}\leq$120$^{\circ}$C, the temperature dependence of the saturation magnetization remains nearly the same while increasing growth temperature. The overall magnetic signal vanishing above 200 K is attributed to the nanocolumns whereas the increasing signal below 50 K originates from diluted Mn atoms in the surrounding matrix. The Mn concentration dependence of the saturation magnetization is displayed in figure 8. For the lowest Mn concentration (4 \%), the contribution from diluted Mn atoms is very high and drops sharply for higher Mn concentrations (7 \%, 9 \% and 11.3 \%). Therefore the fraction of Mn atoms in the diluted matrix decreases with Mn concentration probably because Mn atoms are more and more incorporated in the nanocolumns. In parallel, the Curie temperature of nanocolumns increases with the Mn concentration reaching 170 K for 11.3 \% of Mn. This behavior may be related to different Mn compositions and to the increasing diameter of nanocolumns (from 1.8 nm to 2.8 nm) as discussed in section \ref{structural}.
\begin{figure}[htb]
\center
\includegraphics[width=.7\linewidth]{./fig8.eps}
\caption{Temperature dependence of the saturation magnetization (in $\mu_{B}$/Mn) of Ge$_{1-x}$Mn$_{x}$ films grown at 100$^{\circ}$C plotted for different Mn concentrations: 4.1 \%; 7 \%; 8.9 \% and 11.3 \%.}
\label{fig8}
\end{figure}
ZFC-FC measurements show that the nanocolumns are superparamagnetic. The magnetic signal from the diluted Mn atoms in the matrix is too weak to be detected in susceptibility measurements at low temperature. In samples containing 4 \% of Mn, ZFC and FC curves superimpose down to low temperatures. As we do not observe hysteresis loops at low temperature, we believe that at this Mn concentration nanocolumns are superparamagnetic in the whole temperature range and the blocking temperature cannot be measured. For higher Mn contents, the ZFC curve exhibits a very narrow peak with a maximum at the blocking temperature of 15 K whatever the Mn concentration and growth temperature (see Fig. 7b). Therefore the anisotropy barrier distribution is narrow and assuming that nanocolumns have the same magnetic anisotropy, this is a consequence of the very narrow size distribution of the nanocolumns as observed by TEM. To probe the anisotropy barrier distribution, we have performed ZFC-FC measurements but instead of warming the sample up to 400 K, we stopped at a lower temperature $T_{0}$.
\begin{figure}[htb]
\center
\includegraphics[width=.6\linewidth]{./fig9.eps}
\caption{Schematic drawing of the anisotropy barrier distribution n($E_{B}$) of superparamagnetic nanostructures. If magnetic anisotropy does not depend on the particle size, this distribution exactly reflects their magnetic size distribution. In this drawing the blocking temperature ($T_{B}$) corresponds to the distribution maximum. At a given temperature $T_{0}$ such that 25$k_{B}T_{0}$ falls into the anisotropy barrier distribution, the largest nanostructures with an anisotropy energy larger than 25$k_{B}T_{0}$ are blocked whereas the others are superparamagnetic.}
\label{fig9}
\end{figure}
If this temperature falls into the anisotropy barrier distribution as depicted in Fig. 9, the FC curve deviates from the ZFC curve. Indeed the smallest nanostructures have become superparamagnetic at $T_{0}$ and when decreasing again the temperature, their magnetization freezes along a direction close to the magnetic field and the FC susceptibility is higher than the ZFC susceptibility. Therefore any irreversibility in this procedure points at the presence of superparamagnetic nanostructures. The results are given in Fig. 10a. ZFC and FC curves clearly superimpose up to $T_{0}$=250 K thus the nanocolumns are superparamagnetic up to their Curie temperature and no Ge$_{3}$Mn$_{5}$ clusters could be detected. Moreover for low $T_{0}$ values, a peak appears at low temperature in FC curves which evidences strong antiferromagnetic interactions between the nanocolumns \cite{Chan00}.
\begin{figure}[htb]
\center
\includegraphics[width=.35\linewidth]{./fig10a.eps}
\includegraphics[width=.63\linewidth]{./fig10b.eps}
\caption{(a) ZFC-FC measurements performed on a Ge$_{0.887}$Mn$_{0.113}$ sample grown at 115$^{\circ}$C. The in-plane applied field is 0.015 T. Magnetization was recorded up to different T$_{0}$ temperatures: 30 K, 50 K, 100 K, 150 K, 200 K and 250 K. Curves are shifted up for more clarity. (b) ZFC-FC curves for in-plane and out-of-plane applied fields (0.015 T).}
\label{fig10}
\end{figure}
In order to derive the magnetic size and anisotropy of the Mn-rich nanocolumns embedded in the Ge matrix, we have fitted the inverse normalized in-plane (resp. out-of-plane) susceptibility: $\chi_{\parallel}^{-1}$ (resp. $\chi_{\perp}^{-1}$). The corresponding experimental ZFC-FC curves are reported in Fig. 10b. Since susceptibility measurements are performed at low field (0.015 T), the matrix magnetic signal remains negligible. In order to normalize susceptibility data, we need to divide the magnetic moment by the saturated magnetic moment recorded at 5 T. However the matrix magnetic signal becomes very strong at 5 T and low temperature so that we need to subtract it from the saturated magnetic moment using a simple Curie function. From Fig. 10b, we can conclude that nanocolumns are isotropic. Therefore to fit experimental data we use the following expression well suited for isotropic systems or cubic anisotropy: $\chi_{\parallel}^{-1}= \chi_{\perp}^{-1}\approx 3k_{B}T/M(T)+\mu_{0}H_{eff}(T)$. $k_{B}$ is the Boltzmann constant, $M=M_{s}v$ is the magnetic moment of a single-domain nanostructure (macrospin approximation) where $M_{s}$ is its magnetization and $v$ its volume. The in-plane magnetic field is applied along $[110]$ or $[-110]$ crystal axes. Since the nanostructures Curie temperature does not exceed 170 K, the temperature dependence of the saturation magnetization is also accounted for by writting $M(T)$. Antiferromagnetic interactions between nanostructures are also considered by adding an effective field estimated in the mean field approximation \cite{Fruc02}: $\mu_{0}H_{eff}(T)$.
The only fitting parameters are the maximum magnetic moment (\textit{i.e.} at low temperature) per nanostructure: $M$ (in Bohr magnetons $\mu_{B}$) and the maximum interaction field (\textit{i.e.} at low temperature): $\mu_{0}H_{eff}$.
\begin{figure}[htb]
\center
\includegraphics[width=.7\linewidth]{./fig11.eps}
\caption{Temperature dependence of the inverse in-plane (open circles) and out-of-plane (open squares) normalized susceptibilities of a Ge$_{0.887}$Mn$_{0.113}$ sample grown at 115$^{\circ}$C. Fits were performed assuming isotropic nanostructures or cubic anisotropy. Dashed line is for in-plane susceptibility and solid line for out-of-plane susceptibility.}
\label{fig11}
\end{figure}
In Fig. 11, the best fits lead to $M\approx$1250 $\mu_{B}$ and $\mu_{0}H_{eff}\approx$102 mT for in-plane susceptibility and $M\approx$1600 $\mu_{B}$ and $\mu_{0}H_{eff}\approx$98 mT for out-of-plane susceptibility. It gives an average magnetic moment of 1425 $\mu_{B}$ per column and an effective interaction field of 100 mT. Using this magnetic moment and its temperature dependence, magnetization curves could be fitted using a Langevin function and $M(H/T)$ curves superimpose for $T<$100 K. However, from the saturated magnetic moment of the columns and their density (35000 $\rm{\mu m}^{-2}$), we find almost 6000 $\mu_{B}$ per column. Therefore, for low growth temperatures, we need to assume that nanocolumns are actually made of almost four independent elongated magnetic nanostructures. The effective field for antiferromagnetic interactions between nanostructures estimated from the susceptibility fits is at least one order of magnitude larger than what is expected from pure magnetostatic coupling. This difference may be due to either an additional antiferromagnetic coupling through the matrix which origin remains unexplained or to the mean field approximation which is no more valid in this strong coupling regime. As for magnetic anisotropy, the nanostructures behave as isotropic magnetic systems or exhibit a cubic magnetic anisotropy. First we can confirm that nanostructures are not amorphous otherwise shape anisotropy would dominate leading to out-of-plane anisotropy. We can also rule out a random distribution of magnetic easy axes since the nanostructures are clearly crystallized in the diamond structure and would exhibit at least a cubic anisotropy (except if the random distribution of Mn atoms within the nanostructures can yield random easy axes). Since the nanostructures are in strong in-plane compression (their lattice parameter is larger than the matrix one), the cubic symmetry of the diamond structure is broken and magnetic cubic anisotropy is thus unlikely. We rather believe that out-of-plane shape anisotropy is nearly compensated by in-plane magnetoelastic anisotropy due to compression leading to a \textit{pseudo} cubic anisotropy. From the blocking temperature (15 K) and the magnetic volume of the nanostructures , we can derive their magnetic anisotropy constant using $Kv=25k_{B}T_{B}$: K$\approx$10 kJ.m$^{-3}$ which is of the same order of magnitude as shape anisotropy.
\begin{figure}[htb]
\center
\includegraphics[width=.35\linewidth]{./fig12a.eps}
\includegraphics[width=.63\linewidth]{./fig12b.eps}
\caption{(a) ZFC-FC measurements performed on a Ge$_{0.93}$Mn$_{0.07}$ sample grown at 122$^{\circ}$C. The in-plane applied field is 0.015 T. Magnetization was recorded up to different T$_{0}$ temperatures: 50 K, 100 K, 150 K, 200 K and 250 K. Curves are shifted up for more clarity. (b) ZFC-FC curves for in-plane and out-of-plane applied fields (0.015 T).}
\label{fig12}
\end{figure}
For growth temperatures $T_{g}\geq$120$^{\circ}$C and Mn concentrations $\geq$ 7 \%, samples exhibit a magnetic signal above 200 K corresponding to Ge$_{3}$Mn$_{5}$ clusters (see Fig. 7a). As we can see, SQUID measurements are much more sensitive to the presence of Ge$_{3}$Mn$_{5}$ clusters, even at low concentration, than TEM and x-ray diffraction used in section \ref{structural}. We also observe a sharp transition in the ZFC curve (see Fig. 7b, Fig. 12a and 12b): the peak becomes very large and is shifted towards high blocking temperatures (the signal is maximum at $T=$23 K). This can be easily understood as a magnetic percolation of the four independent nanostructures obtained at low growth temperatures into a single magnetic nanocolumn. Therefore the magnetic volume increases sharply as well as blocking temperatures. At the same time, the size distribution widens as observed in TEM. In Fig. 12a, we have performed ZFC-FC measurements at different $T_{0}$ temperatures. The ZFC-FC irreversibility is observed up to the Curie temperature of $\approx$120 K meaning that a fraction of nanocolumns is ferromagnetic (\textit{i.e.} $T_{B}\geq T_{C}$).
In Fig. 12b, in-plane and out-of-plane ZFC curves nearly superimpose for $T\leq$150 K due to the isotropic magnetic behavior of the nanocolumns: in-plane magnetoelastic anisotropy is still compensating out-of-plane shape anisotropy. Moreover the magnetic signal above 150 K corresponding to Ge$_{3}$Mn$_{5}$ clusters that start to form in this growth temperature range is strongly anisotropic. This perpendicular anisotropy confirms the epitaxial relation: (0002) Ge$_{3}$Mn$_{5}$ $\parallel$ (002) Ge discussed in Ref.\cite{Bihl06}. The magnetic easy axis of the clusters lies along the hexagonal $c$-axis which is perpendicular to the film plane.
\begin{figure}[ht]
\center
\includegraphics[width=.35\linewidth]{./fig13a.eps}
\includegraphics[width=.63\linewidth]{./fig13b.eps}
\caption{(a) ZFC-FC measurements performed on a Ge$_{0.887}$Mn$_{0.113}$ sample grown at 145$^{\circ}$C. The in-plane applied field is 0.015 T. Magnetization was recorded up to different T$_{0}$ temperatures: 50 K, 100 K, 150 K, 200 K, 250 K and 300 K. Curves are shifted up for more clarity. (b) ZFC-FC curves for in-plane and out-of-plane applied fields (0.015 T).}
\label{fig13}
\end{figure}
For growth temperatures $T_{g}\geq$145$^{\circ}$C the cluster magnetic signal dominates (Fig. 13b). Superparamagnetic nanostructures are investigated performing ZFC-FC measurements at different $T_{0}$ temperatures (Fig. 13a). The first ZFC peak at low temperature \textit{i.e.} $\leq$ 150 K is attributed to low-$T_{C}$ nanocolumns ($T_{C}\approx$130 K). This peak is wider than for lower growth temperatures and its maximum is further shifted up to 30 K. These results are in agreement with TEM observations: increasing $T_{g}$ leads to larger nanocolumns (\textit{i.e.} higher blocking temperatures) and wider size distributions. ZFC-FC irreversibility is observed up to the Curie temperature due to the presence of ferromagnetic columns. The second peak above 180 K in the ZFC curve is attributed to Ge$_{3}$Mn$_{5}$ clusters and the corresponding ZFC-FC irreversibility persisting up to 300 K means that some clusters are ferromagnetic. We clearly evidence the out-of-plane anisotropy of Ge$_{3}$Mn$_{5}$ clusters and the isotropic magnetic behavior of nanocolumns (Fig. 13b). In this growth temperature range, we have also investigated the Mn concentration dependence of magnetic properties.
\begin{figure}[ht]
\center
\includegraphics[width=.49\linewidth]{./fig14a.eps}
\includegraphics[width=.49\linewidth]{./fig14b.eps}
\caption{Temperature dependence of the saturation magnetization (in $\mu_{B}$/Mn) of Ge$_{1-x}$Mn$_{x}$ films grown at 150$^{\circ}$C plotted for different Mn concentrations: 2.3 \%; 4 \%; 7 \%; 9 \%; 11.3 \%. (b) ZFC-FC measurements performed on Ge$_{1-x}$Mn$_{x}$ films grown at 150$^{\circ}$C. The in-plane applied field is 0.025 T for 2.3 \% and 4 \% and 0.015 T for 8 \% and 11.3 \%. }
\label{fig14}
\end{figure}
In Fig. 14a, for low Mn concentrations (2.3 \% and 4 \%) the contribution from diluted Mn atoms in the germanium matrix to the saturation magnetization is very high and nearly vanishes for higher Mn concentrations (7 \%, 9 \% and 13 \%) as observed for low growth temperatures. Above 7 \%, the magnetic signal mainly comes from nanocolumns and Ge$_{3}$Mn$_{5}$ clusters. We can derive more information from ZFC-FC measurements (Fig. 14b). Indeed, for 2.3 \% of Mn, ZFC and FC curves nearly superimpose down to low temperature meaning that nanocolumns are superparamagnetic in the whole temperature range. Moreover the weak irreversibility arising at 300 K means that some Ge$_{3}$Mn$_{5}$ clusters have already formed in the samples even at very low Mn concentrations. For 4 \% of Mn, we can observe a peak with a maximum at the blocking temperature (12 K) in the ZFC curve. We can also derive the Curie temperature of nanocolumns: $\approx$45 K. The irresversibility arising at 300 K still comes from Ge$_{3}$Mn$_{5}$ clusters. Increasing the Mn concentration above 7 \% leads to: higher blocking temperatures (20 K and 30 K) due to larger nanocolumns and wider ZFC peaks due to wider size distributions in agreement with TEM observations (see Fig. 3a). Curie temperatures also increase (110 K and 130 K) as well as the contribution from Ge$_{3}$Mn$_{5}$ clusters.\\
Finally when increasing $T_{g}$ above 160$^{\circ}$C, the nanocolumns magnetic signal vanishes and only Ge$_{3}$Mn$_{5}$ clusters and diluted Mn atoms coexist. The overall magnetic signal becomes comparable to the one measured on annealed samples in which only Ge$_{3}$Mn$_{5}$ clusters are observed by TEM (see Fig. 7a).\\
The magnetic properties of high-$T_{C}$ nanocolumns obtained for $T_{g}$ close to 130$^{\circ}$C are discussed in detail in Ref.\cite{Jame06}.\\
In conclusion, at low growth temperatures ($T_{g}\leq$120$^{\circ}$C), nanocolumns are made of almost 4 independent elongated magnetic nanostructures. For $T_{g}\geq$120$^{\circ}$C, these independent nanostructures percolate into a single nanocolumn sharply leading to higher blocking temperatures. Increasing $T_{g}$ leads to larger columns with a wider size distribution as evidenced by ZFC-FC measurements and given by TEM observations. In parallel, some Ge$_{3}$Mn$_{5}$ clusters start to form and their contribution increases when increasing $T_{g}$. Results on magnetic anisotropy seems counter-intuitive. Indeed Ge$_{3}$Mn$_{5}$ clusters exhibit strong out-of-plane anisotropy whereas nanocolumns which are highly elongated magnetic structures are almost isotropic. This effect is probably due to compensating in-plane magnetoelastic coupling (due to the columns compression) and out-of-plane shape anisotropy.
\section{Conclusion}
In this paper, we have investigated the structural and magnetic properties of thin Ge$_{1-x}$Mn$_{x}$ films grown by low temperature molecular beam epitaxy. A wide range of growth temperatures and Mn concentrations have been explored. All the samples contain Mn-rich nanocolumns as a consequence of 2D-spinodal decomposition. However their size, crystalline structure and magnetic properties depend on growth temperature and Mn concentration. For low growth temperatures, nanocolumns are very small (their diameter ranges between 1.8 nm for 1.3 \% of Mn and 2.8 nm for 11.3 \% of Mn), their Curie temperature is rather low ($<$ 170 K) and they behave as almost four uncorrelated superparamagnetic nanostructures. Increasing Mn concentration leads to higher columns densities while diameters remain nearly unchanged. For higher growth temperatures, the nanocolumns mean diameter increases and their size distribution widens. Moreover the 4 independent magnetic nanostructures percolate into a single magnetic nanocolumn. Some columns are ferromagnetic even if Curie temperatures remain quite low. In this regime, increasing Mn concentration leads to larger columns while their density remains nearly the same. In parallel, Ge$_{3}$Mn$_{5}$ nanoclusters start to form in the film with their $c$-axis perpendicular to the film plane. In both temperature regimes, the Mn incorporation mechanism in the nanocolumns and/or in the matrix changes above 5 \% of Mn and nanocolumns exhibit an isotropic magnetic behaviour due to the competing effects of out-of-plane shape anisotropy and in-plane magnetoelastic coupling. Finally for a narrow range of growth temperatures around 130$^{\circ}$C, nanocolumns exhibit Curie temperatures higher than 400 K. Our goal is now to investigate the crystalline structure inside the nanocolumns, in particular the position of Mn atoms in the distorted diamond structure, which is essential to understand magnetic and future transport properties in Ge$_{1-x}$Mn$_{x}$ films.
\section{Aknowledgements}
The authors would like to thank Dr. F. Rieutord for grazing incidence x-ray diffraction measurements performed on the GMT station of BM32 beamline at the European Synchrotron Radiation Facility.
|
[
"Spin injection into non magnetic semiconductors, or electrical manipulation of carrier induced magnetism in magnetic semiconductors."
] | 5,917
|
multifieldqa_en
|
en
| null |
f9b9a553107eed5b994a9aaf07e8ccac487feaa8ff108ec6
|
How many underclassmen are on the NBA Draft Early-Entry List?
|
The Official 2006 NBA Draft Early-Entry List. 30 International Players, 62 underclassmen and one lone 5th year high school player make up this year's list, for a total of 93 early-entrants. Extensive commentary and early draft status projections are included.. For comparison, in 2005, 108 players declared (61 NCAA, 12 high school, 35 internationals), up from 94 in 2004, and 73 in 2003.
There were no major surprises on the early-entry list, besides a few mid-major, Division II and NAIA players that decided to enter, as well as 5th year high school player Clarence Holloway. Amongst the International players, Hrvoje Peric, Renaldas Seibutis, and Kyrylo Fesenko are considered mild surprises who could end up cracking the 2nd round. NCAA Lottery prospects Joakim Noah, Al Horford, Corey Brewer, Josh McRoberts, Brandon Rush and Tyler Hansbrough decided to sit this one out as expected, as did Marco Belinelli, Uros Tripkovic and Goran Dragic on the international front.
Akbar Abdul-Ahad 6-0, PG, Idaho State Junior No Undrafted Averaged under 6 points in 20 minutes per game playing in the Big Sky. Being the first player on the NBA Draft Early-Entry list will likely go down as the highlight of his basketball career.
Arron Afflalo, 6-5, SG, UCLA Sophomore No Undrafted Afflalo initially told the LA media hes returning to school, but after a deep run in the NCAA tournament-- more in spite of his play than because of it--Afflalo will be testing the waters. Afflalo has very average size, athleticism, perimeter shooting and ball-handling skills. Hes clearly receiving bad advice on where his stock lies.
LaMarcus Aldridge, 6-11, PF/C, Texas Sophomore Yes Top 5 pick Aldridge made his announcement official to enter the draft some weeks ago. He will hire an agent soon (Arn Tellem?) and is considered a lock for the top 5 and a strong candidate for #1 overall.
Morris Almond, 6-6, SG, Rice Junior No ??? Almond announced hell be entering the draft, without an agent. He might be the best scorer in the NCAA youve never heard about. His stats are terrific, despite being the sole focal point of opposing defenses, and hes capable of scoring in a variety of ways, particularly with his jumper. Hes hoping for an invite to Orlando.
Renaldo Balkman, 6-8, PF, South Carolina Junior No Undrafted After winning the NIT MVP award, Balkman has decided to see where he stands in the eyes of the NBA by testing the waters. Hes likely to find them downright freezing, as hes a skinny and undersized power forward with little to no skills who came off the bench for a very average team.
Larry Blair,6-1, SG, Liberty Junior No Undrafted The 22 point per game scorer Blair is attempting to get some exposure for himself by testing the waters.
Will Blalock, Iowa State, 5-11, PG, Junior No Second round pick? Declared for the draft together with Curtis_Stinson after Iowa States coach was fired. Size is a big question mark. Will likely hope to attend the pre-draft camp in Orlando and try to show scouts hes a 1st rounder. Likely returns for his senior year.
Jahsha Bluntt, 6-6, SG, Deleware State Junior No Undrafted Puts up fairly average numbers (14.6 ppg, 41% FG) in one of the worst conferences in America. Looking for exposure at the Orlando pre-draft camp but its highly unlikely to receive it.
Josh Boone, 6-10, PF/C, UConn Junior No First round pick? Boone announced hell be entering the draft without an agent. An up and down season has left his stock in the air, and will likely force him to prove himself at the Orlando pre-draft camp. Would greatly benefit from a productive senior season as an offensive focal point now that UConn has lost almost all of its firepower from last year.
Ronnie Brewer, 6-6, PG/SG, Arkansas Junior No Lottery pick? After initially wavering a bit on his decision, Brewer announced hell be entering the draft without an agent in a press conference. Brewer is considered a likely late lottery pick to mid-first rounder pick, as his physical attributes and array of versatile skills on both ends of the floor are highly sought after.
Bobby Brown, 6-1, PG, Cal-State Fullerton Junior No First round pick? DraftExpress exclusively reported that Brown will be testing the waters. Still considered a bit of a sleeper because of the school he plays for, he will not be hiring an agent at this point. Some scouts are very high on his quickness and perimeter shooting ability and feel he will help his stock tremendously in private workouts.
Shannon Brown, 6-4, SG, Michigan State Junior No First round pick? As exclusively reported by DraftExpress, Brown will be testing the waters. He will likely conduct a number of workouts and attend the Orlando pre-draft camp to attempt and gauge where his stock lies. Scouts compare him to Celtic guard Tony Allen, but with a better attitude. Hes a very borderline first rounder in a draft that is stacked with shooting guards.
Derek Burditt, 6-7, SG, Blinn Junior College Sophomore No Undrafted Unknown Junior College prospect. Not ranked as one of the top 25 JUCO players in the country, averaged around 17 points per game. Not burning his draft card as hes not yet an NCAA player, so really doesnt have much to lose, or gain.
Leroy Dawson, 6-2, SG, Emporia State Junior No Undrafted Anonymous Division II player from the MIAA conference. 2nd team all conference, averaged 20 points per game. Like MANY on this list, only declaring because he can and has nothing to lose.
Travis DeGroot, 6-4, SG, Delta State Junior No Undrafted Plays in a strong Division II conference, but is at best only the 3rd best prospect on his own team after Jasper Johnson and Jeremy Richardson, and is therefore not a prospect at all.
Guillermo Diaz, 6-2, PG/SG, Miami Junior Yes First round pick? As reported by DraftExpress all year long, Diaz decided to forgo his senior year of college by hiring an agent, Miami based Jason Levien. One of the top athletes and shooters in the draft, which makes for an intriguing combination.
Cem Dinc, 6-10, SF/PF, Indiana Freshman No Undrafted As exclusively reported by DraftExpress, Dinc will be testing the waters. The coach that recruited him and then never played him, Mike Davis, resigned, so it would not shock anyone to see Dinc return to play in Europe and become automatically eligible next year after pulling out of this years draft.
Quincy Douby, 6-3, PG/SG, Rutgers Junior No First round pick As exclusively reported by DraftExpress, Douby sent out his paperwork to enter the draft. NBA scouts are all over the board on him, with some saying they consider him a 2nd round pick and others saying they would not be surprised if he ended up in the lottery. Terrific shooter and shot creator, averaged 28 ppg in the Big East conference. A real sleeper who will likely play in Orlando.
Mike Efevberha, 6-5, SG, Cal State Northridge Junior ??? Undrafted Ramona Shelburne of the LA Daily News reported that Efevberha will be testing the waters. Efevberha was the leading scorer in the country until he had a falling out with his coach and saw his playing time reduced significantly. Hell likely be looking for an invite to the Orlando pre-draft camp, and does not appear to be likely to head back to school.
Carl Elliot, 6-4, PG, George Washington Junior No Undrafted Elliot is using his use it or lose it draft card as a junior to get some exposure for himself through workouts and try to figure out where he stands in the eyes of the NBA. Elliot has excellent size for the PG position, but is still lacking plenty of all-around polish. His senior year will be essential to his development as a player. Reportedly has a family to support, which makes his decision tough considering how old he is already, despite only being a junior.
Jordan Farmar, 6-2, PG, UCLA Sophomore No First round pick? Farmar was the engine that led his team to the Finals of the NCAA tournament, and the only player that showed up once they got there. He is one of the top playmakers in the country, a Steve Nash type point guard, but his average athleticism, defense and outside shooting means hes only a bubble first-rounder. DraftExpress has been on his bandwagon since day one at UCLA, but is the NBA on it too?
Nick Fazekas, 6-11, PF, Nevada Junior No First round pick? Fazekas announced hell be entering the draft without an agent and will likely return to Nevada if it looks like hes not going to be a first round pick. If hes not a first rounder this year, its hard to imagine him ever being one since there isnt much left for him to accomplish individually in the NCAA. An interesting candidate for the pre-draft camp in Orlando.
Thomas Gardner, 6-5, SG, Missouri Junior No Second round pick? The St. Louis Post Dispatch reported that Gardner will enter the draft. Firing of underachieving Missouri coach Quin Snyder appeared to be the straw the broke the camels back. Gardner will have to hope to get invited to Orlando, but moving into the first round appears unlikely without an incredible performance there.
Rudy Gay, 6-8, SF, UConn Sophomore Yes Top 10 pick Gay announced hes leaving UConn at a press conference on campus, with Coach Calhoun by his side. He will hire an agent eventually. Size, length, incredible talent and athleticism means he might have the most upside of any player in this draft. Does he have the fire to capitalize on it though?
Reggie George, 6-10, PF, Robert Morris Chicago (NAIA) Junior No Undrafted Transfer from Iowa State had a nice season in the NAIA and is looking to capitalize on it by gaining some exposure for himself.
Daniel Gibson, 6-2, PG/SG, Texas Sophomore ??? Second round pick As exclusively reported by DraftExpress, Gibson will be entering the draft. There appears to be a conflict between Gibson and Texas regarding what his role will be next year, specifically whether or not hell be playing the point, meaning its unclear whether or not hell be returning. Gibson will likely go to Orlando to help him decide what his next step is. Showing off some PG skills will be essential there.
Aaron Gray, 7-0, Center, Pitt Junior No First round pick? After a disappointing end to his season, being outplayed by Patrick OBryant in the NCAA tournament, Gray has put that behind him and entered his name in the draft without an agent. Hes yet another underclassmen with huge questions marks about his pro potential that will likely have to go to the Orlando pre-draft camp to show he is worthy of a first round pick. Made some great strides this year, but still has a ways to go, especially conditioning-wise.
LeShawn Hammett 6-0, PG, St. Francis Junior No Undrafted Undersized combo guard played only 7 minutes in the mighty Northeast Conference before being suspended indefinitely for conduct detrimental to team. The NBA is clearly the only goal left for him to achieve.
Brandon Heath, 6-3, PG/SG, San Diego State Junior No Second round pick? Streaky shooting combo guard Heath announced the he will test the NBA draft process this summer, and is hoping for an invite to the Orlando pre-draft camp. MWC player of the year; has a lot of wrinkles to his game that need to be ironed out before he can legitimately think about the NBA.
Tedric Hill, 6-10, PF, Gulf Coast Community College Sophomore Yes Undrafted Ineligible to return to school after flunking out of college once again. Has bounced around over the past few years, and received some early hype from wannabe draftniks such as Gregg Doyel (CBS-Sportsline) and Sam Smith (Chicago Tribune) who compare him to Kevin Garnett. Very athletic we're told, but has absolutely no idea how to play the game. Has no chance of being drafted without an amazing showing at the Orlando pre-draft camp.
Clarence Holloway 7-0, Center, IMG Academy (Prep School) 5th year High School No Undrafted Lone high school player in this years age-limit depleted draft. Former Louisville commit never got eligible for college and was always considered too slow and heavy to make much of an impact anyway. Reportedly lost weight and improved his grades this past year at IMG and is currently being recruited by UConn, Kansas State and Oklahoma, amongst others.
Ekene Ibekwe, 6-9, PF, Maryland Junior No Undrafted Sources told DraftExpress exclusively that Ibekwe will be testing the waters. Likely only making this move because he can, as his chances of being drafted are very low. Athletic and long, but still lacking any type of polish.
Donald Jeffers, 6-8, PF, Roxbury Community College Sophomore No Undrafted Anonymous junior college player.
Alexander Johnson, 6-9, PF, Florida State Junior Yes First round pick? Sources told DraftExpress, that Johnson will be hiring an agent, mainly because he is already 23 years old. Hes considered intriguing because of his strength, raw offensive tools and freakish athleticism at the 4 position, and could work his way into the 1st round with strong workouts.
David Johnson, 6-7, PF, Clinton Junior College Sophomore No Undrafted 6-7 JUCO power forward who averaged 2 points and 3 rebounds per game.
Trey Johnson, 6-5, SG, Jackson State Junior No Undrafted Small school prolific scorer and one of the most accurate perimeter shooters in the country will attempt to draw some more attention to himself by testing the waters this summer. Johnson is hoping for a chance to prove himself in the Orlando pre-draft camp in June.
Coby Karl, 6-4, PG/SG, Boise State Junior No Undrafted Son of Denver Nuggets head Coach George Karl put up nice numbers (17 ppg, 5 rebs, 4 assists, 39.5% 3P) in the underrated WAC conference. Had surgery in March to remove a cancerous lump from his thyroid.
Mark Konecny, 6-10, Center, Lambuth (NAIA) Junior No Undrafted Transfer from Syracuse with mediocre production is looking for any type of exposure he can get before he graduates next season.
Kyle Lowry, 6-1, PG, Villanova Sophomore No First round pick NCAA tournament performance showed that he definitely needs another year, but regardless, Lowry is in. For now its without an agent. Considering the lack of quality point guard prospects in this draft, Lowry is likely a first round pick. Says he will attend the Orlando pre-draft camp if invited.
Aleks Maric, 6-11, Center, Nebraska Sophomore No Undrafted As exclusively reported by DraftExpress, Maric will be testing the waters. What may have played a role in this is the fact that the assistant coach that recruited him at Nebraska, Scott Spinelli, just moved on to Wichita State. Maric is considered a very average athlete who is still very raw and is therefore likely to go undrafted should he decide to stay in. Thanks to his Croatian passport, there is money waiting for him overseas if he chooses to take it.
Japhet McNeil, 5-10, PG, East Carolina Junior No Undrafted Severely undersized PG averaged 4 points and 5.6 assists in watered down Conference USA.
Paul Millsap, 6-8, PF, Louisiana Tech Junior Yes First round pick? As expected, Millsap has declared his intentions to enter the NBA draft, and according to sources hired an agent as well. Millsap has likely achieved just about everything he can in college at this point, and will land somewhere in the 20-40 part of the draft depending on workouts and measurements.
Matt Mitchell, 6-0, PG, Southern University-New Orleans Junior No Undrafted Anonymous NAIA player.
Adam Morrison, 6-8, SF, Gonzaga Junior Yes Top 5 pick As DraftExpress exclusively reported that Morrison will be declaring for the draft and hiring Chicago based agent Mark Bartelstein. Morrison, the top scorer in college basketball, is expected to be a top 5 pick and potentially the #1 pick overall. Questions linger about his athleticism and defense, but no one questions his passion, talent or feel for the game.
Patrick O'Bryant, 7-0, Center, Bradley Sophomore Likely First round pick NBA sources in Portsmouth told DraftExpress exclusively that OBryant will be testing the waters without an agent, but is likely to go all the way once he hears that hes a lock for the 1st round. His steady improvement, strong sophomore season, outstanding NCAA tournament and considerable upside means hes probably gone. O'Bryant since confirmed both DraftExpresss reports, particularly the one about hiring an agent in the Tri-State area (Andy Miller) should he decide to go all the way.
Evan Patterson, 6-7, SF, Texas Wesleyan Junior No Undrafted Mediocre numbers (11 ppg, 2 rebs) in a mediocre Southland conference.
Danilo Pinnock, 6-5, SG, George Washington Junior No Undrafted The extremely athletic Pinnock has told GWs student paper hell be testing the waters. Pinnock will attempt to capitalize on his teams success this year by potentially attending the NBA pre-draft camp in Orlando. Pinnock will have to show better ball-handling and perimeter shooting ability than he did during the regular season.
Leon Powe, 6-7, PF, Cal Sophomore No Second round pick Powe announced hell be testing the waters in a statement released by Cal. Where he ends up being projected depends heavily on how his knee checks out. Powe is already considered a serious tweener by NBA scouts, and had a hard time this season gaining back much of the explosiveness he had earlier in his career. Could realistically go undrafted should he decide to stay in.
Richard Roby, 6-5, SG, Colorado Sophomore Likely Second round pick As first indicated by DraftExpress Roby has decided to test the waters. Disappeared against any major competition he went up against, particularly towards the end of the season. Roby will likely have to put on weight in the next few months and show off his perimeter stroke in the Orlando pre-draft camp. Sources tell us that he is on the verge of making a huge mistake by hiring an agent.
Rajon Rondo, 6-2, PG, Kentucky Sophomore Yes First round pick As expected, Rondo has decided to enter the NBA draft, and has also hired an agent, Bill Duffy. Despite an inconsistent sophomore season, most scouts weve spoken to still had him as at least the #2 point guard on their board because of his intriguing upside. Workouts will be huge for him.
Blake Schilb, 6-7, SG/SF, Loyola Chicago Junior No Undrafted Declared his intentions to enter the draft, without an agent, and is hoping for an invite to Orlando. Schlib is sorely lacking in the quickness and explosiveness departments that scouts demand from swingman prospects, but he makes up for it with his skill set to a certain extent. Regardless, sources tell us he wont be invited to Orlando, meaning he has to go back to school.
Mustafa Shakur, 6-4, PG, Arizona Junior No Second round pick? According to the Arizona Star, Shakur will likely enter his name in the draft, without an agent. Lute Olson confirmed it, saying he is not concerned about it. Shakur is hoping for an Orlando invite to show what he thinks he couldnt at Point Guard U.
Cedric Simmons, 6-9, PF/C, NC State Sophomore No First round pick? Simmons is reportedly "exploring his options," in regards to the 2006 NBA draft, but will do so without an agent. Nice size, frame, length, athleticism and defensive skills make him a very intriguing prospect.
Marcus Slaughter, 6-8, PF, San Diego State Junior Yes Second round pick? After burning his lone draft card a year early last June, despite being considered a marginal prospect, Slaughter has announced that he will be hiring agent Dan Fegan and forfeiting his remaining college eligibility. Slaughters father thinks that There was nothing else for Marcus to do at San Diego State. Many would disagree with that.
Curtis Stinson, 6-3, PG/SG, Iowa State Junior Yes Second round pick After swearing up and down last month that he has no intention on entering the draft, Stinson did just that. His coach Wayne Morgan, who he was very close to, was fired, resulting in him hiring agent Kevin Bradbury. The 23 year old combo guard will have to go to the Orlando pre-draft camp and impress if he wants to come close to being a 1st rounder.
Tyrus Thomas, 6-9, PF, LSU Freshman Yes Top 5 pick As DraftExpress exclusively reported Thomas called a press conference to announce his intentions to enter the 2006 NBA draft, as well as hire agents Brian Elfus and Mike Siegel. SEC Freshman of the year could be the most athletic player in the draft, as well as the player with the most overall upside.
PJ Tucker, 6-5, SF, Texas Junior No Second round pick As reported all year long by DraftExpress, Tucker will be entering the draft without an agent. Considering that hes a 6-5 combo forward with tremendous skills, his stock widely fluctuates depending on who is being asked. Phenomenal basketball player, but is severely lacking in 2-3 inches of height. Will likely need a strong showing at the Orlando pre-draft camp to have a legitimate shot at the 1st round. Some scouts compare him to Bonzi Wells.
Junior No Undrafted Undersized Division II post player has no chance of being drafted despite 20+8 averages.
Ian Vouyoukas, 6-10, Center, St. Louis Junior ??? Undrafted Vouyoukas declared his intentions to enter the draft, supposedly without an agent. Sources in Europe tell us he is likely to return to Greece to take a large contract offer from a first division team once he realizes he has no chance of being drafted. Vouyoukas is a nice mid-major big man who has improved somewhat in his junior season, but does not possess the necessary combination of athleticism and size required of an NBA center.
Darius Washington, 6-2, PG, Memphis Sophomore Likely First round pick? DraftExpress exclusively reported that Washington will be in the draft. It appears that hell be hiring an agent as well, despite not being anywhere near a lock for the first round.
Albert Weber, 6-3, SG, Connors State Sophomore No Undrafted Transfer from Alabama led his conference in scoring and is considered one of the top Junior College players in the country. Not officialy an NCAA player yet, and has not committed to any school yet, so really doesn't stand much to lose (or gain) from this move.
Marcus Williams, 6-3, PG, UConn Junior Yes Late Lottery-Mid-First As expected, Williams is expected to announce that hes hired Calvin Andrews of BDA Sports Management as his agent at a press conference next week. A strong junior season and outstanding NCAA tournament, establishing himself as one of the purest playmakers in the nation, means hes likely one of the first PGs taken.
Andriy Agafonov, 6-8, PF, Khimik 1986 Ukraine Undrafted Ukrainian power forward played 15 minutes and scored 6 points with 4.4 rebounds per game playing for FIBA EuroCup participants, and is declaring in hopes of getting his name out as he has one more draft card to burn after this before becoming automatically eligible.
Nemanja Aleksandrov, 7-0, SF/PF, KK Reflex 1987 Serbia & Montenegro ??? American agent has been telling us all year that hes likely to enter. Still hasnt played a game this year after taking slow recovery process from torn ACL. Once regarded as a prodigy and potential #1 overall pick, but injuries mean he hasnt played in nearly two years and is now considered damaged goods. Might just look for an attractive team to guarantee him in the 2nd round and develop him in the NBDL.
Pape-Philippe Amagou, 6-1, PG, Le Mans 1985 France ??? Amagous American agent has informed us that he will enter the NBA Draft this year, and participate in the Reebok Eurocamp in Treviso. Shares playmaking duties and spotlight with fellow early-entrant Yannick Bokolo.
Andrea Bargnani, 7-0, PF, Benetton Treviso 1985 Italy Top 5 pick Bargnani's Italian agent Stefano Meller told DraftExpress in Portsmouth that the Italian star power forward will definitely be entering the NBA draft. Bargnani is in the process of hiring an American agent and the only question is how long will it take for him to make it over to the US after Benetton finishes up in the Italian playoffs, which could last as far as mid-June. He is expected to be a top 5 pick with a shot at going #1 depending on how the lottery plays out. Considered a phenomenal talent thanks to his excellent size, perimeter skills and athleticism relative to height.
Yannick Bokolo, 6-3, PG/SG, Le Mans 1985 France ??? Terrific athlete who is still making the transition to playing the point full time.
Carlos Cedeno, 6-5, SG, Guaiqueries 1985 Venezuela Undrafted Relatively unknown Venezuelan player. Has some international experience at the junior levels.
Tadija Dragicevic, 6-8, PF, Red Star Belgrade 1986 Serbia & Montenegro Undrafted Undersized power forward barely played in the Adriatic League this past season.
Lior Eliyahu, 6-9, SF/PF, Galil Elyon 1985 Israel Second round pick? Prolific and athletic Israeli combo forward will be entering the NBA draft this year looking for certain guarantees from an NBA team in the 1st or 2nd round. Eliyahu is still in the Israeli army and will stay overseas for another year regardless of what happens. He'll be represented by the American agency Entersport in the United States. A midseason injury set him back from being the top Israeli player in the league despite his youth.
Rudy Fernández, 6-5, SG, DKV Joventut 1985 Spain First round pick? Has some minor buyout issues to deal with to make sure he can stay in the draft. Excellent season in Spain has him projected as a pretty solid first round pick. Improved outside shooting, and still the same excellent athlete, passer, defender and all-around player hes always been. Still very skinny too.
Kyrylo Fesenko, 6-11, PF, Azovmash 1986 Ukraine Second Round Pick More to come.
Rafael Hettsheimeir, 6-9, Center, Akasvayu Girona 1986 Brazil Undrafted Undersized Brazilian center did not overly impress at the Nike Hoop Summit, showing that he will likely lack mobility until he takes off some weight.
Marko Lekic, 6-11, PF, Atlas 1985 Serbia & Montenegro ??? American agent Marc Cornstein, Lekic told us hell be putting his name in the draft this year once again. Still a bit of an unknown, numbers are fairly average in the Serbian YUBA league.
Damir Markota, 6-11, SF/PF, Cibona Zagreb 1985 Croatia Second round pick American agent Marc Cornstein told us Markota will definitely be putting his name in the draft once again. He had a breakout season in the Euroleague and Adriatic league before a groin injury slowed him down and eventually forced him to have minor surgery. Likely wont be able to come to the States until very late in the process. Does not have a buyout.
Mickael Mokongo, 5-11, PG, Chalon 1986 France ??? DraftExpress was exclusively informed hell be in the draft. Considered a talented athlete, but lack of size and the fact that he missed a large chunk of the season due to injury means his draft stock is very much up in the air still.
Brad Newley, 6-6, SG, 1985 Australia Second round pick Newely has told the Australian media that hes entering the draft. Hired Philadelphia based agent Leon Rose. Scouts who saw him play in Argentina last summer like his athleticism. Desperately lacking exposure, but agent appears to be unwilling to provide him with it.
Oleksiy Pecherov, 6-11, PF, Racing Basket 1985 Ukraine Second round pick DraftExpress received indication that Pecherov will be entering his name in the draft after a nice 2nd half regular season in France. Pecherov has his draft card in hand one year before he becomes automatically eligible, meaning he has nothing to lose. Has some nice skills facing the basket, but is still very soft and underdeveloped.
Hrvoje Peric, 6-8, SF, KK Split 1985 Croatia Second round pick? Good athlete who is still coming into his own as a basketball player. Did not play in the Adriatic League this season. Definitely needs at least another year in Europe, but could use the exposure that declaring for the draft provides.
Kosta Perovic, 7-2, Center, Partizan 1985 Serbia & Montenegro Undrafted? DraftExpress has been told that Partizan needs Perovic to be drafted this year to relieve them of his 500,000$ salary next year as well as help them financially with buyout money for their budget. Unfortunately this is happening about 3 years too late as weve seen little to no improvement from Perovic over that span.
Georgios Printezis, 6-9, PF, Olympiakos 1985 Greece Undrafted Greek power forward played 9 minutes and scored 4 points per game playing for a Euroleague team, and is declaring in hopes of getting his name out before he becomes automatically eligible next year.
Milovan Rakovic, 6-10, PF, Atlas 1985 Serbia & Montenegro ??? American agent Marc Cornstein told us Rakovic will be putting his name in the draft. Still an unknown player, puts up nice numbers on occasion in the fairly weak Serbian YUBA league.
Alexandr Rindin, 7-5, Center, Gala Baku 1985 Azerbaijan Undrafted Huge body, complete unknown. 5 points, 5 rebounds per game in FIBA Europe Cup.
Sergio Rodríguez, 6-3, PG, Estudiantes 1986 Spain First round pick Rodríguezs agent in the States told DraftExpress exclusively hell be in the draft, likely for good if he gets a commitment in the 1st round. A disappointing start to his season both in Spain and the ULEB cup made this European prodigy point guard fall on most teams draft boards, but Rodríguez picked things up substantially towards the end of the year and is now playing terrific basketball. Weak NCAA PG crop could put him in the lottery with good workouts.
Dusan Sakota, 6-10, SF/PF, Panathinaikos 1986 Greece Undrafted Fairly unathletic perimeter oriented big man was in the draft last year already. Plays for one of the best teams in Europe and rarely sees the floor for meaningful minutes.
Renaldas Seibutis 6-5, SG, Olympiakos 1985 Lithuania Undrafted One of the most productive players in Europe in his age group considering the level he plays at. Important cog on an excellent team, but lacks athleticism and isnt as good of a shooter as you would hope at this point in his career.
Saer Sene, 7-0, Center, Pepinster 1986? Senegal First round pick? Freakishly long and athletic African prospect who played extremely well at the Nike Hoop Summit. Many question his age and lack of productivity in the very average Belgian league A player teams will want to look at closely.
Sidiki Sidibe, 7-1, Center, Levallois 1985 France ??? 7-1, 265 pound volleyball player and former Kansas State commit will be in this years draft according to his American agent. Too raw to get any playing time whatsoever in French 2nd division.
Tiago Splitter, 7-0, PF/C, Tau Vitoria 1985 Brazil Lottery pick Splitters American agent Herb Rudoy told DraftExpress exclusively hes entering the draft Splitter is having a terrific season in both the ACB Spanish League and the Euroleague, but lack of buyout in his contract means he might not be able to stay in. CBA rules allow him to withdraw and become automatically eligible next season. Tau Vitorias president was quoted saying Splitter will be back in Spain next season.
Sun Yue, 6-9, PG/SF, Aoshen 1985 China Second round pick? Super talented tall point guard with decent athleticism and nice defensive skills. Lacks strength and outside shooting ability. Level of competition is mediocre in American semi-pro ABA league, which makes him an intriguing candidate for Orlando pre-draft camp.
Ali Traore, 6-9, PF, Roanne 1985 France ??? Puts up nice numbers in France. Will participate at the Reebok Eurocamp in Treviso.
Ejike Ugboaja, 6-8, PF, Union Bank Lagos 1985 Nigeria Undrafted Plays for Nigerian National Team.
Goran Dragic, 6-4, PG, Geoplin Slovan 1986 Agent initially notified us that Dragic will be entering the draft, but in the end decided to keep him out. His buyout was always a question mark.
Leigh Enobakhare, 6-10, Center, Oostende 1986 Agent Ugo Udezue from BDA Sports Management told us that Enobakhare will be entering the draft. In the end he must have heard that he is not considered a prospect at all, and decided to keep him out of the draft.
Cartier Martin, 6-8, SF/PF, Kansas State Junior Martin pondered entering his name in the draft, especially after the firing of Kansas State coach Jim Wooldridge.
Nick Young, 6-6, SG, USC Sophomore Young told the LA Daily News in February that hes staying at USC for another year.
D.J. Strawberry, 6-5, SG/SF, Maryland Junior Strawberry initially intended to test the waters, but eventually ended up not doing so once he found out that his chances of being drafted are almost non-existent.
Al Thornton, 6-7, SF/PF, Florida State Sophomore Implied earlier on in the year that he might put his name in, but sources recently told us it appears that he will return for his senior year. Tallahassee media backs this up.
Marcus Williams (AZ), 6-8, SG/SF, Arizona Freshman After initially appearing to be gone after numerous definitive reports, Williams surprised everyone and thrilled Arizona fans by announcing in a press conference hell be returning for his sophomore year.
Josh McRoberts, 6-11, PF, Duke Freshman After being upset by LSU in the Sweet Sixteen, McRoberts was quoted saying Ill be at Duke next year.. Duke issued a press release a month later confirming this.
Yi Jianlian, 7-0, PF, Guangdong 1987? International Jianlian announced in a press conference that hell be staying in China. A CBA official was also quoted on this matter, sounding as if they were the main factor for him staying put.
Acie Law, 6-3, PG, Texas A&M Junior After a fantastic showing in the NCAA tournament, Law helped his NBA draft stock considerably but will return for his senior year where A&M is expected to make a run at possibly winning the Big 12.
Joakim Noah, 6-11, PF/C, Florida Sophomore Huge 2nd half regular of the regular season and NCAA tournament boosted his stock into as high as the top 5. Noah came out and said afterwards hes staying regardless.
Al Horford, 6-9, PF, Florida Sophomore Horford indicated all season long that hes staying at least one more year, but playing extremely well in winning the national championship gave him a realistic chance at being a lottery pick. Regardless, Horford announced he'll return.
Corey Brewer, 6-8, SF, Florida Sophomore Brewer indicated all season long that hes staying at least one more year, but a terrific performance in the NCAA tournament gave him a realistic chance at being a top 20 pick. Regardless, Brewer announced he'll return.
Glen Davis, 6-8, Center, LSU Sophomore Davis announced hell be returning to LSU immediately after an absolutely horrendous showing in the Final Four which exposed all of his glaring weaknesses. Made it official as an LSU press conference alongside Tyrus Thomas.
Jason Smith, 7-0, PF/C, Colorado State Sophomore Smith announced that hes returning for his junior year, stating that "a little further down the road, it [the NBA] might be in my plans. I'm continuing to concentrate on my academics and see how I can help CSU as much as possible."
Jermareo Davidson, 6-10, PF, Alabama Junior > After burning his lone draft card a year early last June, Davidson considered entering the draft again, but eventually made the right decision in announcing hell be returning for his senior year.
Richard Hendrix, 6-8, PF, Alabama Freshman Told Alabama media after NCAA tournament loss that hell be back in Tuscaloosa next year.
Ja'Vance Coleman, 6-3, SG, Fresno State Junior Testing the waters according to the Fresno Bee. Whoops, no hes not.
Sean Singletary, 5-11, PG, Virginia Sophomore Singletary told The Daily Progress in early February that hes returning.
|
[
"62."
] | 5,970
|
multifieldqa_en
|
en
| null |
f9e0095ae38b9c36aac766c4b82f41be5b7560ce8e544675
|
When did the London Paving and Lighting Act pass, which mandated the numbering of houses?
|
A Brief History of Benjamin Franklin's Residences on Craven Street, London: 1757 - 1775 - Journal of the American Revolution
Benjamin Franklin House, 36 Craven St, London. (Photo by Elliott Brown | Wikimedia Commons)
If one looked into Benjamin Franklin’s time on Craven Street, they might initially believe he lived at 36 Craven Street the entirety of his two stays in London based on the plethora of articles on the internet that say so. If they dug a little deeper they might read that he lived at No. 27 Craven Street, previously numbered 7, but now numbered 36; or that he lived exclusively at No. 7 Craven Street; or that he lived in multiple residences on Craven Street; or that he moved out of No. 36 to another house on Craven Street and then moved back into No. 36 the last year of his residence. What is one to believe with all of the conflicting accounts? What does the historical record have to say about Franklin’s time on Craven Street?
Figure 1. Spur Alley 1685. “A map of the parish of St Martins in the Fields, taken from ye last survey, with additions (1685)”. (© The British Library Board, Shelfmark: Maps Crace Port. 13.2, Item number: 2)
Before Craven Street existed there was Spur Alley, a narrow passageway sandwiched between the Hungerford Market to the north (now Charing Cross Station) and Scotland Yard and the Northumberland House and Garden to the south. It was flanked on both ends by major thoroughfares, the Strand on the west, connecting Westminster to London by road, and the River Thames on the east, not only connecting the two cities to each other and to Southwark on the south side of the Thames, but connecting the entire metropolis to the rest of the world. Being located in the City of Westminster, Spur Alley had escaped the devastation of the Great Fire of London in 1666 leaving its wooden structures, built in the early part of seventeenth century, intact, but also in dire need of restoration or demolition. “The ratebooks show that during the last thirty years or so of their existence the houses in Spur Alley were in a very bad condition. Few of them were rated at more than a few shillings and many of them were unoccupied.”[1] The landowner, William, 5th Baron Craven, desiring to increase the profitability of his assets, tore down the derelict structures on Spur Alley around 1730 and leased the newly established lots to builders. By 1735, twenty brick houses in the Georgian style had been built on the west side and sixteen on the east side of the way now called Craven Street.[2]
Figure 2. Craven Street 1746. (John Rocque London, Westminster and Southwark, First Edition 1746, Motco Enterprises Limited, motco.com)
Letters to Franklin during his residence with Mrs. Margaret Stevenson, his landlady on Craven Street, were addressed rather vaguely; “Craven Street/Strand”, “Mrs. Stevensons in Craven Street”, or “Benjamin Franklin Esqr.” are but a few examples. Letters from Franklin referenced “London,” or sometimes “Cravenstreet,” but never included a number. Despite the absence of numbered addresses in Franklin’s correspondence, there was a sense of one’s place in the neighborhood based on entries in the Westminster Rate Books (tax assessments). The Rate Books did not list house numbers during Franklin’s time there, but they did list the residents of Craven Street in a particular order that became the default numbering system for the street. Number one was associated with the first resident listed under “Craven Street” in the Rate Books and was the northernmost house on the west side of the street. The numbers increased counter-clockwise down the west side and up the east side in accordance with the list of residents. In 1748, the first year of Margaret Stevenson’s (Stevens in the Rate Books for that year) residence on Craven Street, she is listed as the twenty-seventh resident, the second house north of Court Street (later Craven Court, now Craven Passage) on the east side of the street.[3]
In 1766, Parliament passed the London Paving and Lighting Act (6 Geo. 3 c. 26), “An act for the better paving, cleansing, and enlightening, the city of London, and the liberties thereof; and for preventing obstructions and annoyances within the same; and for other purposes therein mentioned.”[4] One of the other purposes therein mentioned was the numbering of houses. With an aim to bring order to the chaotic numbering systems or lack thereof on London streets the Act provided that “… the said commissioners … may also cause every house, shop, or warehouse, in each of the said streets, lanes, squares, yards, courts, alleys, passages, and places, to be marked or numbered, in such manner as they shall judge most proper for distinguishing the same.”[5] This was quite an undertaking that took years to accomplish. It was a decade later before numbered addresses on Craven Street in the City of Westminster appeared in The London Directory (1776). The London Directory and its competitors were published primarily by booksellers or printers to supplement their income and were highly profitable. To say they were competitive is an understatement. “Some of the most hotly disputed struggles over copyright in the century concerned guidebooks. Many were optimistically emblazoned with a royal license and a notice that the work had been entered at Stationers’ Hall. Various struggles between rival guides intensified as the potential for profits became clear.”[6] The London Directory boldly proclaimed to contain “An ALPHABETICAL LIST OF THE NAMES and PLACES of ABODE of the MERCHANTS and PRINCIPAL TRADERS of the Cities of LONDON and WESTMINSTER, the Borough of SOUTHWARK, and their Environs, with the Number affixed to each House.”[7] Kent’s Directory made a similar proclamation: “An Alphabetical LIST OF THE Names and Places of Abode OF THE DIRECTORS of COMPANIES, Persons in Public Business, MERCHANTS, and other eminent TRADERS in the Cities of London and Westminster, and Borough of Southwark WITH THE NUMBERS as they are affixed to their Houses agreeable to the late Acts of Parliament.”[8] Mrs. Stevenson wasn’t included in the directories because she didn’t meet the criteria of being a merchant or trader, not because she was a woman. Although it is rare to see women listed in the directories, some examples do exist.[9] If Mrs. Stevenson had appeared in the directories in 1776 it would not have been on Craven Street as she had moved to Northumberland Court, a stone’s throw away, the previous year.[10] A comparison of Craven Street residents whose names and addresses do appear in the directories with the same residents as they appear in the Westminster Rate Books determines if the numbering systems were congruent. For the most part they were. For example, Joseph Bond at No. 30, William Rowles at No. 31, Samuel Sneyd at No. 32, and Jonathan Michie at No. 35 in The London Directory coincide with their places of residence in the Westminster Rate Books; however, errors did occur. The 1776 edition of The London Directory lists Brown & Whiteford, wine merchants, at No. 9 Craven Street while the Westminster Rate Books list them as the twenty-ninth residents. Obviously, it makes no sense to have Brown & Whiteford at No. 9 in The London Directory and their next-door neighbor, Joseph Bond, at No. 30. The same error appears in Baldwin’s The New Complete Guide for 1783. The New Complete Guide may have “borrowed” the error from The London Directory. It was not uncommon for the owner of one directory to copy entries from another to save both time and money. Beginning in 1778 and contrary to The London Directory, Kent’s Directory faithfully followed the numbering system of the Westminster Rate Books in all of its editions and listed Brown & Whiteford at No. 29 as did Bailey’s Northern Directory in 1781. Perhaps realizing their error, The London Directory changed their listing of Brown & Whiteford from No. 9 to No. 29 in their 1783 edition and maintained that listing thereafter.
Sometime prior to 1792, the embankment on the Thames at the south end of Craven Street had been sufficiently extended allowing for the construction of ten new houses below the original houses: “ … four houses, Nos. 21–24, were built on the west side, and six houses, Nos. 25–30, on the east side of the way.”[11] In a note in the same report, the new numbering system is explained. “The houses in the street, which had previously been numbered consecutively down the west side and up the east side, were then renumbered on the same system to include the additional houses.”[12] Because the new houses (21-24) on the west side were built below the existing houses (1-20), houses 1-20 retained their original numbering.
Figure 4. Craven Street 1799. (Richard Horwood’s Map of London, Westminster and the Borough of Southwark 1799, Motco Enterprises Limited, motco.com)
One would think that the numbers of the sixteen original houses on the east side, Nos. 21 – 36, would simply increase by ten with the addition of the ten new houses, but such was not the case; they increased by nine. How could that be? The only possible explanation is that No. 21 of the original houses was demolished to make way for the construction of the northernmost of the six new houses on the east side (No. 30). Evidence of No. 21’s demolition appears in the lease granted to Charles Owen by William, 7th Baron Craven, in 1792, which describes No. 22 as: “All that messuage in Craven Street late in the occupation of Francis Deschamps undertaker … being the Southernmost house in the Old Buildings on the East Side of the said Street numbered with the No. 22.”[13] The lease describes No. 22 as being the southernmost house in the old buildings on the east side of Craven Street. Clearly the house previously at No. 21 did not exist when the lease granted to Charles Owen was written in 1792 as it used to be the southernmost house. It is also worth noting that in 1790, The London Directory listed Jacob Life at No. 21 (original numbering). In 1791-2, it listed him at No. 6. With No. 21 vacated, it would allow for its demolition and the construction of the tenth new house. By utilizing lot No. 21 for the new construction, only nine additional lots were needed to build the ten houses, hence, Margaret Stevenson’s former residence at 27 became 36 (27 + 9) in the renumbering and not 37.
For nearly a century and a half after Franklin departed London for America in March of 1775 the scales were tipped heavily in favor of his residence having been No. 7 Craven Street. As early as 1807 in London; Being An Accurate History And Description Of The British Metropolis And Its Neighborhood, Volume 4, one would have read: “In Craven Street is a house, No. 7, remarkable for having been the residence of Dr. Benjamin Franklin.[14] In 1815, the identical phrase appeared in The Beauties of England and Wales.[15] After 23 editions of not mentioning Franklin, his name finally appeared in the 24th edition of The Picture of London in 1826: “The house, No. 7, Craven Street, in the Strand, was once the residence of Dr. Benjamin Franklin.”[16] In 1840, Jared Sparks referred to Franklin’s Craven Street residence appearing in London guide books in his voluminous The Works of Benjamin Franklin: “In the London Guide Books, ‘No. 7, Craven Street,’ is still indicated as the house in which Dr. Franklin resided.”[17] In 1846, George Gulliver F.R.S., in his book, The Works of William Hewson, wrote: “She [Polly] had been upon terms of the warmest friendship with Dr. Franklin
Figure 5. No. 7 Craven Street with Memorial Tablet. (Photo courtesy of British History Online, and the Survey of London)
since she was eighteen years of age. That eminent philosopher resided with her mother, Mrs. Margaret Stevenson, at No. 7, Craven Street, Strand, during the fifteen years of his abode in London.”[18] Guide books mentioning Franklin at No. 7 continued to proliferate throughout the century: Handbook for London; Past and Present, Volume I (1849);”[19] Handbook for Modern London (1851);”[20] The Town; Its Memorable Characters and Events (1859);”[21] London and Its Environs (1879).[22] There was an anomaly when London In 1880 Illustrated With Bird’s-Eye Views of the Principal Streets, Sixth Edition (1880) placed Franklin at 27 Craven street.[23] The anomaly lasted for six years until his place of residence was changed to No. 7 in the revised edition, London. Illustrated by Eighteen Bird’s-Eye Views of the Principal Streets (1886).[24] London Past and Present; Its History, Associations, and Traditions, Volume 1 (1891), copied the 1849 Handbook for London almost word-for-word and included, “The house is on the right from the Strand.”[25] In October of 1867, The Society of Arts in London declared that: “In order to show how rich the metropolis is in the memory of important personages and events, which it would be desirable to mark by means of tablets on houses, the Council have caused an alphabetical list to be prepared, … ”[26] Franklin had been elected a corresponding member to the Society in 1756 and was a popular choice among Council members deciding who they were to memorialize.[27] By January of 1870, a tablet honoring him was affixed to the house they believed to have been his residence while in London, No. 7 Craven Street in the Strand on the west side of the street.[28] A majority of historians writing about Franklin in the nineteenth and early twentieth century placed him at No. 7: O. L. Holley, The Life of Benjamin Franklin (1848); E. M. Tomkinson, Benjamin Franklin (1885); John Torrey Morse, Benjamin Franklin (1891); Paul Elmer More, Benjamin Franklin (1900); John S. C. Abbot, Benjamin Franklin (1903); Sydney George Fisher, The True Benjamin Franklin (1903). A notable exception is D. H. Montgomery’s His Life Written by Himself published in 1896. He has Franklin at No. 27 Craven Street. It seems then that depending upon the source, Franklin was thought to have lived at either No. 7 or No. 27, but not both, the overwhelming majority favoring No. 7. As late as 2011, Franklin is still mentioned as living at No. 7.[29]
In 1913, No. 7 was scheduled to be torn down. An article in the March 1914 edition of The Book News Monthly, describes the situation:
As is well known to informed American pilgrims, it has been possible for all admirers of the famous philosopher and statesman to pay their respects to his memory before that house, No. 7 Craven Street, just off the Strand, which was his chief home during his two sojourns in the British capital, but even as these lines are being written the London newspapers are recording that that interesting shrine is soon to be pulled down to make room for a restaurant. It is some mitigation of this misfortune to remember that at the most the Craven Street house was nothing more than a reproduction of the one in which Franklin had his suite of four rooms, for the structure has been rebuilt since Franklin’s time. When, then, some one makes a piteous plea that at least the philosopher’s bedroom shall be preserved, the soothing answer is that the apartment in question is only a replica of that in which the illustrious American enjoyed his well-earned slumbers in 1757-62 and 1764-75. The restaurant-builder, however, with an eye doubtless to possible American patronage, has assured the world that every effort will be made to preserve as much as possible of the entire structure.[30]
Concerned with the possible demolition of Franklin’s residence, the Royal Society of Arts (formerly the Society of Arts[31]) initiated an inquiry into the matter.[32] The London County Council, having taken over the responsibility of placing memorial tablets on notable houses from the Royal Society, was charged with the investigation. It ultimately fell to Sir George Laurence Gomme, a clerk to the Council, to come up with a response. A few years earlier Sir George had discovered Margaret Stevenson residing at No. 27 Craven Street in the Westminster Rate Books. He must have wondered why No. 7 on the west side of Craven Street was being celebrated as Franklin’s residence when the evidence clearly showed otherwise.
Sir George and his staff examined the various London directories discussed earlier and came up with a novel explanation for the discrepancy. They concluded that there had been two numbering systems on Craven Street. An anonymous author echoes Sir George’s conclusion about the two numbering systems in an article in The Journal of the Royal Society of Arts:
…an inspection of the directories of that time proves that there were at least two systems of numbering in Craven Street before the erection of the additional houses. According to one of these the numbers started from the top (Strand end) on the west side of the street, and ran down to the bottom to No. 20, then crossed over and went back to the Strand along the east side – 21 to 36. According to the other system, the east side of the street was numbered from the bottom upwards, starting at No 1. This was not apparently in general use, but there is evidence that this numbering was at all events occasionally used.
The evidence of these two systems of numbering, and for believing that Mrs. Stevenson’s house was first No. 7 under the oldest system, next No. 27 under the second system, and finally No. 36 under the latest and existing system, is to be found in the various directories and the Westminster rate-books.[33]
The “evidence” mentioned above consisted of The London Directory’s listing of Brown & Whiteford at No. 9: “The rate-books for 1781 and 1786 show the house next but one to the north of Mrs. Stevenson’s house as in the occupation of Brown and ‘Whiteford,’ while the old directories mention the business of the firm as wine merchants, and give their address as 9, Craven Street – then a little later, down to 1791, as 29, Craven Street. Curiously enough, in the years 1778 to 1780, or 1781, Lowndes gives it as No. 9, and Kent as 29.”[34] Ignoring Kent’s Directory having Brown and Whiteford as 29 and The London Directory (Lowndes) having Brown and Whiteford “a little later” as 29, and knowing that Mrs. Stevenson lived two doors south of them, Sir George concluded that her house must have been numbered 7, even though there is no listing in any of the directories of her residence ever being No. 7. He surmised that the No. 7 on the west side of Craven Street with the memorial tablet thought to have been Franklin’s residence had simply been confused with number 7 (27) on the east side. Again from The Journal of the Royal Society of Arts:
Taking all the evidence together, there cannot be any doubt whatever that Mrs. Stevenson’s house, in which Franklin lodged, was the house two doors north from Craven Court, first numbered 7, afterwards 27, and finally 36, and consequently that the house in which Franklin lived was that now numbered 36, not the one now numbered 7, on which the tablet is placed.[35]
A response to The Royal Society of Arts was issued: “… the London County Council … informed the Society that it had made a mistake and that No. 36 Craven street was the building that deserved commemoration.”[36] The Society accepted the Council’s conclusion, and despite assurances of preservation by the restaurant builder, No. 7 was torn down the following year.
Sir George’s assertion “that Mrs. Stevenson’s house, in which Franklin lodged, was the house two doors north from Craven Court” was correct, however, his assertion that it was “first numbered 7, afterwards 27”, was not. It was only by association with the errant entry of Brown & Whiteford at No. 9 from 1776-1782 in The London Directory that Mrs. Stevenson’s address was conjured to be No. 7. The problem with associating her address exclusively with that of Brown & Whiteford at No. 9 during those years is that, as previously demonstrated, The London Directory also listed four other Craven Street residents, Bond, Rowles, Sneyd, and Michie, who’s addresses did conform to the numbering system in The Westminster Rate Books. If Brown & Whiteford at No. 9 was indicative of a numbering system different from The Westminster Rate Books, Bond, Rowles, Sneyd, and Michie would have been listed as Nos. 10, 11, 12, and 15, respectively. So on one hand Sir George was relying on the Westminster Rate Books to establish Mrs. Stevenson at No. 27 and on the other hand he was dismissing the Westminster Rate Books to establish her at No. 7. Instead of using the anomalous listing of Brown & Whiteford at No. 9, he could have just as easily, and more logically, used the Bond et al. listings, or the post-1782 Brown & Whiteford listing in the London Directory at No. 29 to establish Mrs. Stevenson at No. 27. Even if there had been two numbering systems, his assertion that No. 27 was first numbered 7 would still be false. The earliest numbering system was the Westminster Rate Books dating from the early 1730s when the houses were constructed. Brown & Whiteford at No. 9 didn’t appear until 46 years later and then only for a brief period.
There is ample evidence in Franklin’s correspondence and in a memoir by Polly Hewson (Mrs. Stevenson’s daughter) that Benjamin and Mrs. Stevenson lived in not one, but two houses on Craven Street. On July 6, 1772, Polly wrote to Benjamin from her house at Broad Street North in London: “My Mother I must tell you went off last friday week, took our little Boy with her and left Mr. Hewson [Polly’s husband, William] the care of her House [27 Craven Street]. The first thing he did was pulling down a part of it in order to turn it to his own purpose, and advantage we hope. This Demolition cannot affect you, who at present are not even a Lodger [Benjamin was traveling at the time], your litterary apartment remains untouch’d, the Door is lock’d …”[37] In a memoir about her husband written after his death Polly writes: “He [William Hewson] began his Lectures Sept. 30, 1772, in Craven-street, where he had built a Theatre adjoining a house which he intended for the future residence of his family.”[38] On October 7, 1772, Benjamin wrote to his son William: “I am very well. But we [Mrs. Stevenson and I] are moving to another House in the same street; and I go down tomorrow to Lord LeDespencer’s to [stay a] Week till things are settled.”[39] To his son-in-law, Richard Bache, on the same day he wrote: “We are moving to another House in the [street] leaving this to Mr. Hewson.”[40] Writing to a friend on October 30, 1772 he explained: “I should sooner have answered your Questions but that in the Confusion of my Papers, occasioned by removing to another House, I could not readily find the Memorandums …”[41] On November 4, 1772 Benjamin informed his wife Deborah of the move. “We are removed to a more convenient House in the same street, Mrs. Stevenson having accommodated her Son-in-Law with that we lived in. The Removing has been a troublesome Affair, but is now over.”[42]
An agreement had been struck between the parties. Margaret and Benjamin would move to another house on Craven Street and allow Polly and William to move into No. 27, the large yard behind the house being spacious enough to accommodate the anatomy school William wished to build.[43] Perhaps the idea was inspired by Margaret’s next-door neighbor at No. 26, Dr. John Leake, a man-midwife and founder of the Westminster Lying-in Hospital, who had built a theater adjoining his residence in which he practiced anatomy and taught midwifery.[44]
After Margaret and Benjamin vacated No. 27, Polly, William, their son William Jr., and William’s younger sister, Dorothy Hewson, took up residence there.[45] In the 1773 Westminster Rate Books for Craven Street, Mrs. Stevenson’s (Stephenson in the Rate Books) name has been crossed out and replaced with “William Hewson.”[46] Further proof that the Hewsons had indeed moved into 27 Craven Street has been confirmed by the discovery of human and animal remains buried in the basement of No. 36 (formerly No. 27 and now the Benjamin Franklin House), a by-product of the dissections that took place at William’s anatomy school.[47]
So what house on Craven Street did Mrs. Stevenson and Benjamin move into after vacating No. 27? An examination of the Westminster Rate Books for the years 1774 and 1775 reveal them living not at No. 7 on the west side of Craven Street as one might expect from the overwhelming consensus of nineteenth century guidebooks and biographies, but surprisingly at No. 1.[48] The controversy of No. 7 being torn down was all for naught as it had never been Franklin’s residence. Sir George was correct on that point. Unfortunately, No. 1 was torn down as well in the early part of the twentieth century. The first time No. 1 is mentioned as Franklin’s second residence is in the Survey of London: Volume 18, St Martin-in-The-Fields II: the Strand published by the London County Council in 1937, ironically the same County Council that had declared No. 36 as Franklin’s only residence twenty-four years earlier.
From 1748 until 1772 Margaret ‘Stephenson’ occupied this house [No. 27 (36)], and it was there that Benjamin Franklin settled after his arrival in London in 1757 as Agent to the General Assembly of Pennsylvania … In October, 1772, Mrs. Stevenson and Franklin removed to No. 1, Craven Street (now demolished), and No. 36 was for the next two years occupied by William Hewson, surgeon, who had married Mary Stevenson.[49]
In the spring of 1774, William Hewson died unexpectedly of septicemia two weeks after cutting himself while dissecting a cadaver. Polly was left to care for their two young sons and was pregnant with a daughter she would give birth to in August of the same year. Is it possible that Margaret and Benjamin moved back into No. 27 to assist Polly after the death of her husband as suggested in The Americanization of Benjamin Franklin?[50]
If the Westminster Rate Books are to be believed, the answer is no. For the year 1774, the Rate Books list Margaret Stevenson at No. 1 and William Hewson at No. 27. For the year 1775, they list Margaret Stevenson at No. 1 and Magnus Falkner (Falconer/Falconar) at No. 27. Magnus was William’s assistant at the anatomy school and fiancé to William’s sister, Dorothy. On his death bed, William instructed Polly, “let Mr. Falconar be my successor.”[51] Magnus would immediately take over the running of the anatomy school and continue William’s unfinished research. Four months later, he and Dorothy would marry.[52] Essentially only two things changed at 27 Craven Street after William’s death: Polly gave birth to her daughter, and Magnus replaced William as the lease holder, so even if Margaret and Benjamin had wished to move back into No. 27, there would have been no room for them. It is also interesting to note that considering the multiple times Benjamin wrote of his move out of No. 27 (and complained of it), he never once mentioned moving back into No. 27 in any of his correspondence after Mr. Hewson’s death.
Figure 6. No. 36 Craven Street. (Photo courtesy of David Ross, britainexpress.com)
In sum, based on the Westminster Rate Books[53] and Franklin’s correspondence, Mrs. Stevenson is known to have resided at No. 27 (36) Craven Street from 1748 to 1772. It follows that, aside from the two years Franklin spent in Philadelphia from 1762 to 1764, he resided there from 1757 to 1772. Franklin’s correspondence also reveals that in the autumn of 1772, he and Mrs. Stevenson moved to another house on Craven Street. The 1773 Westminster Rate Books show her name crossed off at No. 27 and William Hewson’s inserted. The following year the Rate Books list her at No. 1 Craven Street. Evidence for Mrs. Stevenson and Benjamin remaining at No. 1 after William’s death appears in the Westminster Rate Books for 1775 which have Mrs. Stevenson still residing at No. 1 and Magnus Falkner residing at No. 27. Further evidence can be construed from the lack of any mention of a move back into No. 27 in Franklin’s correspondence. Despite the many theories one could devise as to why Franklin was thought to have lived at No. 7 Craven Street by so many guide books and Franklin biographers of the nineteenth century, one thing is certain; at some point after Franklin’s departure to America in March of 1775, and no later than 1807, someone mistakenly associated him with No. 7 on the west side of Craven Street, and it soon became his de facto residence. Credit must go to D. H. Montgomery in 1896 and Sir George in 1913 for setting the record partially straight by placing Franklin at No. 27(36). In 1937, the London County Council gave us the first accurate account of Franklin’s residences on Craven Street in the Survey of London at No. 27(36) and No. 1. It has been shown conclusively that No. 27 was never previously numbered 7. It was, however, renumbered 36 in 1792 after ten additional houses were built at the southern end of the street and remains No. 36 to this day.
[1] “Craven Street and Hungerford Lane”, in Survey of London: Volume 18, St Martin-in-the-Fields II: the Strand, ed. G H Gater and E P Wheeler (London, 1937), 27-39, Early History of the Site.
http://www.british-history.ac.uk/survey-london/vol18/pt2/pp27-39
[2] “England, Westminster Rate Books, 1634-1900,” from database with images, Craven Street – 1735, FamilySearch from database by FindMyPast and images digitized by FamilySearch; citing Westminster City Archives, London.
[3] Ibid., Craven Street – 1748.
[4] The Statutes at Large, From Magna Charta to the End of the Eleventh Parliament of Great Britain. Anno 1761 Continued, Vol. XXVII, ed. Danby Pickering, (Cambridge, John Archdeacon, 1767), 96.
[6] James Raven, Publishing Business in Eighteenth-Century England, (Woodbridge: The Boydell Press, 2014), 201.
[7] The London Directory For the Year 1776, Ninth Edition, (London: T. Lowndes, 1776), title page.
[8] Kent’s Directory For the Year 1778, Forty-Sixth Edition, (London: Richard and Henry Causton, 1778), title page.
[9] A listing in Kent’s Directory for the Year 1882 on p. 28 reveals, “Brown Sarah, Leather-seller, 1, Westmoreland-buildings, Aldersgate-street”, and in Kent’s Directory for the Year 1883 on p. 175, “Whiteland Mary, Wine & Brandy Mercht. Jermyn-str. St. James.”
[10] “The Papers of Benjamin Franklin,” Sponsored by The American Philosophical Society and Yale University, Digital Edition by The Packard Humanities Institute, 22:263a.
http://franklinpapers.org/franklin
Mrs. Stevenson wrote to Benjamin Franklin a letter from her new home at 75 Northumberland Court on November 16, 1775: “In this Court I have a kind friend, Mr. Lechmoen he comes and seats with me and talks of you with a hiy regard and friendship.”
[11] Survey of London, Early History of the Site.
[12] Survey of London, Footnotes/n 10.
[13] Survey of London, Historical Notes/No. 31.
[14] David Hughson, LL.D., London; Being An Accurate History And Description Of The British Metropolis And Its Neighbourhood, To Thirty Miles Extent, From An Actual Perambulation, Vol. IV, (London: W. Stratford, 1807), 227.
[15] The Reverend Joseph Nightingale, The Beauties of England and Wales: Or, Original Delineations, Topographical, Historical, and Descriptive, of Each County, Vol. X, Part III, Vol. II (London: J. Harris; Longman and Co.; J. Walker; R. Baldwin; Sherwood and Co.; J. and J. Cundee; B. and R. Crosby and Co.; J Cuthell; J. and J. Richardson; Cadell and Davies; C. and J. Rivington; and G. Cowie and Co., 1815), 245.
[16] John Britton, F.S.A. & Co., ed., The Original Picture of London, Enlarged and Improved: Being A Correct Guide For The Stranger, As Well As For the Inhabitant, To The Metropolis Of The British Empire Together With A Description Of The Environs, The Twenty-Fourth Edition (London: Longman, Rees, Orme, Brown, and Green, 1826), 479.
[17] Jared Sparks, The Works of Benjamin Franklin, Vol. VII, (Philadelphia: Childs & Peterson, 1840), 151.
[18] George Gulliver, F.R.S., The Works of William Hewson, F. R. S., (London: Printed for the Sydenham Society, MDCCCXLVI), xx.
[19] Peter Cunningham, Handbook for London; Past and Present, Vol. I, (London: John Murray, 1849), 245.
[20] F. Saunders, Memories of the Great Metropolis: or, London, from the Tower to the Crystal Palace, (New York: G.P. Putnam, MDCCCLII), 138.
[21] Leigh Hunt, The Town; Its Memorable Characters and Events, (London: Smith, Elder and Co., 1859), 185.
[22] K. Baedeker, London and Its Environs, Including Excursions To Brighton, The Isle of Wight, Etc.: Handbook For Travelers, Second Edition, (London: Dulau and Co., 1879), 133.
[23] Herbert Fry, London In 1880 Illustrated With Bird’s-Eye Views of the Principal Streets, Sixth Edition, (New York: Scribner, Welford, & Co., 1880), 50.
[24] Herbert Fry, London. Illustrated By Eighteen Bird’s-Eye Views of the Principal Streets, (London: W. H. Allen and Co., 1886), 40.
[25] Henry B. Wheatley, F.S.A., London Past and Present; Its History, Associations, and Traditions, Vol. 1, (London: John Murray, New York: Scribner & Welford, 1891), 473.
[26] The Journal of the Society of Arts, Vol. XV, No. 778, (October 18, 1867): 717.
[27] D. G. C. Allen, “Dear and Serviceable to Each Other: Benjamin Franklin and the Royal Society of Arts,” American Philosophical Society, Vol. 144, No. 3, (September 2000): 248-249.
Franklin was a corresponding member in 1756 because he was still residing in Philadelphia. He became an active member the following year when he moved to London.
[28] The Journal of the Society of Arts, Vol. XVIII, No. 894, (Jan. 7, 1870): 137.
“Since the last announcement, the following tablets have been affixed on houses formerly occupied by – Benjamin Franklin, 7 Craven-street, Strand, W.C.”
[29] Franklin in His Own Time, eds. Kevin J. Haytes and Isabelle Bour, (Iowa City, University of Iowa Press, 2011), xxxvii.
“Takes lodgings with Margaret Stevenson at No. 7 Craven Street.” It is unknown if the editors are referring to No. 7 on the west side of Craven Street or No. 36 on the east side using Sir George’s explanation of No. 36 being previously numbered 7.
[30] Henry C. Shelly, “American Shrines on English Soil, III. In the Footprints of Benjamin Franklin,” in The Book News Monthly, September, 1913 to August, 1914, (Philadelphia: John Wanamaker, 1914), 325.
[31] The Journal of the Royal Society of Arts, Vol. LVI, No. 2,880, (Jan. 31, 1908): 245.
http://babel.hathitrust.org/cgi/pt?id=mdp.39015058423073;view=1up;seq=251
“His Majesty the King, who is Patron of the Society, has granted permission to the Society to prefix to its title the term ‘Royal,’ and the Society will consequently be known in future as the ‘Royal Society of Arts.’”
[32] Nineteenth Annual Report, 1914, of the American Scenic and Historic Preservation Society, (Albany: J. B. Lyon Company, 1914), 293.
http://babel.hathitrust.org/cgi/pt?id=wu.89072985302;view=1up;seq=4;size=150
[33] The Journal of the Society of Arts, Vol. LXII, No. 3,183, (Nov. 21, 1913): 18.
http://babel.hathitrust.org/cgi/pt?id=mdp.39015058422968;view=1up;seq=26
[36] Allen, “Dear and Serviceable,” 263-264.
[37] Papers of Benjamin Franklin, 19:20.
[38] Thomas Joseph Pettigrew, F. L. S., Memoirs of the Life and Writings of the Late John Coakley Lettsom With a Selection From His Correspondence, Vol. I, (London: Nichols, Son, and Bentley, 1817), 144 of Correspondence.
[39] Papers of Benjamin Franklin, 19:321b.
[40] Ibid., 19:314.
[41] Ibid., 19:353a.
[43] Simon David John Chaplin, John Hunter and the ‘museum oeconomy’, 1750-1800, Department of History, King’s College London. Thesis submitted for the degree of Doctor of Philosophy of the University of London., 202.
“Following Falconar’s death [1778] the lease [27 Craven Street] was advertised, and the buildings were described as:
A genteel and commodious house, in good Repair, with Coach-house and Stabling for two Horses…consisting of two rooms and light closets on each floor, with outbuildings in the Yard, a Museum, a Compleat Theatre, and other conveniences. (Daily Advertiser, 27 August 1778)”
[44] Simon Chaplin, “Dissection and Display in Eighteenth-Century London,” in Anatomical Dissection in Enlightenment England and Beyond: Autopsy, Pathology and Display, ed. Dr. Piers Mitchell, (Burlington: Ashgate Publishing Company, 2012), 108.
“Given that a nearby building at 35 [ No. 26 in Franklin’s time] was occupied by the man-midwife John Leake, who advertised lectures – including lessons in the art of making preparations – at his ‘theatre’ between 1764 and 1788, it is possible that some facilities were shared. In both cases, however, the buildings [Leake’s residence at No. 26 and Hewson’s residence next door at 27] served a dual function as domestic accommodation and as sites for lecturing and dissection.”
[45] George Gulliver, F.R.S., The Works of William Hewson, F. R. S., (London: Printed for the Sydenham Society, MDCCCXLVI), xviii.
[46] Westminster Rate Books, Craven Street – 1773, courtesy of the City of Westminster Archives.
[47] S.W. Hillson et al., “Benjamin Franklin, William Hewson, and the Craven Street Bones,” Archaeology International, Vol. 2, (Nov. 22, 1998): 14-16.
http://dx.doi.org/10.5334/ai.0206
[48] Westminster Rate Books, Craven Street – 1774, 1775, courtesy of the City of Westminster Archives.
[49] Survey of London, Historical Notes/No. 36, Craven Street (not sourced).
[50] Gordon S. Wood, The Americanization of Benjamin Franklin, (New York: The Penguin Press, 2004), 261.
[51] Pettigrew, Memoirs, 146 of Correspondence.
[52] http://founders.archives.gov/documents/Franklin/01-22-02-0178, note 7. “Falconar married Hewson’s sister five months after the Doctor’s death; most of the Craven Street circle attended the wedding, and BF gave away the bride: Polly to Barbara Hewson, Oct. 4, 1774, APS” (American Philosophical Society); “England Marriages, 1538–1973 ,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:V52W-TGS : accessed September 15, 2015), Magnus Falconar and Dorothy Hewson, September 12, 1774; citing Saint Martin In The Fields, Westminster, London, England, reference ; FHL microfilm 561156, 561157, 561158, 942 B4HA V. 25, 942 B4HA V. 66.
[53] I chose to rely on the Westminster Rate Books for the numbering system on Craven Street. The books were consistent throughout the eighteenth century in the ordering of residents on the street and were used as the basis for the 1792 re-numbering. For the most part, commercial directories aligned with them as well. If by chance a directory didn’t initially align, it would inevitably produce future editions that did.
Benjamin Franklin, Benjamin Franklin House, London
More from David Turnquist
If one looked into Benjamin Franklin’s time on Craven Street, they might...
I think it’s very ironic that on the street maps included in your excellent article, Craven Street is so close to Scotland Yard. Because following the back and forth juxtapositions of numbers 7, 27 and 36 Craven Street (throw in 75 Northumberland Court and 1 Craven Street, too) was a case that could confound Sherlock Holmes.
Excellent job of deciphering street renumbering material spanning sixty years, including that of a wrong house number (# 7) being erroneously identified and then perpetuated in subsequent street map printings. It’s gratifying at least to know that the present day #36 Craven Street is the correct house for Ben Franklin tourists to visit. Except for #1 Craven Street for the last three years Franklin was in London, but we won’t get into that.
Again, excellent article, David!
|
[
"1766."
] | 6,539
|
multifieldqa_en
|
en
| null |
229b5bf2402ae2950c72494dcfd5f1c825c396205b49ca50
|
What is the main topic of the text?
|
Ann's Mega Dub: 12/19/10 - 12/26/10
Got o have a penis to be an expert
Thursday on NPR's Fresh Air, Terry Gross wanted to talk film and music. Since women don't know a thing about either and aren't interested in either, Terry had to find men who were 'experts.'This is C.I.'s " Iraq snapshot Friday, December 24, 2010. Chaos and violence continue, Nouri's incomplete Cabinet continues to receive criticism, a father offers an 'excuse' for killing his own daughter, and more.Marci Stone (US Headlines Examiner) reports, "Friday afternoon, Santa is currently in Baghdad, Iraq and on his next stop is Moscow, Russia, according to the 2010 NORAD Santa Tracker. The North American Aerospace Defense Command (NORAD) has been tracking Santa as he makes his annual journey throughout the world." Gerald Skoning (Palm Beach Post) quotes Santa saying, "We send our special wishes for peace and goodwill to all. That includes the people of Iraq, Afghanistan, Iran and North Korea." Please note that this is Santa's seventh trip to Iraq since the start of the Iraq War and, as usual, his journey was known in advance. No waiting until he hit the ground to announce he was going to Iraq -- the way George The Bully Boy Bush had to and the way US President Barack Obama still has to. In the lead up to Santa's yearly visit, many 'authorities' in Iraq began insisting that Christmas couldn't be celebrated publicly, that even Santa was banned. Gabriel Gatehouse (BBC News) quotes Shemmi Hanna stating, "I wasn't hurt but I wish that I had been killed. I wish I had become a martyr for this church, but God kept me alive for my daughters." Shemmi Hanna was in Our Lady of Salvation Church in Baghdad when it was assaulted October 31st and she lost her husband, her son, her daughter-in-law and her infant grandson in the attack. The October 31st attack marks the latest wave of violence targeting Iraqi Christians. The violence has led many to flee to northern Iraq (KRG) or to other countries. Zvi Bar'el (Haaretz) notes, "This week the Iraqi legislature discussed the Christians' situation and passed a resolution in principle to help families who fled. However, the parliament does not know where the Christians are, how many are still in Iraq, in their homes, and how many have found asylum in Iraqi Kurdistan." John Leland (New York Times) reports:The congregants on Friday night were fewer than 100, in a sanctuary built for four or five times as many. But they were determined. This year, even more than in the past, Iraqi's dwindling Christian minority had reasons to stay home for Christmas. "Yes, we are threatened, but we will not stop praying," the Rev. Meyassr al-Qaspotros told the Christmas Eve crowd at the Sacred Church of Jesus, a Chaldean Catholic church. "We do not want to leave the country because we will leave an empty space." Raheem Salman (Los Angeles Times) reports, "Rimon Metti's family will go to Christian services on Christmas Day, but his relatives will be praying for their own survival and wondering whether this is their last holiday season in Baghdad. If they had any grounds for optimism about the future of their faith in Iraq, it vanished this year amid repeated attacks on fellow believers." Shahsank Bengali (McClatchy Newspapers) adds, "Nearly two months after a shocking assault by Islamist militants, Our Lady of Salvation Catholic Church will commemorate Christmas quietly, with daytime mass and prayers for the dead, under security fit more for a prison than a house of worship. It is the same at Christian churches across Baghdad and northern Iraq, where what's left of one of the world's oldest Christian communities prepares to mark perhaps the most somber Christmas since the start of the Iraq war."Meanwhile Taylor Luck (Jordan Times) reports on Iraqi refugees in Jordan:Although the calendar will say December 25, for Theresa, Saturday will not be Christmas. There will be no cinnamon klecha cooling on the dining room table, no outdoor ceramic nativity scene, no readings of hymns with relatives. The 63-year-old Iraqi woman has even refused to put up Christmas lights in the crowded two-room Amman hotel apartment she has called home since fleeing Baghdad last month."There is no holiday spirit. All we have is fear," she said.This holiday will instead mark another year without news from her 46-year-old son, who was kidnapped outside Baghdad in late 2006.From Turkey, Sebnem Arsu (New York Times -- link has text and video) notes the increase in Iraq refugees to the country since October 31st and quotes Father Emlek stating, "I've never seen as many people coming here as I have in the last few weeks. They also go to Lebanon, Jordan and Syria but it seems that Turkey is the most popular despite the fact that they do not speak the language." Jeff Karoub (AP) reports on the small number of Iraqi refugees who have made it to the US and how some of them "struggle with insomnia, depression and anxiety."One group in Iraq who can openly celebrate Christmas are US service members who elect to. Barbara Surk (AP) reports that tomorrow Chief Warrant Officer Archie Morgan will celebrate his fourth Christmas in Iraq and Captain Diana Crane is celebrating her second Christmas in Iraq: "Crane was among several dozen troops attending a Christmas Eve mass in a chapel in Camp Victory, an American military base just outside Baghdad." Marc Hansen (Des Moines Reigster) speaks with six service members from Iowa who are stationed in Iraq. Sgt 1st Class Dennis Crosser tells Hansen, "I certainly understand from reading the paper what's going on in Afghanistan and the attention definitely needs to be on the troops there. But everyone serving here in Operation New Dawn appreciates a little bit of attention as we finish this up."Today Jiang Yu, China's Foreign Minister, issued the following statement, "We welcome and congratulate Iraq on forming a new government. We hope that the Iraqi Government unite all its people, stabilize the security situation, accelerate economic reconstruction and make new progress in building its country." James Cogan (WSWS) reports:US State Department official Philip Crowley declared on Wednesday that Washington had not "dictated the terms of the government". In reality, constant American pressure was applied to Maliki, Allawi, Kurdish leaders and other prominent Iraqi politicians throughout the entire nine-month process to form a cabinet. The US intervention included numerous personal phone calls and visits to Baghdad by both President Barack Obama and Vice President Joe Biden.The key objective of the Obama administration has been to ensure that the next Iraqi government will "request" a long-term military partnership with the US when the current Status of Forces Agreement (SOFA) expires at the end of 2011. The SOFA is the legal basis upon which some 50,000 American troops remain in Iraq, operating from large strategic air bases such as Balad and Tallil and Al Asad. US imperialism spent billions of dollars establishing these advanced bases as part of its wider strategic plans and has no intention of abandoning them.Cogan's only the second person to include the SOFA in his report. Some are impressed with the 'feat' of taking nearly ten months to form a government, stringing the country along for ten months while no decisions could go through. The editorial board of the Washington Post, for example, was full of praise yesterday. Today they're joined by Iran's Ambassador to Iraq, Hassan Danaiifar. The Tehran Times reports that Danaiifar was full of praise today hailing the "positive and final step which ended the 10-month political limbo in Iraq." However, Danaiifar was less pie-in-the-sky than the Post editorial board because he can foresee future problems as evidenced by his statement, "We may witness the emergence of some problems after one and half of a year -- for example, some ministers may be impeached." Of course, there are already many clouds on the horizon, even if Iranian diplomats and Post editorial boards can't suss them out. For example, Ben Bendig (Epoch Times) noted the objection of Iraq's female politicians to Nouri al-Maliki's decision to nominate only one woman (so far) to his Cabinet: "Some 50 female lawmakers went to the country's top leadership, the United Nations and the Arab League to voice their concern and desire for increased representation." BNO notes that protest and also that a group of Iraqi MPs are alleging that Iraqiya bought seats in the Cabinet via money exchanged in Jordan. UPI adds, "Maliki, a Shiite who has a long history of working with Tehran, has named himself acting minister of defense, interior and national security, three most powerful and sensitive posts in the government he is stitching together. Although Maliki appears to be bending over backward to accommodate rivals among Iraq's Shiite majority as well as minority Sunnis and Kurds in his administration in a spirit of reconciliation, he is unlikely to relinquish those ministries that dominate the security sector." DPA reports, "Sheikh Abdel-Mahdi al-Karbalaei, a confident of influential Shiite spiritual leader Ayatollah Ali al-Sistani, said that the new cabinet is 'below the standards' Iraqi citizens had hoped for and suggested it could prove to be weaker than the previous government." Ranj Alaaldin (Guardian) also spots clouds on the horizon:Lasting peace and stability depends on resolving outstanding disputes with the Kurds on oil, revenue-sharing, security and the disputed territories (Kirkuk in particular). The Kurds, rather than exploiting their kingmaker position to take a stronger proportion of ministries in Baghdad (they are taking just one major portfolio – the foreign ministry), are instead banking on guarantees from Maliki to implement their list of 19 demands that includes resolving the above disputes in their favour.They may have been naive, though. With their historical and federalist partners, the Islamic supreme council of Iraq in decline, the Kurds may be isolated in the new government – a government dominated by the nationalistic and centrist characteristics of the INM, the Sadrists and indeed State of Law.Maliki may, therefore, turn out to be unable to grant concessions even if he wanted to and could use Osama Nujayfi, the new ultra-nationalist speaker of parliament and Kurdish foe, to absorb the Kurdish criticism and insulate himself from any attacks.AP reports that Iraqi police sought out a 19-year-old woman because of rumors that she was working with al Qaida in Mesopotamia only to be greeted with the news that her father allegedly killed her and the father showed the police where he buried the woman . . . last month. The story begs for more than it offers. The most obvious observation is: what does it say that a woman's allegedly killed by her father and no one says a word for over a month? After that, it should probably be noted that there are many men in Iraq killing women who, no doubt, would love to also be able to pin the blame on al Qaida. In other violence, Reuters notes a house bombing in Haswa which claimed the life of Mohammed al-Karrafi, "his wife, two sons and a nephew" -- as well as injuring four more people, and a Samarra roadside bombing which claimed the lives of 2 police officers. DPA notes it was two homes bombed in Haswa and that the Samarra roadside bombing also injured four Iraqi soldiers. Jomana Karadsheh (CNN) reports, "Another policeman was wounded in Baghdad Friday night when a roadside bomb detonated by a police patrol, an Interior Ministry official told CNN."And we'll close with this from Peace Mom Cindy Sheehan's latest Al Jazeera column:The recent repeal of the US military policy of "Don't ask, don't tell" is far from being the human rights advancement some are touting it to be. I find it intellectually dishonest, in fact, illogical on any level to associate human rights with any military, let alone one that is currently dehumanising two populations as well as numerous other victims of it's clandestine "security" policies.Placing this major contention aside, the enactment of the bill might be an institutional step forward in the fight for "equality"; however institutions rarely reflect reality.Do we really think that the US congress vote to repeal the act and Obama signing the bill is going to stop the current systemic harassment of gays in the military?While I am a staunch advocate for equality of marriage and same-sex partnership, I cannot - as a peace activist - rejoice in the fact that now homosexuals can openly serve next to heterosexuals in one of the least socially responsible organisations that currently exists on earth: The US military.It is an organisation tainted with a history of intolerance towards anyone who isn't a Caucasian male from the Mid-West. Even then I'm sure plenty fitting that description have faced the terror and torment enshrined into an institution that transforms the pride and enthusiasm of youth into a narrow zeal for dominating power relations.And we'll close with this from Francis A. Boyle's "2011: Prospects for Humanity?" (Global Research):Historically, this latest eruption of American militarism at the start of the 21st Century is akin to that of America opening the 20th Century by means of the U.S.-instigated Spanish-American War in 1898. Then the Republican administration of President William McKinley stole their colonial empire from Spain in Cuba, Puerto Rico, Guam, and the Philippines; inflicted a near genocidal war against the Filipino people; while at the same time illegally annexing the Kingdom of Hawaii and subjecting the Native Hawaiian people (who call themselves the Kanaka Maoli) to near genocidal conditions. Additionally, McKinley's military and colonial expansion into the Pacific was also designed to secure America's economic exploitation of China pursuant to the euphemistic rubric of the "open door" policy. But over the next four decades America's aggressive presence, policies, and practices in the "Pacific" would ineluctably pave the way for Japan's attack at Pearl Harbor on Dec. 7, 194l, and thus America's precipitation into the ongoing Second World War. Today a century later the serial imperial aggressions launched and menaced by the Republican Bush Jr. administration and now the Democratic Obama administration are threatening to set off World War III. By shamelessly exploiting the terrible tragedy of 11 September 2001, the Bush Jr. administration set forth to steal a hydrocarbon empire from the Muslim states and peoples living in Central Asia and the Persian Gulf under the bogus pretexts of (1) fighting a war against international terrorism; and/or (2) eliminating weapons of mass destruction; and/or (3) the promotion of democracy; and/or (4) self-styled "humanitarian intervention." Only this time the geopolitical stakes are infinitely greater than they were a century ago: control and domination of two-thirds of the world's hydrocarbon resources and thus the very fundament and energizer of the global economic system – oil and gas. The Bush Jr./ Obama administrations have already targeted the remaining hydrocarbon reserves of Africa, Latin America, and Southeast Asia for further conquest or domination, together with the strategic choke-points at sea and on land required for their transportation. In this regard, the Bush Jr. administration announced the establishment of the U.S. Pentagon's Africa Command (AFRICOM) in order to better control, dominate, and exploit both the natural resources and the variegated peoples of the continent of Africa, the very cradle of our human species. This current bout of U.S. imperialism is what Hans Morgenthau denominated "unlimited imperialism" in his seminal work Politics Among Nations (4th ed. 1968, at 52-53): The outstanding historic examples of unlimited imperialism are the expansionist policies of Alexander the Great, Rome, the Arabs in the seventh and eighth centuries, Napoleon I, and Hitler. They all have in common an urge toward expansion which knows no rational limits, feeds on its own successes and, if not stopped by a superior force, will go on to the confines of the political world. This urge will not be satisfied so long as there remains anywhere a possible object of domination--a politically organized group of men which by its very independence challenges the conqueror's lust for power. It is, as we shall see, exactly the lack of moderation, the aspiration to conquer all that lends itself to conquest, characteristic of unlimited imperialism, which in the past has been the undoing of the imperialistic policies of this kind…. On 10 November 1979 I visited with Hans Morgenthau at his home in Manhattan. It proved to be our last conversation before he died on 19 July 1980. Given his weakened physical but not mental condition and his serious heart problem, at the end of our necessarily abbreviated one-hour meeting I purposefully asked him what he thought about the future of international relations. iraqbbc newsgabriel gatehousethe new york timesjohn lelandhaaretzzvi bar'elthe jordan timestaylor luckthe associated pressjeff karoubthe los angeles timesraheem salmancnnjomana karadsheh
Terry thinks she's a man
Yesterday on NPR's Fresh Air the hour went to a male TV critic. It's always a man with Terry. Always. And somebody tell her that a snotty, snooty TV critic really doesn't make for good programming.This is C.I.'s "Iraq snapshot:" Thursday, December 23, 2010. Chaos and violence continue, Iraqi women make clear their displeasure over the Cabinet make up, Daniel Ellsberg and Veterans for Peace get some recognition, and more. Last Thursday a protest held outside the White House. One of the organizers was Veterans for Peace and Pentagon Papers whistle blower Daniel Ellsberg participated and spoke. Juana Bordas (Washington Post) advocates for both of them to be named persons of the year: Veterans for Peace and Daniel Ellsberg should be this year's person of the year because of their courage and bravery to stand up for all of us who believe that "war is not the answer." Moreover in a time of economic recession, the war machine is bankrupting our country. As John Amidon, a Marine Corps veteran from Albany asked at the White House protest, "How is the war economy working for you?"While unemployment rates hover near 10 percent, there is no doubt that the U.S. economy and quality of life is faltering. Worldwide we are 14th in education, 37th in the World Health Organization's ranking on medical systems, and 23rd in the U.N. Environmental Sustainability Index on being most livable and greenest benefits. There is one place we take the undeniable world lead. The US military spending accounts for a whopping 46.5 percent of world military spending--the next ten countries combined come in at only 20.7 percent. Linda Pershing (Truthout) reports, "Responding to a call from the leaders of Stop These Wars(1) - a new coalition of Veterans for Peace and other activists - participants came together in a large-scale performance of civil resistance. A group of veterans under the leadership of Veterans for Peace members Tarak Kauff, Will Covert and Elaine Brower, mother of a Marine who has served three tours of duty in Iraq, sponsored the event with the explicit purpose of putting their bodies on the line. Many participants were Vietnam War veterans; others ranged from Iraq and Afghanistan war veterans in their 20s and 30s to World War II vets in their 80s and older. They were predominately white; men outnumbered women by at least three to one. After a short rally in Lafayette Park, they formed a single-file procession, walking across Pennsylvania Avenue to the solemn beat of a drum. As they reached the police barricade (erected to prevent them from chaining themselves to the gate, a plan they announced on their web site), the activists stood shoulder to shoulder, their bodies forming a human link across the 'picture postcard' tableau in front of the White House." Maria Chutchian (Arlington Advocate) quotes, participant Nate Goldshlag (Vietnam veteran) stating, ""There was a silent, single file march around Lafayette Park to a drum beat. Then we went in front of the White House,. There were barricades set up in front of white house fence. So when we got there, we jumped over barricades and were able to get right next to the White House fence." Participant Linda LeTendre (Daily Gazette) reports: At the end of the rally, before the silent, solemn procession to the White House fence, in honor of those killed in Iraq and Afghan wars of lies and deceptions, the VFP played taps and folded an American flag that had been left behind at a recent funeral for the veteran of one of those wars. Two attendees in full dress uniform held and folded the flag. I had the image of all of the people who stood along the roads and bridges when the bodies of the two local men, Benjamin Osborn and David Miller, were returned to the Capital District. I thought if all of those people were here now or spoke out against war these two fine young men might still be with us.I was blessed enough to be held in custody with one of those in uniform; a wonderful young man who had to move from his hometown in Georgia because no one understood why as a veteran he was against these wars. Even his family did not understand. (He remains in my prayers.)Our plan was to attach ourselves to the White House fence until President Obama came out and talked to us or until we were arrested and dragged away. I don't have to tell you how it ended.Mr. Ellsberg was one of 139 people arrested at that action. We've noted the protest in pretty much every snapshot since last Thursday. If something else comes out that's worth noting on the protest, we'll include it. We will not include people who don't have their facts and it's really sad when they link to, for example, Guardian articles and the links don't even back them up. It's real sad, for example, when they're trashing Hillary (big strong men that they are) and ripping her apart and yet Barack? "Obama's inaccurate statements"??? What the hell is that? You're inferring he lied, say so. Don't be such a little chicken s**t. It's especially embarrasing when you're grandstanding on 'truth.' Especially when you're the little s**t that clogged up the public e-mail account here in the summer of 2008 whining that you were holding Barack to a standard, then admitting that you weren't, then whining that if you did people would be mean to you. Oh, that's sooooooo sad. Someone might say something bad about you. The horror. You must suffer more than all the people in Iraq and Afghanistan combined. While the action took place in DC, actions also took place in other cities. We've already noted NYC's action this week, Doug Kaufmann (Party for Socialism & Liberation) reports on the Los Angeles action: Despite heavy rain, over 100 people gathered in Los Angeles on the corner of Hollywood and Highland to demand an end to the U.S. wars on Afghanistan and Iraq. People came from as far as Riverside to protest, braving what Southern California media outlets have dubbed the "storm of the decade." The demonstration, initiated and led by the ANSWER Coalition, broke the routine of holiday shopping and garnered support from activists and even passers by, who joined in chanting "Money for jobs and education -- not for war and occupation!" and "Occupation is a crime -- Iraq, Afghanistan, Palestine!" Protesters held banners reading, "U.S./NATO Out of Afghanistan!" and "Yes to jobs, housing and education -- no to war, racism and occupation!"Speakers at the demonstration included representatives of Korean Americans for Peace, ANSWER Coalition, KmB Pro-People Youth, Veterans for Peace, Party for Socialism and Liberation and National Lawyers Guild. Tuesday, Nouri al-Maliki managed to put away the political stalemate thanks to a lot of Scotch -- tape to hold the deal together and booze to keep your eyes so crossed you don't question how someone can claim to have formed a Cabinet when they've left over ten positions to be filled at a later date. One group speaking out is women. Bushra Juhi and Qassmi Abdul-Zahra (AP) report, "Iraq's female lawmakers are furious that only one member of the country's new Cabinet is a woman and are demanding better representation in a government that otherwise has been praised by the international community for bringing together the country's religious sects and political parties." As noted Tuesday, though represenation in Parliament is addressed in Iraq's Constitution, there is nothing to address women serving in the Cabinet. Aseel Kami (Reuters) notes one of the most damning aspects of Nouri's chosen men -- a man is heaing the Ministry of Women's Affairs. Iraqiya's spokesperson Maysoon Damluji states, "There are really good women who could do wel . . . they cannot be neglected and marginalized." Al-Amal's Hanaa Edwar states, "They call it a national (power) sharing government. So where is the sharing? Do they want to take us back to the era of the harem? Do they want to take us back to the dark ages, when women were used only for pleasure." Deborah Amos (NPR's All Things Considered) reports that a struggle is going on between secular impulses and fundamentalist ones. Gallery owner Qasim Sabti states, "We know it's fighting between the religious foolish man and the civilization man. We know we are fighting like Gandhi, and this is a new language in Iraqi life. We have no guns. We do not believe in this kind of fighting." Deborah Amos is the author of Eclipse of the Sunnis: Power, Exile, and Upheaval in the Middle East. Meanwhile Nizar Latif (The National) reports that distrust is a common reaction to the new government in Baghdad and quotes high school teacher Hussein Abed Mohammad stating, "Promises were made that trustworthy, competent people would be ministers this time around, but it looks as if everything has just been divided out according to sectarian itnerests. No attention has been paid to forming a functioning government, it is just a political settlement of vested interests. I'm sure al Maliki will have the same problems in his next four years as he had in the last four years." Days away from the ten months mark, Nouri managed to finally end the stalemate. Some try to make sense of it and that must have been some office party that the editorial board of the Washington Post is still coming down from judging by "A good year in Iraq." First up, meet the new Iraqi Body Count -- an organization that provides cover for the war and allows supporters of the illegal war to point to it and insist/slur "Things aren't so bad!" Sure enough, the editorial board of the Post does just that noting the laughable "civilian deaths" count at iCasualities. As we noted -- long, long before we walked away from that crap ass website, they're not doing a civilian count. They're noting how many deaths Reuters reports.
|
[
"The main topic of the text is Iraq's politics and current situation."
] | 4,468
|
multifieldqa_en
|
en
| null |
40a85211345155859f3d2f7268da928f516a65ac6f8c6e08
|
What is the potential of SNNs in modeling the visual system?
|
Paper Info
Title: Deep Spiking Neural Networks with High Representation Similarity Model Visual Pathways of Macaque and Mouse
Publish Date: 22 May 2023
Author List: Zhengyu Ma (from Department of Networked Intelligence, Peng Cheng Laboratory), Yu Liutao (from Department of Networked Intelligence, Peng Cheng Laboratory), Huihui Zhou (from Department of Networked Intelligence, Peng Cheng Laboratory), Allen Brain
Author Affiliation: CORNet-S ConvNeXt-Tiny ConvNeXt-Small EfficientNet, AlexNet RegNetY, ResNet34 ConvNeXt-Base CORNetSEW, ResNet8 ResNet101 SEW-ResNet18 ViT-L, GoogLeNet SEW-ResNet34 SEW-ResNet8 Wide
Figure
Figure 1: To conduct neural representation similarity experiments, we apply three similarity metrics to a layer-by-layer comparison between the responses of models and the neural activities of visual cortex.
Figure 2: For three datasets and three similarity metrics, each point indicates the final representation similarity score of a model.Each pair of SEW ResNet and ResNet with the same depth are linked by a gray solid line.In almost all conditions, SEW ResNet outperforms ResNet by a large margin.
Figure3: For three datasets and three similarity metrics, we plot the trajectories of similarity score with model layer depth.The models are divided into two groups: ResNet and SEW ResNet.The normalized layer depth ranges from 0 (the first layer) to 1 (the last layer).Because the depths of models are not the same, we first discretize the normalized depth into 50 bins, and then apply the cubic spline interpolation to the scores of each model, yielding the smooth trajectories shown in the plot.The fine, semitransparent lines are the trajectories of each model.The thick lines are the average trajectories among each group.
Figure 5: For Macaque-Synthetic dataset, trajectories of similarity score with model layer depth are plotted.The models are divided into two groups: ViT and CNN&SNN.The normalized layer depth ranges from 0 (the first layer) to 1 (the last layer).The calculation and plotting of the trajectories are the same as Figure 3.
Figure6: The basic block of SpikingMobileNet."PW CONV" is the pointwise convolution and "DW CONV" is the depthwise convolution."SN" is the spiking neuron.
Figure 7: Overall model rankings of the similarity scores on Allen Brain mouse dataset.The similarity scores of CNNs, SNNs and vision transformers are shown by blue, green and orange bars, respectively.
Figure 9: Overall model rankings of the similarity scores on Macaque-Synthetic dataset.
Figure 10: The Spearman's rank correlation between the overall model rankings of different metrics.There is a strong correlation between SVCCA and TSVD-Reg, but RSA has weaker correlations with them.
The correlation between the similarity scores and the model depth.r is Spearman's rank correlation coefficient."-" indicates that there is no significant correlation.
Architectures of SNNs."sn" denotes the spiking neuron."g = 32" denotes the grouped convolutions with 32 groups.The hyper-parameters of the spike-element-wise block are shown in the brackets with the number of stacked blocks outside.
abstract
Deep artificial neural networks (ANNs) play a major role in modeling the visual pathways of primate and rodent. However, they highly simplify the computational properties of neurons compared to their biological counterparts. Instead, Spiking Neural Networks (SNNs) are more biologically plausible models since spiking neurons encode information with time sequences of spikes, just like biological neurons do.
However, there is a lack of studies on visual pathways with deep SNNs models. In this study, we model the visual cortex with deep SNNs for the first time, and also with a wide range of state-of-the-art deep CNNs and ViTs for comparison. Using three similarity metrics, we conduct neural representation similarity experiments on three neural datasets collected from two species under three types of stimuli.
Based on extensive similarity analyses, we further investigate the functional hierarchy and mechanisms across species. Almost all similarity scores of SNNs are higher than their counterparts of CNNs with an average of 6.6%. Depths of the layers with the highest similarity scores exhibit little differences across mouse cortical regions, but vary significantly across macaque regions, suggesting that the visual processing structure of mice is more regionally homogeneous than that of macaques.
Besides, the multi-branch structures observed in some top mouse brain-like neural networks provide computational evidence of parallel processing streams in mice, and the different performance in fitting macaque neural representations under different stimuli exhibits the functional specialization of information processing in macaques.
Taken together, our study demonstrates that SNNs could serve as promising candidates to better model and explain the functional hierarchy and mechanisms of the visual system. Originally, the prototype of deep neural networks is inspired by the biological vision system . To date, deep neural networks not only occupy an unassailable position in the field of computer vision , but also become better models of the biological visual cortex compared to traditional models in the neuroscience community (Khaligh-Razavi and Kriegeskorte 2014; .
They have been successful at predicting the neural responses in primate visual cortex, matching the hierarchy of ventral visual stream (Güc ¸lü and van Gerven 2015; , and even controlling neural activity . Moreover, as training paradigms of mice and techniques for collecting neural activity (de Vries et al. 2020) have been greatly improved, there is a strong interest in exploring mouse visual cortex.
Deep neural networks also play an important role in revealing the functional mechanisms and structures of mouse visual cortex . Compared to biological networks, Artificial Neural Networks discard the complexity of neurons . Spiking Neural Networks, incorporating the concept of time and spikes, are more biologically plausible models .
To be more specific, because of their capabilities of encoding information with spikes, capturing the dynamics of biological neurons, and extracting spatio-temporal features, deep SNNs are highly possible to yield brain-like representations ). However, deep SNNs have not been employed to model visual cortex due to the immaturity of training algorithms.
Recently, a state-ofthe-art directly trained deep SNN , makes it possible to use deep SNNs as visual cortex models. Contributions. In this work, we conduct large-scale neural representation similarity experiments on SNNs and other high-performing deep neural networks to study the brain's visual processing mechanisms, with three datasets and three similarity metrics (Figure ).
Specifically, to the best of our knowledge, we are the first to use deep SNNs to fit complex biological neural representations and explore the biological visual cortex. We summarize our main contributions in four points as follows. • We find that SNNs outperform their counterparts of CNNs with the same depth and almost the same architectures in almost all experiments.
In addition, even with very different depths and architectures, SNNs can achieve top performance in most conditions. • By making a more direct comparison between macaques and mice for the first time, we reveal the differences in the visual pathways across the two species in terms of the homogeneity of visual regions and the increases of receptive field sizes across cortical visual pathways, which is consistent with previous physiological work.
• The multi-branch structures in neural networks benefit neural representation similarity to mouse visual cortex, providing computational evidence that parallel information processing streams are widespread between cortical regions in the mouse visual system. • Comparing the results of two macaque neural datasets under different stimuli, we reveal that the macaque vision system may have functional specialization for processing human faces and other natural scenes.
Altogether, as the first work to apply deep SNNs to fit neural representations, we shed light on visual processing mechanisms in both macaques and mice, demonstrating the potential of SNNs as a novel and powerful tool for research on the visual system. Our codes and appendix are available at https://github.com/Grasshlw/SNN-Neural-Similarity.
There are plenty of computational models of macaque and mouse visual systems for exploring the visual processing mechanisms recently. We summarize some of the outstanding work in the following. The network models of macaque visual system. In the early days, studies basically used simple feedforward neural networks as the models of the macaque visual system (Khaligh-Razavi and Kriegeskorte 2014; .
Recently, some bio-inspired or more complex models achieved better performance in fitting the neural representations of macaque visual cortex . proposed a brainlike shallow CNN with recurrent connections to better match the macaque ventral visual stream. By mimicking the primary stage of the primate visual system, VOneNets ) performed more robustly in image recognition while better simulating macaque V1.
Moreover, the representations learned by unsupervised neural networks ) also effectively matched the neural activity of macaque ventral visual stream. Although the above work developed many bio-inspired structures, the networks are still traditional ANNs in nature. Our work introduces deep SNNs for the first time to explore the visual processing mechanisms of macaque visual system.
The network models of mouse visual system. Largescale mouse neural dataset provided an experimental basis for model studies of mouse visual system (de Vries et al. 2020; . conducted comparisons between the representations of mouse visual cortex and the VGG16 trained on the Im-ageNet dataset. In , they developed a single neural network to model both the dorsal and ventral pathways with showing the functional specializations.
What's more, a large survey of advanced deep networks ) revealed some hierarchy and functional properties of mice. Similar to the studies of macaque visual system, deep SNNs have never been used to model the mouse visual system. In this work, we not only use SNNs as one of the candidates to fit the representations of mouse visual cortex, but also conduct direct comparisons between macaques and mice to further investigate the functional hierarchy and mechanisms of the two species.
Our work is conducted with three neural datasets. These datasets are recorded from two species under three types of stimuli. More specifically, there are neural responses of mouse visual cortex to natural scene stimuli, and responses of macaque visual cortex to face image and synthetic image stimuli. Allen Brain mouse dataset.
It is part of the Allen Brain Observatory Visual Coding dataset ) col-lected using Neuropixel probes from 6 regions simultaneously in mouse visual cortex. Compared to two-photon calcium imaging, Neuropixel probes simultaneously record the spikes across many cortical regions with high temporal resolution.
In these experiments, mice are presented with 118 250-ms natural scene stimuli in random orders for 50 times. Hundreds to thousands of neurons are recorded for each brain region. To get the stable neurons, we first concatenate the neural responses (average number of spikes in 10-ms bins across time) under 118 images for each neuron, and then preserve the neurons whose split-half reliability across 50 trials reaches at least 0.8.
Macaque-Face dataset. This dataset ) is composed of neural responses of 159 neurons in the macaque anterior medial (AM) face patch under 2,100 real face stimuli, recorded with Tungsten electrodes. For this dataset, we compute the average number of spikes in a time window of 50-350ms after stimulus onset and exclude eleven neurons with noisy responses by assessing the neurons' noise ceiling.
The details of the preprocessing procedure are the same as . Macaque-Synthetic dataset. This dataset is also about macaque neural responses which are recorded by electrodes under 3,200 synthetic image stimuli, and used for neural prediction in the initial version of Brain-Score . The image stimuli are generated by adding a 2D projection of a 3D object model to a natural background.
The objects consist of eight categories, each with eight subclasses. The position, pose, and size of each object are randomly selected. 88 neurons of V4 and 168 neurons of IT are recorded. The neural responses are preprocessed to the form of average firing rate and can be downloaded from Brain-Score. Since the core visual function of macaque and mouse visual cortex is to recognize objects, the basic premise of model selection is that the model has good performance on object recognition tasks (e.g.
classification on ImageNet). Based on this premise, we employ 12 SNNs, 43 CNNs, and 26 vision transformers, all of which are pretrained on the Ima-geNet dataset and perform well in the classification task. As for SNNs, we use SEW ResNet as the base model, which is the deepest and SOTA directly trained SNN .
Furthermore, by combining the residual block used in SEW ResNet and the hierarchy of the visual cortex, we build several new SNNs and train them on the ImageNet using SpikingJelly ) (see Appendix A for model structures and the details of model training). As for CNNs and vision transformers, we use 44 models from the Torchvision model zoo , 22 models from the Timm model zoo ) and 3 models from the brain-like CNNs, CORnet family ).
In the feature extraction procedures of all models, we feed the same set of images used in biological experiments to the pretrained models and obtain features from all chosen layers. Different from CNNs and vision transformers, the features of SNNs are spikes in multiple time steps. To obtain the representation similarity between biological visual cortex and computational models, we apply three similarity metrics to computing similarity scores: representational similarity analysis (RSA) , regression-based encoding method and singular vector canonical correlation analysis (SVCCA) .
RSA has already been widely used to analyze neural representations of a model and a brain to different stimuli at the population level, while the regression-based encoding method directly fits the model features to neural activity data. SVCCA is originally proposed to compare features of deep neural networks, and then Buice 2019) used it to compare representation matrices from mouse visual cortex and DNNs, which demonstrated its effectiveness.
With the same model and same cortical region, we use these metrics for a layer-by-layer comparison to compute the similarity scores. The maximum similarity score across layers for a given cortical region is considered to be the level of representation similarity between the model and the cortical region.
Finally, in a given dataset, we take the average score of all cortical regions as the final similarity score for each model, which gives the overall model rankings. The implementation of each similarity metric is as follows. RSA. For two response matrices R ∈ R n×m from each layer of models and each cortical region, where n is the number of units/neurons and m is the number of stimuli, we calculate the representational similarity between the responses to each pair of image stimuli using the Pearson correlation coefficient r, yielding two representational dissimilarity matrices (RDM ∈ R m×m , where each element is the correlation distance 1 − r).
Then, the Spearman rank correlation coefficient between the flattened upper triangles of these two matrices is the metric score. Regression-Based Encoding Method. Firstly, we run truncated singular value decomposition (TSVD) to reduce the feature dimension of model layers to 40. Secondly, the features after dimensionality reduction are fitted to the representations of each neuron by ridge regression.
Finally, we compute the Pearson correlation coefficient between the predicted and ground-truth representations of each neuron and take the mean of all correlation coefficients as the metric score. More specifically, we apply leave-one-out crossvalidation to obtain predicted representations of each neuron.
For simplicity, we name this method 'TSVD-Reg'. SVCCA. For both the responses of model layers and cortical regions, we use TSVD to reduce the dimension of unit/neuron to 40, yielding two reduced representation matrices. Then we apply canonical correlation analysis (CCA) to these two matrices to obtain a vector of correlation coefficients (the length of the vector is 40).
The metric score is the mean of the vector. Because of the invariance of CCA to affine transformations , in this procedure, we only need to ensure that the stimulus dimension is consistent and aligned, even if the unit/neuron dimension is different. Dimensionality reduction plays an important role in this method to make the number of model features comparable to the number of neurons in cortical regions, since the former usually far exceeds the latter.
In addition, dimensionality reduction helps to determine which features are important to the original data, while CCA suffers in important feature detection. Using just CCA performs badly, which has been proven by . To check how similar the models are to the visual cortex's mechanisms in visual processing, we rank the final similarity scores of all models and conduct comparisons among three types of models (CNNs, SNNs, and vision transformers).
Specially, we focus on comparing SNN (SEW ResNet) and CNN (ResNet) with the same depth and almost the same architectures (Figure ). The final similarity score of a model is the average similarity score across all cortical regions. (The overall rankings can be found in Appendix B and the comparisons among three types of models are shown in Appendix C.)
Allen brain mouse dataset. No single model achieves the highest final similarity scores with all three metrics. For a fair comparison, we apply the paired t-test to SEW ResNet and ResNet with the same depth. For all three metrics, SEW ResNet performs better than ResNet by a large margin (t = 5.857, p = 0.004; t = 7.666, p = 0.002; t = 7.592, p = 0.002) 1 . 1 The results of the three similarity metrics are separated by semicolons, in the order of SVCCA, TSVD-Reg, and RSA.
Other Macaque-Face dataset. For both SVCCA and TSVD-Reg, Wide-SEW-ResNet14 and Wide-SEW-ResNet8 achieve the first and second highest final similarity scores respectively. But for RSA, TNT-S and Inception-ResNet-V2 take their place and outperform other models by a large margin. As for SEW ResNet and ResNet, the former performs significantly better than the latter for both SVCCA and TSVD-Reg (t = 8.195, p = 0.001; t = 7.528, p = 0.002).
However, the difference is not significant for RSA (t = 1.117, p = 0.327). Specifically, the similarity score of SEW ResNet152 is only slightly higher than that of ResNet152, and at the depth of 50 and 101, SEW ResNet's scores are lower than ResNet's. Macaque-Synthetic dataset. Similar to the results of Allen Brain dataset, no model performs best for all three metrics.
SEW ResNet performs moderately better than ResNet (t = 3.354, p = 0.028; t = 3.824, p = 0.019; t = 2.343, p = 0.079). The only contrary is that SEW ResNet18 performs worse than ResNet18 for RSA. Further, to check the details of comparison between the SNNs and their CNN counterparts, we analyze the trajectories of similarity score across model layers (Figure ).
As for ResNet and SEW ResNet with the same depth, the trends of their similarities across model layers are almost the same, but the former's trajectory is generally below the latter's. In other words, the similarity scores of SEW ResNet are higher than those of ResNet at almost all layers. Taken together, the results suggest that when the overall results that appear below also correspond to the three metrics in this order, unless the correspondence is stated in the text.
architectures and depth are the same, SNNs with spiking neurons perform consistently better than their counterparts of CNNs with an average increase of 6.6%. Besides, SEW ResNet14 also outperforms the brain-like recurrent CNN, CORnet-S, with the same number of layers (see more details in Appendix B). Two properties of SNNs might contribute to the higher similarity scores.
On the one hand, IF neurons are the basic neurons of spiking neural networks. The IF neuron uses several differential equations to roughly approximate the membrane potential dynamics of biological neurons, which provides a more biologically plausible spike mechanism for the network. On the other hand, the spiking neural network is able to capture the temporal features by incorporating both time and binary signals, just like the biological visual system during information processing.
To figure out the distinctions in the functional hierarchy between macaques and mice, for each cortical region, we obtain the normalized depth of the layer that achieves the highest similarity score in each model. Then, we divide models (excluding vision transformers) into two groups based on their depths and conduct investigations on these two groups separately.
A nonparametric ANOVA is applied to each group for testing whether layer depths change significantly across cortical regions. For mouse visual cortex (Figure (a)), taking the deep model group as an example, ANOVA shows overall significant changes in depth across cortical regions for TSVD-Reg and RSA (Friedman's χ 2 = 49.169,
p = 2.0 × 10 −9 ; χ 2 = 19.455, p = 0.002). But there is no significant change for SVCCA (χ 2 = 8.689, p = 0.122). According to these results, the differences in depth across regions are indeterminacy and irregular. Meanwhile, the trends of layer depth between some regions contradict the hierarchy observed in physiological experiments of mice (those between VISp and VISrl for TSVD-Reg and between VISal and VISpm for RSA).
However, for macaque visual cortex (Figure (b)), there are significant differences (t = −5.451, p = 6.5 × 10 −6 ; t = −8.312, p = 2.8 × 10 −9 ; t = −3.782, p = 6.9 × 10 −4 , also taking the deep model group as an example) between V4 and IT, and the trend is consistent with the information processing hierarchy in primate visual cortex.
The comparative analyses of the best layer depths of the shallow and deep model groups also exhibit the differences between macaques and mice. For mouse visual cortex, the best layer depths of shallow models are significantly higher than those of deep models. Compared to deep models, most shallow models achieve the top similarity scores in intermediate and even later layers.
Differently, for macaque visual cortex, the depth of models has little effect on the depth of the most similar layer. What's more, we find that the most similar layer of mouse visual cortex always occurs after the 28 × 28 feature map is downsampled to 14 × 14, which leads to the layer depths' difference between shallow and deep models.
Nevertheless, the best layer of macaque IT appears in the last part of networks, where the feature map has been downsampled more times. In summary, our results might reveal two distinctions in the functional hierarchy between macaques and mice. First, there is a distinct functional hierarchical structure of macaque ventral visual pathway, while there might be no clear sequential functional hierarchy in mouse visual cortex.
One explanation is that the mouse visual cortex is organized into a parallel structure and the function of mouse cortical regions are more generalized and homogeneous than those of macaques. Another possibility would be that even though the sequential relations exist among mouse cortical regions as proposed in anatomical and physiological work, they are too weak for the current deep neural networks to capture.
Additionally, mice perform more complex visual tasks than expected with a limited brain capacity . Consequently, the neural responses of mouse visual cortex may contain more information not related to object recognition that neural networks focus on. Secondly, it is well known that the units in the neural networks get larger receptive fields after downsampling, and through the analyses of differences between two groups of models based on depth, we find the feature map of the best layer for mouse is downsampled fewer times than that for macaque.
Based on these results, we provide computational evidence that the increased ratio of the receptive field size in cortical regions across the mouse visual pathway is smaller than those across the macaque visual pathways, which echoes some physio- Macaque-Face dataset --- Table : The correlation between the similarity scores and the number of parameters.
r is Spearman's rank correlation coefficient. "-" indicates that there is no significant correlation. To explore the processing mechanisms in the visual cortex of macaques and mice, we investigate the model properties from the whole to the details. As shown in Table and 2, we first measure the correlation between the similarity scores and the sizes (i.e. the number of trainable parameters and the depth) of network models.
For Allen Brain mouse dataset, there are significant negative correlations between the similarity scores and the number of parameters for three metrics while there is no correlation with the depth. Conversely, for the two macaque neural datasets, the similarity scores are highly correlated with the depth of networks, but not with the number of parameters.
Specifically, there is a positive correlation for Macaque-Face dataset while a negative correlation for Macaque-Synthetic dataset. (We also apply the linear regression to analyze the correlation between the similarity scores and the model size. The results are consistent with Spearman's rank correlation and are shown in Appendix E).
Based on these results, we further investigate more detailed properties of neural networks to explain the processing mechanisms in the visual cortex. For the mouse dataset, on the one hand, the best layer depths show non-significant changes across the mouse cortical regions as mentioned in the previous section.
On the other hand, the similarity scores of the mouse dataset are only correlated with the number of model parameters but not with the depth of models. It calls into the question whether any detailed structures in the neural networks help to reduce the number of parameters and improve its similarity to mouse visual cortex.
Therefore, we explore the commonalities between models that have the top 20% representation similarities (see Appendix D) for Allen Brain dataset. As expected, the top models contain similar structures, such as fire module, inception module, and depthwise separable convolution. All these structures essentially process information through multiple branches/channels and then integrate the features from each branch.
The models with this type of structure outperform other models (t = 2.411, p = 0.024; t = 3.030, p = 0.007; t = 1.174, p = 0.247). Moreover, we apply the depthwise separable convolution to SNNs, which yields a positive effect. The representation similarity of Spiking-MobileNet is higher than SEW-ResNet50 with a similar depth (+0.8%; +3.9%; +12.1%).
In fact, some studies using multiple pathways simulate the functions of mouse visual cortex to some extent . Our results further suggest that not only the mouse visual cortex might be an organization of parallel structures, but also there are extensive parallel information processing streams between each pair of cortical regions .
For the two macaque datasets with different stimuli, not only are the model rankings significantly different, but also the correlations between the similarity scores and the model depth are totally opposite. These results corroborate the following two processing mechanisms in macaques: the ventral visual stream of primate visual cortex possesses canonical coding principles at different stages; the brain exhibits a high degree of functional specialization, such as the visual recognition of faces and other objects, which is reflected in the different neural responses of the corresponding region (although the face patch AM is a sub-network of IT, they differ in the neural representations).
Besides, as shown in Figure , The calculation and plotting of the trajectories are the same as Figure . the similarity scores of vision transformers reach the maximum in the early layers and then decrease. Differently, the scores of CNNs and SNNs keep trending upwards, reaching the maximum in almost the last layer.
On the other hand, Appendix C shows that vision transformers perform well in Macaque-Face dataset but poorly in Macaque-Synthetic dataset. Considering the features extraction mechanism of vision transformers, it divides the image into several patches and encodes each patch as well as their internal relation by self-attention.
This mechanism is effective for face images that are full of useful information. However, the synthetic image consists of a central target object and a naturalistic background. When vision transformers are fed with this type of stimuli, premature integration of global information can lead to model representations containing noise from the unrelated background.
What's more, when we take all models with the top 20% representation similarities as a whole for analyses, as described in the above paragraph, the properties that enable networks to achieve higher neural similarity are not yet clear. Taken together, the computational mechanism of the better models may reveal core processing divergence to different types of stimuli in the visual cortex.
In this work, we take large-scale neural representation similarity experiments as a basis, aided by analyses of the similarities across models and the visual cortical regions. Compared to other work, we introduce SNNs in the similarity analyses with biological neural responses for the first time, showing that SNNs achieve higher similarity scores than CNNs that have the same depth and almost the same architectures.
As analyzed in Section 3.1, two properties of SNNs might serve as the explanations for their high similarity scores. The subsequent analyses of the models' simulation performance and structures indicate significant differences in functional hierarchies between macaque and mouse visual cortex. As for macaques, we observed a clear sequential hi-erarchy.
However, as for mouse visual cortex, some work ) exhibits that the trend of the model feature complexity roughly matches the processing hierarchy, but other work suggests that the cortex ) is organized into a parallel structure. Our results are more supportive of the latter. Furthermore, we provide computational evidence not only that the increased ratio of the receptive field size in cortical regions across the mouse visual pathway is smaller than those across the macaque visual pathway, but also that there may be multiple pathways with parallel processing streams between mouse cortical regions.
Our results also clearly reveal that the processing mechanisms of macaque visual cortex differ to various stimuli. These findings provide us with new insights into the visual processing mechanisms of macaque and mouse, which are the two species that dominate the research of biological vision systems and differ considerably from each other.
Compared to CNNs, the study of task-driven deep SNNs is just in its initial state. Although we demonstrate that SNNs outperform their counterparts of CNNs, SNNs exhibit similar properties as CNNs in the further analyses. In this work, we only build several new SNNs by taking the hints from the biological visual hierarchy, while many well-established structures and learning algorithms in CNNs have not been applied to SNNs yet.
In addition, the neural datasets used in our experiments are all collected under static image stimuli, lacking rich dynamic information to some certain, which may not fully exploit the properties of SNNs. Given that SNNs perform well in the current experiments, we hope to explore more potential of SNNs in future work.
In conclusion, as more biologically plausible neural networks, SNNs may serve as a shortcut to explore the biological visual cortex. With studies on various aspects of SNNs, such as model architectures, learning algorithms, processing mechanisms, and neural coding methods, it's highly promising to better explain the sophisticated, complex, and diverse vision systems in the future.
Implementation Details of SNNs Spiking Neuron Model
For all SNNs, we use the Integrate-and-Fire (IF) model as the spiking neuron model, which acts as the activation layer in neural networks. As mentioned in , V t , X t and S t denote the state (membrane voltage), input (current) and output (spike) of the spiking neuron model respectively at time-step t, and the dynamics of the IF model can be described as follows:
(1) (2) (3) While V t is the membrane voltage after the trigger of a spike, H t is also the membrane voltage, but after charging and before a spike firing. Θ(x) is the unit step function, so S t equals 1 when H t is greater than or equal to the threshold voltage V thresh and 0 otherwise. Meanwhile, when a spike fires, V t is reset to V reset .
Here, we set V thresh = 1 and V reset = 0. In addition, because Θ(x) is non-differentiable at 0, the surrogate gradient method is applied to approximate the derivative function during back-propagation. Here, we use the inverse tangent function as the surrogate gradient function and the derivative function is
(5) In our experiments on SNNs, we not only use SEW ResNet proposed by ), but also build several new SNNs. On the one hand, we improve the spike-elementwise block in SEW ResNet with new architectures referring to studies on ResNet , as shown in Table . On the other hand, as the multi-branch structures in CNNs increase neural representation similarity to mouse visual cortex, we use depthwise separable convolutions and follow the overall architecture of MobileNetV2 to build the SpikingMobileNet, the basic block of which is shown in Figure .
Our implementation is based on SpikingJelly , an open-source framework of deep SNN. We use the ImageNet dataset to pre-train the new SNNs. Following the settings for training SEW ResNet , we train the models for 320 epochs on 8 GPUs (NVIDIA V100), using SGD with a mini-batch size of 32. The momentum is 0.9 and the weight decay is 0. The initial learning rate is 0.1 and we decay it with a cosine annealing, where the maximum number of iterations is the same as the number of epochs.
For all SNNs, we set the simulation duration T = 4.
Overall model rankings
The results of model rankings are shown in Figure , 8 and 9. We also apply the Spearman's rank correlation to the overall model rankings of different metrics, which is shown in Figure .
Score Comparisons among Model Groups
We conduct comparisons of similarity scores among CNNs, SNNs, and vision transformers. The results are shown in Figure .
Overall CNN rankings
The results of CNN rankings are shown in Figure , 13 and 14.
Correlations between the Model Sizes and the Similarity Scores
The results of linear regression to model sizes and the similarity scores are shown in Figure , 16 and 17.
The ImageNet Accuracy and the Similarity Scores
The results are shown in Figure .
|
[
"SNNs have the potential to better model and explain the functional hierarchy and mechanisms of the visual system."
] | 5,588
|
multifieldqa_en
|
en
| null |
6b35731428ea6d9b480338b90572d21690c2fbb89ebba249
|
What position did Simon English hold in the 2008 general election?
|
Sir Simon William English (born 30 December 1961) is a New Zealand former National Party politician who served as the 39th prime minister of New Zealand from 2016 to 2017. He had previously served as the 17th deputy prime minister of New Zealand and minister of finance from 2008 to 2016 under John Key and the Fifth National Government.
A farmer and public servant before entering politics, English was elected to the New Zealand Parliament in as the National Party's candidate in the Wallace electorate. He was elevated to Cabinet in 1996 and in 1999 was made minister of finance, although he served for less than a year due to his party's loss at the 1999 general election. In October 2001, English replaced Jenny Shipley as the leader of the National Party (and consequently as Leader of the Opposition). He led the party to its worst defeat at the 2002 general election, and as a consequence, in October 2003 he was replaced as leader by Don Brash.
In November 2006, after Brash's resignation, English became deputy leader under John Key. After National's victory at the 2008 general election, he became deputy prime minister and was also made minister of finance for the second time. Under English's direction New Zealand's economy maintained steady growth during National's three terms of government. He became a list-only MP after stepping down as an electorate MP at the 2014 general election.
John Key resigned as leader of the National Party and prime minister in December 2016. English won the resulting leadership election unopposed and was sworn in as prime minister on 12 December 2016. His tenure was only ten months, and included a three-month election campaign. In the 2017 general election, National won the largest number of seats but fell short of a majority. The parties holding the balance of power declined to support the existing government, and English was subsequently replaced as prime minister by Jacinda Ardern, leader of the Labour Party. English initially continued on as Leader of the Opposition, but resigned as leader of the National Party on 27 February 2018 and left parliament two weeks later.
Early life
English was born on 30 December 1961 at Lumsden Maternity Centre in Lumsden. He is the eleventh of twelve children of Mervyn English and Norah (née O'Brien) English. His parents purchased Rosedale, a mixed sheep and cropping farm in Dipton, Southland from Mervyn's uncle, Vincent English, a bachelor, in 1944. English was born in the maternity unit at Lumsden.
English attended St Thomas's School in Winton, then boarded at St. Patrick's College in Upper Hutt, where he became head boy. He played in the first XV of the school's rugby team. English went on to study commerce at the University of Otago, where he was a resident at Selwyn College, and then completed an honours degree in English literature at Victoria University of Wellington.
After finishing his studies, English returned to Dipton and farmed for a few years. From 1987 to 1989, he worked in Wellington as a policy analyst for the New Zealand Treasury, at a time when the free market policies favoured by Labour's finance minister Roger Douglas (known collectively as "Rogernomics") were being implemented.
English joined the National Party in 1980, while at Victoria University. He served for a period as chairman of the Southland branch of the Young Nationals, and became a member of the Wallace electorate committee. After moving to Wellington, he served for periods on the Island Bay and Miramar electorate committees, respectively.
Fourth National Government (1990–1999)
At the 1990 general election, English stood as the National candidate in Wallace, replacing the retiring Derek Angus, and was elected with a large majority. He would hold this seat, renamed Clutha-Southland in 1996, until 2014. He and three other newly elected National MPs (Tony Ryall, Nick Smith, and Roger Sowry) were soon identified as rising stars in New Zealand politics, and at various points were dubbed the "brat pack", the "gang of four", and the "young Turks". In his first term in parliament, English chaired a select committee into social services. He was made a parliamentary under-secretary in 1993, serving under the Minister of Health.
First period in cabinet (1996–1999)
In early 1996, English was elevated to cabinet by Prime Minister Jim Bolger, becoming the Minister for Crown Health Enterprises and Associate Minister of Education (to Wyatt Creech). He was 34 at the time, becoming the cabinet's youngest member. After the 1996 general election, the National Party was forced into a coalition with New Zealand First to retain government. In the resulting cabinet reshuffle, English emerged as Minister of Health. However, as a condition of the coalition agreement, NZ First's Neil Kirton (a first-term MP) was made Associate Minister of Health, effectively becoming English's deputy. This arrangement was described in the press as a "shotgun marriage", and there were frequent differences of opinion between the two ministers. After their relationship became unworkable, Kirton was sacked from the role in August 1997, with the agreement of NZ First leader Winston Peters.
As Minister of Health, English was responsible for continuing the reforms to the public health system that National had begun after the 1990 general election. The reforms were unpopular, and health was perceived as one of the government's weaknesses, with the health portfolio consequently being viewed as a challenge. English believed that the unpopularity of the reforms was in part due to a failure in messaging, and encouraged his National colleagues to avoid bureaucratic and money-focused language (such as references to "balance sheets" and "user charges") and instead talk about the improvements to services the government's reforms would bring. He also rejected the idea that public hospitals could be run as commercial enterprises, a view which some of his colleagues had previously promoted.
By early 1997, as dissatisfaction with Bolger's leadership began to grow, English was being touted as a potential successor, along with Jenny Shipley and Doug Graham. His age (35) was viewed as the main impediment to a successful leadership run. National's leadership troubles were resolved in December 1997, when Bolger resigned and Shipley was elected to the leadership unopposed. English had been a supporter of Bolger as leader, but Shipley reappointed him Minister of Health in her new cabinet.
English was promoted to Minister of Finance in a reshuffle in January 1999, a position which was at the time subordinate to the Treasurer, Bill Birch. After a few months, the pair switched positions as part of Birch's transition to retirement, with English assuming the senior portfolio. In early interviews, he emphasised his wish to be seen as a pragmatist rather than an ideologue, and said that the initiatives of some of his predecessors (Roger Douglas's "Rogernomics" and Ruth Richardson's "Ruthanasia") had focused on "fruitless, theoretical debates" when "people just want to see problems solved".
Opposition (1999–2008)
After the National Party lost the 1999 election to Helen Clark's Labour Party, English continued on in the shadow cabinet as National's spokesperson for finance. He was elected deputy leader of the party in February 2001, following the resignation of Wyatt Creech, with Gerry Brownlee being his unsuccessful opponent.
Leader of the Opposition
In October 2001, after months of speculation, Jenny Shipley resigned as leader of the National Party after being told she no longer had the support of the party caucus. English was elected as her replacement unopposed (with Roger Sowry as his deputy), and consequently became Leader of the Opposition. However, he did not openly organise against Shipley, and according to The Southland Times "there was almost an element of 'aw, shucks, I'll do it then' about Mr English's ascension".
Aged 39 when he was elected, English became the second-youngest leader in the National Party's history, after Jim McLay (who was 38 when elected in 1984). He also became only the third Southlander to lead a major New Zealand political party, after Joseph Ward and Adam Hamilton. However, English failed to improve the party's performance. In the 2002 election, National suffered its worst electoral defeat ever, gaining barely more than twenty percent of the vote. English described it as "the worst day of my political life". Both party insiders and the general public were split as to how much to blame him for the loss, but most of the party believed that English would be able to rebuild National's support.
By late 2003, however, National's performance in opinion polls remained poor. The party had briefly increased its popularity in the year following the election, but by October its support had fallen to levels only slightly better than what it achieved in the last ballot. English also appeared in a boxing match for a charity against entertainer Ted Clarke. This did not boost his polling or that of the National party either, with suggestions that it devalued his image as a serious politician. Don Brash, former governor of the Reserve Bank and a relative newcomer to politics, began to build up support to replace English. On 28 October, Brash gained sufficient backing in Caucus to defeat English in a leadership contest.
Shadow cabinet roles and deputy leader
On 2 November 2003, when Brash changed responsibilities for certain MPs, English became National's spokesman for education, ranked at fifth place in the party's parliamentary hierarchy. He remained in parliament after the 2005 election. In his new shadow education portfolio, English performed strongly, and remained a party favourite despite his election defeat as leader in 2002, eventually being returned to the finance portfolio in August 2004 as deputy spokesman (while still retaining responsibility for education).
In November 2006, Brash resigned as leader. English was considered as a potential replacement leader (running against John Key) or deputy leader (against incumbent Gerry Brownlee) in the ensuing leadership election. However, a contest was avoided when the MPs agreed a Key/English ticket would run unopposed in a display of party unity. English took over the deputy leadership and the finance portfolio in the Key shadow cabinet.
Fifth National Government (2008–2017)
Deputy Prime Minister and Minister of Finance (2008–2016)
At the 2008 election, English was re-elected by his electorate, winning by a margin of about 15,500 votes. He became Deputy Prime Minister of New Zealand and Minister of Finance in the fifth National Government, being sworn into office on 19 November 2008 and continued to serve in those roles until becoming Prime Minister on 12 December 2014. He was also made Minister of Infrastructure in National's first term of government and Minister responsible for Housing New Zealand Corporation and minister responsible for the New Zealand flag consideration process in its third.
He was comfortably re-elected in Clutha-Southland in the 2011 election but opted to run as a party-list candidate in 2014.
The pairing of John Key as leader of the National Party and English as his deputy has been compared to that of Bob Hawke and Paul Keating (in Australia) and Tony Blair and Gordon Brown (in the UK).
English acceded to the role of Finance Minister in the continuing wake of the financial crisis. In response to New Zealand's rising debt, English made budget deficit-reduction his main priority. His first budget outlined three focuses in New Zealand's financial recovery: "improving the business environment and removing roadblocks to growth; investment in productive infrastructure; and improving the way government works". One of his first acts was creating the National Infrastructure Unit, charged with formulating a plan for infrastructure projects and investments. He commissioned a government-wide spending review, with an aim to reducing government expenditure—with the exceptions of a two-year stimulus package and long-term increases on infrastructure spending.
In April 2011, the Opposition criticised English for suggesting that New Zealand businesses could use New Zealand's low wages to help it compete with Australia. The National Government campaigned for re-election in 2011 on its economic record. The Government boasted growth for five consecutive quarters up to mid-2010, totalling 1.6% of real GDP.
Strong growth resulted in a surplus of $473 million for the 2015/16 financial year, projected to rise to $8.5 billion by 2020/21. In his 2016 Economic and Fiscal Update address, English stated that reducing debt and tackling the costs of the 2016 Kaikōura earthquake were higher priorities than reducing rates of tax.
Allowances issue
In 2009, the media, including TVNZ and TV3 revealed that English was receiving about NZ$900 a week as part of a living allowance for ministers, to live in his own NZ$1.2 million Wellington home. At the time, English also received $276,200 in his annual salary as Deputy Prime Minister. It was also revealed other ministers with homes in the capital city were also claiming accommodation allowances. On 3 August 2009, Prime Minister John Key started a review of the housing allowances claimed by cabinet ministers. English subsequently paid back $12,000 and only claimed about $24,000 a year in living allowances. The Auditor-General's office said in September 2009 that they were making "preliminary enquiries" into parliamentary housing expenses in response to a letter of complaint from Progressive party leader Jim Anderton. Two days later English stated that he would no longer take up any housing allowance and had paid back all the allowance he had received since the November 2008 election.
Prime Minister (2016–2017)
John Key resigned on 12 December, and endorsed English as his successor in the resulting leadership election. Following the drop-out of both Judith Collins and Jonathan Coleman from the leadership election, English was sworn in as the 39th Prime Minister of New Zealand on 12 December 2016.
English appointed his first cabinet on 18 December. In a reshuffle, he appointed Steven Joyce to succeed him as Finance Minister, while most ministerial portfolios remained the same.
In February 2017, English did not attend Waitangi Day commemorations at the historic treaty grounds, reportedly in response to the Ngāpuhi iwi's decision to stop the Prime Minister from speaking at the marae. Ngāpuhi have protested the Government's negotiation of the Trans Pacific Partnership Agreement (TPPA), which the iwi believe infringes upon Māori sovereignty, and thus does not adhere to the Treaty of Waitangi. English had been invited to attend in an official capacity; his non-attendance was criticised by a Ngāpuhi elder and Opposition leader Andrew Little.
In his first overseas trip as Prime Minister, English travelled to Europe to discuss trade ties, including a prospective New Zealand–European Union free trade agreement. He first travelled to London on 13 January 2017 to meet British Prime Minister Theresa May. Discussing trade relations, English said the two nations were "natural partners" and would "continue to forge ties" after the UK's withdrawal from the EU. He also arranged to meet with London Mayor Sadiq Khan, Belgian Prime Minister Charles Michel and German Chancellor Angela Merkel. In a meeting with Merkel, English received crucial backing from Germany for a trade deal with the EU. On 16 January, English stated that his government would continue to promote TPPA, despite the United States' decision to withdraw from the agreement. He explained that Southeast Asian countries would now be treated as a priority in negotiations—he also asserted that the United States was ceding influence to China by its rejection of the trade pact.
At a press conference at the Beehive on 1 February 2017, English announced that the 2017 general election would be held on 23 September. The Prime Minister later confirmed that his party would approach ACT, United Future and the Māori Party if confidence and supply agreements were required to form a government following the election. In his second cabinet reshuffle on 24 April, English appointed Gerry Brownlee as his new Foreign Affairs Minister; he also promoted Nikki Kaye to the portfolio of Education Minister, and moved Mark Mitchell into the cabinet to become Defence Minister. The reshuffle was perceived as an election preparation.
On 13 February 2017, English welcomed Australian Prime Minister Malcolm Turnbull to Wellington. The two leaders reaffirmed their shared trade agenda, and discussed changes to the Australian citizenship pathway which will affect permanent residents originating from New Zealand.
On 19 June, it was reported that Todd Barclay, who succeeded English as MP for Clutha-Southland, had clandestinely recorded one of his employee's conversations the previous year, and that John Key's leaders' budget was used to pay a confidential settlement after the employee resigned. English admitted that he had been aware of the illegal recording and the settlement, and thus implicated in the scandal.
During the 2017 National campaign launch, English introduced a $379 million social investment package including digital learning academies for high school students, more resources for mathematics, and boosting support for teaching second languages in schools, and maintaining National Standards in the school curriculum. Prime Minister English also sought to defend National's financial management and economic track record and claimed that the opposition Labour Party would raise taxes. Early opinion polling had forecast a poor showing in the election for the Labour Party, but in early August 37-year-old Jacinda Ardern took over as Labour leader and seemingly energised younger voters.
At the 2017 general election, National won the largest share of the party vote (44.4%) and the largest number of seats (56) in the House Representatives. However, National lacked enough seats to govern alone due to two of the party's support partners, the Māori Party and United Future, losing their parliamentary seats. In response, English stated that the party would be entering into talks to form a coalition with New Zealand First. Following talks with the two largest parties, New Zealand First entered a coalition arrangement with the Labour Party. English was succeeded as prime minister by Jacinda Ardern on 26 October.
Opposition (2017–2018)
Leader of the Opposition
English was re-elected as National Party leader on 24 October 2017. At the time of his re-election, English announced his intention to stay on as leader until the next general election. On 13 February 2018, however, he stood down as National Party leader due to personal reasons, and instructed the party to put into motion the processes to elect a new leader. He also retired from Parliament. English's resignation followed weeks of speculation that he would step aside for a new leader. On 27 February, he was succeeded as party leader by Simon Bridges as the result of the leadership election held that day.
Post-premiership
In 2018, English joined the board of Australian conglomerate, Wesfarmers. English serves in Chairmanships of Mount Cook Alpine Salmon, Impact Lab Ltd and Manawanui Support Ltd. He is also a director of The Instillery, Centre for Independent Studies and The Todd Corporation Limited, and is a member of the Impact Advisory Group of Macquarie Infrastructure and Real Assets.
Political and social views
English is regarded as more socially conservative than his predecessor, John Key. He has stated his opposition to voluntary euthanasia and physician-assisted suicide, same-sex civil unions, and the decriminalisation of prostitution. As Prime Minister he opposed any "liberalisation" of abortion law.
In 2004, English voted against a bill to establish civil unions for both same-sex and opposite-sex couples. In 2005, he voted for the Marriage (Gender Clarification) Amendment Bill, which would have amended the Marriage Act to define marriage as only between a man and a woman. English voted against the Marriage (Definition of Marriage) Amendment Bill, a bill that legalised same-sex marriage in New Zealand. However, in December 2016 he stated, "I'd probably vote differently now on the gay marriage issue. I don't think that gay marriage is a threat to anyone else's marriage".
In 2009, English voted against the Misuse of Drugs (Medicinal Cannabis) Amendment Bill, a bill aimed at amending the Misuse of Drugs Act so that cannabis could be used for medical purposes.
Personal life
English met his future wife, Mary Scanlon, at university. She was studying medicine at the time, and became a general practitioner. Both her parents were immigrants, her father being Samoan and her mother Italian, born on the island of Stromboli. They have six children: a daughter and five sons.
English is a practising Roman Catholic, but has stated that he considers his religious beliefs personal and thus separate from politics.
In June 2002, English took part in TV3's Fight For Life, a celebrity boxing fundraiser to raise money for the Yellow Ribbon anti-youth-suicide campaign, influenced by the death of a teenage nephew in 1997. He lost a split decision to former university colleague Ted Clarke.
Honours
In the 2018 Queen's Birthday Honours, English was appointed a Knight Companion of the New Zealand Order of Merit, for services of over 27 years to the State.
See also
List of New Zealand governments
Politics of New Zealand
References
External links
Profile at National Party
Profile on Parliament.nz
Releases and speeches at Beehive.govt.nz
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
|-
1961 births
21st-century New Zealand politicians
Candidates in the 2017 New Zealand general election
Deputy Prime Ministers of New Zealand
Leaders of the Opposition (New Zealand)
Living people
Members of the Cabinet of New Zealand
Members of the New Zealand House of Representatives
New Zealand farmers
New Zealand finance ministers
New Zealand list MPs
New Zealand MPs for South Island electorates
New Zealand National Party MPs
New Zealand National Party leaders
New Zealand Roman Catholics
New Zealand people of Irish descent
People educated at St. Patrick's College, Silverstream
People from Dipton, New Zealand
People from Lumsden, New Zealand
Prime Ministers of New Zealand
University of Otago alumni
Victoria University of Wellington alumni
Knights Companion of the New Zealand Order of Merit
New Zealand politicians awarded knighthoods
|
[
"He became deputy prime minister and minister of finance."
] | 3,602
|
multifieldqa_en
|
en
| null |
73debbba53d5848cdc1e726c047bb0b82c5730d747fa710c
|
What is the score achieved by the authors for Track-2?
|
Paper Info
Title: Two-stage Pipeline for Multilingual Dialect Detection
Publish Date: Unkown
Author List: Ankit Vaidya (from Pune Institute of Computer Technology), Aditya Kane (from Pune Institute of Computer Technology)
Figure
Figure 1: Class distribution of dialects
Figure 2: System diagram for dialect classification.The LID classifies the input into one of 3 languages.The sample is then further classified into dialects by language specific models.
Figure 3: Confusion matrix of 9-way classification.Note that rows are normalized according to the number of samples is that class.
Our complete results for Track-1 using the two-stage dialect detection pipeline.Model-* denotes the language of the models used for the experiments.
Performance on Track-1 validation dataset of individual models used in the two-stage pipeline."Lg" stands for language of the model used.
Comparative results of two-way classification using the finetuned (F.T.) predictions and predictions adapted from three-way classification models.
abstract
Dialect Identification is a crucial task for localizing various Large Language Models. This paper outlines our approach to the VarDial 2023 DSL-TL shared task. Here we have to identify three or two dialects from three languages each which results in a 9-way classification for Track-1 and 6-way classification for Track-2 respectively.
Our proposed approach consists of a two-stage system and outperforms other participants' systems and previous works in this domain. We achieve a score of 58.54% for Track-1 and 85.61% for Track-2. Our codebase is available publicly 1 .
Introduction
Language has been the primary mode of communication for humans since the pre-historic ages. Studies have explored the evolution of language and outlined mathematical models that govern the intricacies of natural language . Inevitably, as humans established civilization in various parts of the world, this language was modified by, and for the group of people occupied by that particular geographical region.
This gave rise to multiple national dialects of the same language. The VarDial workshop (colocated with EACL 2023) explores various dialects and variations of the same language. We participated in the Discriminating Between Similar Languages -True Labels (DSL-TL) shared task. In this task, the participants were provided with data from three languages, with each language having three varieties.
This shared task consisted of two tracks -Track-1 featuring nine-way classification and Track-2 featuring six-way classification. The second track included two particular national dialects of each language (eg. American English and British English), and the first track had one general We ranked 1 st in both of the tracks.
Moreover, we beat the next best submission by a margin of 4.5% in the first task and 5.6% in the second task.We were the only team to surpass the organizer baseline scores. We present our winning solution in this paper. We used an end-to-end deep learning pipeline which consisted of a language identification model and three language-specific models, one for each language.
We converged upon the best combination by doing an elaborate analysis of various models available. Furthermore, in this work we also analyze the performance of the pipeline as a whole and also provide an ablation study. Lastly, we provide some future directions in this area of research.
Related Work
The present literature encompasses various aspects of dialect identification. We study this from three perspectives: large language models, language identification and dialect classification problems.
Large Language Models
The success of transformers and BERT based models was inevitable since the initial boom of the transformer 2017) model. In recent years, many other architectures like RoBERTa and ELECTRA have further pushed the state-of-the-art in this domain. Moreover, autoregressive models like GPT and GPT-2 have also shown their prowess.
Multilingual versions of RoBERTA, namely XLM-RoBERTa are also available. Lastly, language specific models like Spanish BERT (la Rosa y Eduardo G. Ponferrada y Manu Romero y Paulo Villegas y Pablo González de Prado Salas y María Grandury, 2022) and Portuguese BERT are available as well. Our winning solution makes use of these large language models trained on specific languages.
Language Identification Models
Many multilingual language identification models have been developed in order to classify the language of the input sentence beforehand. Even though the initial works used n-gram models and generative mixture models or even conditional random fields and other classical machine learning methods like naive bayes , modern methods have shifted to the use of deep learning for language identification .
Recent works have mainly focused on deep learning based language identification, where handling codemixed data is a big challenge in the domain. For our experiments, we use a version of XLM-RoBERTa finetuned on a language identification dataset 2 . This model has near-perfect test accuracy of 99.6%.
Dialect Classification
Dialect classification has been previously solved using statistical methods like Gaussian Mixture Models and Frame Selection Decoding or Support Vector Machines (SVM) . It has been explored relatively sparsely, mostly in the case for local languages . Deep learning approaches have been explored in previous editions of the VarDial workshop shared tasks and otherwise .
Dialect classification was also explored previously as a part of other shared tasks . We want to stress that given the multilingual nature of the dataset, using the present methods directly was not an option. In our work, although we take inspiration from the previous works, we propose a novel system that surpasses the performance of the previous systems by a large margin.
Data
The dataset We observed that the class PT-BR had the most number of samples (2,724) and the class EN had the least number of samples (349), and thus the imbalance ratio was almost 1:8. We have illustrated the data distribution in Figure . We tried to mitigate this imbalance using over-sampling and weighted sampling methods.
However, the improved data sampling method did not affect the performance.
System Description
This was a problem of multi-class classification having 9 classes for Track-1 and 6 classes for Track-2. The samples were belonging to 3 languages having 3 varieties each, so the classification pipeline was made in 2 stages. The Language Identification (LID) model which is the first stage classifies the sentence into 3 languages: English (EN), Spanish (ES) and Portuguese (PT).
The LID is a pretrained XLM-RoBERTa that is fine-tuned for the task of language identification. It is able to classify the input sentence into 20 languages. We classify and separate the samples according to their language. The samples corresponding to the specific languages are then fed into the language specific models for dialect identification.
For dialect identification we have used models like BERT and RoBERTa with a linear layer connected to the pooler output of the models. Then fine-tuning is done on the models for dialect identification using the samples corresponding to the specific languages. For the task of dialect identification we experimented with several pretrained models like XLM-RoBERTa, BERT, ELECTRA, GPT-2 and RoBERTa.
All models were fine-tuned for 20 epochs with a learning rate of 1e-6 and weight decay 1e-6 with a batch size of 8. The best performing model checkpoint was chosen according to the epoch-wise validation macro-F1 score. 5 Experiments and Results
Experiments using Large Language Models
For the task of Dialect Identification we have tried various language specific models like XLM-RoBERTa, BERT, ELECTRA, RoBERTa and GPT- 2. The base variant of all these models were used and all the models were used through the Hugging-Face library. The pooler output of these models was passed through a linear layer and the models were fine-tuned.
First, we experimented with different models for Track-1. All the models were trained for 20 epochs with learning rate 1e-6, weight decay 1e-6 and a batch size of 8. We used XLM-RoBERTa as the baseline for all 3 languages. The best performing models for the English language were RoBERTa and BERT whereas GPT-2 was the worst performing.
Similarly the language specific versions of RoBERTa and BERT performed well for the Spanish and Portuguese respectively. Overall the worst performing model was GPT-2 across all 3 languages. The validation F1 scores are present in Table . The two best-performing models for every language were chosen for Track-2.
The same procedure as specified above was used and the F1 scores are present in Table . The train and validation F1 scores for 2-class classification are higher for all models as compared to the F1 score of the same models for 3-class classification. This was mainly due to the poor representation and accuracy of classification of the third class.
We observed symptoms of overfitting in all models after 12-15 epochs and the best validation F1 score was obtained in the range of 4-8 epochs.
LID experiments
The pipeline for dialect identification is divided into two parts as the sentences in the dataset belong to different languages. The stages are described in Section 4. The XLM-RoBERTa we have used for language classification has a test accuracy of 99.6% meaning it correctly classifies all input sentences and hence, can be considered as a perfect classifier.
For the final pipeline we experimented using the two best performing models for each language in Track-1 and Track-2. For both the tracks we experimented with all 8 (2 3 ) possible combinations of models and calculated the validation F1 score for the combined validation dataset which had sentences belonging to all languages.
The validation scores for Track-1 and Track-2 are shown in Table and Table respectively. For both the tracks, the three pipelines with the best validation F1 scores were chosen for submission.
Using 3-way classifier as a 2-way classifier
In Track-1, participants are expected to train a classifier which classifies amongst 9 classes, and in Track-2, participants are expected to train a classifier which classifies amongst 6 classes. These 6 classes are a proper subset of the 9 classes from Track-1. Thus, an intuitive baseline for Track-2 is to use the model finetuned for Track-1, whilst considering only the relevant classes for the latter task.
The classes EN , ES and P T , i.e. the classes without any national dialect associated with them are not included in Track-2 as compared to Track-1. Thus, we calculate the predictions for the Track-2 validation dataset using the models for Track-1 and exclude the metrics for Track-1 specific classes to get the metrics for this "adapted" 2-way classification.
We show the results of this experiment in Table and observe that, as expected, the adapted 2-way classification performs worse compared to the explicitly finetuned variant.
Results for Track-1 and Track-2
We now present our experiments and their performance for both tracks. Our experiments for Track-1 are described in Table and our experiments for Track-2 are described in Table . The participants were allowed three submissions for evaluation on the test set, so we submitted predictions using the three systems which performed the best on the validation set.
As mentioned in Section 5.2, we performed 2 3 , i.e. a total of 8 experiments using the two best models for each language. We observed that RoBERTa base on English, Spanish BERT base on Spanish and Portuguese BERT base performed the best on the testing set for Track-1. The same combination, with RoBERTa base for English, worked best for Track-2.
All of our submissions were the top submissions for each track, which surpassed the next best competitors by a margin of 4.5% and 5.6% for Track-1 and Track-2 respectively.
Ablation of best submissions
We hereby make some observations of our submissions and other experiments. To assist this, we plot the confusion matrices of our best submissions for Track-1 and Track-2 in Figures respectively. Note that these confusion matrices have their rows (i.e. true labels axes) normalized according to the number of samples in the class.
Here are observations from our experiments: 1. BERT-based models outperform other models across all languages: We observe that BERT-based models outperform ELECTRA-based and GPT-2-based models, as shown in Table . We speculate this is because of the inherent architecture of BERT, which combines semantic learning with knowledge retention.
This combination of traits is particularly useful for this task. 2. Common labels perform the worst across all languages: We observe that the common labels EN , ES and P T perform the worst, both in the individual as well as the two-stage setup. We hypothesize this is because of the absence of dialect specific words, or words that are specific to the geographical origin of the national dialect (for example, "Yankees" for EN-US and "Oxford" for EN-GB).
3. English models work better than models of other languages: It can be noted from Figures 4 and 3 that the English models have the best performance across all classes. This can be attributed to two reasons: absence of national dialect specific words and lesser pretraining data in the case of Portuguese.
4. British English is most correctly classified class: We can observe that the Spanish or Portuguese models make equal number of mistakes in the case of either national dialect, in the case of Track-2 (see Figure ). However, in the case of English, the label EN − GB is correctly classified for more than 95% of the cases.
We speculate this is because British English involves slightly distinctive grammar and semantics, which help the model separate it from other classes. 5. The proposed 2-step method is scalable for multiple language dialect classification: We can strongly assert that the novel 2-step deep learning method for multilingual dialect classification is a scalable method for the task due to two specific reasons: firstly, the multilingual models (like XLM-RoBERTa) might not have the vocabulary as well as the learning capabilities to learn the minute differences between individual dialects.
Secondly, this system can be quickly expanded for a new language by simply adding a language specific dialect classifier, provided the language identification model supports that particular language.
Conclusion
In this paper we propose a two-stage classification pipeline for dialect identification for multilingual corpora. We conduct thorough ablations on this setup and provide valuable insights. We foresee multiple future directions for this work. The first is to expand this work to many languages and dialects.
Secondly, it is a worthwhile research direction to distill this multi-model setup into a single model with multiple prediction heads. The obvious limitation of this system is the excessive memory consumption due to the usage of language specific models. For low resource languages this system is difficult to train and scale.
We hope that these problems will be addressed by researchers in future works.
|
[
"85.61%."
] | 2,395
|
multifieldqa_en
|
en
| null |
c6d0de0391867185e00e945075301d33fc1c5c05d2a7d082
|
How does the specific-heat ratio affect the average motion of the bubble?
|
Paper Info
Title: Specific-heat ratio effects on the interaction between shock wave and heavy-cylindrical bubble: based on discrete Boltzmann method
Publish Date: May 29, 2023
Author List: Yanbiao Gan (from School of Liberal Arts and Sciences, Hebei Key Laboratory of Trans-Media Aerial Underwater Vehicle, North China Institute of Aerospace Engineering), Yudong Zhang (from School of Mechanics and Safety Engineering, Zhengzhou University)
Figure
Figure 1: Research orientation and tasks of DBM.
Figure 2: Sketch of D2V16 model.The numbers in the figure represent the index i in Eq. (3).
Figure 3: The computational configuration of the shock-bubble interaction.
In the figure, results from odd rows are experimental, and the even rows indicate DBM simulation results.The typical wave patterns and bubble's main characteristic structures are marked out in the figures.Numbers in the pictures represent the time in µs.Schlieren images of DBM results are calculated from the density gradient formula, i.e., |∇ρ|/|∇ρ| max , with |∇ρ| = (∂ ρ/∂ x) 2 + (∂ ρ/∂ y)2 .At t = 0µs, the incident shock wave impacts the upstream interface, and subsequently generates a transmitted shock (TS) propagating downstream in the bubble and a reflected shock wave moving upward in ambient gas.The incident shock wave travels downstream contin-
The definitions and the corresponding physical meanings of the common TNE quantities in DBM, where the operator ∑ ix,iy indicates integrating over all the fluid units and multiply the unit area dxdy.From a certain perspective, the TNE strength is increasing; While from a different perspective, the TNE strength, on the other hand, may be decreasing.It is one of the concrete manifestations of the complexity of non-equilibrium flow behavior.
Figure 4: Snapshots of schlieren images of the interaction between a shock wave and a heavy-cylindrical bubble.The odd rows represent experimental results from Ref. [31] with permission, and the even rows are DBM simulation results.The typical wave patterns and the bubble's main characteristic structure are marked out in the figures.Numbers in the picture represent the time in µs.
Figure 5: The temporal variations of length and width of the bubble.The symbols represent DBM results and the lines are experimental.The definition of the length and the width of the bubble can be seen in the illustration.Experimental results are obtained from Fig. 12, in Ref. [31] with permission.
Figure 6: Density contours and particle tracer images at three different moments (i.e., t = 0.07,t = 0.11, and t = 0.16) with various specific-heat ratios.The odd rows represent density contours, and the even rows are tracer particle images.
Figure 9: Vorticity contours at t = 0.134, with various specific-heat ratios.The arrows in the vorticity image point out the apparent difference between case γ = 1.4 and case γ = 1.09.
Figure 11: Density contours (first row) and mixing degree M (second row) at several typical moments.
Figure 13: (a) Temporal evolution of D * 3,1 and D * 4,2 .(b) Temporal evolution of D * 2 and D * 3 .Lines with different colors represent the cases with various specificheat ratios.
The development of schemes for checking TNE state, extracting TNE information and describing corresponding TNE effects in DBM.
abstract
Specific-heat ratio effects on the interaction between a planar shock wave and a two-dimensional heavy-cylindrical bubble are studied by the discrete Boltzmann method. Snapshots of schlieren images and evolutions of characteristic scales, being consistent with experiments, are obtained. The specific-heat ratio effects on some relevant dynamic behaviors such as the bubble shape, deformation process, average motion, vortex motion, mixing degree of the fluid system are carefully studied, as well as the related Thermodynamic Non-Equilibriums (TNE) behaviors including the TNE strength, entropy production rate of the system.
Specifically, it is found that the influence of specific-heat ratio on the entropy production contributed by non-organized energy flux (NOEF) is more significant than that caused by non-organized momentum flux (NOMF). Effects of specific-heat ratio on entropy production caused by NOMF and NOEF are contrary.
The effects of specific-heat ratio on various TNE quantities show interesting differences. These differences consistently show the complexity of TNE flows which is still far from clear understanding.
Introduction
The applications of shock-accelerated inhomogeneous flows (SAIFs) are of significant value in biomedicine, energy utilization, and astrophysics fields, including but not limited to scenarios such as the impact of shock waves on kidney stones, the interaction between shock waves with foams, the impacting of detonation wave with burning flames in supersonic combustion systems, the formation of supernova remnants, etc .
Shock-bubble interaction (SBI) is one of the most fundamental problems in the research of SAIFs. Its applications and academic research are interdisciplinary. Generally, there are two kinds of problems encountered in SBI research: (i) The geometry of shock waves, the shape of material interfaces, and the structure of container are complex in the actual scene.
They will result in various wave patterns and significantly affect the flow morphology and bubble's evolution. (ii) There usually exist multi-physics coupling problem in the engineering application of SBI. Such as the supersonic combustion machines. When the shock waves passing through the reactants, it may lead to phase transition and chemical reactions, making the flow morphology more complex and inducing small structure (or fast-changing pattern) .
In an underwater explosion experiment, the interaction between shock waves and bubbles may refer to the cavitation and annihilation effects. The other scene is the inertial confinement fusion (ICF), in which the laser ablation, electron heat conduction, self-generated electromagnetic field, radiation, and many other factors may complicate the investigation of hydrodynamic instabilities .
Commonly, research on SBI mainly includes three methods: theoretical derivation, experiment, and numerical simulation. As a fundamental research method, theoretical research can provide a clear understanding of physical processes. In 1960, Rudinger et al. developed a theory that permits computing the response of bubbles to accelerations .
In order to describe the formation and evolution processes of vortex structure quantitatively, many scholars have developed circulation models . However, theoretical works provide limited information. Meanwhile, in the late stage of SBI evolution, the bubble deformation and flow morphology dominated by the developed Richtmyer-Meshkov instability (RMI) and Kelvin-Helmholtz instability (KHI) are difficult to be predicted accu-rately.
As the research method closest to engineering application, the experimental results are often regarded as standard results to verify the rationality and accuracy of theoretical and numerical works. To study the SBI process accurately, the scholars have made a series of improvements to experimental equipment or technique, including the generation techniques of different types of shock waves, interface formation methods, schlieren facilities, and image recognition techniques .
Among these, two of important and valuable works are performed by Ding et al.. Based on the soap film technique, they formed kinds of initial interfaces with different curvatures through the wire-restriction method and captured the wave patterns and interface evolution with high-speed schlieren photography .
Other works, such as evolutions of a spherical gas interface under reshock conditions , developments of a membrane-less SF 6 gas cylinder under reshock conditions , and interactions of a cylindrical converging shock wave with an initially perturbed gaseous interface , are also performed by many other scholars.
However, we know that the experimental studies mainly depend on the experimental platform. When studying some complex and demanding condition problems, it takes much work to build the experimental platform. In this situation, numerical simulation research becomes an option. Generally, there are three kinds of physical modeling methods (or models) for SBI numerical research, i.e., the macroscopic, mesoscopic, and microscopic modeling methods.
Most of the existing numerical researches on SBI are related to the macroscopic modeling methods (such as the Euler and Navier-Stokes (NS) models) based on the continuous hypothesis (or equilibrium and nearequilibrium hypothesis) . For example, presented the computational results on the evolution of the shock-accelerated heavy bubbles through the multi-fluid Eulerian equation .
There also exist a few SBI works based on the mesoscopic modeling method, such as the Direct Simulation Monte Carlo method . The microscopic modeling methods such as the Molecular dynamics (MD) simulation, is capable of capturing much more flow behaviors but restricted to smaller spatiotemporal scales because of its huge computing costs.
In the numerical research on SBI, three points need to be concerned. (i) Investigation of kinetic modeling that describes the non-continuity/non-equilibrium flows. Most of the current researches are based on macroscopic models. However, there exist abundant small structure (and fast-changing patterns) behaviors and effects such as the shock wave, boundary layer, material defects, etc.
For cases with small structures, the mean free path of molecules cannot be ignored compared to the characteristic length, i.e., the non-continuity (discreteness) of the system is pronounced, which challenge the rationality and physical function of the macroscopic models based on the continuity hypothesis.
For cases with fast-changing patterns, the system dose not have enough time to relax to the thermodynamic equilibrium state, i.e., the system may significantly deviate from the thermodynamic equilibrium state. Therefore, the rational-ity and physical function of the macroscopic models based on the hypothesis of thermodynamic equilibrium (or near thermodynamic equilibrium) will be challenged.
(ii) Improvement of method that describes the evolution characteristics of bubbles and flows morphology. Most of the studies describe bubble characteristics and flows morphology from a macroscopic view. The mesoscopic characteristics such as the kinetic effects which help understand the kinetic process, are rarely to be studied.
(iii) Further studies of effects of specific-heat ratio on SBI process. The specific-heat ratio is an essential index for studying the compressibility of the gas. Research from Igra et al. has shown that the differences in the specific-heat ratio of bubbles would cause various wave patterns and pressure distribution inside the bubbles during the interaction process .
Besides, many works on hydrodynamic instability have also demonstrated the importance of investigating the specific-heat ratio effect . Among these, Chen et al. investigated the specific-heat ratio effects on temperature gradient and the TNE characteristics of compressible Rayleigh-Taylor (RT) system .
For the above three points, in this work we apply the recently proposed discrete Boltzmann method (DBM) . The Lattice Boltzmann Method (LBM) research has two complementary branches . One aims to work as a kind of new scheme for numerical solving various partial differential equation(s). The other aims to work as a kind of new method for constructing kinetic model to bridge the macro and micro descriptions.
The two branches have different goals and consequently have different rules. The current DBM is developed from the second branch of LBM and focusing more on the Thermodynamic Non-Equilibrium (TNE) behaviors that the macro modeling generally ignore. It breaks through the continuity and near-equilibrium assumptions of traditional fluid modeling, discards the lattice gas image of standard LBM, and adds various methods based on phase space for checking, exhibiting, describing and analyzing the non-equilibrium state and resulting effects.
More information extraction technologies and analysis methods for complex field are introduced with time. The numerical simulation includes three parts, as shown in Fig. . (1) Physical modelling, (2) Algorithm design, (3) Numerical experiments and analysis of complex physical fields. The research of equation algorithm corresponds to the part (2) of the above three parts.
The DBM aims at parts (1) and (3) of the three mentioned above. It belongs to a physical model construction method rather than a numerical solution for the equations. The tasks of DBM are to: (i) Ensure the rationality of the physical model (theoretical model) and balance the simplicity for the problem to be studied; (ii) Try to extract more valuable physical information from massive data and complex physical fields.
Based on the coarse-grained modeling method of nonequilibrium statistical physics, the DBM aims to solve the following dilemma: (i) The traditional hydrodynamic modelings are based on the continuous hypothesis (or near-equilibrium hypothesis). They only concern the evolution of three conserved kinetic moments of the distribution function, i.e. the density, momentum and energy, so their physical functions are insufficient.
(ii) The situation that the MD can be used is restricted to too small spatial-temporal scales. The physical requirement for the modeling is that except for the Hydrodynamic Non-Equilibriums (HNE), the most related TNE are also needed to be captured. Theoretically, the Boltzmann equation is suitable for all-regime flows, including the continuum regime, slip regime, transition regime, and free molecule flow regime.
Based on the Chapman-Enskog (CE) multiscale analysis , through retaining various orders of Kn number (or considering different orders of TNE effects), the Boltzmann equation can be reduced to the various orders of hydrodynamic equations. They can be used to describe the hydrodynamic behaviors, i.e., the conservations of mass, momentum and energy , in corresponding flow regimes.
Because what the traditional hydrodynamic equations describe are only the conservation laws of mass, momentum and energy. Consequently, it should be pointed out that, the information lost in the traditional hydrodynamic equations increases sharply with increasing the Kn number. With increasing the Kn number, to ensure the describing capability not to decrease significantly, the more appropriate hydrodynamic equations should be the Extended Hydrodynamic Equations (EHEs) which include not only the evolution equations of conserved kinetic moments but also the most relevant nonconserved kinetic moments of distribution function.
For convenience of description we refer the modeling method that derives EHEs from the fundamental kinetic equation to Kinetic Macroscopic Modeling (KMM) method. It is clear that, the complex process of CE expansion is necessary and the simulation is still based on the macroscopic equations in KMM. As a comparison, the DBM is a kind of Kinetic Direct Modeling (KDM) method.
In DBM modeling, the CE analysis is only used to quickly determine which kinetic moments should keep values unchanged, the final EHEs are not needed, and the simulation is not based on the complicated EHEs. As the TNE degree of the flow to be described rises gradually, the complexity of the derivation process and difficulty of numerical simulation in the KMM method increase sharply.
However, in the DBM method, to describe flows in a one-order more deeper depth of TNE, only two more related kinetic moments need to be added. Since without needing to derive and solve the EHEs, as the TNE degree deepens, the complexity of the DBM approach increases much slower than that of KMM method.
The core step in DBM modeling is to provide a feasible scheme for detecting, describing, presenting, and analyzing TNE effects and behaviors beyond traditional macroscopic modeling. Based on the non-equilibrium statistical physics, we can use the non-conservative moments of ( f − f eq ) to describe how and how much the system deviates from the thermodynamic equilibrium state and to check corresponding effects due to deviating from the thermodynamic equilibrium.
The non-conservative moments of ( f − f eq ) open a phase space, and this space and its subspaces provide an intuitive geometric correspondence for describing complex TNE system properties. The development of schemes for checking TNE state, extracting TNE information and describing corresponding TNE effects in DBM are seen in Table .
Actually, this set of TNE describing methods has been applied in many kinds of complex fluid systems such as hydrodynamic instability system , combustion and detonation systems , multiphase flow system , plasma system , etc. Besides the scheme for detecting, describing, presenting, and analyzing TNE effects and behaviors, the DBM incorporates other methods for analyzing the complex physical field.
One of them is the tracer particle method. The introduction of the tracer particle method makes the gradually blurred interface appear clearly . The rest of the paper is structured as follows. Section 2 shows Year Scheme for investigating TNE effects and behaviors Before 2012 Two classes of LBMs did not show a significant difference in physical function.
2012 Use the non-conservative moments of ( f − f eq ) to check and describe TNE . This is the starting point of current DBM approach. 2015 Open TNE phase space based on non-conservative moments of ( f − f eq ) and define a TNE strength using the distance from a state point to the origin. This is the starting point of the phase space description method .
2018 Extend the distance concepts in phase space to describe the TNE difference/similarity of TNE states and kinetic processes . 2021 Further extend the phase space description methodology to any set of system characteristics . the modeling method. Then, the numerical simulations and results are presented in Section 3, which includes two subsections.
Section 4 concludes the paper. Other complementary information is given in the Appendix.
Model construction
Based on the Bhatnagar-Gross-Krook (BGK) singlerelaxation model, a two-fluid DBM with a flexible specific-heat ratio is presented in this part. From the origin Boltzmann equation to a DBM, four fundamental steps are needed: (i) Simplification and modification of the Boltzmann equation according to the research requirement.
(ii) Discretization of the particle velocity space under the condition that the reserved kinetic moments keep their values unchanged. (iii) Checking the TNE state and extracting TNE information. (iv) The selection/design of the boundary conditions.
Simplification and modification of the Boltzmann equation
As we know, the collision term in the original Boltzmann contains high dimensional distribution functions. Therefore, the direct solution to it needs too much computing consumption. The most common method to simplify the collision operator is to introduce a local equilibrium distribution function ( f eq ) and write the complex collision operator in a linearized form, i.e., the original BGK collision operator − 1 τ ( f − f eq ), where τ is the relaxation time .
The original BGK operator describes the situation where the system is always in the quasi-equilibrium state. Namely, it characterizes only the situation where the Kn number of the system is small enough and f ≈ f eq . The currently used BGK operator for non-equilibrium flows in the field is a modified version incorporating the meanfield theory description .
Based on the above considerations, the simplified Boltzmann equation describing the SBI process is where the two-dimensional equilibrium distribution function is ) where ρ, T , v, u, I, R, and η are the mass density, temperature, particle velocity vector, flow velocity vector, the number of the extra degrees of freedom including molecular rotation and vibration inside the molecules, gas constant, and a free parameter that describes the energy of the extra degrees of freedom, respectively.
The specific-heat ratio is flexible by adjusting parameter I, i.e., γ = (D + I + 2)/(D + I), where D = 2 represents the two-dimensional space.
Discretization of the particle velocity space and determination of f σ ,eq i
The continuous Boltzmann equation should be discretized for simulating. Specifically, the continuous velocity space can be replaced by a limited number of particle velocities. So that the values of continuous kinetic moments can be obtained from the summation form of kinetic moments. In this process, it requires the reserved kinetic moments, which are used to characterize the system behaviors, keep their values unchanged after discretizing the velocity space.
Namely, f the reserved kinetic moments. According to the CE analysis, f can be expressed by f eq . Therefore, in the process of discretization, the reserved kinetic moments of f eq should keep their values unchanged, i.e., where i represents the kind of discrete velocities and α (α = x or y) is the direction in cartesian coordinate.
To simulate the interaction between two different fluids, a two-fluid DBM should be constructed. Based on the singlerelaxation model, the discrete two-fluid Boltzmann equation can be written as : where σ represents the types of material particle and f σ ,eq i = f σ ,eq i (ρ σ , u, T). In two-fluid DBM, the macroscopic quantities of the mixture and each component are
where ρ σ and u σ are the mass density and flow velocity of the component σ , respectively. ρ and u represent the mass density and flow velocity of the mixture, respectively. There exist two kinds of temperature (internal energy) definitions in two-fluid DBM because the definition of temperature (internal energy) depends on the flow velocity to be chosen as a reference.
The first definition is by choosing the velocity of the mixture to be a reference, i.e., So that the expressions of temperature of component σ and mixture are where We can also choose the flow velocity of component as a reference, i.e., , where u σ is the flow velocity of component σ . The corresponding definitions of temperature for component σ and the mixture are
where ∆E * I is It is clear to see that these two definitions of temperature for mixture are the same, but for temperature of component σ are different. We choose the first definition in this manuscript. To solve the Eq. ( ), it is necessary to determine the values of f σ ,eq i . Its values depend on the reserved kinetic moments which characterize the main system behaviors.
In DBM modeling, the CE multiscale analysis is used to determine quickly the reserved kinetic moments. Specifically, when constructing a DBM which only the first order term of Kn number is retained (i.e., only the first order TNE effects are retained), seven kinetic moments should be reserved, i.e., the M 0 , M 1 , M 2,0 , M 2 , M 3,1 , M 3 , M 4,2 .
Two more kinetic moments ( M 4 and M 5,3 ) are needed when the second order TNE is considered . However, it should be noted that the function of CE analysis in DBM modeling is only to determine the kinetic moments that need to be preserved. Whether or not to derive the hydrodynamic equations does not affect the DBM simulation.
The kinetic moments used in our physical modeling are shown in the Appendix B. Their expressions can be obtained by integrating v and η with continuous-form f eq . For better understanding, the Appendix C gives the two-fluid hydrodynamic equations recovered from the Boltzmann equation. The kinetic moments in Appendix B can be written in matrix form, i.e., C • f σ ,eq = fσ,eq , (
where C is the matrix of discrete velocity and feq represents the kinetic moments. A proper discrete velocity model is needed to confirm the values of f σ ,eq i . The f σ ,eq can be obtained by solving the inverse matrix, i.e., f σ ,eq = C −1 • fσ,eq , where C −1 is the inverse matrix of C. It is very convenient to obtain the inverse matrix of C through some mathematical softwares such as Mathematica, etc.
The D2V16 model is chosen in this paper, its sketches can be seen in Fig. . The specific values of D2V16 are given in the following equations: where "cyc" indicates cyclic permutation and c is an adjustable parameter of the discrete velocity model. The sketch of η in D2V16 is η i = η 0 for i = 1 − 4, and η i = 0 for i = 5 − 16.
Checking the TNE state and extracting TNE information
Many physical quantities can characterize the degree of TNE in a fluid system, such as relaxation time, Kn number, viscosity, heat conduction, the gradients of macroscopic quantity, etc. They are all helpful to characterize the TNE strength and describe the TNE behaviors of a fluid system from their perspectives.
But it is not enough only relying on these quantities. Besides the above physical quantities describing the TNE behaviors, in DBM modeling, we can also use the non-conservative moments of ( f − f eq ) to characterize the TNE state and extract TNE information from the fluid system. Fundamentally, four TNE quantities can be defined in a firstorder DBM, i.e., ∆ σ * 2 , ∆ σ * 3,1 , ∆ σ * 3 , and ∆ σ * 4,2 .
Their definitions can be seen in Table , where v * i = v i − u represents the central velocity and u is the macro flow velocity of the mixture. Physically, ∆ σ * 2 = ∆ σ * 2,αβ e α e β and ∆ σ * 3,1 = ∆ σ * 3,1 e α represent the viscous stress tensor (or non-organized momentum flux, NOMF) and heat flux tensor (or non-organized energy flux, NOEF), respectively.
The e α (e β ) is the unit vector in the α (β ) direction. The later two higher-order TNE quantities contain more condensed information. Specifically, and it indicates the flux information of ∆ σ * 2 . To describe the TNE strength of the whole fluid system, some TNE quantities contained more condensed information are also defined, i.e.,
Other TNE quantities can be defined based on specific requirements. All the independent components of TNE characteristic quantities open a highdimensional phase space, and this space and its subspaces provide an intuitive image for characterizing the TNE state and understanding TNE behaviors . It should be emphasized that: (i) The TNE strength/intensity/degree is the most basic parameter of non-equilibrium flow description; And any definition of non-equilibrium strength/intensity/degree depends on the research perspective.
(ii) The physical meaning of D * m,n is the TNE strength of this perspective. (iii) From a certain perspective, the TNE strength is increasing; While from a different perspective, the TNE strength, on the other hand, may be decreasing. It is normal, one of the concrete manifestations of the complexity of non-equilibrium flow behavior.
Strictly speaking, those TNE intensity and effect descriptions that do not account for the research perspective are not correct. Do not explain the research perspective, the corresponding is not dependent on the research perspective.
Numerical simulations and results
In this section, we first validate the DBM code by comparing the DBM results with experimental results. Then, the effects of specific-heat ratio on the dynamic process and TNE behaviors on SBI are investigated.
Comparison with experimental results
In the following part, we use a first-order two-fluid DBM to simulate the interaction between a planar shock wave with a 2-D heavy-cylindrical bubbles, and compare the DBM results with the experimental results from Ref. . The computational configuration can be seen in Fig. . In a flow field which is filled with Air, there is a static bubble composed of 26% Air and 74% SF 6 .
A shock with Ma = 1.2 would pass through the bubble from left to right. The initial conditions of ambient gas are ρ 0 = 1.29kg/m 3 , T 0 = 293K, p 0 = 101.3kPa. Ignoring the pressure difference between interior gas and ambient gas, the initial parameters of the bubble are ρ bubble = 4.859kg/m 3 , p bubble = 101.3kPa,
and T 0 = 293K. For simulating, these actual physical quantities should be transferred to dimensionless parameters. This process can refer to the Appendix A. The dimensionless conditions of macroscopic quantities of the fluid field in initial time are (ρ, T, u x , u y ) bubble = (4.0347, 1.0, 0.0, 0.0), (ρ, T, u x , u y ) 1 = (1.3416,
1.128, 0.3616, 0.0), (ρ, T, u x , u y ) 0 = (1.0, 1.0, 0.0, 0.0), where the subscript "0" ("1") represents downstream (upstream) region. In two-fluid DBM code, the distribution function f Air is used to describe the ambient gas, i.e., Air. The f bubble characters the bubble which is a mixture that composed of Air and SF 6 .
The grid number is N x × N y = 800 × 400, where the N x and N y are grid number in x and y direction, respectively. This grid size has passed the mesh convergence test. The below results also show that it is sufficient to meet the requirements of the following research problem. Other parameters used for the simulation are: c = 1.0, η Air = η bubble = 10.0,
I Air = 3, I bubble = 15, ∆x = ∆y = 1.2 × 10 −4 and ∆t = 1 × 10 −6 . The viscosity effect is feeble compared to the shock compression effect, so it does not significantly affect the deformation of the bubble. Therefore, in this part, the relaxation time τ is set sufficiently small. The inflow (outflow) boundary condition is used in the left (right) boundary, and the periodic boundary is adopted in the y direction.
The first-order forward difference scheme is used to calculate the temporal derivative, and the second-order nonoscillatory nonfree dissipative scheme is adopted to solve the spatial derivative in Eq. ( ) . Two quantitative comparisons between experimental results and DBM simulations are shown in the following part, including snapshots of schlieren images and evolutions of characteristic scales for the bubble.
The first is shown in Fig. non-organized momentum flux (NOMF) uously to form a diffracted shock (DS). As TS propagates, it will split into three branches due to the considerable pressure perturbations caused by the gradual decay of the DS strength . Afterward, as shown in the subfigure at about t = 128µs, two high pressure regions (ROH) generate because of the interaction of these branches.
Subsequently, at about t = 148µs, the two ROHs meet, causing the shock focusing. On the one hand, at about t = 168µs, the shock focusing causes the generation of downstream-propagating second transmitted shock (STS) and upward-moving rarefaction wave. On the other hand, it will produce high pressure region inside the bubble, which later leads to a jet structure, as shown at about t = 288µs.
At about t = 428µs, due to the deposited vorticity, there will produce a pair of counter-rotating vortexes at the pole region of the bubble. The further development of the vortex pair and the effect of viscosity decrease the amplitude of the jet. Finally, the jet structure disappears. The second quantitative comparison is the interface structure described by the length and width of the bubble, as shown in Fig. .
The experimental data are extracted from Fig. , in Ref. . Quantitative agreements between DBM simulation and experimental results are seen. For the profile of bubble width, there are mainly two stages. At an early time (t < 150µs), it decreases to a minimum value because of the shock compression effect.
After the shock wave passes through the bubble (t > 150µs), the developed vortex pair caused by the deposited vorticity gradually dominates the growth of bubble width. Different from width evolution, the temporal variation of length experiences three stages. In the early stages (t < 150µs), it decreases quickly due to the shock compression effect.
Then, the jet structure emerges, which results in a growth in length (150µs < t < 250µs). Because the upstream interface moves faster than the downstream interface, the bubble length would decrease at 250µs < t < 500µs. In the third stage (t > 500µs), the vortex pair forms and then leads to a continuous development of bubble length.
Both the length and width experience oscillations in the later stages due to complex wave patterns. The quantitative agreements between DBM simulation and experimental results indicate the following two facts: (i) the order of TNE considered in the current DBM is sufficient, (ii) the choosing of discrete velocities and spatial-temporal steps and simulation parameters like the relaxation times is suitable for characterizing the deformation of bubble, wave patterns, main characteristics of flow morphology.
Effects of specific-heat ratio on SBI
The major of current works on SBI research have not focused on specific-heat ratio effects. In this part, the simulation parameters are fine-adjusted based on the parameters in Section 3.1 to highlight the influence of specific-heat ratio. Through adjusting the extra degree of freedom I, five cases with various specific-heat ratios of the bubble are simulated, i.e., γ = 1.4,
1.28, 1.18, 1.12, and 1.09. Two kinds of analysis methods, including tracer particle method and two-fluid model, are used to characterize qualitatively the macroscopic behaviors such as the shape, deformation process, mixing degree, etc. The related TNE behaviors are also studied.
Effects of specific-heat ratio on jet shape, deformation process, and average motion
We first observe the specific-heat ratio effect on the bubble shape from the view of density contour and images of particle tracer visually. As shown in Fig. , pictures with three typical moments are plotted, i.e., t = 0.07,t = 0.11, and t = 0.16. The odd rows represent density contours and the even rows are tracer particle images.
It can be seen that the specific-heat ratio significantly affects the length and shape of the jet structure. The smaller the specific-heat ratio is, the stouter the jet structure can be seen. The reason is that the specific-heat ratio significantly changes the propagation speed of shock waves and wave patterns inside the bubble.
The specific-heat ratio also influences the vortex structure in early stage but contributes little effects to it in later stage. In the later stage, for cases with different specific-heat ratios, the differences in vortex pairs are almost invisible. Then, the effects of specific-heat ratio on deformation process are analyzed.
Shown in Fig. are the evolutions of characteristic scales which used to describe the bubble size, i.e., width and length. It can be seen that the smaller the specific-heat ratio of bubble, the smaller the bubble width and length. For the fluid with smaller specific-heat ratio, it is easier to be compressed.
Therefore, the characteristic scales of bubbles with smaller specific-heat ratio tend to be compressed smaller. It can also be seen that the case with the largest specific-heat ratio reaches the minimum characteristic scales firstly. The reason is that the shock wave propagates faster in case with larger specific-heat ratio.
Through the method of tracer, information on the average motion of the bubble is easy to obtain. Shown in Fig. are the average position and average velocity of the bubble, with different specific-heat ratios. It is found that, in the shock compression stage (t < 0.03), the effect of specific-heat ratio contributes little to the average motion.
However, when the shock wave passes through the bubble (t > 0.03), a larger specific-heat ratio speeds up the average motion of the bubbles. The reason is that the bubbles with smaller specific-heat ratio need more energy to compress their size, so their translational energy is smaller.
Effects of specific-heat ratio on vortex motion
Vorticity is one of the most important physical quantities in describing the vortex motion. In the 2-D case, the vorticity can be calculated by the following equation: The positive (negative) value of ω represents the positive (negative) direction along the z axis. Vorticity contours at t = 0.134, with various specific-heat ratios, are shown in Fig. .
The discernable difference between cases with various specific-heat ratios can be observed. The arrows in the vorticity images point out the obvious differences around the interface between case γ = 1.4 and case γ = 1.09. That is to say, there exists influences of specific-heat ratio on the rotational motion of the bubble.
The strength of vorticity is described by circulation Γ, where Γ = ∑ ω∆x∆y. Γ + = ∑ ω| ω>0 ∆x∆y is the positive circulation and Γ − = ∑ ω| ω<0 ∆x∆y represents the negative circulation. Figure shows the temporal evolution of circulations on SBI process. It can be seen that the values of Γ are equal to zero all the time because the values of Γ + and Γ − are the same.
But they point in the opposite direction. In the shock compression stage (t < 0.03), the specific-heat ratio effect contributes little to the circulation of the bubble. When the shock wave sweeps through the bubble (t > 0.03), the specific-heat ratio affects the value of circulation obviously. The cases with a smaller specific-heat ratio experiences a larger range of amplitude of change, which is caused by its good compressibility.
Effects of specific-heat ratio on mixing degree
The mixing process is a fundamental research content on SBI. In two-fluid DBM, the mixing degree at each fluid unit can be defined as M = 4 • M A M B , where M σ represents the mass fraction of component σ . The higher the value of M, the higher the mixing amplitude. Images of density (first cow) and mixing degree M (second row) at several typical moments are shown in Fig. .
As can be seen, the mass mixing occurs in the region where two media contact. In addition, the mixing degree M g described the whole fluid field can be defined where the symbol "−" indicates integrating the M σ over the whole fluid field and then dividing the grid size N x • N y . Shown in Fig. is the temporal evolution of the global mixing degree M g .
As can be seen, temporal profiles of the global mixing degree show two stages: t < 0.03 and t > 0.03. When t < 0.03, there is almost no difference between cases with various specific-heat ratios. But for t > 0.03, the stronger the specific-heat ratio effect, the larger the mixing degree. Actually, there are mainly two indicators that measure the global mixing degree: the amplitude of mixing and the area of the mixing zone between two fluids.
At the stage t > 0.03, the shock compression dominates the mix by enhancing the mixing amplitude and increasing the area of the mixing zone simultaneously. In this stage, the specific-heat ratio effect contributes little to the mix. However, when the shock passes through the bubble, the deformation of interface and the evolution of vortex core both significantly raise the area of the mixing zone.
As can be seen in Fig. , the smaller specific-heat ratio of bubble, the stronger global mixing degree of fluid field. Intuitively, for the fluid with smaller specific-heat ratio, it is easier to deform and compress, which is beneficial for the fluid mixing. It can also be explained by the diffusion formula, i.e., .
The specific-heat ratio affects both the temperature T and the gradient of density simultaneously. Therefore, these two aspects comprehensively influence the material diffusion between the two fluids. Due to the complex reflected shock wave, the global mixing degree shows a tendency for oscillating growth.
Effects of specific-heat ratio on TNE behaviors
The investigation of TNE behaviors is of great importance for understanding the kinetics process on SBI. These TNE quantities describe the fluid system deviating from the thermodynamic state from their own perspectives. The effects of specific-heat ratio on global TNE strength, i.e., D * 2 , D * 3 , D * 3,1 , and D * 4,2 , are shown in Fig. .
It can be seen that the effects of specific-heat ratios on various TNE quantities are different. Theoretically, the influence of specific-heat ratio on the non-equilibrium effect is reflected in two aspects: transport coefficient and macroscopic quantity gradient. For example, on the one hand, the specific-heat ratio reduces heat conductivity, while on the other hand, it enhances the temperature gradient.
Therefore, the effect of specific heat ratio on NOEF is the comprehensive result of the competition between the two aspects. As shown in Fig. , the smaller the specific-heat ratio, the stronger strength of D * 3,1 . It indicates that the specific-heat ratio increase the strength of D * 3,1 by raising the heat conductivity .
For the strength of D * 3 , as shown in Fig. (b), it is seen that it decreases as the specific-heat ratio becomes small. The reason is that a smaller specific-heat ratio decreases the temperature gradient. Effects of specific-heat ratio on D * 4,2 show two-stage. In the shock compression stage (t < 0.03), the smaller specificheat ratio, the larger the strength of D * 4,2 .
But the situation is reversed at the stage t > 0.03. For strength of D * 2 , the specificheat effects are more significant in later stage.
Effects of specific-heat ratio on entropy production rate
and entropy production The concepts of entropy are commonly used in complex flows . In DBM, there are two kinds of en- tropy production rates, i.e., ṠNOEF and ṠNOMF . They are key factors in compression science field. The former is induced by temperature gradient and the NOEF (∆ * 3,1 ). The latter is affected by velocity gradient and the NOMF (∆ * 2 ).
The entropy production rates are defined by the following formulas : Integrating the ṠNOEF and ṠNOMF over time t, the entropy generations over this period of time are obtained, i.e., S NOEF = t 0 ṠNOEF dt and S NOMF = t 0 ṠNOMF dt. Plotted in Fig. ) and 14(b) are the temporal evolution of ṠNOMF and ṠNOEF , respectively.
The evolution of entropy generation rate is related to two aspects: (i) the propagation of the shock wave, and (ii) the deformation of the bubble. The former generates a macroscopic quantity gradient, and the latter makes the contact interface wider, longer, and deformed. Depending on the location of the shock wavefront, there exist two critical moments in this SBI process: (i) at around t = 0.03, the shock wave just sweeps through the bubble, and (ii) at t = 0.06, the shock wave exits the flow field.
Therefore, the temporal evolution of the entropy production rate shows three stages, i.e., t < 0.03, 0.03 < t < 0.06, and t > 0.06. At the stage t < 0.03, the shock compression stage, the shock effects compress the bubble. It generates the large macroscopic quantity gradients, resulting in a quick increase of ṠNOMF .
At around t = 0.03, the shock wave passed through the bubble. So the values of ṠNOMF decreases. The values of ṠNOMF would continue to decrease due to the gradually wider contact interface caused by the diffusion effect. At around t = 0.06, the shock wave comes out of the flow field so that the values of ṠNOMF drops rapidly.
In the third stage, i.e., t > 0.06, because of the diffusive effect, the general trend of ṠNOMF is downward. However, it shows an oscillatory trend due to the influence of various reflected shock waves. The specific heat ratio indirectly changes the value of ṠNOMF by changing the velocity gradient. The smaller the specific-heat ratio, the larger ṠNOMF .
Different understanding can be seen in Fig. , where the temporal evolution of ṠNOEF is plotted. In the first stage (t < 0.03), cases with different specific-heat ratios show various trends. At the stage where the bubble deformation is not very large, i.e., 0.03 < t < 0.06, values of ṠNOEF fluctuate near the average value.
In the third stage (t > 0.06), evolutions of ṠNOEF in cases with larger specific-heat ratios show an apparent growing tendency. Differently, the values of ṠNOEF in cases with smaller specific-heat ratios remain almost unchanged. The influence of specific heat ratio on the ṠNOEF , similar with the effect on NOEF, is also affected by the heat conductivity and the temperature gradient.
It can be seen that, except for the case of γ = 1.09, the larger the specific-heat ratio, the higher entropy production rate ṠNOEF . The temporal evolutions of ṠNOEF of case γ = 1.09 and case γ = 1.12 are very similar. Consequently, the specific-heat ratio increases the ṠNOEF by raising the temperature gradient.
Further understanding can be seen in Fig. , where the entropy productions over this period are plotted. For convenience, the sum and difference between S NOMF and S NOEF are also plotted in the figure. The variation range of S NOEF is larger than that of S NOMF . It indicates that the influence of specific-heat ratio on S NOEF is more significant than that on S NOMF .
Effects of specific-heat ratio on entropy production caused by NOMF and NOEF are contrary. Specifically, it can be seen that the entropy production contributed by NOMF increases with re- duced specific-heat ratio. But the entropy production caused by NOEF first reduces with decreasing specific-heat ratio and then approaches to a saturation value.
The S NOEF in case γ = 1.09 is almost the same with it in case γ = 1.12. When the specificheat ratio γ is smaller than a threshold value γ c (γ c ≈ 1.315), the entropy production induced by NOEF is more significant than that caused by NOMF. However, in the case of γ > γ c , the situation reverses. The temporal evolution of the total entropy production (S NOMF +S NOEF ) is similar to the S NOEF profile.
The difference between S NOMF and S NOEF increases with decreasing specific-heat ratio.
Conclusions
Specific-heat ratio effects on the interaction between a planar shock wave and a 2-D heavy-cylindrical bubble are studied by a two-fluid DBM which has a flexible specific-heat ratio and includes several schemes for analyzing the complex physical fields. Besides the HNE that NS easily describes, the DBM pays more attention to the related TNE that NS is not convenient to describe.
First, both the snapshots of schlieren images and evolutions of characteristic scales from DBM simulation are compared with those from experiment. The quantitative agreements between them indicate the following two facts: (i) the order of TNE considered in the current DBM is sufficient, (ii) the choosing of discrete velocities, spatial-temporal steps, and simulation parameters like the relaxation times are suitable for the following physical researches.
Then, five cases with various specific-heat ratios are simulated. Several analysis methods for complex physical fields, including the description scheme of TNE behaviors, tracer particle method, and two-fluid model, are used to characterize the effects of specific-heat ratio on the bubble shape, deformation process, average motion, vortex motion, mixing degree of the fluid system, TNE strength, and entropy production.
Specifically, for bubble shape, bubbles with different specific-heat ratios display various jet structures. The smaller the specific-heat ratio is, the stouter the jet structure can be seen. For the case with smaller specific-heat ratio, the fluid is easier to be compressed. So, the characteristic scales of bubbles with smaller specific-heat ratio tend to be compressed smaller.
For the bubble, the smaller the specific-heat ratio, the slower average motion. In the shock compression stage, the specific-heat ratio contributes little effects to the vortex motion. Differently, after the shock passes through the bubble, it significantly influences the vorticity around the interface and the corresponding amplitude of circulation due to the development of KHI.
The larger the difference in specific-heat ratio between the bubble and ambient gas, the higher the degree of material mixing. Effects of specific-heat ratio on various TNE quantities are different. These differences consistently show the complexity of TNE flows which is still far from a clear understanding.
In addition, it is found that the temporal evolution of the entropy production rates ṠNOMF and ṠNOEF both show three stages because of the influence of the shock wave location. The smaller the specific-heat ratio, the larger the velocity gradient, which indirectly enhances the strength of ṠNOMF . The specific-heat ratio increases the ṠNOEF by raising the temperature gradient.
The influence of specific-heat ratio on S NOEF is more significant than that on S NOMF . Effects of specific-heat ratio on entropy production caused by NOMF and NOEF are contrary. Specifically, the entropy production contributed by NOMF increases with reduced specific-heat ratio. But the entropy production caused by NOEF first reduces with decreasing specific-heat ratio and then approaches to a saturation value.
When the specific-heat ratio γ is smaller than a threshold value γ c (γ c ≈ 1.315), the entropy production induced by NOEF is more significant than that caused by NOMF. However, in the case of γ > γ c , the situation reverses. The fundamental research in this paper helps to understand the interaction mechanism between shock waves and bubbles in ICF, supersonic combustors, underwater explosions, etc.
The effects of viscosity and heat conduction on the interaction between shock waves and bubbles will be studied in the following work. where the subscript "m, n" means that the m-order tensor is contracted to n-order tensor. According to the CE multiscale analysis, the Boltzmann-BGK equation can be reduced to the hydrodynamic equations.
In the following part, the derivation process from Boltzmann-BGK equation to a two-fluid hydrodynamic equation are shown. More details can see the reference presented by Zhang et al. . The discrete Boltzmann equation for component σ is (C.1) In Eq. C.1 there are two equilibrium distribution functions, i.e., f σ ,seq = f σ ,seq (ρ σ , u σ , T σ ) and f σ ,eq = f σ ,eq (ρ σ , u, T ).
For convenience, S σ i is defined as We perform the CE expansion around the f σ ,seq . That is, the distribution function f σ i can be expanded as where ε is a coefficient referring to Knudsen number. The partial derivatives of time and space can also be expanded to Substituting the above four equations into Eq.
(C.1), we can obtain (C.6) When retaining to ε terms, the following equation is obtained When retaining to ε 2 terms, we can obtain where M 2,αβ ( f σ ,(1) ) = ∑ i v iα v iβ f σ ,(1) i and M 3,1,α ( f σ ,(1) ) = . Substituting Eq. (C.14) into the above three equations, and replacing the time derivatives with the space derivatives, we obtain It should be noted that the ability to recover the corresponding level of macroscopic fluid mechanics equations is only part of the physical function of DBM.
The corresponding to the physical functions of DBM is the EHEs, which, in addition to the conserved moments evolution equations corresponding to the three conservation laws of mass, momentum and energy, also includes some of the most closely related nonconserved moments evolution equations. We refer the EHEs derivation based on kinetic equation to as KMM.
The necessity of the expanded part, the evolution equations of the relevant non-conserved moments, increases rapidly as increasing the degree of non-continuity/non-equilibrium. As the degree of non-continuity/non-equilibrium increases, the complexity will rapidly make KMM simulation studies, deriving and solving EHE, impossible.
|
[
"The specific-heat ratio affects the average motion of the bubble. The bubbles with smaller specific-heat ratios have slower average motion."
] | 8,366
|
multifieldqa_en
|
en
| null |
110688fd7522324ef26cbf3ec4f4b7ab29aa0b687aa1ade5
|
Where is McPherson County located?
|
McPherson County (standard abbreviation: MP) is a county located in the U.S. state of Kansas. As of the 2020 census, the county population was 30,223. The largest city and county seat is McPherson. The county is named for Civil War General James B. McPherson.
History
Early history
For many millennia, the Great Plains of North America was inhabited by nomadic Native Americans. From the 16th century to 18th century, the Kingdom of France claimed ownership of large parts of North America. In 1762, after the French and Indian War, France secretly ceded New France to Spain, per the Treaty of Fontainebleau. In 1802, Spain returned most of the land to France, but keeping title to about 7,500 square miles.
In 1803, most of the land for modern day Kansas was acquired by the United States from France as part of the 828,000 square mile Louisiana Purchase for 2.83 cents per acre. In 1848, after the Mexican–American War, the Treaty of Guadalupe Hidalgo with Spain brought into the United States all or part of land for ten future states, including southwest Kansas. In 1854, the Kansas Territory was organized, then in 1861 Kansas became the 34th U.S. state.
19th century
From the 1820s to 1870s, the Santa Fe Trail passed through, what is now McPherson County. The trail entered the county, east of Canton, then south of Galva, then north of Inman, and west towards Lyons. In 1855, Charles O. Fuller established a ranch adjacent to the Running Turkey Creek Crossing about two miles south and one mile east of Galva. Fuller's Ranch provided accommodations for travelers on the Santa Fe Trail and was probably the first white settlement in McPherson County.
Peketon County was established in 1860, by the passage of a bill by S. N. Wood: An act to establish Peketon County. Section 1. - That all that territory west of the sixth principal meridian and south of Township 16, in Kansas Territory, be and the same is hereby erected into a county, to be known by the name of Peketon County. On February 17, 1865, Peketon County was abolished, and McPherson County was made a part of Marion County, which extended from the west line of Chase County to the present western boundary of Kansas.
In 1868, Solomon Stephens and L. N. Holmberg were appointed Justices of the Peace—the first officers in what is now McPherson County. The next year (1869) occurred the first election for the township, now the county of McPherson. McPherson was regularly organized as a county in the spring of 1870, a mass meeting being held at Sweadal. Sweadal, the county seat thus selected, was located about one mile and a half southwest of the present site of Lindsborg. In September, however, the County Commissioners resolved to meet at the latter place, McPherson which had already been located some two years.
In April, 1873, a petition was filed for the county seat re-location. It was signed by 483 voters, and a special election was accordingly ordered for June 10. Upon that day, McPherson received 605 votes, New Gottland 325, King City 3 and Lindsborg 1; McPherson's majority over all, 276. In May the McPherson Town Company had offered, as an inducement for the location of the county seat at this point, the free use of rooms for ten years, and the donation of two squares of land on the town site. The offer was accepted the next month, the County Commissioners selecting blocks 56 and 65. Thus the county seat was established at McPherson and has remained since.
As early as 1875, city leaders of Marion held a meeting to consider a branch railroad from Florence. In 1878, Atchison, Topeka and Santa Fe Railway and parties from Marion County and McPherson County chartered the Marion and McPherson Railway Company. In 1879, a branch line was built from Florence to McPherson, in 1880 it was extended to Lyons, in 1881 it was extended to Ellinwood. The line was leased and operated by the Atchison, Topeka and Santa Fe Railway. The line from Florence to Marion, was abandoned in 1968. In 1992, the line from Marion to McPherson was sold to Central Kansas Railway. In 1993, after heavy flood damage, the line from Marion to McPherson was abandoned. The original branch line connected Florence, Marion, Canada, Hillsboro, Lehigh, Canton, Galva, McPherson, Conway, Windom, Little River, Mitchell, Lyons, Chase, then connected with the original AT&SF main line at Ellinwood.
In 1887, the Chicago, Kansas and Nebraska Railway extended its main line from Herington to Pratt. This main line connected Herington, Ramona, Tampa, Durham, Waldeck, Canton, Galva, McPherson, Groveland, Inman, Medora, Hutchinson, Whiteside, Partridge, Arlington, Langdon, Turon, Preston, Natrona, Pratt. In 1888, this main line was extended to Liberal. Later, this line was extended to Tucumcari, New Mexico and Santa Rosa, New Mexico, where it made a connection with the Southern Pacific from El Paso, Texas. The Chicago, Kansas and Nebraska Railway was absorbed by the Chicago, Rock Island and Pacific Railway. This line is also called the "Golden State Route".
20th century
The National Old Trails Road, also known as the Ocean-to-Ocean Highway, was established in 1912, and was routed through Windom, Conway, McPherson.
Geography
According to the U.S. Census Bureau, the county has a total area of , of which is land and (0.3%) is water.
Adjacent counties
Saline County (north)
Dickinson County (northeast)
Marion County (east)
Harvey County (southeast)
Reno County (southwest)
Rice County (west)
Ellsworth County (northwest)
Major highways
Interstate 135
U.S. Route 56
U.S. Route 81
K-4
K-61
K-153
Demographics
The McPherson Micropolitan Statistical Area includes all of McPherson County.
2000 census
As of the census of 2000, there were 29,554 people, 11,205 households, and 7,966 families residing in the county. The population density was 33 people per square mile (13/km2). There were 11,830 housing units at an average density of 13 per square mile (5/km2). The racial makeup of the county was 96.53% White, 0.81% Black or African American, 0.34% Native American, 0.32% Asian, 0.06% Pacific Islander, 0.79% from other races, and 1.16% from two or more races. 1.94% of the population were Hispanic or Latino of any race. 37.1% were of German, 12.9% Swedish, 12.1% American, 6.7% English and 6.3% Irish ancestry according to Census 2000.
There were 11,205 households, out of which 33.00% had children under the age of 18 living with them, 62.50% were married couples living together, 6.00% had a female householder with no husband present, and 28.90% were non-families. 25.50% of all households were made up of individuals, and 11.80% had someone living alone who was 65 years of age or older. The average household size was 2.49 and the average family size was 2.99.
In the county, the population was spread out, with 25.40% under the age of 18, 10.30% from 18 to 24, 25.20% from 25 to 44, 21.80% from 45 to 64, and 17.30% who were 65 years of age or older. The median age was 38 years. For every 100 females there were 95.90 males. For every 100 females age 18 and over, there were 92.90 males.
The median income for a household in the county was $41,138, and the median income for a family was $48,243. Males had a median income of $33,530 versus $21,175 for females. The per capita income for the county was $18,921. About 4.20% of families and 6.60% of the population were below the poverty line, including 5.20% of those under age 18 and 8.10% of those age 65 or over.
Government
Presidential elections
McPherson county is often carried by Republican candidates. The last time a Democratic candidate has carried this county was in 1964 by Lyndon B. Johnson.
Laws
Following amendment to the Kansas Constitution in 1986, the county remained a prohibition, or "dry", county until 1996, when voters approved the sale of alcoholic liquor by the individual drink with a 30 percent food sales requirement.
Education
Colleges
McPherson College in McPherson
Bethany College in Lindsborg
Central Christian College in McPherson
Unified school districts
Smoky Valley USD 400
McPherson USD 418
Canton-Galva USD 419
Moundridge USD 423
Inman USD 448
School district office in neighboring county
Goessel USD 411
Little River-Windom USD 444
Museums
Birger Sandzén Memorial Gallery in Lindsborg
McCormick-Deering Days Museum in Inman
McPherson Museum in McPherson
Lindsborg Old Mill & Swedish Heritage Museum in Lindsborg
Kansas Motorcycle Museum in Marquette
Communities
Cities
Canton
Galva
Inman
Lindsborg
Marquette
McPherson (county seat)
Moundridge
Windom
Unincorporated communities
† means a Census-Designated Place (CDP) by the United States Census Bureau.
Conway
Elyria†
Groveland
Johnstown
New Gottland
Roxbury†
Ghost towns
Alta Mills
Battle Hill
Christian
Doles Park
Elivon
King City
Sweadal
Townships
McPherson County is divided into twenty-five townships. The cities of Lindsborg and McPherson are considered governmentally independent and are excluded from the census figures for the townships. In the following table, the population center is the largest city (or cities) included in that township's population total, if it is of a significant size.
See also
List of people from McPherson County, Kansas
National Register of Historic Places listings in McPherson County, Kansas
McPherson Valley Wetlands
Maxwell Wildlife Refuge
References
Notes
Further reading
Wheeler, Wayne Leland. "An Analysis of Social Change in a Swedish-Immigrant Community: The Case of Lindsborg, Kansas." (PhD dissertation, University of Missouri-Columbia; ProQuest Dissertations Publishing, 1959. 5905657).
County
Through the Years: A Pictorial History of McPherson County; McPherson Sentinel' Heritage House Publishing Co; 1992.
McPherson County First Courthouse Built About 1869 or 1870; Lindsborg News-Record; March 30, 1959.
Pioneer Life and Lore of McPherson County, Kansas; Edna Nyquist; Democratic-Opinion Press; 1932.
A History of the Church of the Brethren in Kansas (includes McPherson College history); Elmer LeRoy Craik; McPherson Daily; Republican Press; 397 pages; 1922.
Portrait and Biographical Record of Dickinson, Saline, McPherson, and Marion Counties, Kansas; Chapman Bros; 614 pages; 1893.
Standard Atlas of McPherson County, Kansas; Geo. A. Ogle & Co; 82 pages; 1921.
Plat Book of McPherson County, Kansas; North West Publishing Co; 50 pages; 1903.
Edwards' Atlas of McPherson County, Kansas; John P. Edwards; 51 pages; 1884.
Trails
The Story of the Marking of the Santa Fe Trail by the Daughters of the American Revolution in Kansas and the State of Kansas; Almira Cordry; Crane Co; 164 pages; 1915. (Download 4MB PDF eBook)
The National Old Trails Road To Southern California, Part 1 (LA to KC); Automobile Club Of Southern California; 64 pages; 1916. (Download 6.8MB PDF eBook)
Mennonite Settlements
Impact of Mennonite settlement on the cultural landscape of Kansas; Brenda Martin; Kansas State University; 1985/1988.
Mennonite settlement : the relationship between the physical and cultural environment; Susan Movle; University of Utah; 1975/1886.
Status of Mennonite women in Kansas in their church and home relationships; Eva Harshbarger; Bluffton College; 1925/1945.
External links
County
McPherson County - Directory of Public Officials
Historical
, from Hatteberg's People'' on KAKE TV news
Maps
McPherson County Maps: Current, Historic, KDOT
Kansas Highway Maps: Current, Historic, KDOT
Kansas Railroad Maps: Current, 1996, 1915, KDOT and Kansas Historical Society
Kansas counties
1867 establishments in Kansas
|
[
"McPherson County is located in the U.S. state of Kansas."
] | 1,853
|
multifieldqa_en
|
en
| null |
71902c8027dca26b265f12709ec21224b5abe8b9ef5750fd
|
What is the scaling form for the alternative order parameter O?
|
\section*{Dynamical Behaviour of $O$ in Lattice Gases}
The dynamical behaviour of the anisotropic order parameter $m$ [see Eq.~\eqref{eq:def-m} in the Letter] following a quench to the critical point is well described by
the Gaussian theory for all the three lattice gas models studied, $i.e.,$ driven lattice gas with either constant (IDLG) or random (RDLG) infinite drive and equilibrium lattice gas (LG). In other words, in the short-time regime, $m \sim t^{1/2}$ [see Eq. \eqref{eq:mt}] and the Binder cumulant $g$ of the lowest transverse mode [defined in Eq. \eqref{eq:binder}] is zero in this regime. The alternative order parameter $O,$ however, distinguishes between the driven (IDLG, RDLG) and the equilibrium (LG) lattice gases.
In order to understand this, we first write the phenomenological scaling form for $O$, analogous to Eq. \eqref{eq:scalingass} in the Letter,
\begin{eqnarray}
O (t, L_{\parallel} ; S_\Delta) = L_{\parallel}^{-\beta/[\nu(1+\Delta)]} \tilde f_O (t/L_{\parallel}^{z/(1+\Delta)} ; S_\Delta).\quad
\label{eq:Oscalingass}
\end{eqnarray}
We already remarked that, in the LG, this scaling form is not compatible with the prediction $O \sim t^{1/8} L_{\parallel}^{-1/2}$ of the Gaussian theory. However, following Ref. \cite{AS2002}, it can be argued that, at short times, the only dependence of $O$ on the system size $L_{\parallel}$ is of the form $O \sim L_\parallel^{-1/2}$ which is very well confirmed by numerical simulations. Accordingly, the generic behaviour of $O$ can be assumed to be
\begin{eqnarray}
O \sim t^{\alpha} L_\parallel^{-1/2}, \label{eq:O}
\end{eqnarray}
where $\alpha$ is a phenomenological exponent to be determined. This, along with Eq. \eqref{eq:Oscalingass}, implies $\tilde f_O(x) \sim x^{\alpha}.$ Comparing the finite-size behaviour in Eq.~\eqref{eq:O} with Eq.~\eqref{eq:Oscalingass} one actually infers,
\begin{eqnarray}
\alpha &=& \frac{1+ \Delta -2 \beta/\nu}{2 \, (4- \eta)}. \label{eq:alpha}
\end{eqnarray}
This equation, together with the hyperscaling relation $\Delta - 2 \beta/\nu= - \eta$ in two spatial dimensions, shows that the prediction $\alpha = 1/8$ of the Gaussian theory [see Eq. \eqref{eq:Ot}] can be obtained only when $\eta=0,$ which is the case for the IDLG (exactly) and the RDLG (approximately) but not for the LG.
On the other hand, Eq.~\eqref{eq:alpha} predicts $\alpha = 1/10$ upon substituting the values of the critical exponents corresponding to the Ising universality class (LG). This is consistent with the numerical simulation results presented in the main text, see Fig. \ref{fig:ising}(b) therein.
\begin{figure}[th]
\vspace*{0.2 cm}
\centering
\includegraphics[width=10 cm]{./compare_binder.pdf}
\caption{Comparison between the temporal evolution of the Binder cumulants $g$ corresponding to the $12^{th}$ transverse mode, $i.e.,$ with $n_\perp =12,$ in the LG (lowest curve), IDLG and RDLG (two upper curves) on a $32 \times 32$ lattice. \label{fig:b}}
\label{fig:binder}
\end{figure}
The emergence of this new value $1/10$ of the exponent $\alpha$ must be traced back to the non-Gaussian nature of higher fluctuating modes in the LG. In fact, even though the lowest mode behaves identically in all the three models we considered, characterized by the same behaviour of $m$, higher modes show a significant difference in the non-driven case.
To illustrate this, we measured the Binder cumulants of higher modes which is defined analogously to Eq.~(11), using transverse modes other than the first, i.e., with $\mu=\tilde \sigma(0,2 \pi n_\bot/L_\bot)$ and $n_\bot>1.$
Figure \ref{fig:b} compares the same for all the three lattice gases for the mode with $n_\perp =12$ on a $32 \times 32$ lattice. Clearly, the curve corresponding to the LG (lowest, blue) departs from Gaussian behaviour $g=0$ (in practice, $e.g.,$ $|g| \lesssim 0.005,$ corresponding to the shaded gray area) much earlier than it does for the IDLG or RDLG (two upper curves, red and green respectively).
Accordingly, the different dynamical behaviour of $O$, which involves a sum over all modes, can be attributed to the non-Gaussian nature of the higher modes in the LG.
Such a departure is not entirely surprising. In fact, for higher modes, mesoscopic descriptions such as the ones in Eqs. \eqref{eq:L-DLG} or \eqref{eq:g_evol} are not expected to hold, while the anisotropy at the microscopic level could be the mechanism leading to the Gaussianity of higher modes in the driven models.
|
[
"O(t, L_{\\parallel}; S_\\Delta) = L_{\\parallel}^{-\\beta/[\\nu(1+\\Delta)]} \\tilde f_O(t/L_{\\parallel}^{z/(1+\\Delta)}; S_\\Delta)."
] | 663
|
multifieldqa_en
|
en
| null |
22034e095a602824678c4028e6f605919ce520270dc06089
|
How are the relationships between catch per set and fishing behavior variables different for different measures of catch per unit effort (CPUE)?
|
Overfishing is a major threat to the survival of shark species, primarily driven by international trade in high-value fins, as well as meat, liver oil, skin and cartilage. The Convention on the International Trade in Endangered Species of Wild Fauna and Flora (CITES) aims to ensure that commercial trade does not threaten wild species, and several shark species have recently been listed on CITES as part of international efforts to ensure that trade does not threaten their survival. However, as international trade regulations alone will be insufficient to reduce overexploitation of sharks, they must be accompanied by practical fisheries management measures to reduce fishing mortality. To examine which management measures might be practical in the context of a targeted shark fishery, we collected data from 52 vessels across 595 fishing trips from January 2014 to December 2015 at Tanjung Luar fishing port in East Lombok, Indonesia. We recorded 11,920 landed individuals across 42 species, a high proportion of which were threatened and regulated species. Catch per unit effort depended primarily on the number of hooks and type of fishing gear used, and to a lesser degree on month, boat engine power, number of sets and fishing ground. The most significant factors influencing the likelihood of catching threatened and regulated species were month, fishing ground, engine power and hook number. We observed significant negative relationships between standardised catch per unit effort and several indicators of fishing effort, suggesting diminishing returns above relatively low levels of fishing effort. Our results suggest that management measures focusing on fishing effort controls, gear restrictions and modifications and spatiotemporal closures could have significant benefits for the conservation of shark species, and may help to improve the overall sustainability of the Tanjung Luar shark fishery. These management measures may also be applicable to shark fisheries in other parts of Indonesia and beyond, as sharks increasingly become the focus of global conservation efforts.
Copyright: © 2018 Yulianto et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: Data collection of this study was funded by the Darwin Initiative (grant number 2805). The funder had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Overfishing is the greatest global threat to marine fish stocks [1–5]. Several shark species (Selachimorpha) are particularly vulnerable to overexploitation due to their conservative life history strategies, large body sizes and the high economic value of their preserved body parts [6–8]. With increasing fishing pressure in recent decades, primarily driven by international demand for a range of consumer goods (including fins, liver oil, skin, cartilage and meat), it is estimated that annual fishing mortality now exceeds the intrinsic rebound potential of most commercially exploited species [5, 9, 10]. This fishing pressure is taking its toll, with an estimated one in four Chondrichthyan species now threatened with extinction, making sharks amongst the most threatened species groups in the world .
It is also increasingly acknowledged that sharks play a critical role in maintaining functional and productive ocean ecosystems , as well as providing an important source of food and income for many coastal communities . Recognising both the plight and importance of shark populations, there is growing professional and public interest to improve shark conservation, and the management of shark fisheries and trade . This is reflected in several recent policy decisions to afford new international regulations for 12 species of sharks across seven genera under the Convention on the International Trade of Endangered Species of Wild Fauna and Flora (CITES). This is a promising step for shark conservation; however, in order to create tangible outcomes for species conservation CITES must be implemented through domestic measures that are adapted to national and local contexts.
Indonesia is the world’s largest shark fishing nation [9, 14], and a global priority for shark conservation . Until recently Indonesia’s shark fishery has largely functioned as de facto open-access [12, 16]. However, in the past five years the Indonesian government has demonstrated a clear commitment to shark conservation and resource management, with domestic measures put in place to implement international obligations under CITES . Exploitation of all CITES-listed species is now regulated, either through full species protection or export controls (these species are hereafter referred to as ‘regulated’ species). However, CITES only affords protection to a small number of Indonesia’s 112 known shark species , of which 83 are threatened with extinction according to the IUCN Red List of Threatened Species (i.e. Vulnerable (VU), Endangered (EN) or Critically Endangered (CR) , these species are hereafter referred to as ‘threatened’ species), many of which continue to be landed throughout the country . Further, these policy measures predominantly regulate trade at the point of export, but do not necessarily influence fisher behaviour or local demand at the point of catch, such that the ‘trickle-down’ impacts on species mortality are unknown. In addition, effectively implementing species-specific shark mortality controls remains challenging due to the non-selectivity of fishing gears, and practical and cultural barriers to changing fisher preferences for certain gear-types and fishing methods. As such, existing regulations alone (e.g. Indonesian Law on Fisheries 31/2004 and its derivative regulations) will likely be insufficient to curb mortality of threatened and regulated species, as fishers must be both willing and able to change their fishing behaviour . Moreover, most of Indonesia’s shark fisheries are small-scale, and in relatively poor coastal communities where there are often no legal, sustainable marine-based alternatives to shark fishing that offer similar financial returns [22, 23]. It is therefore imperative to consider the ethical and socioeconomic impacts of shark trade controls. Most shark species listed under CITES are listed on Appendix II, which is designed for sustainable use. International trade is permitted for CITES Appendix II species provided it is non-detrimental to wild populations of the species, as proven through a scientific non-detriment finding (NDF) report and implemented through a system of export permits. However, in Indonesia there is currently a lack of species-specific trade data for conducting NDFs and setting sustainable export quotas, such that the Indonesian government has to introduce trade bans for these species in order to meet CITES obligations. With new CITES-listings for thresher sharks (Alopias spp.) and silky shark (Carcharhinus falciformis) recently coming into force, this is likely to have huge implications for Indonesia’s economically important shark industry, and the coastal communities depending on it. In order to balance conservation and socioeconomic objectives, robust management systems must be put in place that ensure and allow sustainable fishing and trade. This necessitates the identification of practical management measures that can reduce mortality of threatened and regulated species at the point of catch, and provide realistic options for fishers to effectively and measurably improve the sustainability of their fishing practices.
This study analyses two years of qualitative and quantitative data from one of Indonesia’s targeted shark fisheries in Tanjung Luar, West Nusa Tenggara Province. We outline the key characteristics of the fishery, including fishing behaviour and overall catch volumes and composition. We analyse the impacts of different fishing techniques, and present factors influencing overall catch per unit effort (CPUE) of individual shark fishing trips, as well as factors influencing the likelihood of catching threatened and regulated species. Finally, we discuss the implications of our findings, and provide practical recommendations for fisheries management measures, which can support CITES implementation for sharks and reduce the catch of threatened and regulated species, in Indonesia and beyond.
This work was conducted under a Memorandum of Understanding (MoU) and Technical Cooperation Agreement (TCA) between the Wildlife Conservation Society (WCS) and the Ministry of Environment and Forestry (MoEF), Ministry Marine Affairs and Fisheries (MMAF) and the Marine and Fisheries Agency (MFA) of West Nusa Tenggara Province. These documents were approved and signed by Sonny Partono (Director General of Conservation of Natural Resources and Ecosystem MoEF), Sjarief Widjaja (Secretary General MMAF), and Djoko Suprianto (Acting Head of MFA of West Nusa Tenggara Province). Due to this MoU and TCA no specific research permit was required. We collected data by measuring sharks that were already caught, dead, and landed by fishers in Tanjung Luar, with no incentives, compensation or specific requests for killing sharks for this study. WCS participates in the Conservation Initiative on Human Rights and the rules and guidelines of our Internal Review Board ensures that any research protects the rights of human subjects. We did not apply for an IRB permit for this study because our study design focused on collecting fish and fisheries data as opposed to personal socio-economic data. The FDGs and interviews were conducted to obtain early scoping information about fishing practices, and to establish protocols for more detailed fisheries data collection (as used in this study), and socio-economic data collection (as used in a later study (Lestari et al ), which underwent further ethical review due to the specific focus on human subjects).
Tanjung Luar, located in East Lombok, West Nusa Tenggara Province, Indonesia (Fig 1), is a landing site for one of Indonesia’s most well-known targeted shark fisheries. Tanjung Luar serves at least 1,000 vessels, and the majority of these are less than 10 gross tonnes (GT) in size . A group of specialised fishers operating from Tanjung Luar village and a neighbouring island, Gili Maringkik, specifically target sharks. Shark catch is landed in a dedicated auction facility at the Tanjung Luar port. The shark industry is well established in Tanjung Luar, with product processing facilities and trade connections to local, national and international markets. Research by Lestari et al. indicates that the shark industry is significantly more profitable than non-shark fisheries in Tanjung Luar, particularly for boat owners. Strong patron-client relationships exist between boat owners and fishers, with shark fishers exhibiting high dependency on shark fishing, limited occupational diversity and low adaptive capacity for shifting into other fisheries .
Fig 1. Sharks landing monitoring site and fishing grounds of shark fishers that land at Tanjung Luar.
In January 2014 we conducted preliminary scoping research to better understand the operational and socioeconomic characteristics of Tanjung Luar’s shark fishery. During a three-week scoping visit a team of four trained Indonesian enumerators conducted semi-structured interviews and focus group discussions (FDGs) with fishers, boat owners and traders, alongside naturalistic observation in the field. Respondents were selected through purposive sampling, since the research was exploratory in nature and a priori sampling decisions were not possible . We conducted a total of 34 semi-structured interviews (S1 File) and four FDGs, which were attended by a total of 30 individuals. All interviews and discussions took place in Indonesian, with the help of a local enumerator who was fluent in the Tanjung Luar local dialect. Interviews took approximately 30 minutes, with no remuneration for participating. All respondents gave their full prior and informed consent before contributing to the research. During the interviews and FDGs we gathered information on number of boats, fishing gears used, fishing grounds, fishery operational characteristics, and shark supply chain, including estimated volumes and value of shark catch relative to other fisheries. We improved the accuracy of information on shark fishery characteristics and fishing behaviour through informal daily interactions and discussions with 131 shark fishers during our daily landings data collection and community engagement activities. More detailed socioeconomic data were collected in a full household survey in 2016, as outlined in Lestari et al. .
Shark landings data were collected by three experienced enumerators, who were trained in species identification and data collection methods during a two-day workshop and three weeks of field mentoring to ensure the accuracy of the data collected. Landings were recorded every morning at the Tanjung Luar shark auction facility where shark fishers usually landed dead sharks, from 5am to 10am from January 2014 to December 2015. The enumerators recorded data on catch composition and fishing behaviour (Table 1) from 52 different vessels across a total of 595 fishing trips. The enumerators also measured the weight of selected sharks to calculate biomass and length-weight relationship.
Table 1. Types of data collected on fishing behaviour and catch composition during daily landings data collection at Tanjung Luar.
From fishing behaviour and catch data we calculated the overall species composition of catch. We calculated catch per unit effort (CPUE) by number of individuals using both catch per set (hereafter CPUE per set) and catch per 100 hooks per set (hereafter standardised CPUE) [25,26]. This was deemed necessary since different vessels and gear-types systematically deploy different numbers of hooks, and standardised CPUE allows for a more meaningful comparison.
To understand factors influencing overall CPUE we log transformed CPUE per trip to fit a normal distribution, and fitted linear models (LMs) of CPUE per trip to fishing behaviour variables (Table 1). We considered all variables and used minimum AIC values with stepwise analysis of variance to identify the best fit and most significant influencing variables.
To inform the development of practical fisheries management measures (e.g. gear restrictions), we also specifically analysed differences in CPUE for surface and bottom longline gears employed in the fishery, using two-way ANOVAs.
Factors affecting catch of threatened and regulated species.
To identify variables influencing the catch of threatened and regulated species we conducted a two-step process. In the first step, we identified factors influencing the likelihood of catching any threatened/regulated species during a given fishing trip, by creating binary response variables for whether a threatened species had been caught during a trip (yes = 1, no = 0), and separately for whether a regulated species had been caught during a trip (yes = 1, no = 0). We then fitted generalised linear models (GLMs) with binomial errors to the binary response variables, separately for catch of threatened species and catch of regulated species. In the second step we identified variables that significantly influenced the CPUE of threatened species and the CPUE of regulated species, given that any were caught. We removed all records in which no threatened or regulated species were caught, log transformed standardised CPUE of threatened and regulated species, and fitted linear models (LMs) of standardised CPUE of threatened species and standardised CPUE to regulated species to fishing behaviour variables. Again, we considered all meaningful models and used minimum AIC values with stepwise analysis of variance to identify the best fit and most significant influencing variables. This approach was necessary since catch of threatened and regulated species is zero-inflated, and creating binary response variables with a binomial error structure allowed for a simpler and more powerful statistical analysis. Note that we conducted two separate analyses, one for threatened species only and one for regulated species only, but used the same methods and process, as outlined above, for each analysis. We did not group threatened and protected species together, since although some species are both threatened and protected, this is not the case for all shark species landed in Tanjung Luar.
A total of 52 shark fishing vessels operate from Tanjung Luar, all of which are classified as small-scale according to the Indonesian Ministry of Marine Affairs and Fisheries (MMAF) vessel categorisation system, with <7GT capacity. These vessels are operated by approximately 150 highly-specialised shark fishers, from Tanjung Luar village and Gili Maringkik, who make up roughly 5% of the local fisher population. The shark industry is more profitable than non-shark fisheries, and shark fishers report high household dependency on shark resources, low occupational diversity, and limited capacity and aspirations to move into other fisheries or industries.
Surface and bottom longlines are used as the primary fishing gears to target sharks, with pelagic fish (e.g. Euthynnus spp., Rastrellinger spp.) used as bait. Surface and bottom longlines systematically vary in length, depth deployed, number of sets, number of hooks used, and soak times (Table 2). Gear types are typically associated with certain vessel types, and fishers–captain and crew—tend to exhibit preferences for specific gear types. Shark fishers also use gillnets and troll lines as secondary gears, to catch bait and opportunistically target other species, such as grouper, snapper, skipjack and mackerel tuna.
Table 2. Characteristics of surface and bottom longlines.
The shark fishing vessels can be divided into two broad categories according to fishing behaviour: larger vessels (≥14 m) with higher horsepower (HP) engines spend more time at sea than smaller vessels (≤12m) (p<0.001), and reach fishing grounds outside of West Nusa Tenggara. These vessels primarily fish in southern Sumbawa and Sumba Islands, however, they also reach as far as eastern Flores, Timor Island, and the Java Sea (Fig 1). Larger, higher HP vessels also tend to employ surface longlines (p<0.001), and since they spend more time at sea, have a higher number of sets per trip than smaller vessels (p<0.001). Smaller vessels (≤12 m) with smaller engines tend to remain in waters around West Nusa Tenggara only, carrying out shorter fishing trips using bottom longlines (Table 3).
Table 3. Characterisation of the different fishing vessels used to target sharks in Tanjung Luar.
During the study period we recorded shark catch from a total of 595 fishing trips. We recorded 11,678 individual sharks, with an average total catch of 963 individuals per month (SD ± 434) and 19.7 individuals per trip (SD ± 15.6). Standardised CPUE (per 100 hooks per set) ranged from 0.05 to 22.13 individuals, with an average of 0.96 and a mode of 0.20. Catch consisted of 42 different species from 18 families (Table 4). 22% of all landings were classified as threatened species (i.e. VU, EN, CR) according to the IUCN Red List of Threatened Species, and 73% were near threatened. Almost half (46.3%) of landings were regulated (i.e. CITES-listed) species. The most commonly caught species were silky shark (Carcharhinus falciformis), black tip shark (Carcharhinus limbatus) and scalloped hammerhead (Sphyrna lewini).
Table 4. Sharks species landed in Tanjung Luar from January 2014 –December 2015 (VU = Vulnerable, EN = Endangered, NT = Near Threatened, LC = Least Concern, NE = Not Evaluated (VU and EN classified as ‘threatened’ in this study); II = CITES Appendix II, N = Not CITES-listed (II species classified as ‘regulated’ in this study)).
Measures of CPUE for the Tanjung Luar shark fishery vary spatially and temporally, and with several aspects of fishing effort including gear type, hook number, engine power and number of sets. An initial comparison of average catch per trip and catch per set of the two major gear types, surface longline and bottom longline, indicates that CPUE of surface longlines was significantly higher than that of bottom longlines (ANOVA, p<0.001). CPUE (individuals per set) was also positively associated with number of hooks, engine power, and number of sets (Fig 2). However, these relationships are for unstandardised CPUE i.e. without controlling for number of hooks.
Plots of CPUE: Number of individuals per set (A) and number of individuals per 100 hooks per set (standardised CPUE) (B) by gear type (1), number of hooks (2), number of sets (3) and engine horsepower (4).
When controlling for hook number using standardised CPUE (individuals per 100 hooks per set) the relationships were reversed, with standardised CPUE of bottom longlines significantly higher than that of surface longlines (ANOVA, p<0.001; Fig 2). A similar pattern was observed when comparing relationships between CPUE (individuals per set) and standardised CPUE for other measures of fishing effort, including numbers of hooks, engine power and number of sets (Fig 2). There was a positive relationship between unstandardised CPUE (individuals per set) and number of hooks, number of sets and engine power, but a negative relationship between CPUE and these fishing behaviour variables when CPUE was standardised by hook number (individuals per 100 hooks per set).
The best fit LM of standardised CPUE indicated that the most significant factors influencing standardised CPUE were fishing gear and number of hooks (p<0.001). Month, engine power, number of sets and fishing ground were also identified as significant variables (Table 5), although there was considerable covariance between these factors. Standardised CPUE was significantly lower in January, and decreased with higher numbers of hooks, despite a higher total catch per trip and set (Fig 2).
Table 5. Analysis of variance for linear model of standardised CPUE (individuals per 100 hooks per set) data from Tanjung Luar; significant values (p<0.05) are given in bold.
Best fit GLMs indicated that the most significant factors influencing the likelihood of catching threatened species were month (January and November were significantly lower: p<0.001 and p<0.05, respectively) and fishing ground (Other (i.e. fishing grounds outside of WNTP and ENTP) was significantly higher: p<0.01). Significant factors associated with standardised CPUE of threatened species were number of hooks (p<0.001), fishing ground (other: p<0.001, ENTP p<0.05), engine power (p<0.001) and trip length (p<0.001) (Table 6 and Fig 3).
Plots of most significant factors affecting standardised CPUE (number of individuals per 100 hooks per set) of threatened species: a) hook number, b) fishing ground, c) engine power and d) trip length.
Analysis of variance for the best fit models of factors affecting: a) the likelihood of catching and the standardised CPUE of threatened species b) the likelihood of catching and the standardised CPUE of regulated species.
The most significant factors influencing the likelihood of catching regulated species were month (January was significantly lower: p<0.001), number of hooks (p<0.001) and engine power (<0.01). Significant factors associated with standardised CPUE of regulated species were number of hooks (p<0.001), fishing gear (<0.001), number of sets (p<0.001), engine power (p<0.01) and month (November and January: p<0.05) (Table 5 and Fig 4).
Plots of most significant factors affecting standardised CPUE (number of individuals per 100 hooks per set) of regulated species: a) hook number, b) gear type, c) number of sets.
Although Tanjung Luar’s targeted shark fishery is small in scale, considerable numbers of shark are landed, including a large proportion of threatened and regulated species. A key finding is that measures of CPUE, for all sharks and for threatened and regulated species, vary spatially and temporally, and with several aspects of fishing effort including gear type, hook number, engine power and number of sets. Moreover, the relationships between CPUE and fishing behaviour variables are different for different measures of CPUE (CPUE per trip, CPUE per set, CPUE per 100 hooks per set). This highlights the importance of using appropriate standardisation for meaningful comparisons of CPUE across different gears and vessel types, and has important implications for fisheries management.
Unstandardised CPUE (individuals per set) was significantly lower in January. This is during the west monsoon season, which is characterised by high rainfall and adverse conditions at sea for fishing. Unstandardised CPUE was also significantly lower in West Nusa Tenggara Province (WNTP) than East Nusa Tenggara Province (ENTP) and other provinces, suggesting a lower abundance of sharks in this area. Engine power had a significant positive influence on unstandardised CPUE, and was also associated with longer trips and more sets, which was likely due to the ability of vessels with larger engines to travel longer distances, over longer time periods, and with higher numbers of sets, to favoured fishing grounds. Unstandardised CPUE was also significantly higher for surface longlines than bottom longlines. However, when standardising CPUE for the number of hooks (i.e. individuals per 100 hooks per set) this relationship was reversed. Bottom longlines exhibit a higher standardised CPUE, with negative relationships between catch per 100 hooks per set and number of hooks and frequency of sets. Vessels with moderate engine horsepower (50-59hp) also had the highest standardised CPUE. Since surface longlines systematically employ significantly more hooks than bottom longlines (400–600 vs 25–200 hooks), and tend to be associated with larger boats, longer trips and more sets, these findings suggest that although increasing fishing effort increased total catch for these gears and trips, there were diminishing returns of this increased effort above low to moderate levels.
A large proportion of Tanjung Luar’s shark catch consisted of threatened (22%) and regulated species (46%). Month is a significant factor in explaining standardised CPUE of both threatened and regulated species, which could indicate seasonal variation in the abundance of these species in the Tanjung Luar fishing grounds, or seasonal impacts on CPUE due to poor weather conditions. Fishing ground was a significant factor in explaining the catch of threatened species but not the catch in regulated species. This may be due to differences in range, distribution and relative abundance of species within these groups. Threatened species make up a relatively small proportion of Tanjung Luar’s catch in comparison to regulated species, which make up almost half of the catch (46%). As such, regulated species may generally be more abundant and spatially diffuse than threatened species, and therefore caught more uniformly across fishing grounds. For example, regulated species catch is dominated by silky sharks (Carcharhinus falciformis), which are circum-tropical and coastal-pelagic, and exhibit limited site-fidelity or aggregation behaviour, while threatened species catch is dominated by scalloped hammerheads (Sphyrna lewini), which are known to aggregate in schools. These schools of scalloped hammerheads may be more restricted to specific aggregation sites outside of WNTP and ENTP waters, while silky sharks are found in uniform abundance throughout fishing grounds.
As with CPUE of all catch, there was a positive relationship between unstandardised CPUE (catch per set) of threatened and regulated species and number of hooks, but a significant negative relationship between standardised CPUE (catch per 100 hooks per set). This was likely due to diminishing returns of adding additional hooks, and indicates that the effort for threatened and regulated species was exceeding maximum sustainable yield effort, such that increases in effort (e.g. hook number) were leading to decreases in catch [28–30].
Due to the profitability of the shark industry in Tanjung Luar, and limited adaptive capacity and willingness of shark fishers to move into other industries, it is necessary to identify practical and ethical management interventions that can improve the sustainability of the fishery whilst also mitigating the negative socio-economic consequences for coastal communities. Our findings indicate that spatiotemporal closures and restrictions on fishing effort could improve the overall catch per unit effort and sustainability of the Tanjung Luar shark fishery, and lead to positive conservation outcomes for priority species.
Since the location of shark fishing grounds plays a significant role in determining the likelihood of catching threatened species and their associated CPUE, improved marine spatial planning, with the identification of marine protected areas (MPAs) that protect critical shark habitat and shark populations, could reduce catch of species of conservation concern [31–33] and increase abundance of sharks [34, 35]. Provincial governments in West Papua and West Nusa Tenggara have already established ‘shark sanctuary’ MPAs, which protect critical shark habitat and ban shark fishing within their boundaries [16, 36], and monitoring data indicates positive impacts of shark-specific closures on shark abundance [37, 38]. Strengthening Indonesia’s existing MPA network for shark conservation, such as making all MPAs no-take zones for sharks and expanding spatial protection to critical shark habitat, including aggregation sites or pupping and nursery grounds for species of conservation concern, could have considerable conservation benefits. It should be noted, however, that MPAs may only be effective for certain species, such as those with small ranges or site-fidelity . More research is required to identify critical shark habitat and life history stages. For Tanjung Luar these efforts could focus on better understanding scalloped hammerhead (Sphyrna lewini) aggregation sites. Well-targeted spatial closures for this species could significantly reduce catch of threatened species in this fishery.
The relationships between gear type, several aspects of fishing effort (i.e. hook number, engine power, number of sets, trip length), standardised CPUE of all shark species and standardised CPUE of threatened and regulated species suggest that there is an optimal effort that could increase overall CPUE of the fishery and significantly reduce fishing mortality of species of conservation concern. For example, our data suggest that CPUE peaks with low to intermediate trip lengths and gear sets, intermediate engine power and hook numbers of less than 75 per set longline. Although standardised CPUE of threatened and regulated species is also higher when fewer hooks are deployed, the catch per set and overall mortality is significantly lower. Regulations that control the number of hooks in combination with incentives for shark fishers to tightly manage the number of hooks they deploy could significantly reduce mortality of threatened and endangered species, maximise the overall CPUE of the fishery, and reduce operational costs for fishers, making shark fishing in Tanjung Luar more sustainable and more cost effective [39–41].
Acknowledging that almost half of Tanjung Luar’s shark catch consists of CITES-listed species, developing measures that ensure both the sustainability of the fishery, and full traceability and control of onward trade, will be crucial for implementing CITES . The Indonesian government has demonstrated a strong commitment to regulating shark trade and implementing CITES [17–18], as demonstrated through several policy decisions to confer full and partial protection to CITES-listed shark and ray species (Marine Affairs and Fisheries Ministerial Decree No 4./KEPMEN-KP/2014, Regulation No. 48/PERMEN-KP/2016). This includes zero quotas/export bans for hammerhead and oceanic whitetip sharks. However, these export bans should be considered intermediate policy measures as monitoring systems and data availability are improved, and sustainable quotas are established. This will be challenging, as shark products are often traded in large volumes of fresh and/or preserved body parts, with high morphological similarity between products from regulated species and non-regulated species. To guarantee that trade is not detrimental to the survival of species, sustainable fisheries management will need to be complemented with species-specific trade quotas. This will require catch documentation systems which trace shark products from point of catch to point of export and rapid, low-cost species identification methods.
As baseline data on shark population health are limited, and there is no standardised, fisheries-independent system for monitoring long-term changes in shark populations, indirect bio-indicators (e.g. endo- and ectoparasites, [43–45]) could help to elucidate the impact of management measures on fisheries and populations of wild species. In the future, shark conservation and fisheries management could benefit from long-term monitoring of agreed indices of population abundance and health status.
These lessons may also apply to shark fisheries in other parts of the world. As sharks increasingly become the focus of global conservation efforts it should be acknowledged that species protection alone will not be enough to reduce mortality of priority species. More needs to be done to identify practical fisheries management measures that can reduce pressure on the most vulnerable species and populations, but also support sustainable use of species that are less susceptible to overfishing. Shark fishing forms an integral part of the livelihood strategies of many coastal communities [22, 23], and prohibiting catches will not necessarily lead to positive conservation outcomes [21, 46]. Management interventions must take into account local context and the motivations and well-being of fisher communities in order to be ethical, feasible and impactful.
S1 Dataset. Data of landed sharks at Tanjung Luar auction that had been used for this study.
S1 File. Questionnaires have been used to interview shark fishers, collector, traders, and processors.
We wish to acknowledge the support provided by fishers in Tanjung Luar for their great cooperation during fieldwork. We also thank I Made Dharma Aryawan, Muhsin, Abdul Kohar, and Abdurrafik for their assistance during field research, Benaya M Simeon, Peni Lestari, and Siska Agustina for helping with data processing, Ken Kassem for carefully reading the manuscript and providing useful inputs, and the anonymous reviewers for their constructive comments.
3. Hutchings JA, Reynolds JD. Marine fish population collapses: consequences for recovery and extinction risk. AIBS Bulletin. 2004 Apr;54(4):297–309.
4. Costello C, Ovando D, Clavelle T, Strauss CK, Hilborn R, Melnychuk MC, et al. Global fishery prospects under contrasting management regimes. Proceedings of the national academy of sciences. 2016 May 3;113(18):5125–9.
5. Davidson LN, Krawchuk MA, Dulvy NK. Why have global shark and ray landings declined: improved management or overfishing?. Fish and Fisheries. 2016 Jun 1;17(2):438–58.
6. Stevens JD, Bonfil R, Dulvy NK, Walker PA. The effects of fishing on sharks, rays, and chimaeras (chondrichthyans), and the implications for marine ecosystems. ICES Journal of Marine Science. 2000 Jun 1;57(3):476–94.
9. Dent F, Clarke S. State of the global market for shark products. FAO Fisheries and Aquaculture Technical Paper (FAO) eng no. 590. 2015.
12. Christensen J, Tull M, editors. Historical perspectives of fisheries exploitation in the Indo-Pacific. Springer Science & Business Media; 2014 Apr 1.
13. Simpfendorfer CA, Heupel MR, White WT, Dulvy NK. The importance of research and public opinion to conservation management of sharks and rays: a synthesis. Marine and Freshwater Research. 2011 Jul 21;62(6):518–27.
14. Lack M, Sant G. The future of sharks: a review of action and inaction. TRAFFIC International and the Pew Environment Group. 2011 Jan:44.
15. Bräutigam A, Callow M, Campbell IR, Camhi MD, Cornish AS, Dulvy NK, et al. Global priorities for conserving sharks and rays: A 2015–2025 strategy. The Global Sharks and Rays Initiative; 2015. 27p.
16. Satria A, Matsuda Y. Decentralization of fisheries management in Indonesia. Marine Policy. 2004 Sep 30;28(5):437–50.
17. Dharmadi , Fahmi , Satria F. Fisheries management and conservation of sharks in Indonesia. African journal of marine science. 2015 Apr 3;37(2):249–58.
20. Sembiring A, Pertiwi NP, Mahardini A, Wulandari R, Kurniasih EM, Kuncoro AW, Cahyani ND, Anggoro AW, Ulfa M, Madduppa H, Carpenter KE. DNA barcoding reveals targeted fisheries for endangered sharks in Indonesia. Fisheries Research. 2015 Apr 30;164:130–4.
21. Clarke S. Re-examining the shark trade as a tool for conservation. SPC Fisheries Newsletter. 2014:49–56.
22. Jaiteh VF, Loneragan NR, Warren C. The end of shark finning? Impacts of declining catches and fin demand on coastal community livelihoods. Marine Policy. 2017 Mar 24.
24. Cohen D, Crabtree B. Qualitative research guidelines project. Robert Wood Johnson Foundation, Princeton. 2006 Available from: http://www.qualres.org/index.html Cited in August 2016.
25. Skud BE. Manipulation of fixed gear and the effect on catch-per-unit effort. FAO Fisheries Report (FAO). 1984.
26. Damalas D, Megalofonou P, Apostolopoulou M. Environmental, spatial, temporal and operational effects on swordfish (Xiphias gladius) catch rates of eastern Mediterranean Sea longline fisheries. Fisheries Research. 2007 Apr 30;84(2):233–46.
27. Burnham KP, Anderson DR. Model selection and multimodel inference: a practical information-theoretic approach. Springer Science & Business Media; 2003 Dec 4.
28. Schaefer MB. Some aspects of the dynamics of populations important to the management of the commercial marine fisheries. Inter-American Tropical Tuna Commission Bulletin. 1954;1(2):23–56.
29. Fox WW Jr. An exponential surplus-yield model for optimizing exploited fish populations. Transactions of the American Fisheries Society. 1970 Jan 1;99(1):80–8.
30. Purwanto P, Nugroho D, Suwarso S. Potential production of the five predominant small pelagic fish species groups in the Java Sea. Indonesian Fisheries Research Journal. 2014 Dec 1;20(2):59–67.
31. Barker MJ, Schluessel V. Managing global shark fisheries: suggestions for prioritizing management strategies. Aquatic Conservation: Marine and Freshwater Ecosystems. 2005 Jul 1;15(4):325–47.
34. Ward-Paige CA, Worm B. Global evaluation of shark sanctuaries. Global Environmental Change. 2017 Nov 30;47:174–89.
35. Speed CW, Cappo M, Meekan MG. Evidence for rapid recovery of shark populations within a coral reef marine protected area. Biological Conservation. 2018 Apr 30;220:308–19.
36. West Nusa Tenggara Provincial Government. 2017. [Management and zoning plan of Lunyuk Marine Protected Area]. Mataram: West Nusa Tenggara Provincial Government; 2017. Indonesian.
37. Jaiteh VF, Lindfield SJ, Mangubhai S, Warren C, Fitzpatrick B, Loneragan NR. Higher abundance of marine predators and changes in fishers' behavior following spatial protection within the world's biggest shark fishery. Frontiers in Marine Science. 2016 Apr 7;3:43.
39. Kumoru L. The shark longline fishery in Papua New Guinea. InReport prepared for Billfish and bycatch research group, at the 176th meeting of the standing committee on Tuna and Billfish, Mooloolaba, Australia, 9th-16th July 2003 2003 Jul.
40. Cartamil D, Santana-Morales O, Escobedo-Olvera M, Kacev D, Castillo-Geniz L, Graham JB, Rubin RD, Sosa-Nishizaki O. The artisanal elasmobranch fishery of the Pacific coast of Baja California, Mexico. Fisheries Research. 2011 Mar 31;108(2):393–403.
42. Vincent AC, Sadovy de Mitcheson YJ, Fowler SL, Lieberman S. The role of CITES in the conservation of marine fishes subject to international trade. Fish and Fisheries. 2014 Dec 1;15(4):563–92.
43. Palm HW. Fish parasites as biological indicators in a changing world: can we monitor environmental impact and climate change?. InProgress in Parasitology 2011 (pp. 223–250). Springer Berlin Heidelberg.
44. Palm HW, Yulianto I, Piatkowski U. Trypanorhynch Assemblages Indicate Ecological and Phylogenetical Attributes of Their Elasmobranch Final Hosts. Fishes. 2017 Jun 17;2(2):8.
46. Booth H. Using the case of illegal manta ray trade in Indonesia to evaluate the impact of wildlife trade policy (Master Thesis, Imperial College London).
47. White WT, Last PR, Stevens JD, Yearsley GK. Economically important sharks & rays of Indonesia. Austr-alian Centre for International Agricultural Research (ACIAR); 2006.
|
[
"The relationships between catch per set and fishing behavior variables differ when comparing unstandardized CPUE and standardized CPUE."
] | 6,133
|
multifieldqa_en
|
en
| null |
cd0ecda68ad8031330b971fbfdd3794916e815109f004d3b
|
What genre did Margaret Way write in?
|
Margaret Way (b. Brisbane d. Cleveland, Queensland, Australia ) was an Australian writer of romance novels and women's fiction. A prolific author, Way wrote more than 120 novels since 1970, many through Mills & Boon, a romance imprint of British publisher Harlequin UK Ltd., owned by Harlequin Enterprises.
Biography
Before her marriage, she was a well-known pianist, teacher, vocal coach and accompanist. She began writing when her son, Laurence Way, was born, a friend took a pile of Mills & Boon books to her, she read all and decided that she also could write these types of novels. She began to write and promote her country with her stories set in Australia. She sold her first novels in 1970. Margaret Way lives with her family in her native Brisbane. Beginning in 2013, Margaret began to self-publish, releasing her first "e-book" mid-July.
Margaret died on the 10th of August 2022 in Cleveland, Queensland.
Bibliography
Single Novels
King Country (1970)
Blaze of Silk (1970)
The Time of the Jacaranda (1970)
Bauhinia Junction (1971)
Man from Bahl Bahla (1971)
Summer Magic (1971)
Return to Belle Amber (1971)
Ring of Jade (1972)
Copper Moon (1972)
Rainbow Bird (1972)
Man Like Daintree (1972)
Noonfire (1972)
Storm Over Mandargi (1973)
Wind River (1973)
Love Theme (1974)
McCabe's Kingdom (1974)
Sweet Sundown (1974)
Reeds of Honey (1975)
Storm Flower (1975)
Lesson in Loving (1975)
Flight into Yesterday (1976)
Red Cliffs of Malpara (1976)
Man on Half-moon (1976)
Swan's Reach (1976)
Mutiny in Paradise (1977)
One Way Ticket (1977)
Portrait of Jaime (1977)
Black Ingo (1977)
Awakening Flame (1978)
Wild Swan (1978)
Ring of Fire (1978)
Wake the Sleeping Tiger (1978)
Valley of the Moon (1979)
White Magnolia (1979)
Winds of Heaven (1979)
Blue Lotus (1979)
Butterfly and the Baron (1979)
Golden Puma (1980)
Temple of Fire (1980)
Lord of the High Valley (1980)
Flamingo Park (1980)
North of Capricorn (1981)
Season for Change (1981)
Shadow Dance (1981)
McIvor Affair (1981)
Home to Morning Star (1981)
Broken Rhapsody (1982)
The Silver Veil (1982)
Spellbound (1982)
Hunter's Moon (1982)
Girl at Cobalt Creek (1983)
No Alternative (1983)
House of Memories (1983)
Almost a Stranger (1984)
A place called Rambulara (1984)
Fallen Idol (1984)
Hunt the Sun (1985)
Eagle's Ridge (1985)
The Tiger's Cage (1986)
Innocent in Eden (1986)
Diamond Valley (1986)
Morning Glory (1988)
Devil Moon (1988)
Mowana Magic (1988)
Hungry Heart (1988)
Rise of an Eagle (1988)
One Fateful Summer (1993)
The Carradine Brand (1994)
Holding on to Alex (1997)
The Australian Heiress (1997)
Claiming His Child (1999)
The Cattleman's Bride (2000)
The Cattle Baron (2001)
The Husbands of the Outback (2001)
Secrets of the Outback (2002)
With This Ring (2003)
Innocent Mistress (2004)
Cattle Rancher, Convenient Wife (2007)
Outback Marriages (2007)
Promoted: Nanny to Wife (2007)
Cattle Rancher, Secret Son (2007)
Genni's Dilemma (2008)
Bride At Briar Ridge (2009)
Outback Heiress, Surprise Proposal (2009)
Cattle Baron, Nanny Needed (2009)
Legends of the Outback Series
Mail Order Marriage (1999)
The Bridesmaid's Wedding (2000)
The English Bride (2000)
A Wife at Kimbara (2000)
Koomera Crossing Series
Sarah's Baby (2003)
Runaway Wife (2003)
Outback Bridegroom (2003)
Outback Surrender (2003)
Home to Eden (2004)
McIvor Sisters Series
The Outback Engagement (2005)
Marriage at Murraree (2005)
Men Of The Outback Series
The Cattleman (2006)
The Cattle Baron's Bride (2006)
Her Outback Protector (2006)
The Horseman (2006)
Outback Marriages Series
Outback Man Seeks Wife (2007)
Cattle Rancher, Convenient Wife (2007)
Barons of the Outback Series Multi-Author
Wedding At Wangaree Valley (2008)
Bride At Briar's Ridge (2008)
Family Ties Multi-Author
Once Burned (1995)
Hitched! Multi-Author
A Faulkner Possession (1996)
Simply the Best Multi-Author
Georgia and the Tycoon (1997)
The Big Event Multi-Author
Beresford's Bride (1998)
Guardian Angels Multi-Author
Gabriel's Mission (1998)
Australians Series Multi-Author
7. Her Outback Man (1998)
17. Master of Maramba (2001)
19. Outback Fire (2001)
22. Mistaken Mistress (2002)
24. Outback Angel (2002)
33. The Australian Tycoon's Proposal (2004)
35. His Heiress Wife (2004)
Marrying the Boss Series Multi-Author
Boardroom Proposal (1999)
Contract Brides Series Multi-Author
Strategy for Marriage (2002)
Everlasting Love Series Multi-Author
Hidden Legacy (2008)
Diamond Brides Series Multi-Author
The Australian's Society Bride (2008)
Collections
Summer Magic / Ring of Jade / Noonfire (1981)
Wife at Kimbara / Bridesmaid's Wedding (2005)
Omnibus in Collaboration
Pretty Witch / Without Any Amazement / Storm Over Mandargi (1977) (with Lucy Gillen and Margaret Malcolm)
Dear Caliban / Heart of the Eagle / Swans' Reach (1978) (with Jane Donnelly and Elizabeth Graham)
The Bonds of Matrimony / Dragon Island / Reeds of Honey (1979) (with Elizabeth Hunter and Henrietta Reid)
The Man Outside / Castles in Spain / McCabe's Kingdom (1979) (with Jane Donnelly and Rebecca Stratton)
Winds From The Sea / Island of Darkness / Wind River (1979) (with Margaret Pargeter and Rebecca Stratton)
Moorland Magic / Tree of Idleness / Sweet Sundown (1980) (with Elizabeth Ashton and Elizabeth Hunter)
The Shifting Sands / Portrait of Jaime / Touched by Fire (1982) (with Jane Donnelly and Kay Thorpe)
Head of Chancery / Wild Heart / One-Way Ticket (1986) (with Betty Beaty and Doris Smith)
Heart of the Scorpion / The Winds of Heaven / Sweet Compulsion (1987) (with Janice Gray and Victoria Woolf)
One Brief Sweet Hour / Once More With Feeling / Blue Lotus (1990) (with Jane Arbor and Natalie Sparks)
Marry Me Cowboy (1995) (with Janet Dailey, Susan Fox and Anne McAllister)
Husbands on Horseback (1996) (with Diana Palmer)
Wedlocked (1999) (with Day Leclaire and Anne McAllister)
Mistletoe Magic (1999) (with Betty Neels and Rebecca Winters)
The Australians (2000) (with Helen Bianchin and Miranda Lee)
Weddings Down Under (2001) (with Helen Bianchin and Jessica Hart)
Outback Husbands (2002) (with Marion Lennox)
The Mother's Day Collection (2002) (with Helen Dickson and Kate Hoffmann)
Australian Nights (2003) (with Miranda Lee)
Outback Weddings (2003) (with Barbara Hannay)
Australian Playboys (2003) (with Helen Bianchin and Marion Lennox)
Australian Tycoons (2004) (with Emma Darcy and Marion Lennox)
A Mother's Day Gift (2004) (with Anne Ashley and Lucy Monroe)
White Wedding (2004) (with Judy Christenberry and Jessica Steele)
A Christmas Engagement (2004) (with Sara Craven and Jessica Matthews)
A Very Special Mother's Day (2005) (with Anne Herries)
All I Want for Christmas... (2005) (with Betty Neels and Jessica Steele)
The Mills and Boon Collection (2006) (with Caroline Anderson and Penny Jordan)
Outback Desire (2006) (with Emma Darcy and Carol Marinelli)
To Mum, with Love (2006) (with Rebecca Winters)
Australian Heroes (2007) (with Marion Lennox and Fiona McArthur)
Tall, Dark and Sexy (2008) (with Caroline Anderson and Helen Bianchin)
The Boss's Proposal (2008) (with Jessica Steele and Patricia Thayer)
Island Heat / Outback Man Seeks Wife / Prince's Forbidden Virgin / One Night Before Marriage / Their Lost-and-found Family / Single Dad's Marriage Wish (2008) (with Robyn Donald, Marion Lennox, Carol Marinelli, Sarah Mayberry and Anne Oliver)
Australian Billionaires (2009) (with Jennie Adams and Amy Andrews)
Cattle Baron : Nanny Needed / Bachelor Dad on Her Doorstep (2009) (with Michelle Douglas)
External links
Margaret Way at Harlequin Enterprises Ltd
Australian romantic fiction writers
Australian women novelists
Living people
Year of birth missing (living people)
Women romantic fiction writers
|
[
"Romance novels and women's fiction."
] | 1,193
|
multifieldqa_en
|
en
| null |
fc1544761460f97af3a338bbf3e3c648c00ec27b8b297069
|
Can someone sell or modify the Agency Spotter Content?
|
By purchasing now, you agree to the following terms. You authorize Agency Spotter to store and charge your payment method on file. Your paid account will renew automatically, unless you terminate it, or you notify Customer Service by email ([email protected]) of your decision to terminate your paid account. You must cancel your subscription before it renews in order to avoid billing of subscription fees for the renewal form to your credit card.
Should You object to any of the Terms or any subsequent modifications thereto, or become dissatisfied with the Site in any way, Your only recourse is to immediately discontinue use of the Site. Agency Spotter has the right, but is not obligated, to strictly enforce the Terms through self-help, community moderation, active investigation, litigation and prosecution.
(b) Agency Spotter will use commercially reasonable efforts to make the Services available on a 24 hours a day, 7 days a week, and 365 days a year basis, subject to Section 23 below and to downtime for maintenance purposes.
(c) Agency Spotter may from time to time modify the Services and add, change, or delete features of the Services in its sole discretion, without notice to you. Your continued use of the Service after any such changes to the Service constitutes your acceptance of these changes. Agency Spotter will use commercially reasonable efforts to post information on the Site regarding material changes to the Services.
(d) The contents of the Site, such as text, graphics, images, logos, user interfaces, visual interfaces, photographs, button icons, software, trademarks, sounds, music, artwork and computer code, and other Agency Spotter content (collectively, “Agency Spotter Content”), are protected under both United States and foreign copyright, trademark and other laws. All Agency Spotter Content is the property of Agency Spotter or its content suppliers or clients. The compilation (meaning the collection, arrangement and assembly) of all content on the Site is the exclusive property of Agency Spotter and is protected by United States and foreign copyright, trademark, and other laws. Unauthorized use of the Agency Spotter Content may violate these laws, and is strictly prohibited. You must retain all copyright, trademark, service mark and other proprietary notices contained in the original Agency Spotter Content on any authorized copy You make of the Agency Spotter Content.
(e) You agree not to sell or modify the Agency Spotter Content or reproduce, display, publicly perform, distribute, or otherwise use the Agency Spotter Content in any way for any public or commercial purpose, in connection with products or services that are not those of the Site, in any other manner that is likely to cause confusion among consumers, that disparages or discredits Agency Spotter or its licensors, that dilutes the strength of Agency Spotter’s or its licensor’s property, or that otherwise infringes Agency Spotter’s or its licensor’s intellectual property rights. You further agree to in no other way misuse Agency Spotter Content that appears on this Site. Any code that Agency Spotter creates to generate or display any Agency Spotter Content or the pages making up the Website is also protected by Agency Spotter’s copyright and You may not copy or adapt such code.
2. Site Restrictions. You may not use the Site in order to transmit, post, distribute, store or destroy material, including without limitation, the Agency Spotter Content, (a) in violation of any applicable law or regulation, (b) in a manner that will infringe the copyright, trademark, trade secret or other intellectual property rights of others or violate the privacy, publicity or other personal rights of others, (c) that is defamatory, obscene, threatening, abusive or hateful, or (d) that is in furtherance of criminal, fraudulent, or other unlawful activity. You are also prohibited from violating or attempting to violate the security of the Site and Services, including without limitation, the following activities: (a) accessing or attempting to access data not intended for You or logging into a server or account which You are not authorized to access; (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization; (c) attempting to interfere with service to any other user of the Site or Services, host or network, including, without limitation, via means of submitting a virus to the Website, overloading, “flooding”, “spamming”, “mailbombing” or “crashing”; or (d) forging any TCP/IP packet header or any part of the header information in any e-mail or newsgroup posting. Violations of system or network security may result in civil and/or criminal liability.
3. Specific Prohibited Uses. The Agency Spotter Content and other features of the Site may be used only for lawful purposes. Agency Spotter specifically prohibits any other use of the Site, and You agree not to do any of the following: (a) use the Site for any purpose other than as a platform for connecting businesses and agencies, including but not limited to using the information in the Website to sell or promote any products or services; (b) post or submit to the Website any incomplete, false or inaccurate biographical information or information which is not Your own; (c) post on the Website any franchise, pyramid scheme or “club membership”; (d) send unsolicited mail or e-mail, make unsolicited phone calls or send unsolicited faxes regarding promotions and/or advertising of products or services to any other user(s) of the Website; (e) delete or revise any material posted by any other person or entity; (f) take any action that imposes an unreasonable or disproportionately large load on the Website’s infrastructure; (g) notwithstanding anything to the contrary contained herein, use or attempt to use any engine, software, tool, agent or other automatic device, program, algorithm, methodology or mechanism (including without limitation browsers, spiders, robots, avatars or intelligent agents) to navigate or search the Website other than the search engine and search agents available from Agency Spotter on the Website and other than through generally available third party web browsers (e.g., Internet Explorer, Firefox, Safari); (h) decipher, decompile, disassemble or reverse engineer any of the software comprising or in any way making up a part of the Website; or (i) aggregate, copy or duplicate in any manner any of the Agency Spotter Content or information available from the Website, without express written consent from Agency Spotter.
(a) Certain features or services offered on or through the Site to users or agencies may require you to open a user or agency account (“Agency Account”) (including setting up a user ID and password). You are entirely responsible for maintaining the confidentiality of the information you hold for your account, including your password, and for any and all activity that occurs under your account until you close down your account or prove that your account security was compromised due to no fault of your own. To close your account, please email us at [email protected] You agree to notify Agency Spotter immediately of any unauthorized use of your account or password, or any other breach of security. You may be held liable for losses incurred by Agency Spotter or any other user of or visitor to the Site due to someone else using your Agency Spotter ID, password or account as a result of your failing to keep your account information secure and confidential. You may not use anyone else’s Agency Spotter ID, password or account at any time without the express permission and consent of the holder of that Agency Spotter ID, password or account. Agency Spotter cannot and will not be liable for any loss or damage arising from your failure to comply with these obligations. Agency Spotter may verify Agency Accounts to confirm that such accounts meet Agency Spotter’s minimum requirements to be an agency, as the same may be modified or amended from time to time, and may assign an administrator to such verified Agency Account.
(b) To eligible to use the Site and the Services, you must meet the following criteria and represent and warrant that you: (i) are at least 18 years of age; (ii) are not currently restricted from the Site or Services, and are not otherwise prohibited from having an Agency Spotter account, (iii) are not a competitor of Agency Spotter or are not using the Site or Services for reasons that are in competition with Agency Spotter, (iv) will only maintain one Agency Spotter account at any given time, (v) have full power and authority to enter into this Agreement and doing so will not violate any other agreement to which you are bound, (vi) will not violate any rights of Agency Spotter, including intellectual property rights such as copyright and trademark rights, and (vii) agree to provide at your cost all equipment, software and internet access necessary to use the Site or Services.
6. User Content and Submissions. You understand that all information, data, text, software, music, sound, photographs, graphics, video, advertisements, messages or other materials submitted, posted or displayed by You on or through the Website (“User Content”) is the sole responsibility of the person from which such User Content originated. Agency Spotter claims no ownership or control over any User Content. You or a third party licensor, as appropriate, retain all patent, trademark and copyright to any User Content You submit, post or display on or through Agency Spotter and You are responsible for protecting those rights, as appropriate. By submitting, posting or displaying User Content on or through Agency Spotter, You grant Agency Spotter a worldwide, non-exclusive, royalty-free license to reproduce, adapt, distribute and publish such User Content through Agency Spotter. In addition, by submitting, posting or displaying User Content which is intended to be available to the general public, You grant Agency Spotter a worldwide, non-exclusive, royalty-free license to reproduce, adapt, distribute and publish such User Content for the purpose of promoting Agency Spotter Services. Agency Spotter will discontinue this licensed use within a commercially reasonable period after such User Content is removed from the Site. Agency Spotter reserves the right to refuse to accept, post, display or transmit any User Content in its sole discretion.
You also represent and warrant that You have the right to grant, or that the holder of any rights has completely and effectively waived all such rights and validly and irrevocably granted to You the right to grant, the license stated above. If You post User Content in any public area of the Website, You also permit any user of the Website to access, display, view, store and reproduce such User Content for personal use. Subject to the foregoing, the owner of such User Content placed on the Website retains any and all rights that may exist in such User Content.
Agency Spotter does not represent or guarantee the truthfulness, accuracy, or reliability of User Content or endorse any opinions expressed by users of the Website. You acknowledge that any reliance on material posted by other users will be at Your own risk.
The following is a partial list of User Content that is prohibited on the Website. Prohibited Content includes, but is not limited to, Content that: is implicitly or explicitly offensive, such as User Content that engages in, endorses or promotes racism, bigotry, discrimination, hatred or physical harm of any kind against any group or individual; harasses, incites harassment or advocates harassment of any group or individual; involves the transmission of “junk mail”, “chain letters,” or unsolicited mass mailing or “spamming”; promotes or endorses false or misleading information or illegal activities or conduct that is abusive, threatening, obscene, defamatory or libelous; promotes or endorses an illegal or unauthorized copy of another person’s copyrighted work, such as providing or making available pirated computer programs or links to them, providing or making available information to circumvent manufacture-installed copy-protect devices, or providing or making available pirated music or other media or links to pirated music or other media files; contains restricted or password only access pages, or hidden pages or images; displays or links to pornographic, indecent or sexually explicit material of any kind; provides or links to material that exploits people under the age of 18 in a sexual, violent or other manner, or solicits personal information from anyone under 18; or provides instructional information about illegal activities or other activities prohibited by these Terms and Conditions, including without limitation, making or buying illegal weapons, violating someone’s privacy, providing or creating computer viruses or pirating any media; and/or solicits passwords or personal identifying information from other users.
It is your responsibility to keep your Agency Spotter profile information accurate and updated.
7. User-to-User Communications and Sharing (Agency Spotter Groups, Ratings, Reviews, Updates, Agency Pages, etc.). Agency Spotter offers various forums such as Agency Spotter Groups, Ratings, Reviews, and Updates, where you can post your observations and comments on designated topics. Agency Spotter also enables sharing of information by allowing users to post updates, including links to news articles and other information such as product recommendations, job opportunities, and other content to their profile and other parts of the Site, such as Agency Spotter Groups and Agency Pages. Agency Spotter members can create Agency Spotter Groups and Agency Pages for free; however, Agency Spotter may close or transfer Agency Spotter Groups or Agency Pages, or remove content from them if the content violates these Terms or others’ intellectual property rights. To create an Agency Spotter Agency Page, the Agency must be a company or legal entity that meets Agency Spotter’s minimum requirements for an Agency, and you must have the authority to create the Agency Page on behalf of the third party Agency.
For clarity, only DMCA Notices should go to the Copyright Agent; any other feedback, comments, requests for technical support, and other communications should be directed to: [email protected] You acknowledge that if you fail to comply with all of the requirements of this Section, your DMCA Notice may not be valid.
Upon receipt of a Notice, Agency Spotter will take whatever action, in its sole discretion, it deems appropriate, including removal of the challenged material from the Site and/or termination of the User’s account in appropriate circumstances. Please note that a Complainant may be liable for damages (including costs and attorneys’ fees) if he or she knowingly makes a material misrepresentation that content is infringing.
(i) If you have posted material subject to a DMCA Notice that allegedly infringes a copyright (the “Counterclaimant”), you may send Agency Spotter a written Counter Notice pursuant to Section 512(g), (ii) and 512(g), (iii) of the DMCA. When Agency Spotter receives a Counter Notice, it may, in its discretion, reinstate the material in question not less than ten (10) nor more than fourteen (14) days after receiving the Counter Notice unless Agency Spotter first receives notice from the Claimant that he or she has filed a legal action to restrain the allegedly infringing activity. Please note that Agency Spotter will send a copy of the Counter Notice to the address provided by the Claimant. A Counterclaimant may be liable for damages (including costs and attorneys’ fees) if he or she knowingly makes a material misrepresentation that that material or activity was removed or disabled by mistake or misidentification.
1. Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled.
2. A statement under penalty of perjury that you have a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled.
3. Your name, address, and telephone number, and a statement that you consent to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if your address is outside of the United States, for any judicial district in which Agency Spotter may be found, and that you will accept service of process from the person who provided notification under subsection (c)(1)(C) of the DMCA or an agent of such person.
(c) AGENCY SPOTTER HAS NO OBLIGATION TO ADJUDICATE CLAIMS OF INFRINGEMENT – EACH USER’S AGREEMENT TO HOLD AGENCY SPOTTER HARMLESS FROM CLAIMS. Claimants, Counterclaimants, and users understand that Agency Spotter is not an intellectual property tribunal. While Agency Spotter may, in its discretion, use the information provided in a DMCA Notice and Counter Notice in order to decide how to respond to infringement claims, Agency Spotter is not responsible for determining the merits of such claims. If a Counterclaimant responds to a claim of infringement by providing a Counter Notice, the Counterclaimant agrees that if Agency Spotter restores or maintains the content, the Counterclaimant will defend and hold Agency Spotter harmless from any resulting claims of infringement against Agency Spotter.
10. Advertisements and Other Potential Sources Of Revenue. Some of the Services may now or in the future be supported by advertising revenue, pay-per-click mechanisms, or other funding, and the Site may display advertisements and promotions. These advertisements may be targeted to the content of information stored via the Site, queries made through the Services, or other criteria. The manner, mode and extent of advertising on the Site are subject to change without specific notice to you. In consideration for Agency Spotter granting you access to and use of the Site and the Services, you agree that the Agency Spotter may place such advertising on the Site and/or incorporate such advertisements into the Services.
11. DISCLAIMERS. THE SITE AND ITS CONTENT AND THE SERVICES ARE PROVIDED “AS IS” AND AGENCY SPOTTER MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, ABOUT THE IMAGES OR SITE INCLUDING, WITHOUT LIMITATION, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, TO THE FULLEST EXTENT PERMISSIBLE UNDER APPLICABLE LAW. AGENCY SPOTTER DOES NOT WARRANT THAT ACCESS TO THE SITE OR ITS CONTENTS OR THE SERVICES WILL BE UNINTERRUPTED OR ERROR-FREE, THAT DEFECTS WILL BE CORRECTED, OR THAT THIS SITE OR THE SERVERS THAT MAKE IT AVAILABLE ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. AGENCY SPOTTER DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF ANY CONTENT ON THE SITE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE. ACCORDINGLY, YOU ACKNOWLEDGE THAT YOUR USE OF THE SITE IS AT YOUR OWN RISK. YOU (AND NOT AGENCY SPOTTER) ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR, OR CORRECTION RESULTING FROM COMPUTER MALFUNCTION, VIRUSES OR THE LIKE. APPLICABLE LAW MAY NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.
12. Limitation on Liability. Neither Agency Spotter, nor its licensors, representatives, affiliates, employees, shareholders or directors (collectively, “Agency Spotter Affiliates”), shall be cumulatively responsible or liable for (a) any damages in excess of three (3) times the most recent monthly fee that you paid for a Premium Service, if any, or US $100, whichever amount is greater, or (b) any damages of any kind including, without limitation, lost business, profits or data (or the cost to recreate such data), direct, indirect, incidental, consequential, compensatory, exemplary, special or punitive damages that may result from Your access to or use of Website, the Agency Spotter Content, or the Services, or any content or other materials on, accessed through or downloaded from the Site. The allocations of liability in this Section represent the agreed and bargained-for understanding of the parties and the fees herein reflects such allocation. These limitations of liability will apply notwithstanding any failure of essential purpose of any limited remedy, whether your claim is based in contract, tort, statute or any other legal theory, and whether we knew or should have known about the possibility of such damages; provided, however, that this limitation of liability shall not apply if you have entered into a separate written agreement to purchase Premium Services with a separate Limitation of Liability provision that expressly supersedes this Section in relation to those Premium Services.
13. Indemnification. In the event that You use the Website, the Agency Spotter Content, or any portion thereof, in any manner not authorized by Agency Spotter, or if You otherwise infringe any intellectual property rights or any other rights relating to other users, You agree to indemnify and hold Agency Spotter, its subsidiaries, affiliates, licensors and representatives, harmless against any losses, expenses, costs or damages, including reasonable attorneys’ fees, incurred by them as a result of unauthorized use of the Website or the Agency Spotter Content and/or Your breach or alleged breach of these Terms and Conditions.
(a) You agree that Agency Spotter and its licensors own all intellectual property rights in and to the Services, the Site and related Software, including but not limited to the look and feel, structure, organization, design, algorithms, templates, data models, logic flow, text, graphics, logos, and screen displays associated therewith.
(b) You will not reverse engineer, decompile or disassemble the Software, or otherwise attempt to reconstruct or discover the source code for the Software. You further agree not to resell, lease, assign, distribute, time share or otherwise commercially exploit or make the Services available to any third party for such third party’s benefit.
(c) You may make a single copy of the Downloaded Software for backup purposes only; provided that any such copies contain the same proprietary rights notices that appear on the Downloaded Software. Agency Spotter reserves all rights in the Services and Software not expressly granted to you hereunder. As used herein, “Software” means Agency Spotter’s proprietary software used to deliver the Services, made available to you as part of the Site and/or Services, and all updates and associated documentation thereto made available as a part of the Site or Services pursuant to these Terms, including Downloadable Software. The term “Downloadable Software” means client software downloaded by you from the Site that augments your use of the Site and/or Services, including add-ins, sample code, APIs and ancillary programs.
(d) Agency Spotter shall have a perpetual, royalty-free, worldwide, and transferable license to use or incorporate into the Site and Services any suggestions, ideas, enhancements, feedback, or other information provided by you related to the Site or Services.
(e) Agency Spotter may derive and compile aggregated and/or analytical information from your usage of the Site and Services. Such aggregated data and metadata may be used for Agency Spotter’s own purposes without restriction, including, but not limited to, using such data in conjunction with data from other sources to improve Agency Spotter’s products and services and to create new products.
15. Third Party Software and Features; Agency Spotter Applications. (a) Agency Spotter may make software from third-party companies available to You. To download such software, You may be required to agree to the respective software licenses and/or warranties of such third-party software. Each software product is subject to the individual company’s terms and conditions, and the agreement will be between You and the respective company. This means that Agency Spotter does not guarantee that any software You download will be free of any contaminating or destructive code, such as viruses, worms or Trojan horses. Agency Spotter does not offer any warranty on any third-party software You download using the Site. Further, the Site and/or Service may contain features, functionality and information that are provided through or by third-party content, software, websites, and/or system (“Third Party Materials”). Your use and access of these features and functionality are subject to the terms published or otherwise made available by the third-party providers of Third Party Materials. Agency Spotter has no responsibility for any Third-Party Materials, and you irrevocably waive any claim against Agency Spotter with respect to such Third-Party Materials.
(b) Agency Spotter may also offer the Services through applications built using Agency Spotter’s platform (“Agency Spotter Applications”), including smart phone applications, “Share” and other similar buttons and other interactive plugins distributed on websites across the Internet. Agency Spotter Applications are distinct from Third-Party Materials and applications address in Section 14(a), above. If you use an Agency Spotter application or interact with a website that has deployed a plugin, you agree that information about you and your use of the Services, including, but not limited to, your device, your mobile carrier, your internet access provider, your physical location, and/or web pages containing Agency Spotter plugins that load in your browser may be communicated to us. You acknowledge that you are responsible for all charges and necessary permissions related to accessing Agency Spotter through your mobile access provider. You should therefore check with your provider to find out if the Services are available and the terms for these services for your specific mobile devices. Finally, by using any downloadable application to enable your use of the Services, you are explicitly confirming your acceptance of the terms of the End User License Agreement associated with the application provided at download or installation, or as may be updated from time to time.
16. International Use. Agency Spotter makes no representation that materials on this site are appropriate or available for use in locations outside the United States, and accessing them from territories where their contents are illegal is prohibited. Those who choose to access this site from other locations do so on their own initiative and are responsible for compliance with local laws.
17. Dispute Resolution. These Terms and any claim, cause of action or dispute (“claim”) arising out of or related to these Terms shall be governed by the laws of the State of Georgia, regardless of your country of origin or where you access Agency Spotter, and notwithstanding any conflicts of law principles and the United Nations Convention for the International Sale of Goods. You and Agency Spotter agree that all claims arising out of or related to these Terms must be resolved exclusively by a state or federal court located in Fulton County, Georgia, except as otherwise mutually agreed in writing by the parties or as described in the Arbitration option in Section 16(b), below. You and Agency Spotter agree to submit to the personal jurisdiction of the courts located within Fulton County, Georgia, for the purpose of litigating all such claims. Notwithstanding the foregoing, you agree that Agency Spotter shall still be allowed to seek injunctive remedies (or an equivalent type of urgent legal relief) in any jurisdiction.
18. Arbitration. You agree that any dispute, claim or controversy arising hereunder or relating in any way to the Terms, shall be settled by binding arbitration in Fulton County, Georgia, in accordance with the commercial arbitration rules of Judicial Arbitration and Mediation Services (“JAMS”). The arbitrator shall issue a written decision specifying the basis for the award made. The party filing a claim or counterclaim in the arbitration proceeding shall pay the deposit(s) determined by JAMS with respect to such claim or counterclaim. All other costs associated with the arbitration and imposed by JAMS shall be paid as determined by the arbitrator(s) and, in absence of such determination, equally by each party to the arbitration. In addition, unless the arbitrator awards payment of reasonable attorney and other fees to a party, each party to the arbitration shall be responsible for its own attorneys’ fees and other professional fees incurred in connection with the arbitration. Determinations of the arbitrator will be final and binding upon the parties to the arbitration, and judgment upon the award rendered by the arbitrator may be entered in any court having jurisdiction, or application may be made to such court for a judicial acceptance of the award and an order of enforcement, as the case may be. The arbitrator shall apply the substantive law of the State of Georgia, without giving effect to its conflict of laws rules.
19. Export Control. You agree to comply with all relevant export laws and regulations, including, but not limited to, the U.S. Export Administration Regulations and Executive Orders (“Export Controls”). You warrant that you are not a person, company or destination restricted or prohibited by Export Controls (“Restricted Person”). You will not, directly or indirectly, export, re-export, divert, or transfer the Site or Service or any related software, any portion thereof or any materials, items or technology relating to Agency Spotter’s business or related technical data or any direct product thereof to any Restricted Person, or otherwise to any end user and without obtaining the required authorizations from the appropriate governmental entities.
(a) These Terms will continue until terminated in accordance with this Section.
(b) You may cancel your legal agreement with Agency Spotter at any time by (i) notifying Agency Spotter in writing, (ii) ceasing to use the Services, and (iii) closing your accounts for all of the Services which you use, if we have made this option available to you. Your cancellation of the Services will not alter your obligation to pay all charges incurred prior to your effective date of termination.
Agency Spotter may terminate its legal agreement with you if, (i) you have breached any provision of the Terms (or have acted in manner which clearly shows that you do not intend to, or are unable to comply with the provisions of the Terms), or (ii) Agency Spotter is required to do so by law (for example, where the provision of the Services to you is, or becomes, unlawful), or (iii) Agency Spotter is transitioning to no longer providing the Services to users in the country in which you are resident or from which you use the service, or (iv) the provision of the Services to you by Agency Spotter is, in Agency Spotters’ opinion, no longer commercially viable.
(c) The terms provided in Sections 2, 3, 6, 11, 12, 13, 14, 17, 19, 20, 21 and 22 of these Terms shall survive any termination of these Terms.
21. Independent Contractors. The parties are and intend to be independent contractors with respect to the Services contemplated hereunder. You agree that neither you nor any of your employees or contractors shall be considered as having an employee status with Agency Spotter. No form of joint employer, joint venture, partnership, or similar relationship between the parties is intended or hereby created.
22. Assignment and Delegation. You may not assign or delegate any rights or obligations under these Terms. Any purported assignment or delegation shall be ineffective. We may freely assign or delegate all rights and obligations under these Terms, fully or partially, without notice to you. We may also substitute, by way of unilateral novation, effective upon notice to you, Agency Spotter Inc. for any third party that assumes our rights and obligations under these Terms.
The personally identifiable information we collect from you allows us to provide you with the Services and to enable users to navigate and enjoy using the Site. We will also use your personally identifiable information to develop, improve and advertise the Site and Services. We may also use your personally identifiable information for internal purposes such as auditing, data analysis and research to improve our Services and customer communications. We do not rent, sell or otherwise provide your personally identifiable information to third parties without your consent, except as described in this policy or as required by law.
When you register with us through the Site or Services and become a Registered User, or when you wish to contact another Registered User, we will ask you for personally identifiable information. This refers to information about you that can be used to contact or identify you (“Personally Identifiable Information“). Personally Identifiable Information includes, but is not limited to, your name, phone numbers, email address, home postal address, business address, social media user names, employer/affiliated organization, reasons for accessing the Site, and intended usage of requested information, but does not include your credit card number or billing information. We may also use your email address or phone number (if provided by you) to contact you regarding changes to the Services; system maintenance and outage issues; account issues; or otherwise to troubleshoot problems. In order to process some of your transactions through the Site and Services, we may also ask for your credit card number and other billing information (“Billing Information“; and, together with Personally Identifiable Information, “Personal Information“).
Information you provide to us also includes your account profile and your contributions to discussion groups and community features Agency Spotter may offer. Do not upload or insert any information to or into the Site or Services that you do not want to be shared or used in the manner described in this section.
In addition, when you use the Site, our servers automatically record certain information that your web browser sends whenever you visit any website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, referring/exit pages and URLs, platform type, number of clicks, domain names, landing pages, pages viewed and the order of those pages, the amount of time spent on particular pages, the date and time of your request, and one or more cookies that may uniquely identify your browser.
Information from third party services and other websites.
Do not upload or insert any information to or into the Site or Services that you do not want to be shared or used in the manner described in this section.
Advertisements. Advertisers who present ads on the Site may use technological methods to measure the effectiveness of their ads and to personalize advertising content. You may use your browser cookie settings to limit or prevent the placement of cookies by advertising networks. Agency Spotter does not share personally identifiable information with advertisers unless we get your permission.
Links. When you click on links on Agency Spotter you may leave our site. We are not responsible for the privacy practices of other sites, and we encourage you to read their privacy statements.
If we are requested to disclose your information to a government agency or official, we will do so if we believe in good faith, after considering your privacy interests and other relevant factors, that such disclosure is necessary to: (i) conform to legal requirements or comply with a legal process with which we are involved; (ii) protect our rights or property or the rights or property of our affiliated companies; (iii) prevent a crime or protect national security; or (iv) protect the personal safety of Site users or the public. Because Agency Spotter is a United States limited liability company and information collected on our Site is stored in whole or in part in the United States, your information may be subject to U.S. law.
We also reserve the right to disclose Personally Identifiable Information and/or other information about users that Agency Spotter believes, in good faith, is appropriate or necessary to enforce our agreements, take precautions against liability, investigate and defend itself against ay third-party claims or allegations, assist government enforcement agencies, protect the security or integrity of our Site or Services, and protect the rights, property or personal safety of Agency Spotter, our users and others.
Cookies allow us to (i) manage, present and keep track of temporary information, such as data you upload onto the Site for use with the Services; (ii) register you as a Registered User on the Site or in other various programs associated with the Site; (iii) remember you when you log in to the places on the Site that require you to be a Registered User of the Site; (iv) help us understand the size of our audience and traffic patterns; (v) collect and record information about what you viewed on the Site; and (vi) deliver specific information to you based on your interests.
When you access the Site, the Site automatically collects certain non-personally identifiable information through the use of electronic images known as web beacons (sometimes called single-pixel gifs) and log files. Such information may include your IP address, browser type, the date, time and duration of your access and usage of the Site and whether you opened emails You received from us.
This information is collected for all visits to the Site and then analyzed in the aggregate. This information is useful for, among other things, tracking the performance of our online advertising, such as online banner ads, and determining where to place future advertising on other websites.
Editing your profile. You may review and change or remove your personal information or the settings for your Agency Spotter account at any time by going to your account profile. You can edit your name, email address, password and other account information here. Please be aware that even after your request for a change is processed, Agency Spotter may, for a time, retain residual information about you in its backup and/or archival copies of its database.
Deactivating or deleting your account. If you want to stop using your account you may deactivate it or delete it. When you deactivate an account, no user will be able to see it, but it will not be deleted. We save your profile information in case you later decide to reactivate your account. Many users deactivate their accounts for temporary reasons and in doing so are asking us to maintain their information until they return to Agency Spotter. You will still have the ability to reactivate your account and restore your profile in its entirety. When you delete an account, it is permanently deleted from Agency Spotter. You should only delete your account if you are certain you never want to reactivate it. You may deactivate your account or delete your account within your account profile.
Limitations on removal. Even after you remove information from your profile or delete your account, copies of that information may remain viewable elsewhere to the extent it has been shared with others, it was otherwise distributed pursuant to your privacy settings, or it was copied or stored by other users. However, your name will no longer be associated with that information on Agency Spotter. (For example, if you post something to another user’s or Agency’s profile or Agency’s portfolio and then you delete your account, that post may remain, but be attributed to an “Anonymous Agency Spotter User.”) Additionally, we may retain certain information to prevent identity theft and other misconduct even if deletion has been requested. If you have given third party applications or websites access to your information, they may retain your information to the extent permitted under their terms of service or privacy policies. But they will no longer be able to access the information through our platform after you disconnect from them.
Default Settings. Because the mission of Agency Spotter is to connect businesses and agencies, enabling them to save time, be more productive and successful, we have established what we believe are reasonable default settings that we have found most agencies and professionals desire. Because Registered Users may use and interact with Agency Spotter in a variety of ways, and because those uses may change over time, we designed our settings to provide our users control over the information they share. We encourage our Registered Users to review their account settings and adjust them in accordance with their preferences.
Risks inherent in sharing information. Please be aware that no security measures are perfect or impenetrable, and no method of transmission over the Internet, or method of electronic storage, is 100% secure. We cannot control the actions of other users with whom you share your information. We cannot guarantee that only authorized persons will view your information. We cannot ensure that information you share on the Site or through the Services will not become publicly available. We are not responsible for third party circumvention of any privacy or security measures on Agency Spotter. You can reduce these risks by using common sense security practices such as choosing a strong password, using different passwords for different services, and using up to date antivirus software.
If you receive an unsolicited email that appears to be from us or one of our members that requests personal information (such as your credit card, login, or password), or that asks you to verify or confirm your account or other personal information by clicking on a link, that email was likely to have been sent by someone trying to unlawfully obtain your information, sometimes referred to as a “phisher” or “spoofer.” We do not ask for this type of information in an email. Do not provide the information or click on the link. Please contact us at [email protected] if you get an email like this. Notwithstanding the foregoing, after your initial account setup, we may send an email to your registered account address solely to confirm that we have the correct, valid email address for your account.
If You have concerns about your privacy in connection with your use of the Site or any general questions related thereto, please tell us by emailing us at [email protected] We will make every reasonable effort to address your concerns.
Thank You for supporting websites, such as ours. We take your privacy seriously by implementing written privacy policies, such as this one.
|
[
"No."
] | 6,839
|
multifieldqa_en
|
en
| null |
2914f0d14be47681d3c23b975c5bdadf23943ddd2bdd99d5
|
What are the datasets used in this community for research?
|
\section{Introduction}
Underwater robot picking is to use the robot to automatically capture sea creatures like holothurian, echinus, scallop, or starfish in an open-sea farm where underwater object detection is the key technology for locating creatures. Until now, the datasets used in this community are released by the Underwater Robot Professional Contest (URPC$\protect\footnote{Underwater Robot Professional Contest: {\bf http://en.cnurpc.org}.}$) beginning from 2017, in which URPC2017 and URPC2018 are most often used for research. Unfortunately, as the information listed in Table \ref{Info}, URPC series datasets do not provide the annotation file of the test set and cannot be downloaded after the contest.
Therefore, researchers \cite{2020arXiv200511552C,2019arXiv191103029L} first have to divide the training data into two subsets, including a new subset of training data and a new subset of testing data, and then train their proposed method and other \emph{SOTA} methods. On the one hand, training other methods results in a significant increase in workload. On the other hand, different researchers divide different datasets in different ways,
\begin{table}[t]
\renewcommand\tabcolsep{3.5pt}
\caption{Information about all the collected datasets. * denotes the test set's annotations are not available. \emph{3} in Class means three types of creatures are labeled, \emph{i.e.,} holothurian, echinus, and scallop. \emph{4} means four types of creatures are labeled (starfish added). Retention represents the proportion of images that retain after similar images have been removed.}
\centering
\begin{tabular}{|l|c|c|c|c|c|}
\hline
Dataset&Train&Test&Class&Retention&Year \\
\hline
URPC2017&17,655&985*&3&15\%&2017 \\
\hline
URPC2018&2,901&800*&4&99\%&2018 \\
\hline
URPC2019&4,757&1,029*&4&86\%&2019 \\
\hline
URPC2020$_{ZJ}$&5,543&2,000*&4&82\%&2020 \\
\hline
URPC2020$_{DL}$&6,575&2,400*&4&80\%&2020 \\
\hline
UDD&1,827&400&3&84\%&2020 \\
\hline
\end{tabular}
\label{Info}
\end{table}
\begin{figure*}[htbp]
\begin{center}
\includegraphics[width=1\linewidth]{example.pdf}
\end{center}
\caption{Examples in DUO, which show a variety of scenarios in underwater environments.}
\label{exam}
\end{figure*}
causing there is no unified benchmark to compare the performance of different algorithms.
In terms of the content of the dataset images, there are a large number of similar or duplicate images in the URPC datasets. URPC2017 only retains 15\% images after removing similar images compared to other datasets. Thus the detector trained on URPC2017 is easy to overfit and cannot reflect the real performance.
For other URPC datasets, the latter also includes images from the former, \emph{e.g.}, URPC2019 adds 2,000 new images compared to URPC2018; compared with URPC2019, URPC2020$_{ZJ}$ adds 800 new images. The URPC2020$_{DL}$ adds 1,000 new images compared to the URPC2020$_{ZJ}$. It is worth mentioning that the annotation of all datasets is incomplete; some datasets lack the starfish labels and it is easy to find error or missing labels. \cite{DBLP:conf/iclr/ZhangBHRV17} pointed out that although the CNN model has a strong fitting ability for any dataset, the existence of dirty data will significantly weaken its robustness.
Therefore, a reasonable dataset (containing a small number of similar images as well as an accurate annotation) and a corresponding recognized benchmark are urgently needed to promote community development.
To address these issues, we introduce a dataset called Detecting Underwater Objects (DUO) by collecting and re-annotating all the available underwater datasets. It contains 7,782 underwater images after deleting overly similar images and has a more accurate annotation with four types of classes (\emph{i.e.,} holothurian, echinus, scallop, and starfish).
Besides, based on the MMDetection$\protect\footnote{MMDetection is an open source object detection toolbox based on PyTorch. {\bf https://github.com/open-mmlab/mmdetection}}$ \cite{chen2019mmdetection} framework, we also provide a \emph{SOTA} detector benchmark containing efficiency and accuracy indicators, providing a reference for both academic research and industrial applications. It is worth noting that JETSON AGX XAVIER$\protect\footnote{JETSON AGX XAVIER is an embedded development board produced by NVIDIA which could be deployed in an underwater robot. Please refer {\bf https://developer.nvidia.com/embedded/jetson-agx-xavier-developer-kit} for more information.}$ was used to assess all the detectors in the efficiency test in order to simulate robot-embedded environment. DUO will be released in https://github.com/chongweiliu soon.
In summary, the contributions of this paper can be listed as follows.
$\bullet$ By collecting and re-annotating all relevant datasets, we introduce a dataset called DUO with more reasonable annotations as well as a variety of underwater scenes.
$\bullet$ We provide a corresponding benchmark of \emph{SOTA} detectors on DUO including efficiency and accuracy indicators which could be a reference for both academic research and industrial applications.
\pagestyle{empty}
\section{Background}
In the year of 2017, underwater object detection for open-sea farming is first proposed in the target recognition track of Underwater Robot Picking Contest 2017$\protect\footnote{From 2020, the name has been changed into Underwater Robot Professional Contest which is also short for URPC.}$ (URPC2017) which aims to promote the development of theory, technology, and industry of the underwater agile robot and fill the blank of the grabbing task of the underwater agile robot. The competition sets up a target recognition track, a fixed-point grasping track, and an autonomous grasping track. The target recognition track concentrates on finding the {\bf high accuracy and efficiency} algorithm which could be used in an underwater robot for automatically grasping.
The datasets we used to generate the DUO are listed below. The detailed information has been shown in Table \ref{Info}.
{\bf URPC2017}: It contains 17,655 images for training and 985 images for testing and the resolution of all the images is 720$\times$405. All the images are taken from 6 videos at an interval of 10 frames. However, all the videos were filmed in an artificial simulated environment and pictures from the same video look almost identical.
{\bf URPC2018}: It contains 2,901 images for training and 800 images for testing and the resolutions of the images are 586$\times$480, 704$\times$576, 720$\times$405, and 1,920$\times$1,080. The test set's annotations are not available. Besides, some images were also collected from an artificial underwater environment.
{\bf URPC2019}: It contains 4,757 images for training and 1029 images for testing and the highest resolution of the images is 3,840$\times$2,160 captured by a GOPro camera. The test set's annotations are also not available and it contains images from the former contests.
{\bf URPC2020$_{ZJ}$}: From 2020, the URPC will be held twice a year. It was held first in Zhanjiang, China, in April and then in Dalian, China, in August. URPC2020$_{ZJ}$ means the dataset released in the first URPC2020 and URPC2020$_{DL}$ means the dataset released in the second URPC2020. This dataset contains 5,543 images for training and 2,000 images for testing and the highest resolution of the images is 3,840$\times$2,160. The test set's annotations are also not available.
{\bf URPC2020$_{DL}$}: This dataset contains 6,575 images for training and 2,400 images for testing and the highest resolution of the images is 3,840$\times$2,160. The test set's annotations are also not available.
{\bf UDD \cite{2020arXiv200301446W}}: This dataset contains 1,827 images for training and 400 images for testing and the highest resolution of the images is 3,840$\times$2,160. All the images are captured by a diver and a robot in a real open-sea farm.
\begin{figure}[t]
\begin{center}
\includegraphics[width=1\linewidth]{pie.pdf}
\end{center}
\caption{The proportion distribution of the objects in DUO.}
\label{pie}
\end{figure}
\begin{figure*}
\centering
\subfigure[]{\includegraphics[width=3.45in]{imagesize.pdf}}
\subfigure[]{\includegraphics[width=3.45in]{numInstance.pdf}}
\caption{(a) The distribution of instance sizes for DUO; (b) The number of categories per image.}
\label{sum}
\end{figure*}
\section{Proposed Dataset}
\subsection{Image Deduplicating}
As we explained in Section 1, there are a large number of similar or repeated images in the series of URPC datasets. Therefore, it is important to delete duplicate or overly similar images and keep a variety of underwater scenarios when we merge these datasets together. Here we employ the Perceptual Hash algorithm (PHash) to remove those images. PHash has the special property that the hash value is dependent on the image content, and it remains approximately the same if the content is not significantly modified. Thus we can easily distinguish different scenarios and delete duplicate images within one scenario.
After deduplicating, we obtain 7,782 images (6,671 images for training; 1,111 for testing). The retention rate of the new dataset is 95\%, which means that there are only a few similar images in the new dataset. Figure \ref{exam} shows that our dataset also retains various underwater scenes.
\subsection{Image Re-annotation}
Due to the small size of objects and the blur underwater environment, there are always missing or wrong labels in the existing annotation files. In addition, some test sets' annotation files are not available and some datasets do not have the starfish annotation. In order to address these issues, we follow the next process which combines a CNN model and manual annotation to re-annotate these images. Specifically, we first train a detector (\emph{i.e.,} GFL \cite{li2020generalized}) with the originally labeled images. After that, the trained detector predicts all the 7,782 images. We treat the prediction as the groundtruth and use it to train the GFL again. We get the final GFL prediction called {\bf the coarse annotation}. Next, we use manual correction to get the final annotation called {\bf the fine annotation}. Notably, we adopt the COCO \cite{Belongie2014} annotation form as the final format.
\subsection{Dataset Statistics}
{\bf The proportion of classes}: The total number of objects is 74,515. Holothurian, echinus, scallop, and starfish are 7,887, 50,156, 1,924, and 14,548, respectively. Figure \ref{pie} shows the proportion of each creatures where echinus accounts for 67.3\% of the total. The whole data distribution shows an obvious long-tail distribution because the different economic benefits of different seafoods determine the different breed quantities.
{\bf The distribution of instance sizes}: Figure \ref{sum}(a) shows an instance size distribution of DUO. \emph{Percent of image size} represents the ratio of object area to image area, and \emph{Percent of instance} represents the ratio of the corresponding number of objects to the total number of objects. Because of these small creatures and high-resolution images, the vast majority of objects occupy 0.3\% to 1.5\% of the image area.
{\bf The instance number per image}: Figure \ref{sum}(b) illustrates the number of categories per image for DUO. \emph{Number of instances} represents the number of objects one image has, and \emph{ Percentage of images} represents the ratio of the corresponding number of images to the total number of images. Most images contain between 5 and 15 instances, with an average of 9.57 instances per image.
{\bf Summary}:
In general, smaller objects are harder to detect. For PASCAL VOC \cite{Everingham2007The} or COCO \cite{Belongie2014}, roughly 50\% of all objects occupy no more than 10\% of the image itself, and others evenly occupy from 10\% to 100\%.
In the aspect of instances number per image, COCO contains 7.7 instances per image and VOC contains 3. In comparison, DUO has 9.57 instances per image and most instances less than 1.5\% of the image size.
Therefore, DUO contains almost exclusively massive small instances and has the long-tail distribution at the same time, which means it is promising to design a detector to deal with massive small objects and stay high efficiency at the same time for underwater robot picking.
\section{Benchmark}
Because the aim of underwater object detection for robot picking is to find {\bf the high accuracy and efficiency} algorithm, we consider both the accuracy and efficiency evaluations in the benchmark as shown in Table \ref{ben}.
\subsection{Evaluation Metrics}
Here we adopt the standard COCO metrics (mean average precision, \emph{i.e.,} mAP) for the accuracy evaluation and also provide the mAP of each class due to the long-tail distribution.
{\bf AP} -- mAP at IoU=0.50:0.05:0.95.
{\bf AP$_{50}$} -- mAP at IoU=0.50.
{\bf AP$_{75}$} -- mAP at IoU=0.75.
{\bf AP$_{S}$} -- {\bf AP} for small objects of area smaller than 32$^{2}$.
{\bf AP$_{M}$} -- {\bf AP} for objects of area between 32$^{2}$ and 96$^{2}$.
{\bf AP$_{L}$} -- {\bf AP} for large objects of area bigger than 96$^{2}$.
{\bf AP$_{Ho}$} -- {\bf AP} in holothurian.
{\bf AP$_{Ec}$} -- {\bf AP} in echinus.
{\bf AP$_{Sc}$} -- {\bf AP} in scallop.
{\bf AP$_{St}$} -- {\bf AP} in starfish.
For the efficiency evaluation, we provide three metrics:
{\bf Param.} -- The parameters of a detector.
{\bf FLOPs} -- Floating-point operations per second.
{\bf FPS} -- Frames per second.
Notably, {\bf FLOPs} is calculated under the 512$\times$512 input image size and {\bf FPS} is tested on a JETSON AGX XAVIER under MODE$\_$30W$\_$ALL.
\subsection{Standard Training Configuration}
We follow a widely used open-source toolbox, \emph{i.e.,} MMDetection (V2.5.0) to produce up our benchmark. During the training, the standard configurations are as follows:
$\bullet$ We initialize the backbone models (\emph{e.g.,} ResNet50) with pre-trained parameters on ImageNet \cite{Deng2009ImageNet}.
$\bullet$ We resize each image into 512 $\times$ 512 pixels both in training and testing. Each image is flipped horizontally with 0.5 probability during training.
$\bullet$ We normalize RGB channels by subtracting 123.675, 116.28, 103.53 and dividing by 58.395, 57.12, 57.375, respectively.
$\bullet$ SGD method is adopted to optimize the model. The initial learning rate is set to be 0.005 in a single GTX 1080Ti with batchsize 4 and is decreased by 0.1 at the 8th and 11th epoch, respectively. WarmUp \cite{2019arXiv190307071L} is also employed in the first 500 iterations. Totally there are 12 training epochs.
$\bullet$ Testing time augmentation (\emph{i.e.,} flipping test or multi-scale testing) is not employed.
\subsection{Benchmark Analysis}
Table \ref{ben} shows the benchmark for the \emph{SOTA} methods. Multi- and one- stage detectors with three kinds of backbones (\emph{i.e.,} ResNet18, 50, 101) give a comprehensive assessment on DUO. We also deploy all the methods to AGX to assess efficiency.
In general, the multi-stage (Cascade R-CNN) detectors have high accuracy and low efficiency, while the one-stage (RetinaNet) detectors have low accuracy and high efficiency. However, due to recent studies \cite{zhang2019bridging} on the allocation of more reasonable positive and negative samples in training, one-stage detectors (ATSS or GFL) can achieve both high accuracy and high efficiency.
\begin{table*}[htbp]
\renewcommand\tabcolsep{3.0pt}
\begin{center}
\caption{Benchmark of \emph{SOTA} detectors (single-model and single-scale results) on DUO. FPS is measured on the same machine with a JETSON AGX XAVIER under the same MMDetection framework, using a batch size of 1 whenever possible. R: ResNet.}
\label{ben}
\begin{tabular}{|l|l|c|c|c|ccc|ccc|cccc|}
\hline
Method&Backbone&Param.&FLOPs&FPS&AP&AP$_{50}$&AP$_{75}$&AP$_{S}$&AP$_{M}$&AP$_{L}$&AP$_{Ho}$&AP$_{Ec}$&AP$_{Sc}$&AP$_{St}$ \\
\hline
\emph{multi-stage:} &&&&&&&&&&&&&& \\
\multirow{3}{*}{Faster R-CNN \cite{Ren2015Faster}}
&R-18&28.14M&49.75G&5.7&50.1&72.6&57.8&42.9&51.9&48.7&49.1&60.1&31.6&59.7\\
&R-50&41.14M&63.26G&4.7&54.8&75.9&63.1&53.0&56.2&53.8&55.5&62.4&38.7&62.5\\
&R-101&60.13M&82.74G&3.7&53.8&75.4&61.6&39.0&55.2&52.8&54.3&62.0&38.5&60.4\\
\hline
\multirow{3}{*}{Cascade R-CNN \cite{Cai_2019}}
&R-18&55.93M&77.54G&3.4&52.7&73.4&60.3&\bf 49.0&54.7&50.9&51.4&62.3&34.9&62.3\\
&R-50&68.94M&91.06G&3.0&55.6&75.5&63.8&44.9&57.4&54.4&56.8&63.6&38.7&63.5\\
&R-101&87.93M&110.53G&2.6&56.0&76.1&63.6&51.2&57.5&54.7&56.2&63.9&41.3&62.6\\
\hline
\multirow{3}{*}{Grid R-CNN \cite{lu2019grid}}
&R-18&51.24M&163.15G&3.9&51.9&72.1&59.2&40.4&54.2&50.1&50.7&61.8&33.3&61.9\\
&R-50&64.24M&176.67G&3.4&55.9&75.8&64.3&40.9&57.5&54.8&56.7&62.9&39.5&64.4\\
&R-101&83.24M&196.14G&2.8&55.6&75.6&62.9&45.6&57.1&54.5&55.5&62.9&41.0&62.9\\
\hline
\multirow{3}{*}{RepPoints \cite{yang2019reppoints}}
&R-18&20.11M&\bf 35.60G&5.6&51.7&76.9&57.8&43.8&54.0&49.7&50.8&63.3&33.6&59.2\\
&R-50&36.60M&48.54G&4.8&56.0&80.2&63.1&40.8&58.5&53.7&56.7&65.7&39.3&62.3\\
&R-101&55.60M&68.02G&3.8&55.4&79.0&62.6&42.2&57.3&53.9&56.0&65.8&39.0&60.9\\
\hline
\hline
\emph{one-stage:} &&&&&&&&&&&&&& \\
\multirow{3}{*}{RetinaNet \cite{Lin2017Focal}}
&R-18&19.68M&39.68G&7.1&44.7&66.3&50.7&29.3&47.6&42.5&46.9&54.2&23.9&53.8\\
&R-50&36.17M&52.62G&5.9&49.3&70.3&55.4&36.5&51.9&47.6&54.4&56.6&27.8&58.3\\
&R-101&55.16M&72.10G&4.5&50.4&71.7&57.3&34.6&52.8&49.0&54.6&57.0&33.7&56.3\\
\hline
\multirow{3}{*}{FreeAnchor \cite{2019arXiv190902466Z}}
&R-18&19.68M&39.68G&6.8&49.0&71.9&55.3&38.6&51.7&46.7&47.2&62.8&28.6&57.6\\
&R-50&36.17M&52.62G&5.8&54.4&76.6&62.5&38.1&55.7&53.4&55.3&65.2&35.3&61.8\\
&R-101&55.16M&72.10G&4.4&54.6&76.9&62.9&36.5&56.5&52.9&54.0&65.1&38.4&60.7\\
\hline
\multirow{3}{*}{FoveaBox \cite{DBLP:journals/corr/abs-1904-03797}}
&R-18&21.20M&44.75G&6.7&51.6&74.9&57.4&40.0&53.6&49.8&51.0&61.9&34.6&59.1\\
&R-50&37.69M&57.69G&5.5&55.3&77.8&62.3&44.7&57.4&53.4&57.9&64.2&36.4&62.8\\
&R-101&56.68M&77.16G&4.2&54.7&77.3&62.3&37.7&57.1&52.4&55.3&63.6&38.9&60.8\\
\hline
\multirow{3}{*}{PAA \cite{2020arXiv200708103K}}
&R-18&\bf 18.94M&38.84G&3.0&52.6&75.3&58.8&41.3&55.1&50.2&49.9&64.6&35.6&60.5\\
&R-50&31.89M&51.55G&2.9&56.8&79.0&63.8&38.9&58.9&54.9&56.5&66.9&39.9&64.0\\
&R-101&50.89M&71.03G&2.4&56.5&78.5&63.7&40.9&58.7&54.5&55.8&66.5&42.0&61.6\\
\hline
\multirow{3}{*}{FSAF \cite{zhu2019feature}}
&R-18&19.53M&38.88G&\bf 7.4&49.6&74.3&55.1&43.4&51.8&47.5&45.5&63.5&30.3&58.9\\
&R-50&36.02M&51.82G&6.0&54.9&79.3&62.1&46.2&56.7&53.3&53.7&66.4&36.8&62.5\\
&R-101&55.01M&55.01G&4.5&54.6&78.7&61.9&46.0&57.1&52.2&53.0&66.3&38.2&61.1\\
\hline
\multirow{3}{*}{FCOS \cite{DBLP:journals/corr/abs-1904-01355}}
&R-18&\bf 18.94M&38.84G&6.5&48.4&72.8&53.7&30.7&50.9&46.3&46.5&61.5&29.1&56.6\\
&R-50&31.84M&50.34G&5.4&53.0&77.1&59.9&39.7&55.6&50.5&52.3&64.5&35.2&60.0\\
&R-101&50.78M&69.81G&4.2&53.2&77.3&60.1&43.4&55.4&51.2&51.7&64.1&38.5&58.5\\
\hline
\multirow{3}{*}{ATSS \cite{zhang2019bridging}}
&R-18&\bf 18.94M&38.84G&6.0&54.0&76.5&60.9&44.1&56.6&51.4&52.6&65.5&35.8&61.9\\
&R-50&31.89M&51.55G&5.2&58.2&\bf 80.1&66.5&43.9&60.6&55.9&\bf 58.6&67.6&41.8&64.6\\
&R-101&50.89M&71.03G&3.8&57.6&79.4&65.3&46.5&60.3&55.0&57.7&67.2&42.6&62.9\\
\hline
\multirow{3}{*}{GFL \cite{li2020generalized}}
&R-18&19.09M&39.63G&6.3&54.4&75.5&61.9&35.0&57.1&51.8&51.8&66.9&36.5&62.5\\
&R-50&32.04M&52.35G&5.5&\bf 58.6&79.3&\bf 66.7&46.5&\bf 61.6&55.6&\bf 58.6&\bf 69.1&41.3&\bf 65.3\\
&R-101&51.03M&71.82G&4.1&58.3&79.3&65.5&45.1&60.5&\bf 56.3&57.0&\bf 69.1&\bf 43.0&64.0\\
\hline
\end{tabular}
\end{center}
\end{table*}
Therefore, in terms of accuracy, the accuracy difference between the multi- and the one- stage methods in AP is not obvious, and the AP$_{S}$ of different methods is always the lowest among the three size AP. For class AP, AP$_{Sc}$ lags significantly behind the other three classes because it has the smallest number of instances. In terms of efficiency, large parameters and FLOPs result in low FPS on AGX, with a maximum FPS of 7.4, which is hardly deployable on underwater robot. Finally, we also found that ResNet101 was not significantly improved over ResNet50, which means that a very deep network may not be useful for detecting small creatures in underwater scenarios.
Consequently, the design of high accuracy and high efficiency detector is still the main direction in this field and there is still large space to improve the performance.
In order to achieve this goal, a shallow backbone with strong multi-scale feature fusion ability can be proposed to extract the discriminant features of small scale aquatic organisms; a specially designed training strategy may overcome the DUO's long-tail distribution, such as a more reasonable positive/negative label sampling mechanism or a class-balanced image allocation strategy within a training batch.
\section{Conclusion}
In this paper, we introduce a dataset (DUO) and a corresponding benchmark to fill in the gaps in the community. DUO contains a variety of underwater scenes and more reasonable annotations. Benchmark includes efficiency and accuracy indicators to conduct a comprehensive evaluation of the \emph{SOTA} decoders. The two contributions could serve as a reference for academic research and industrial applications, as well as promote community development.
\bibliographystyle{IEEEbib}
|
[
"URPC2017, URPC2018, URPC2019, URPC2020_ZJ and URPC2020_DL."
] | 2,616
|
multifieldqa_en
|
en
| null |
b321c147c0e0a8a35ee8738ad89326ecad1509bf591b4233
|
What is the research opportunity that is mentioned?
|
My Aspergers Child: COMMENTS & QUESTIONS [for Feb., 2017]
I emailed you a while back and you mentioned that I could email when I needed to. Thank you. I last wrote you in December that my son became involved in a dispute involving the local police. We have had 3 court dates. It keeps delaying due to not being able to come to an agreement. But the attorney, even though he was just vaguely familiar with Aspergers, has been very good with Craig. He has the compassion and excellence that is needed here. What started out very bad is turning into a good thing. It will probably take another 90 days or more.
But Craig is working hard. Too hard sometimes. He goes to therapy 3 times a week. Doing excellent. He's more focused and can calm down easier. He's got a lot on his plate but has support from his family. From his attorney. From therapy. And from his work.
He has been renting a room from a lady who has a son with ADHD. It is good for him. I'm a little worried though because since she smokes he wants to find his own place. With all the costs he has to balance it out financially. That is good. I can't help him more than I am which is good. He is stepping up and taking responsibility. He is listening much better.
He is going to have an evaluation today to get an accurate diagnosis. I understand that is a little difficult since he is an adult. Also the PTSD may cover it over. The attorney stated it would help to have the diagnosis.
Aware this is a long update, but thanks for reading. I am fighting much guilt still but I have a lot of peace now. My daughter and her 4 year old son also have Aspergers symptoms. So my life chapters may not close for a while. :-)
My name is Mac. I'm sure you're quite busy, so I'll get right to it I just wanted to pass on compliments on My Aspergers Child and your post, How to Implement the GFCF Diet: Tips for Parents of Autistic Children.
Me and my wife absolutely loved it!
I got a facebook message from him today begging to be able to come home saying he misses home and he will change. He says he will follow rules now. I stated to him the simple rules he has to follow which were - No weed in my house, or smoked in my house, coming home at curfew, going to school, no skipping, no drugs at school, and to drop the attitude of I am 17 I can do whatever I want.
I have made it very clear that if I see any drugs in my home I will be calling the police, as well as if I see signs of it being sold by him I will report him. (He has never had selling amounts in my house, ... I believe it's being kept at his "friends" which of course I have no proof of....I just know it is not here.
I know my battle is not over by a long shot, I am sure we will have more consequences and possibly another being kicked out, but I am going to think positive and hope that he learned some form of a valuable lesson here.
Thank you so much for the guidance, never in a million years did I ever think I'd be on this side, (the one needing the help, as I am the one who helps.)
I am going to go back to the start of the program like I said earlier and keep notes close by for reference.
Thanks for all you do, helping us all with ODD children/teens
I have a small company providing educational support services to a few families who have children with various disabilities in Ohio. One of the families has multiple adopted children of whom several have significant attachment disorders including RAD. As an experienced teacher and foster parent I have some experience in working with children who have extensive trauma backgrounds. However, I could use additional training. Also working with these children are two staff members with minimal background in attachment disorders who would also benefit from training primarily in behavior management. The primary caregiver to the children does a wonderful job managing their needs. In order to further develop team cohesion, I'm hoping to include her in any training as well.
Is it possible to schedule such a training session with you? If so, please let us know what will work for you including time, place, and cost. Thank you for your assistance.
I just listed to your tapes on dealing with an out of control, defiant teen. I'd like to ask your advice on a particular situation we have. Our 15 year old daughter is smoking pot almost every day at school. Because we had no way to control the situation, we told her, fine, go ahead and smoke weed. However, you will no longer receive the same support from us. You will not have your phone, lunch money to go off campus (she has an account at the school for the cafeteria she can use), and you will be grounded until you can pass a drug test. We will not be testing you except for when you tell us you are ready to be tested. She is now saying she's suicidal because she feels so isolated, yet she continues to smoke weed. In fact, she tried to sneak out last night but was foiled by our alarm system. For the particular drug test we have, I read it takes about 10 days of not smoking to pass the test. What would you do? Please advise.
I am having a problem with my 18 year old son, Danny, with high functioning autism. We finally had him diagnosed when he was 16 years old. I always knew something was going on with him but the doctors misdiagnosed him as bipolar. It's been 2 years now and he will not accept his diagnosis. He won't talk about it and when I try to bring it up he gets very angry. I've tried telling him that it's not a bad thing, that there's been many, many very successful people with Aspergers. He won't tell anyone and refuses to learn about managing life with it. He once shared with me that the other kids at school use it as an insult, like saying someone is so autistic when they do something they don't approve of. So he doesn't want anyone to know. He's turned down services that could help him. He has a girlfriend, going on 8 months. He won't tell her and they're having problems arguing a lot and I wonder if it would help for her to know.
I'm sad that he thinks it's a life sentence to something horrible instead of accepting, embracing it and learning about it more so he maybe can understand why he's struggling. I told him that he doesn't need to shout it out to the whole world but he won't even accept it himself.
I don't know how to help him with it and because he's almost 19 I have limited control now. It's made my life easier knowing what we're dealing with and I think his life would be easier is he accepted it.
Please help me help him.
I am a clinical psychologist in NYC who now has several (!!) children I see who have RAD. In 20 years of practice, I’d seen only one case. Now, I have at least three children with this. I have no training, per se, in working with this children though I know about setting structure, consistency, etc. I do a lot of work with parents about parenting. I work primarily within the school setting in a charter school whose mission is to educate children on the autism spectrum in a mainstream setting. We use Michelle Garcia Winner’s social thinking program with our ASD kids. I also work with gen ed kids in the school who are at-risk; the school is in the inner city from where the majority of our non-ASD kids live.
It would have been so much easier to mention to my adult son that I think (I know he does, but want to ease into the subject)
he has Asperger's when we were living together two years ago. He has since moved to Tennessee working in his field of interest
which is 3-D printing and software development. I am so happy for him that he has found his way into a job that he truly enjoys
even though he's socially isolated.
He's not diagnosed and does not know he has it. How I know is his classic symptoms being sensory issues (fabric feeling like sandpaper)
communication difficulties, meltdowns and much more. Throughout his childhood I just felt he was a bit different. Nothing major stood out and time
just passes, misdiagnosis of ADHD, low frustration, etc. We've talked about his ADHD numerous times (which I now know he doesn't have).
It's so much easier to communicate with him now that I know he has Asperger's. I keep it "slow and low" in talking, with long moments
of silence and then we connect. It's really too bad that Asperger's got a diagnostic code back in the 90's, yet all the so called doctors,
physiologist's, etc, didn't know how to diagnose it. Too bad.
There seems to be no one answer to "should I tell my adult son he has Asperger's" from a few specialists I asked. He is typical Asperger,
complicated, highly intelligent (high IQ), anxiety at times, socially isolated, hard to make friends. Not knowing how he will react is the hard part.
How will he be better off knowing he has it? Do I wait to tell him in person, or ease into it with him over Skype? He likes direct, honest, concrete communication.
Why is this so hard for me? Maybe because no one know's if he is going to be better off knowing or not. Do you know if people are better off
knowing? I try to get up the courage to just let him know, then I back down.
I have been searching the web looking for advice and came upon your site. I am trying to read blogs, websites, books, and articles to help guide me. I was so happy when you said that I could ask you a question. My husband and I are struggling with my 27 year old son who lives with us.
Kyle is the youngest of 4 sons. He is a college graduate but never could find the "right" job. He has always been quiet and never had a lot of friends. Two years ago, his girlfriend broke up with him. Kyle had an online gambling addiction and was using pot all the time. After the breakup, Kyle was very depressed and started using heroin and finally told my husband he was using. He is now seeing a psychiatrist who has him on suboxone and antidepressants. He is also seeing a psychologist weekly for counseling but it does not seem to be helping.
Last October,, Kyle lost his job, got drunk, and was agitated and came home , fighting with us, damaging our home and being verbally abusive. My other son , age 32, who also lives with us called the police and Kyle got arrested. He is currently in the family court system. He went through an anger management course and now is in substance abuse classes. Kyle continues to verbally abusive to me and blame me for everything. He says he "hates me "and calls me terrible names. At times, he pushes my husband and intimidates me. My husband and I are so upset. We just hired an attorney for him because since he has been going to these classes, he is getting more depressed and not getting better. Kyle continues to drink while taking his meds prescribed by the psychiatrist and then he has his "moods." My husband and I have met once with the psychiatrist just to give him background information when Kyle started with him.
At this point, we do not know what to do. We never thought at this stage of our life, we would be supporting and spending our retirement money on adult children. I do not know why Kyle hates me, I could not have been a better mom. My husband and I have no life and just do not know what it the right path we should take. Kyle does not want anything to do with us. He spends all his time in his room playing football online.We have tried tough love versus caring and love and understanding. Do you have any advice for me?
This whole ODD and ADHD is killing me as a parent. I work in the field of adult psych and addictions so I am well educated. I have been dealing with my teen being like this for almost 3 years and I totally lost my cool today with my 17-year-old son to the point I told him he is out of the house. He can never simple rules, comes and goes as he pleases sometimes doesn't come home, just recently back in school from several suspension for drug related... I am just so exhausted. He has made me hate life, hate being a parent and sometimes I just feel like not even being here. I bought your program in hopes to it would help, I am at week three and I feel things are getting worse... what am I doing wrong??
My partner hasn't been diagnosed yet but I know he has aspergers ..day to day is a struggle . I feel I'm going crazy with how he makes me feel.Feel let down constantly. He lies alot but I've been told they can't but I know he does.I just feel trapped and unloved.We have a 4yr old daughter together and my main worry with how he is that it will effect our daughter ; (his skills as a parent are so weak.He can't disapline at all.Feel so alone .he hides it well too.I just wondered if things will get worse? He's angry so quick in arguments.Scares me etc.I can't leave as he's the main bread winner and our daughter loves him to bits.Don't know why I'm writing this..Sorry if I'm going on and not making sense :(
I wanted to let you know about a research opportunity for children, teens, and young adults with autism. I am studying the effects of Brazilian Jiu Jitsu, and psychotherapy on helping people with autism develop subjective awareness of others.
I am writing you to see if this might help someone in your practice, or to see if you might know of someone with autism who may benefit from participating in this study. The requirements of the study will be:
1. A participant should be between 7-21 years of age and have a diagnosis of Autism Spectrum Disorder.
2. The participant should enroll in an approved Jiu Jitsu Academy and attend at least two sessions a week for a period of six months.
3. The participant should enroll in social skills groups, provided by my office or be in a steady psychotherapeutic relationship in your office, at least once a week, or minimally two to three times a month.
4. The participant will be given a SRS (Social Responsiveness Scale) test at the beginning of the study, at three months, and again at six months.
If you know of anyone who might benefit from this novel approach to helping to develop social awareness in autism, please do not hesitate to contact me for further information.
I have a 10 year old daughter who has outbursts with prolonged crying almost like tantrums that 2 year olds have when they cannot express themselves.
I had her in therapy from age 6-8 years old for the same thing but I feel that the sessions didn't really help much.
She has severe sensitivities to light, sound, vibration, frequencies which trigger irritability and crying.
We changed her diet and tried getting her involved with activities but she is anti-social and prefers reading than being social. She is terrified of change even in daily routine (even that will trigger prolonged crying).
It frustrates me because I don't know what else to do with her behavior.
I've tried acupuncture (she refused at the first session); she refuses massage too.
She is an honor-roll student at school and has very minimal issues at school but if she has had a bad day it does result in a tantrum or crying and defiance.
How can I get her tested for Asperger's Syndrome?
Last night our 24 year old son with Aspergers told his dad and I that he is pulling out of the 4 college classes that he recetnly enrolled in because he has not been attending class or turning in his assignments. He paid $2800 (his own money) for tuition and I reminded him of this when he told us but it did not seem to bother him.
This is the 3rd time he has started college courses and has not completed them. (He also took some concurrent college classes while he was in high school that he failed). This is a son who basically had a 4.0 grade point average through 10th grade and got a 34 on the ACT the first time he took it.
With the news that he was once again not sticking with college courses I did not sleep well. When I got up this mornning I began looking online for help in how to deal with his situation. I found your "Launching Adult Children With Aspergers" and purchased it. Most of what is included are things we have done or did with our son throughout his life. I was hoping for more help so I am emailing you now in hopes of more specific ideas.
We noticed some things with our son, Taylor, as a yound child but as we had not heard of Aspergers at that time we just did what we thought would help him. As a toddler and a child at pre-school he generally went off on his own to play. When I talked to his pre-school teacher about my concerns (that I was worried he would end up a hermit) she said she did not see him being a loner and that he seemed to interact fine with others in many situations. We worked with him on making eye contact when talking with others. We explained different emotions in people's faces and mannerisms to help him know how to interact with others. We discussed the fact that people would say things that did not mean what they souneded like - such as "I'm so hungry I could eat a horse". As we did these things he worked hard to better understand communication with others.
During his 4th grade year I had a teacher from the gifted program ask me if I had ever heard of Aspergers. I told her that I had not heard of it. She proceeded to read me some of the charateristics and so many of them described my son. So we had him tested by the school district during the summer between 4th and 5th grade and they did find that he had Aspergers but that he was high functioning. We then set him up with and EIP which stayed with him until his sophomore year. We pulled him from it at that time because we had moved and the new district was requiring him to take one class a day that was a study class. This reduced the number of required classes he could take and he was doing fine with his studies at the time.
It was during the 2nd half of his Junior year that we noticed some of his grades going down. Then during his Senior year is when he started skipping classes and not doing assignments. We had not realized it before then but we soon became aware that he was addicted to gaming. He would go to the library or somewhere else on campus and play games on the computer rather than go to class. It was also at this time that he began lying about his actions (so as not to get in trouble).
Based on his grades and his ACT score he received offers from colleges for full tuition scholarships. He chose the college where he had taken concurrent classes during his high school years. But he proceeded to skip class and not turn in assignments so he lost his scholarship and quit attending college. During this time he was only able to find employment through an employment agency where he was mostly sent to manuel labor type jobs (which is not something he enjoys but he did it anyway). It was during this time that at one place had gone to on numerous occasions he was told if he came late one more time they would tell the emplyment agency they did not want him to come there anymore. (This seemed to make an impression on him because he has continued to be reliable and responsbile at his places of employment).
At 19 1/2 he left to serve a 2 year full-time mission for our church. He completed his mission successfully. (I don't think it was without some struggle, stress and depression, but he was able to pick himself up and move on from those times).
When he came home he started working for the employment agency again but began looking for employment elsewhere. He got a job at a local Chick Fil-A where he has worked for 3 years. He started college again shortly after he came home but as before it was short lived. He did finish out the semester but failed most of the classes due to his skipping class and not turning in assignments. When he skipped class he would usually sleep in his car.
Taylor's life consists of working (where to the best of our knowledge) he does well, he is reliable and his employer likes him. When he comes home from work he either sleeps or plays video games or other games - such as kakuro. He spendes most of his time in the basement where his bedroom is and this is where he games. Taylor owns his own car, bought his own laptop and very rarely spends money. He pays us $200 /month to still live at home, unloads the dishwasher on a regular basis and does the weekly garbage. However, his room is a mess and he only cleans his bathroom when I tell him he needs to clean it.
Taylor used to read quite a bit and loved to learn. It has just been in his adult years that he has not read as much - I think because of his gaming addiction. Taylor goes to church on a regular basis but sleeps through the main meeting. In Sunday class room settings he stays awake - I think because he is able to particpate in discussions.
Taylor has only had 2 real friends since entering Junior High school. And as of now he only keeps in contact with one of them who still lives in Georgia. We have lived in Utah since the summer of 2007 and he has never had a friend to do things with since we have lived here. He has two younger siblings, a brother 22 and a sister 20. They love Taylor and spend time with him when they are home. They are both at college and doing well.
Throughout Taylor's school years he has seen a counsleor on a fairly regular basis. One summer during junior high he attended a weekly class where he interacted with other kids with Aspergers. We did see a lot of change in him from this group. After he returned from his mission he went to see a counselor for a short period - this counselor tried to help him with some social skills. His dad and I went with him the first 3 or 4 times but we found out that after we quit going with him he only went a few more times and then scheduled appointments but did not show a couple of the times. We only found this out when a bill came for a "no show" appointment.
I don't know if this is too much information but were are in dire need of help for him. In the information that we purchased from you you mentioned that you do coaching for Aspergers adults. I don't know if you can help us but I thought I would check with you just in case.
Alas I think I have found your information too late to save my marriage but I am hoping to save myself.
I am currently going through a very very painful separation after a 27 year relationship with my husband whom I am convinced has aspergers syndrome. It is a long and painful story and I am desperately trying to process it all alongside dealing with a very conflictual separation. My partner is angry non communicative and totally dismissive of me and our long shared history.
He walked out last year after I discovered he had been visiting massage parlours and developed a relationship with an illegal Chinese escourt whom he subsequently moved in with. He had been seeing this woman behind my back for over 18 months. The pain of all this indescribable and his dismissal of my pain and very existence beyond belief.
Leading up to this I had been battling anxiety and depression which my husband found very hard to cope with.
Over the years of our relationship I knew something was off but I just could not put my finger on it. I often felt a complete lack of validation and empathy. Communication was also difficult as my husband was defensive and unwilling to look at issues in our marriage.
Please Mark could you help me validate some of this pain and try and make dense of 27 years of my life without drowning in fear guilt and despair about my future.
Thank you for listening and your site.
I have had problems with drunkenness, being late for school, not handing in school work, buying pot from a dealer etc. I chose to focus on the drinking and did the grounding then (grounding happened 3 times). I also stopped sleep overs at friends 100%. I have stopped handing out money for no reason or even buying treats like chocolate.
I did lose it one evening (and didn't do the poker face) when I was trying to unplug the internet at midnight on a school night (she’s always late for school so I am trying to get her to sleep at a reasonable hour). I was physically stopped and pushed around so I slapped my daughter (it was not hard). This ended up with her saying she didn’t want to come home (the next day after school). By this stage, I also had enough and didn’t go get her. I thought I am not begging. You will run out of money soon. It was quite a relief to have some peace. Daughter’s Dad was in town (from another country) and called a family meeting with the counsellor. To cut a long story short, daughter and her counsellor put it on the table that daughter wants to go live somewhere else (with her friends family) because of the stress at home with me (we live on our own) (i.e. stricter rules and her bucking up against it).
I didn’t really want this but made a compromise that daughter would go there Tues morning – Friday afternoon as the friend is an A student whereas my daughter is failing. They do the same subjects. I made the decision at the end of the day based on what is good for me – some time away from the daughter. I also thought of your book when the child went to live with the grandparents – daughter will dig her own hole over at the friend’s house. They have a week day no going out policy which made me think it is OK. I went and discussed with them the problems experienced (drinking, pot, late nights, not handing in work)
I am also trying to follow the let go of school thing per your book. I find it really difficult to remain calm when I can see daughter on her phone and watching series (when I have her on the weekends) when I know there are projects due. I hired her a private tutor once a week for help with a subject. The tutor has just fired my daughter for not handing in work and being not committed. It’s not the first time private tutoring has not been appreciated. The school give me a report back on a Friday as to whether everything is handed in. The deal is – if the work is not handed in – no pocket money and no Friday night out). Her school is a "progressive" school and there are no repercussions for her being late or not handing in work. I would change schools if I could but there are only 8 months left of school (she turns 18 in August).
We have just completed the first week and beginning week two of your material. We are agreeing with your take and see our son and ourselves in most of what you are saying. Prior to finding your material and starting your program we had been having extreme out of control behaviors and had to call the police because he was breaking things in our house and pushed my husband. This happened three weeks ago. After that incident we took away privileges ie. PS4, phone (which had already been taken for a few days), and friends. So, last week while doing your program he already didn’t have privileges and has continued with poor behavior – name calling, throwing things, slamming doors. We are not sure when to give privileges back. He has been given the privilege of playing with friends on occasion. His 13th birthday is tomorrow. This past weekend, for his birthday my husband and he went boar hunting. Of course we debated about it but decided to go ahead since it was his bday. We are cooking some of the meet on the grill tomorrow night for his bday and inviting a couple of his friends over for a cookout. No more gifts other than cards and balloons. We are wondering if we should go ahead and give him his privileges back and not sure how to do it. Last Friday morning we attempted to talk giving him a date to return privileges and that conversation ended with him getting angry but he gathered from our conversation that he is getting his stuff back on his bday. We are starting week 2 assignments today but not sure how to handle what was already in place. Of course, we aren’t seeing the respect and responsibility we are looking for but realize it has been a long time. We were wanting him to pay for his phone and thought it might be a good time to introduce that idea. Allowing him to earn his phone. We expect that he will be angry with this idea and not sure how to implement.
My son and myself are interested in a inpatient Aspergers program. We line in Calif which is preferable. My son is very high functioning and was diagnosed dry late. He was eight years old. He has never been in or attended a full day of class. Partially due to depression,anxiety, and trouble with his ADHD also his aversion and being bullied and of course his Aspergers. He will not attend his freshmen year due to surgery on both Achilles' tendons from walking on his toes. With physical therapy he should be ready by his sophomore year! We all feel he needs in patient therapy to give him the tools on how to work with his issues in a structured setting and a place that will give him tools for the rest of his life.
In my utter desperation to find a way to get some help for my daughter's increasingly challenging behaviour I trawled the internet to see if I could find some strategies that would provide specific methods on dealing with teenagers with Asperger's syndrome. When I came across your website, I couldn't believe that every statement you made was exactly what I have been going through with my daughter. She has just turned 14 last week, and was diagnosed with Asperger's/ Autism Spectrum Disorder 15 months ago. I have already been seeing a child psychologist for the past five months, however the methods she has been advising have not been very effective.
Our main difficulty with our daughter is her overwhelming obsession to use her cell phone (and to a lesser extent her laptop) constantly. Without any restriction, she will be on it every minute of the day, and will be awake until the early hours every day. We have tried to incorporate her input around rules as to when she has to give in her phone, but she is unwilling to compromise on a time that she should give it to us, believing that she should have unlimited use. I believe she is unable to do any adequate study or homework, as she is constantly having to look at the phone. We have tried to put rules in place that she has to give in her phone and laptop on school nights at 22:15. If she is able to do this then she is given rewards, and if she doesn't then she knows that there will be consequences. The consequence has been restricted use the following day. However, this is usually where we fail, because taking her phone away from her results in tantrums, screaming, and even threatening to harm herself. This behaviour is relentless to the point where the whole family becomes deeply distressed, and inevitably results in her getting the phone back.
This obsession is affecting her schoolwork, and more severely her eyesight. She has become very shortsighted, and her eyesight continues to deteriorate as a result of holding the phone or laptop very close, and mostly in the dark without any lights on. My husband and I have a constant battle on our hands daily, in all areas of discipline with our daughter, but our main concern is that we have been unable to find a way to minimise this obsessive behaviour centred around her phone and laptop. Please can you provide some strategies that can help us specifically with this problem.
First of all, I thank you for developing this program and I am only at the first stage of assignment 1. I have loads of books I have bought, attended psychiatrists for my son and myself, family therapy, occupational therapy, begged and prayed for change but have been dealing with behavioural issues for so long I am definitely exhausted and resentful.
I am a mum to a 15 yr old boy with ASD, dyslexia, OCD and ODD. Sorry to focus on the labels but just to give you an idea of what I am dealing with. I also have a 13 yr old son whom finds his brother’s behaviours difficult, embarassing and challenging. My husband whom is not in great health ( he had a cerebral aneurysm clamped two years ago and has two further aneurysms that are inoperable so endures fatigue, headaches and stress). We have however a pet cat that is very social and a calming influence in the home! I was fortunate enough to have loving parents but I lost both my mum and dad in 2008 and 2015. My inlaws are elderly and quite directly say they are too old to help us so it feels we are alone in dealing with the issues we have.
I am desperate for change as the household is one of stress and anger and I feel all the control lies in my son Patrick’s hands. I am hopeful your programme can make life better for all of us but I wonder if it is too early to ask you two questions?
The first lies with what to do when Patrick goes into my other son Brendan’s room and will either turn on a light when he is sleeping, yell when he is on his phone or create some disturbance. He will not leave the room when asked to do so and the situation always escalates into yelling and Brendan attempting to physically remove him. This happens regularly and always ends badly with doors slamming, my husband being woken and myself in tears feeling the lack of control and also I admit I seem to think “Why me?” which rationally I know is of no help.
The second problem is leaving the house for school. Patrick refuses personal hygiene (either morning or night) and any request to even brush his teeth is fraught with swearing and abuse. If I can get him to shower, he will watch the water roll down the drain and turn up the water really high temp (mu husband has had to turn down the thermostat on the hot water service) without so much as getting wet. My husband leaves for work at 6am but I leave at 745 to work as a nurse in a busy outpatients department in the Alfred Hospital (Melbourne). My work is my sanity as it is a paid break from home but most days I am late which is causing considerable stress and anxiety not to mention my responsibility to do my job. Patrick simply refuses to leave the house and as much as I am tempted to just walk out and leave I know the house would be left unlocked and wonder if Patrick would even attend school. The time I need to leave is not negotiable but Patrick uses this to his advantage and seems to delight in stressing me out and subsequently speeding to work in a frazzled mess.
The interesting and frustrating element in all of this is that although he is socially isolated at school (he has no friends) and academically challenged his behaviour at school is not a problem. He is quiet and his teachers report he does his best and is compliant and well mannered. It is like a Jekyll and Hyde situation where another side of him at home is so angry and abusive yet at school this behaviour does not happen.
I’m Jackie, I now work primarily as a freelance tech writer, after starting my career in software development and moving on to teach IT to young adults at a variety of colleges and schools.
My freelance work is pretty varied and looks at many aspects of the computer industry as a whole, and I’ve just recently completed a piece which gives help and advice to anyone wanting to become a game designer, which you can read here: http://www.gamedesigning.org/become-a-game-designer/. It highlights the hard work and effort it takes to get into such a role, and also how you can further your career and continue to learn and improve as you go. I hope you’ll agree it shows that starting work in the industry takes dedication and skill and that becoming a game designer isn’t just a fly-by-night job!
If you’d be interested in sharing a quick mention of my work on your blog that would be really wonderful and I’d appreciate the chance to get my work out there to a wider audience. Alternatively, I’d be happy to write a short blurb or paragraph or two (or a longer piece - just let me know) highlighting the key points because I think some of your readers might get a lot of value from it.
My son just turned 15 and is a freshman in high school. Although this is his first year in a general ed environment, he is struggling with behaviors in school. He has meltdowns and does not express why he would have them until much later. Once we all know what caused it, the school will accommodate him and try to "change up" things so as not to cause his meltdown. Once that is resolved, another issue comes up and causes him to melt down. He is a high functioning and academically does well, when he wants to do the work. We battle at home over homework. He does not care how it is done, as long as he hands it in. He thinks failing a test is ok, at least he took the test. Homework is never on his mind when he gets home from school. If I never prompt him, he would never open is backpack. He can be aggressive but is never intentionally trying to hurt anyone. He may push over a chair in school, but it is not directed at anyone. We know how that in itself could hurt someone who gets hit by it though. He is defiant in that he only wants to do what interests him. He does not go out by himself (still immature), or abuse alcohol or drugs and never curses. He is a very funny kid and very talented. His main problems are task avoidance and seeking attention. He can be disrespectful to adults in that he is "cheeky" with them, trying to be funny or cute. And he has no "filters".
I’ve just finished reading your Living with an Aspergers Partner ebook. I found it so informative, thank you.
You offered some personal advise, and i wanted to run a situation past you and seek your input as to a strategy for what to do next.
I’ve been seeing a guy for about 7 months now who I believe has Aspergers. I came to this conclusion months ago and I don’t think he realizes, (or acknowledges) although he is aware he has some traits.
He’s highly intelligent and successful, a pattern seeker, has a tendency to focus on the project to hand to the total exclusion of all else for as long sit takes (work or home) socially awkward (has learned coping strategies), sensitive to loud noise, high anxiety with control strategies, black and white thinking etc. He’s currently not working and I’ve seen a slow withdrawal over the last 6 weeks, including the need to ‘escape’ and leave a situation at least once.
He also has a bipolar ex overseas who has primary custody one daughter where there has been ongoing patterns of drama which has recently increased.
Over the past couple of months (since stopping work and drama increase) I’ve gone from being ‘wonderful’ in his eyes to him now being sorry and not having the ‘urge’ to spend close/intimate time with me and offering friendship. Since he shared that with me in a message he’s stonewalled and has retreated to the safety of minimal messages and talks about not knowing what best to say and not being able to find the right words somehow.
He’s a good kind man who I feel is struggling. I’m concerned about his anxiety and possibly the risk of depression. I’m fairly resilient and whilst i’m disappointed he doesn’t want to pursue a relationship with me, i’m concerned for him and his well being. One of his very few close friends is also just leaving the country to live overseas.
The strategy I’ve used so far is simply to back off and give him space. I’ve asked to take him up on an original offer he made to talk but haven’t pushed it. I also haven’t been aggressive or accusatory in the few messages i’ve sent.
Any advise you could give would be greatly appreciated,
Carli who is 10 years old and has had behavioral issues her whole life. The other night she came home very upset after having a conflict with a friend. She was at her friend's house and her and her friend wanted to get on the computer and the older sister was using it. Carli made up a story that someone was at the door to get the older sister off the computer. Her friend didn't understand that she was making up a story to get the sister off the computer. She got excited that someone was at the door and ran downstairs to answer the door. In the process of getting the door, she fell and yelled at Carli. Carli became extremely upset. She was able to control her feelings at her friend's house, but when she came home, she proceeded to cry extremely loudly for over an hour. Her dad spent most of that time with her, talking to her and trying to calm her down. After an hour, I asked him if he could please tell her to be more quiet because the other members of the household were trying to go to sleep.
My question is....how do I as the girlfriend, handle this? He did not like that I asked her to be quiet. We have a rule that if she is having bad behavior, and can't calm down in 5 minutes, he takes her out of the house because her yelling doesn't stop for a long time and is very upsetting to everyone in the household. I would like to ask him to do this with this kind of situation as well. Is this a reasonable request? His thought was that she shouldn't be made to calm down, because everyone handles being upset in a different way. But, she was literally sobbing and wailing very loudly.
My other question is should she have been told that if she wouldn't have lied, this wouldn't have happened? She has a history of lying and of not accepting responsibility for her actions. My boyfriend became very upset with me when I brought this up. He was being very sympathetic and understanding to her. I feel like he was giving her negative attention, and being an over indulgent parent by not putting his foot gown and saying, "you can't carry on like this, even though you are upset". Please let me know how we can handle these situations better.
I am contacting you for help with adult AS. I am taking initiative to pre screen potential therapists to help my current boyfriend get therapy and help with Adult AS.
He has seen many therapists, but it seems like they aren’t really helping him with his problems. They don’t seem to understand how his (undiagnosed) AS would affect therapy approaches. For example, he may not share enough in therapy session and I’m assuming an AS therapist would recognize that is part of the AS and employ strategies to get information from him that helps with treatment. Sometime he tunes out when he is processing something heavy or that he doesn’t want to hear necessarily, or he gets distracted and I’m hoping an As therapist would recognize that and get that he may need repeated something for example, if this is happening.
He is currently suffering from depression that appears clinical in nature as well as reoccurring negative thoughts about something specific that has been worrying him about our relationship. Today he told me these reoccurring thoughts happen during all waking hours unless he watches TV, he never gets a break from them and they make him feel like he is going crazy. As his girlfriend, I am extremely concerned that he cannot get relief from these thoughts and that the therapists he is seeing are unable to help him with his problems. Therefore, I am taking initiative to try and help him find better therapy options, because I want to see him someone who can better help him get to the bottom of things and help him with the challenges he is facing. He really needs an advocate that will help him go deep to figure things out and not just assume therapies are working well, without seeing changes or getting supporting feedback from him in that regard.
Here are some questions I am trying to ask in advance to find the right people to help us with this. As you may know, insurance for these therapies are not often available. We don’t have a lot of money to go from therapist to therapist to find the right person and are hoping prescreening will help.
I recently downloaded your e-book and listened to your talks and your information is by far the most helpful I have been able to find to date. It's very accurately describes my situation as an NT wife married to a very probable AS husband. I think you for taking the time to write this and sharing your insights as well as the experiences of many of your clients. It has really helped me understand the last 32 years of our marriage and get a grasp on how to move forward.
One area that is of primary concern to me, that I did not see addressed, is stimming. I believe that is the behavior my husband is showing through constant vocal singing, repetition of words, shouting out, as well as slapping himself in the chest and general nervous activity. It is very loud and disruptive to our household and it is often a relief when he is not at home. I think there may be a level of Tourette's syndrome as well.
I did some searches on the Internet and could not find anything that really describes his behavior. Most of what I found was flapping or children's behavior. I understand that it is a release of nervous tension but I am really trying to find some strategies to help him stop this behavior as it is extremely frustrating and builds my resentment in dealing with it daily. A lot of it is embarrassing as well and sounds childish to me.
He usually does this when close family members are around and will reign himself in if he is around other people besides us. When we are home it is constant. He also has a lot of anger, mostly at himself, and blows up at unimportant things, it is as if he has a ton of negative energy inside him that need to get out and stimming is one outlet.
I will try to build my acceptance of it, but I also would just like him to stop especially the loudest and most annoying portions. Would you have any resources you could point me to?
|
[
"A study on the effects of Brazilian Jiu Jitsu and psychotherapy on people with autism."
] | 8,511
|
multifieldqa_en
|
en
| null |
56514cd4cf8dac4f9081927e3ffaaca1ff1231198b7b16e9
|
全国美国文学研究会的第十八届年会在哪所大学举办的?
|
全国美国文学研究会
受秘书处委托,由我向美文会会员单位的各位代表简单汇报一下全国美国文学研究会自上届(第十七届)年会召开以来所做的工作。美文会秘书处刚刚完成了教育部社团办“关于在教育部主管社会组织中开展调研工作的通知”中要求提交的“全国美国文学研究会调研报告”(2016年11月),主要内容4项:我想就把我们提交的“调研报告”中1、2两部分中的部分内容,作为我向大会汇报的“全国美国文学研究会2014-2016年工作总结”的内容。
1、研究会现状和基本情况
美文会现有会员单位127个(不招收个人会员),包括国内主要985与211高校,以及中国社科院等科研单位和知名出版社。会长单位是南京大学,副会长单位是南京大学,中国社会科学院,北京外国语大学,北京大学,复旦大学,山东大学,秘书处设在南京大学外国语学院,秘书长、副秘书长是南京大学赵文书、何宁。美文会正式成立于1979年7月,是我国改革开放后成立最早的高校外国文学研究机构。1992年8月18日在民政部正式注册登记,获颁《中华人民共和国社会团体登记证》。美文会挂靠南京大学,财务由南京大学财务处负责,接受南京大学审计处审计,按民政部要求,每年参加年检,年检结果均为“通过”。
美文会秘书处聘有专职秘书,工作人员7人,包括会长,副会长,秘书长,副秘书长,常务理事等。美文会设有党小组,隶属外国语学院英语系党支部,由会长任党小组长,成员包括副会长、常务理事、副秘书长、以及参加秘书处工作的青年教师与博士生。美文会发行《全国美国文学研究会通讯》(CASAL Newsletter),现已刊出33期。美文会每年轮流召开年会和专题研讨会,迄今已经举办17届年会和11届专题研讨会。
2、近两年主要工作和取得的成效
1)上届年会。美文会第十七届年会于2014年10月24日至26日在中国人民大学苏州校区举行,由中国人民大学外国语学院承办。来自全国28个省市自治区175所高等院校、研究所、出版社的348名正式代表参加了该次年会。年会的主题是“全球化语境中的美国文学研究:理论与实践”,收到论文全文164篇,摘要273篇。会议期间,全国美国文学研究会第七届理事会召开第三次会议。会议讨论通过了增补美文会副会长、常务理事、理事、会员单位事宜。会议再次明确,两期不缴纳会费的单位视为自动退出。理事和常务理事连续两次无故不参加理事会会议自动取消理事和常务理事。
2、上届专题研讨会。美文会第十一届专题研讨会于2015年10月23至25日在徐州江苏师范大学举行,由江苏师大外国语学院承办。专题研讨会的主题是“美国文学中的城市”。来自全国21个省市自治区125所高等院校、研究所、出版社的88名正式代表参加了本次研讨会。收到论文全文54篇,论文摘要73篇。会议期间,美文会召开第七届理事会第三次会议,讨论通过了美文会秘书处的提议,增补何宁为理事兼任副秘书长,提请本届年会的理事会确认。
3、业务活动。1)继续举办“全国美国文学研究会学术成果奖”评选。美文会设立此奖项,是为了促进我国美国文学研究的繁荣与发展,每5年评选一次,迄今已经评选3次。第三届成果奖评选出“优秀专著奖”14项,在2015年10月公示,“优秀论文奖”9项,“优秀教材奖”3项,“优秀译作奖”1项。该活动不收取任何费用。2)第十七届美国戏剧研究年会。由南京师范大学外国语学院承办,2015年7月21-22日在南京举办,主题是“20-21世纪之交美国戏剧研究”。
4、年检情况。美文会接受业务主管单位教育部的业务指导和社团管理机关民政部社团的监督管理,执行《民间非营利组织会计制度》,接受南京大学财务处、审计处的管理和督查,接受“江苏兴瑞会计师事务所有限公司”财务审计,结果报教育部、民政部。2015年3月进行年检,编制2015年度美文会工作报告书。8月民政部“中国社会组织网”公布年检结果:“合格”。
2016年11月25日晚,全国美国文学研究会召开理事会,讨论了如下事项。
会议申办:
1. 19届年会(2018,浙江大学)和第12届专题研讨会(2017,河海大学),主题尚没有最终确定。
2. 哈尔滨工业大学申办第20届年会(2020)
新申请理事单位:
1. 中国矿业大学,推荐王丽明副教授担任理事
2. 哈尔滨工业大学,推荐刘克东院长任理事
3. 南京大学,推荐何宁(美文会副秘书长)任理事
会员单位变更:
1. 解放军国际关系学院按照相关要求退出全国美国文学研究会,因此不再常务理事单位,方成教授退出常务理事
2. 对外经贸大学英语学院英美文学研究所长金冰接替孙建秋担任理事
3. 中央民族大学外国语学院朱小琳接替郭英剑担任理事
4. 厦门理工大学张跃军担任理事(原为中南大学常务理事)
5. 上海外语教育出版社孙静接替汪义群担任理事
6. 黑龙江大学推荐徐文培为常务理事
美国族裔文学研究:空间拓展与界域重绘
全国美国文学研究会第十八届年会(2016)纪要
2016年11月25日至28日,全国美国文学研究会第十八届年会在厦门大学举行。本届年会由厦门大学外文学院承办,来自全国各地180余所高等院校、研究所、出版社的296位正式代表参加了会议。大会组委会共收到论文全文127篇、摘要371篇,与会代表围绕大会主题“美国族裔文学研究:空间拓展与界域重绘”(Ethnic Studies in US: Extending Interspace and Redefining Typology)展开了广泛而深入的研讨。
11月25日晚,全国美国文学研究会召开常务理事和理事会,共有23位常务理事和理事出席,理事会主要讨论通过了以下议题:
1. 确认2017年的专题研讨会由河海大学承办,河海大学外国语学院院长蔡斌教授在闭幕式作简单介绍。
2. 确认2018年第十九届年会由浙江大学承办。
3. 因政策变化,解放军国际关系学院退出美文会,方成教授不再担任常务理事。
4. 增补黑龙江大学徐文培教授为常务理事。
5. 增补哈尔滨工业大学(刘克东教授)、北京航空航天大学(田俊武教授)、中国矿业大学(王丽明副教授)、北京联合大学(黄宗英教授)为理事单位,山东大学李保杰教授、对外经济贸易大学金冰教授(接替孙建秋教授)、中央民族大学朱小琳教授(接替郭英剑教授)、上海外语教育出版社孙静(接替汪义群)为理事。
6. 重新明确会员单位申请原则。美文会实行单位会议制,欢迎尚未加入协会的单位申请加入。申请方法和申请表格可以从美文会官网上下载。填写后加盖单位公章邮寄到协会秘书处。美文会秘书处收到入会申请并收到会员费之后即通报理事会并确认会员单位资格。
7. 重新明确理事单位申请条件。第一,理事单位必须是正常缴纳会费的会员单位;第二,原则上需有英语语言文学硕士点;第三,符合以上条件单位可以申请成为美文会理事单位并推荐合适人选担任理事。
8. 理事会决定,在美文会的年会和专题研讨会上评选会议优秀论文并颁发证书。其中,优秀论文仅在向会议提交的论文全文(未发表)中评选;作者所在单位须为美文会员单位,在向会议提交论文时,注明论文未经发表,并注明申请参加会议优秀论文评选;美文会常务理事以上(含)不参加申请。
9. 关于本次年会优秀论文评选:已向会议提交未发表论文全文的会员单位参会代表,在12月15日前,向本会秘书处提交修改后的论文申请评选,本会将在寒假组织评选,在2017年3月公布评选结果并颁发证书。
11月26日上午,本届年会开幕式在厦门大学科艺报告厅举行。厦门大学校长助理张建霖教授,外文学院张龙海院长,全国美国文学研究会会长朱刚教授、副会长盛宁教授、郭继德教授、杨仁敬教授、金莉教授、王守仁教授、张冲教授、申富英教授,秘书长赵文书教授及其他与会代表出席了开幕式。
开幕式由外文学院副院长李美华教授主持。张建霖校长助理首先代表厦门大学对来自全国各地的与会者表示热烈欢迎,并对全国美国文学研究会第十八届年会的顺利召开表示衷心祝贺。外文学院张龙海院长代表承办方致欢迎辞,向与会者介绍了厦大外文学院的人才培养、学术研究等情况,以及年会的准备情况。全国美国文学研究会朱刚会长代表与会人员感谢厦门大学对本届年会的大力支持。朱会长简要回顾了美文会的历史和现状,并向与会代表汇报了研究会自第十七届年会以来的主要工作。最后,朱刚会长感谢全体参会代表及承办方对美文会工作的大力支持和对共同推动美国文学研究所做出的贡献,并对今后的工作提出了殷切希望。
本届年会共分为大会发言、小组讨论、专题研讨(panel discussion)及研究生学术论坛四个部分。11月26日上午的大会发言分别由美文会副会长金莉教授和美文会前副会长、南京大学王守仁教授主持,共有5位代表发言。
中国社科院外国文学研究所盛宁教授的发言题目是《对政治正确的文化批评的再审视》。盛宁教授指出,美国总统大选造成的国内民族分裂愈演愈烈,这一新国情使我国的族裔文学研究更具价值和意义。作为学者我们必须凸显自己的立场和价值判断,对少数族裔文学的审美价值要有清晰的认识。盛教授以第一代华裔作家代表汤婷婷和第二代华裔作家代表哈金为例,评析了两代作家迥异的“政治正确”书写策略。他认为,借助“政治正确”发音的族裔文学的审美价值会很快消失,我们应深刻反思非裔作家的代表――托尼・莫里森――的创作遗产。莫里森不只着眼于描写黑人苦难,更深入探索人性,将黑人作为“人性”的缩影进行刻画,这是她能够进入美国文学传统、流芳传世的重要原因。
复旦大学外文学院张冲教授以《超越族裔:美国族裔文学研究的几点思考》为题,探讨我国当前族裔文学研究面临的困境及出路。张冲教授指出,国内族裔文学研究仍然面临研究角度单一与模仿、研究方法过于“理论导向”、文本“碎片化”释读等问题。他建议可从“族裔文学发展流变史”、“比较族裔文学史”以及“本土裔与中国文学文化比较”等维度,重新思考我国方兴未艾的族裔文学研究,族裔文学研究应努力超越族裔而回归文学,既要思考族裔文学的“族裔性”也需关注其“文学性”。
在《再议作家的族裔身份问题:本质主义与自由选择》的发言中,上海外国语大学虞建华教授以斯图亚特・霍尔对“身份”的定义为出发点,对现有族裔身份的归置基准进行拷问。虞教授强调,在讨论族裔作家文化身份时,我们需聚焦常被忽视的身份的表演性和叙事性,应以社会建构理论为指导思路,走出本质主义,作家的族裔身份在全球化大势下的多元社会,应被看作一个动态、临时、杂糅的建构过程。
南京大学英语系朱雪峰副教授的发言《重组芝加哥:拉图尔ANT理论视阈下的<克莱伯恩公园>》以社会学家布鲁诺・拉图尔的“行动者网络理论”为视角,从“流动的城市”、“行动者网络”、“蚂蚁视角与新现实主义”三个层面审视《克莱伯恩公园》中的芝加哥城市再现。朱教授认为,此剧在美国本土政治正确风潮中的接受悖论正在于它如实近距离描述了芝加哥城市地理在互动中流变的复杂性,其政治相关性在于它没有给出一个关于芝加哥社会的明晰解释或批评,而是通过不断追踪新问题联合来重组社会,以貌似传统的新现实主义风格体现了戏剧价值。
厦门大学外文学院张龙海教授以《美国少数族裔文学研究在中国》为题,向大家勾勒了我国美国族裔文学研究的历史图景。张教授通过大量的文献研究和详细的数据,从研究的规模、研究队伍的状况、期刊报纸的刊登情况以及研究中出现的不平衡等方面详细探析美国少数族裔文学研究在中国的涌现和繁荣发展。
11月26日下午,年会设立23个分会场进行小组讨论。代表们围绕“华裔文学研究新视野”、“亚裔文学研究新视野”、“非裔文学研究新视野”、 “犹太裔文学研究新视野”、“拉美裔文学研究新视野”、“印第安裔文学研究新视野”、“族裔文学与性别研究”、“族裔文学批评理论新动向”、“少数族裔与多元文化”、“族裔文学研究中的中国视角”、“美国文学理论研究与教学”、“美国现代派文学研究”、“早期美国文学研究”等议题,对美国族裔文学展开了多层次全方位的探讨。
第一组(专题讨论:族裔成长小说研究)由方红、芮渝萍主持,发言人有方红(南京大学)“消声、言说与成长:《褐姑娘、褐砖房》研究”;侯金萍(华南农业大学)“华裔美国文学对成长小说的改写与创新”;芮渝萍(宁波大学)“美国华裔成长小说的特点”;谭岸青(暨南大学)“解读任碧莲《世界与小镇》的成长书写”;邹惠玲(江苏师范大学)“《飞逸》:在自省与融合之中成长”。
第二组(华裔文学研究新视野之一)由刘永杰、戴鸿斌主持,发言人有黄明(商丘师范学院)“严歌苓小说《扶桑》对华人形象的颠覆”;霍盛亚(北京外国语大学)“华裔美国科幻作家刘宇昆小说的“复族裔化”倾向”;刘向辉(许昌学院)“谭恩美小说《喜福会》中的文学地图与民族记忆”;刘永杰(郑州大学)“‘秘密’的真相:《蝴蝶君》主人公断袖之谊探析”;史博(华北科技学院)“解读《折纸》中爱的主题”;孙坚(陕西师范大学)“新历史主义关照下的《中国佬》”;颜碧洪(福建师范大学福清分校)“论汤亭亭《中国佬》的后现代主义书写”。
第三组(华裔文学研究新视野之二)由郭栖庆、金衡山主持,发言人有黄一畅(南京航空航天大学)“虚构的权威―《谁是爱尔兰人?》中的叙事伦理之辨”;季峥(重庆工商大学)“华裔美国作家入典原因探究”;金衡山(华东师范大学)“The Puzzling and Enlightening Racial Identity in Who’ s Irish?”;苏娉(中山大学)“论李翊云的非母语写作及其意义”;王芳(中央民族大学)“《无声告白》中的华裔精神生存困境探析”;王增红(厦门大学)“种族冒充、冒充叙事与混血族身份政治―威妮弗蕾德•伊顿新解”;姚红艳(武汉大学)“族群记忆、族群认同与身份建构―《接骨师之女》中的仪式书写”;周凌敏(南方医科大学)“以物为导向的本体论下的后人文主义―以《咸鱼女孩》为例”。
第四组(族裔文学与性别研究之一)由王玉括、田俊武主持,发言人有方小莉(四川大学)“20世纪黑人女性小说叙述策略研究”;李蕊(南京大学)“论《他们眼望上苍》中珍妮的‘生成女性’特质”;毛艳华(浙江大学)“性别‘引用’视域下《秀拉》中女性主体的初现与重构”;隋红升(浙江大学)“汉斯伯里《太阳下的葡萄干》对美国男性气质的反思”;田俊武(北京航空航天大学)“回归之路―托尼•莫里森作品中的旅行叙事”;王玉括(南京邮电大学)“黑人女性主义文学批评述评”;杨艳春(哈尔滨石油学院)“生态女性主义视域下艾丽丝•沃克作品中女性族裔身份的自我认同”;朱海峰(东北师范大学)“父权、女权、后女权―论《钢琴课》中黑人的种族出路”。
第五组(族裔文学与性别研究之二)由张跃军主持,发言人有董秋芳(广东农工商职业技术学院)“美国华裔女性主体身份流变―以华裔女作家英语创作为例”;刘兮颖(华中师范大学)“《卢布林的魔术师》中雅夏的身份危机与伦理选择”;杨静(广东外语外贸大学)“全球化时代的跨国婚姻:《追寻亚裔女性》”;姚丽梅(佳木斯大学)“论邝丽莎在《雪花秘扇》中的女性主义身份伦理观”;张跃军(厦门理工学院)“‘温和的女性主义’:华裔美国诗人陈美玲诗歌解读”;朱骅(上海海洋大学)“跨国主义的美国族裔文学建构”。
第六组(犹太裔文学研究新视野)由刘文松主持,发言人有高莉敏(上海立信会计金融学院)“《末世之城》:大屠杀的历史记忆”;胡选恩(陕西师范大学)“E.L.多克托罗《大进军》中的历史阐释模式”;孔伟(北京外国语大学)“俄国犹太人的‘应许之地’―新移民叙事中的‘发声’策略研究”;刘文松(厦门大学)“美国犹太知识分子小说探秘”;孙璐(上海外国语大学)“菲利普•罗斯《美国牧歌》中的美国民族神话及其当代启示”;张国庆(中国人民大学)“《人性的污秽》的后人道主义解读”;赵永健(浙江工商大学)“国外美国犹太戏剧研究评述”。
第七组(美国后现代派文学研究之一)由陈世丹、刘雪岚主持,发言人有杨仁敬(厦门大学)“略论《时间》与《达洛威夫人》的互文性”;陈世丹(中国人民大学)“后现代文学伦理学批评要义”;曾艳钰(湖南科技大学)“‘流动的爱国主义盛宴’―评美国后现代战争小说”;谷红丽(华南师范大学)“后现代主义历史叙事”;刘雪岚(社会科学院外国文学研究所)“从‘加州三部曲’看托马斯•品钦的后现代城市书写”;方凡(浙江大学)“论威廉•加斯笔下的图像与文字”;王祖友(泰州学院)“后人道主义与人道主义辨析”;陈奔(厦门大学)“美国研究背景下的后现代主义文学研究”;范小玫(厦门大学外)“德里罗小说中的全球化”。
第八组(美国后现代派文学研究之二)由吴泽庆、陈俊松主持,发言人有陈俊松(华东师范大学)“《地下世界》:冷战阴云的文化记忆与后现代恐怖叙事”;许希夷(南京大学)“福尔‘后9/11’小说《特别响,非常近》中的历史叙事”;史菊鸿(兰州大学)“一个城市,两幅画面――库切和詹姆斯对伦敦的不同文学再现”;吴泽庆(中央民族大学)“‘恶魔的诅咒’―欧茨的《被诅咒的》中历史书写”;姚本标(广西师范学院)“《白噪音》的‘风险社会’表征”;栾天宇(南京大学)“《赛姆勒先生的行星》中的记忆伦理与美国20世纪60年代”。
第九组(美国后现代派文学研究之三)由甘文平、杨纪平主持,发言人有甘文平(武汉理工大学)“米歇尔•福柯、共同体、美国越战文学”;崔永光(大连海洋大学)“世界文学史视域中的纳博科夫形象及其创作密码”;范湘萍(上海政法学院)“论‘9.11文学’结构主义叙事中的空间与政治”;林莉(东北师范大学)“论小说《恶棍来访》的空间叙事策略”;刘丹(大连外国语大学)“融合与分裂:《地下世界》中的种族冲突与文化政治”;王程辉(湖南科技大学)“纳博科夫《国王、王后和杰克》与福楼拜《包法利夫人》的互文性”;杨纪平、胡燕(北京邮电大学)“《X战警:第一战》中的族裔观”;张芳芳(上海电力学院)“论纳博科夫小说《普宁》中‘坐错车’的隐喻与流亡主题”;张蓝予(中央民族大学)“文明对话与身份认同:评《恐怖分子》的身份观念”。
第十组(拉美裔文学研究新视野)由李保杰、李毅峰主持,发言人有李保杰(山东大学)“当历史的重负成为过去―《古巴之王》中的‘反流亡’书写”;李毅峰(天津商业大学)“桑德拉•西斯内罗斯对女性原型形象的重新阐释”;乔玲玲(山西大同大学)“芒果街上的奇卡纳游荡者”;涂沙丽(中南民族大学)“论《石化鹿》中的奇卡娜形象”;王绵绵(浙江传媒学院)“加勒比裔美国移民女作家的空间意识及空间策略”。
第十一组(美国文学理论研究与教学)由郭建辉、刘春芳主持,发言人有陈�Q(中央民族大学)“论当代反本质主义文学理论的发生因缘与中国进程”;郭建辉(四川外国语大学期刊社)“英美文学教学与审美教育”;焦敏(广东外语外贸大学)“人文主义与戏剧教学”;刘春芳(山东工商学院)“美国浪漫主义文学中的平民思想”;马特(中央财经大学)“文学批评的空间转向:空间批评的新动向”;许玉军(集美大学)“东方启蒙:西方的‘东方主义’话语”。
第十二组(族裔文学批评理论新动向)由胡铁生、郭英剑主持,发言人有胡铁生(吉林大学)“美国少数族裔文学的演进”;郭英剑(中国人民大学)“2015美国文学:种族,还是种族问题”;洪琪(湖北第二师范学院)“美国华裔戏剧的创伤叙事”;任虎军(四川外国语大学)“性别视阈下新世纪中国的美国族裔小说研究”;王斐(集美大学)“追寻都会中的空间正义:美国非裔城市叙事嬗变初探”。
第十三组(美国现代派文学研究之一)由黄宗英、王跃洪主持,发言人有陈秋红(青岛大学)“亨利•詹姆斯后期小说的进化叙述”;陈喜华(湘潭大学)“菲茨杰拉德的服饰书写与爵士时代美国文化”;黄宗英(北京联合大学)“‘其城/其人,一种身份’:读威廉斯的《帕特森》”;蒋贤萍(西北师范大学)“表演的自我――再读《进入黑夜的漫长旅程》”;李晶(中南财经政法大学)“生存还是生活?:凯瑟《一个迷途的女人》的伦理选择”;陶久胜(南昌大学)“无意识的种族偏见――《上帝的儿女都有翅膀》的心理原型解读”;朱晓萍(贵州大学)“追逐无的欲望――《嘉莉妹妹》的拉康式解读”。
第十四组(美国现代派文学研究之二)由李建波、朴玉主持,发言人有朴玉(吉林大学)“科伦•麦凯恩在《光明这一面》中的城市创伤叙事”;王晓丹(哈尔滨师范大学)“阶层流动的幻灭:《纹身女孩》中的社会身份”;王跃洪、郝天昕(上海理工大学)“福柯凝视理论视角下的亨利•詹姆斯《德莫福夫人》研究”;薛丽(北京师范大学)“《布拉迪默传奇》中矛盾的女性意识形态”;姚学丽(安徽大学)“映射美国南方的‘隐约轮廓’――析《干旱的九月》碎片化叙事”;张金良(天津外国语大学)“哈贝马斯有效沟通视域下《奥利安娜》中的交流困境分析”;张小平(扬州大学)“旅行•幻梦•混沌――论麦卡锡小说《骏马》中的‘奇异吸引子’”。
第十五组(早期美国文学研究)由张和龙、金冰主持,发言人有金冰(对外经贸大学)“美国自然主义文学的进化叙事与伦理想像”;李晋(中南财经政法大学)“19世纪美国文学市场研究综述”;李敏(山东工商学院)“《红字》通奸案的法、罚与霍桑的‘疼痛’书写”;李方木(北京外国语大学)“爱的伪装:《献给爱米丽的玫瑰》中的罗曼司及其多义性”;戚涛(安徽大学)“多数暴政下的碎片――梅尔维尔的价值困惑与身份建构”;张和龙(上海外国语大学)“中国杰克•伦敦研究中的话语模式及其历史嬗变”。
第十六组(非裔文学研究新视野之一)由林元富主持,发言人有陈红(广东外语外贸大学)“‘所有的故事都是真的’―评怀德曼的编史元小说《法农》”;甘婷(集美大学)“第三空间理论视阈下《中间通道》的空间建构”;林元富(福建师范大学)“当代非裔美国涉奴题材小说的历史传承”;刘锦丽(湖北科技学院)“种族歧视下的身份困惑―论切斯纳特小说中的混血儿”;龙跃(湖南师范大学)“兰斯顿•休斯诗歌中的‘黑人性’”;吕春媚(大连外国语大学)“黑白的空间对峙――解读《莱尼大妈的黑臀舞》中的社会空间”;王予霞(集美大学)“美国黑人左翼文学消长的历史启示”;修树新(东北师范大学外国语学院)“论特瑞•麦克米兰小说中爱的主题”;张健然(四川外国语大学)“《他们眼望上苍》中原始性与现代性的背离与融合”。
第十七组(非裔文学研究新视野之二)由徐文培、杜志卿主持,发言人有杜志卿(华侨大学外国语学院)“从霍妮的精神分析理论看阿契贝笔下的伊祖鲁”;蒯冲(荆楚理工学院)“非裔美国人的身份缺失与身份认同――以《阳光下的葡萄干》为例”;李美芹(浙江工商大学)“论埃里森‘文学爵士乐’美学中表达的种族政治思想”;李云瑾(华北科技学院)“论托妮•莫里森《宣叙》的含混性”;马粉英(西北师范大学)“《最蓝的眼睛》中克劳迪娅拆解行为的后殖民叙事”;唐莹(大连外国语大学)“从‘挪亚的诅咒’到非洲主义―对罗宾逊种族书写的反思”;徐文培(黑龙江大学)“《所罗门之歌》与奴隶叙事文学”;张宏薇(东北师范大学)“莫里森早晚期两部小说中‘儿童创伤’主题的对比分析”;朱小琳(中央民族大学)“悲莫悲兮伤永逝:以墓志为叙事策略的《宠儿》新解”。
第十八组(亚裔文学研究新视野)由谷红丽、李汝成主持,发言人有李青霜(南京审计大学)“论戏剧《耻辱》中的穆斯林文化定势”;刘喜波(齐齐哈尔大学)“列斐伏尔的身体空间理论下的《灿烂千阳》解读”;李东风(盐城师范学院)“美国印度裔离散文学中的‘家叙事’”。
|
[
"厦门大学。"
] | 9,593
|
multifieldqa_zh
|
zh
| null |
5b1b8e937b83c3ff9b75ac386fae9c4575c4b9f26a4fbdad
|
过去五年地方财政用于社会保障支出的金额是多少?
|
各位代表:
现在,我代表市十二届人民政府向大会报告工作,请予审议,并请政协各位委员和列席人员提出意见和建议。
一、五年来政府工作回顾
市十二届人民政府任期从1998年1月至今已满五年。五年来,在省委、省政府和市委的领导下,市政府高举邓小平理论伟大旗帜,深入实践“三个代表”重要思想,全面贯彻党的十五大和十六大精神,深化改革,扩大开放,促进了国民经济和社会事业健康发展,保持了社会稳定。特别是进入新世纪,围绕实现高起点开局和跨越式发展,通过深入开展“塑造鞍山新形象”大讨论活动,增强忧患意识,理清发展思路,确立了建设现代工业强市、优秀旅游名市和先进文化城市的发展目标,确定了以开放促改革、促调整、促发展,全面建设开放型地区经济的战略构想,树立了“经营城市”和建设“绿色鞍山”的理念,提出了“谋划大事、自我加压、破解难题、深度推进”的创新工作要求,推动鞍山经济步入加速发展的快车道。预计2002年全市实现国内生产总值709亿元,比上年增长11%,五年平均增长10.1%。其中,农业增加值52亿元,年均增长9%;工业增加值349.7亿元,年均增长9.4%;第三产业增加值266亿元,年均增长11.3%。实现地方财政收入32.6亿元,比上年增长14.1%,五年平均增长11%。县区财政收入均超亿元。累计完成全社会固定资产投资599亿元,比前五年增长42.4%。城市人均可支配收入6800元,五年增长34.4%;农民人均纯收入3780元,五年增长20%。
(一)扩大开放,规划和引进一批有牵动力的大项目,增强了经济发展后劲。五年实际利用外商直接投资5亿美元,比前五年增长2.2倍,新办“三资”企业437家。积极争取项目争取资金,实际到位资金以年均25%的速度递增。通过举办中国·鞍山(北京)推介会、海外学子创业周等一系列招商活动,引进了台湾纺织工业园、韩国大邱纺织工业园等一批重大外资项目,美国欧文斯·科宁、加拿大好运集团、台湾中橡、香港华润、青岛啤酒等一批知名企业来鞍投资。与香港中旅集团、青岛海尔集团、清华大学、北京大学、上海交大建立了长期合作关系。与韩国安山、德国埃森等14个国外城市和无锡、九江等一批国内城市建立了友好合作关系。坚持以项目为核心,市地方规划投资亿元以上项目100个,投资总额442亿元。其中,5亿元以上项目17个,投资额290亿元;工业项目53个,投资额305亿元;已开工建设45项,总投资91.4亿元。
(二)深化改革,加快产业结构和所有制结构调整,提高了经济运行质量。全面落实党在农村的各项政策,在稳定家庭联产承包责任制的基础上,深化土地流转制度改革,顺利开展了撤乡并镇和区划调整工作。大力推进农业产业化经营,发展生态农业、设施农业、订单农业和创汇农业,形成了优质米、蔬菜、食用菌等十大主导产品,建设了6个农业科技示范园区,千山宁远、海城王家堡子等4个现代农业园区进入省级农业园区行列。培育了364个龙头企业,其中省市级龙头企业14个,龙头企业带动农户比例达到45%,促进了传统农业向现代农业转变。完成退耕还林和荒山造林17万亩,植树造林合格面积68万亩。对辽河、浑河、太子河鞍山段进行综合整治,防洪标准由20年一遇提高到50年一遇。在巩固国有大中型企业三年改革与脱困成果基础上,积极推进国有经济布局调整和企业公司制改造,组建了冶化建、机电、轻纺、物资、建工等5个资产经营公司,完成了地方300户国有中小企业改制任务,在19户国有大中型企业建立了现代企业制度。总结推广“两啤一化”模式,对21户地方国有大中型企业实施了脱胎换骨式改造。全市工业经济综合效益指数达到107.6%。通过政策引导、放手发展、积极扶持,西洋耐火、宝德轧钢等一批民营企业不断壮大,民营经济占全市GDP的比重达到48.3%。加大旅游资源开发和宣传力度,千山和玉佛苑晋升为国家4A级旅游景区(点),千山仙人台景区被认定为国家级森林公园。成功举办了三届中国·鞍山千山国际旅游节和首届中国·鞍山玉佛文化节,旅游综合收入五年平均增长23%。现代流通业态方兴未艾,各类超市和连锁店发展到320家。
(三)科技创新,大力发展高新技术产业,高新区实现了历史性跨越。鞍山被确定为国家技术创新试点城市和全国制造业信息化工程重点城市。五年累计取得市级以上科研成果364项,获得国家、省(部)级科技进步奖60项,申报专利1910项。培育发展省级高新技术企业119家。科技进步对工业经济的贡献率达到40%以上,对农业经济的贡献率达到55%以上。高新区实行封闭式管理,调整了总体规划,减少居住用地,增加产业项目用地。对进区企业和项目免缴各种行政事业性收费,成为“无费区”。先后建成了海外学子创业园、鞍山软件园和科大科技园,引进了托普软件、清华紫光等一批高科技企业。创业服务中心晋升为国家级,累计孵化企业286家。高新区五年累计完成基础设施建设投资4.6亿元,建成标准厂房1.4万平方米。引进项目912个,其中投资亿元以上项目10个,实际利用外资5123万美元。2002年高新区完成技工贸总收入150亿元,五年平均增长108%;实现高新技术产品产值50亿元,五年平均增长50%;实现全口径财政收入3亿元,五年平均增长42%。高新区整体发展水平和对外形象有了显著变化,在国家级高新区的排位由51位上升到36位。
(四)经营城市,全面改善经济发展软硬环境,塑造了现代文明、整洁优美的城市形象。通过土地出让、市场化运作和适当融资等方式,五年累计完成城建投资40亿元。建成了以五一路立交桥为轴心的“十”字型城市交通主骨架,改造和大修51条主次干道,46处马路市场实现了退路进厅,畅通工程达到国家A类一等模范城市标准。实施了全日制供水工程和城乡电网改造工程。新建了二一九广场,对胜利、站前和人民公园等9个城市广场进行了高标准美化、绿化、亮化,为广大市民提供了休闲娱乐的高品位场地。城市植树537万株,新增绿地1129万平方米,城区绿化覆盖率达到35%。新建和改造居民小区71个,基本完成棚户区改造,建设住宅500万平方米。对建成区临时和违章建筑进行了全面拆扒,完成了市区主街主路照明设施更新和楼宇粉饰。西部第二污水处理厂已完成一期工程,实施了120项环境污染治理工程,城市空气质量全年有一半以上天数达到国家二级标准,太子河鞍山段主要污染物治理后水质达到国家地面水五类标准。规划建设了8个省级以上小城镇示范点,改造了鞍海路、鞍腾路、鞍羊路等干线路网,提前三年实现了乡乡通油路和村村通公路。适应入世要求,开展了软环境建设绿色行动,出台了一系列规范软环境建设的政策规定,压缩行政审批事项83.5%。在省内率先成立了市县两级公共行政服务中心以及经济发展软环境投诉中心、经济政策查询中心和外商投资企业代理服务中心,为海内外投资者、企事业单位和广大市民提供了便捷高效的服务,增强了城市的吸引力和竞争力。
(五)地企融合,积极为在鞍中省直企业创造良好环境,开创了地方与鞍钢联合协作的新局面。树立“地企融合、共兴共荣”理念,积极为中省直企业改革发展提供服务,全面接收了中省直企业所属中小学校,实现了中省直企业职工失业保险属地化管理。鞍钢形成了母子公司体制,建立了现代企业制度。实施了1780、1700、钢轨万能轧制生产线等一系列重大技术改造,主体装备达到世界先进水平,钢铁产量双超1000万吨,生产经营跨越式发展,对市本级财政贡献率始终保持在40%以上。地方和鞍钢分别成立了联合协作工作机构,建立了重大问题及时协商制度。按照市场经济规律,采取资本运作方式,鞍钢出资5000万元一次性买断了闲置八年之久的东北风厂房场地,地方帮助协调化解各种债务2.2亿元,建设了年产30万吨的两条彩色涂层钢板生产线。帮助解决鞍钢与冀东水泥合资生产150万吨水泥熟料项目建设中遇到的各种困难,实现了企业在地方注册。支持鞍钢铸管厂搬迁改造,将3000万元土地补偿费返还给鞍钢,建成了年产8万吨的两条球墨铸铁管生产线,同时也极大地改善了城市环境。通过这三个示范项目,探索出地方与鞍钢联合协作的多种成功模式,为今后工作奠定了坚实基础。
(六)促进就业,积极推进社会保障体系建设,保持了社会稳定。认真组织建立完善的社会保障体系试点工作,社会养老、失业、医疗保险覆盖面分别达到100%、99%和75%。五年地方财政用于社会保障支出6.5亿元,累计发放下岗职工基本生活费4.5亿元,支出养老金71.4亿元。全部关闭了企业再就业服务中心,有12.8万人与企业解除了劳动关系,对失业并轨人员做到了接续养老保险和失业保险。健全和完善了劳动者自主择业、市场调节就业、政府促进就业的新机制,开展就业培训和就业援助,兴办再创业企业,创办社区保安、保洁、商品配送和家政服务四大公司,走出了一条依托社区的多渠道就业之路。五年累计安置就业34万人次,涌现出小铅笔编织社、妈咪贝贝月嫂服务中心和康泰华刮痧中心等一批再创业企业典型。全面落实城镇居民最低生活保障制度,建立了科学的组织体系和规范的审核发放体系,累计发放最低生活保障金1.2亿元,做到了应保尽保。积极开展扶贫救助活动,发动社会力量筹集款物3亿元,累计救助150万人次,为516户农村贫困户和1594户城市困难居民解决了住房问题。有效化解金融风险,“两债”余额下降80%。加强安全生产和安全防火工作,杜绝了重大安全事故发生。深入开展严打专项整治斗争,坚决取缔“法轮功”等邪教组织,强化社会治安综合治理,有效遏制了重特大刑事案件的发生。
(七)“四城”同创,全面加强精神文明建设,推动了社会事业全面进步。全市动员,全民参与,认真组织“创城”活动,进入中国优秀旅游城市行列,荣获创建全国文明城市工作先进城市称号,成为东北地区第二个国家卫生城市,蝉联全国双拥模范城。贯彻落实《公民道德建设实施纲要》,提高了全市人民的思想道德素质和城乡整体文明程度。巩固“普九”成果,大力推进了素质教育。强化高中教育和职业教育,高中阶段入学率和高考升学率分别提高13个百分点和36个百分点。基本完成了鞍山科技大学升级换建和鞍山师范学院重组整合。恢复了市新华书店等主要文化设施的基本功能,建成了市少儿阅览中心,组建了市艺术学校。深化专业表演艺术团体改革,创作出一批优秀剧目。创建大型文化广场10处,发展各级各类文化网点296个,丰富了群众文化生活。实施区域卫生规划,建立了新的卫生监督和疾病预防控制体系。加强了农村医院建设。广泛开展城市社区卫生服务,可服务人口达到90%,主要健康指标达到国家先进水平。建成了市体育中心,成功承办了辽宁省第九届运动会,实现了参赛成绩进入省内前三名、办会接待水平超过前八届、商业化运作筹措办会资金“三个既定目标”,凝炼出“万众一心、敬业奉献、追求卓越、铸就辉煌”的九运精神。民族、宗教、侨务政策得到全面落实。对台经贸工作成效显著,台商对鞍山的认知度明显提高。民兵预备役建设不断加强。人防工作成为全省一面旗帜。军政军民关系进一步发展。广播电视宽
带网接入20万户。气象服务和接待服务达到省内一流水平。老龄事业在实践中得到创新。完成了建国后鞍山首届修志工作。档案工作较好地发挥了服务经济和服务社会的作用。人口与计划生育、妇女儿童和地震工作进入全国先进行列。
(八)依法治市,不断加强政府自身建设,改进了机关工作作风。认真组织“三五”、“四五”普法活动,有效实施了法律援助。加强地方行政立法工作,提请人大审议地方性法规16件,颁布实施行政规章60件。清理法规、规章243件,废止政府文件46件。建立行政执法责任制,聘请政府法律顾问,规范行政执法行为,行政复议胜诉率提高20个百分点。坚持重大事项及时向人大及其常委会报告和向人民政协通报,自觉接受人大依法监督、政协民主监督和人民群众社会监督,人大代表建议和政协委员提案办结率100%。完成市县两级政府机构改革,市级政府机构精简28.6%,压缩行政编制31.3%。加大反腐倡廉力度,提高了公务员素质。采取《政府工作任务书》等有效形式,使政府各部门自我加压,开创了工作新局面,树立起廉洁高效的政府形象。加强信访和市民投诉受理工作,创办《今晚会见》栏目,设立政府网站和市长信箱,密切了与人民群众的血肉联系,营造出奋发向上、积极进取的社会氛围。
各位代表,过去五年改革开放和现代化建设所取得的成就,既为十二届政府工作画上了一个圆满句号,更为我们在十六大精神指引下全面建设小康社会奠定了坚实基础。这是全市人民努力拼搏的结果,也是社会各界大力支持的结果。在此,我代表政府全体成员,向全市广大工人、农民和知识分子,向鞍钢等中省直单位和市属企事业单位、驻鞍部队、武警官兵、公安干警、大中小学校师生、离退休干部、广大公务员以及所有关心和支持鞍山发展的海内外朋友,表示衷心的感谢和崇高的敬意!
在肯定成绩的同时,我们也清醒地看到,在前进的道路上还面临着许多困难和问题。经济结构的战略性调整还不到位,产业结构还处于较低层次,新的经济增长点不够突出;市场经济体制还不完善,国有企业改革与发展的任务仍很艰巨;对外开放的深度和广度与经济发展的要求还存在较大差距,招商引资的大项目不多,投资环境有待于进一步改善;城乡居民收入增长缓慢,下岗失业人员较多,部分群众生活仍很困难,就业和社会保障的压力较大;政府机关行政效能不高、创新突破意识不强、工作作风不够扎实等问题还比较突出,个别干部还存在腐败现象。对这些问题,我们都要予以重视,并在今后工作中采取有效措施,认真加以解决。
各位代表,十二届政府任期的五年是不平凡的五年,我们经历了亚洲金融风险的考验,经历了国有企业三年改革与脱困的磨练,经历了中国入世的挑战。五年的实践,使我们加深了对市情的认识,进一步理清了未来发展的思路,在组织经济和社会发展方面也积累了一些经验。我们深深感到,开放是鞍山发展的根本出路,开放的力度决定改革的深度、调整的进度和发展的速度;项目是经济工作的核心,只有源源不断地实施大项目,才能实现经济的跨越式发展;投资环境是提升城市综合竞争力的核心要素,只有坚持不懈地改善投资环境,才能不断增强城市的吸引力和凝聚力;人民群众是鞍山的建设者和受益者,只有集中民智,凝聚民力,顺应民心,反映民意,才能真正形成加速发展的强大合力;创新是加速发展和实现赶超的制胜法宝,只有不断地解放思想,战胜自我,超越自我,永远奋斗,才能使鞍山越来越美好!
二、新一届政府工作的指导思想和奋斗目标
新一届政府任期的五年,是全面建设小康社会的关键时期。历史和现实要求我们必须牢牢抓住本世纪前二十年这一重要战略机遇期,集全民之智,举全市之力,以更高的追求,更大的气魄,谱写社会主义现代化建设的新篇章。根据市委九届六次全会做出的战略部署,今后五年乃至到2010年政府工作总的指导思想是:高举邓小平理论伟大旗帜,全面实践“三个代表”重要思想,深入贯彻十六大精神,围绕建设现代工业强市、优秀旅游名市和先进文化城市,继续坚持以开放促改革、促调整、促发展,建设开放型地区经济的战略构想,突出项目核心,强化招商引资,加速经济结构战略性调整,全面扩大社会就业,积极推进科教兴市,提升国民经济整体素质和人口素质,增强可持续发展能力,走上生产发展、生活富裕、生态良好的文明发展道路,为鞍山提前全面建成小康社会、在省内第一批基本实现现代化奠定基础。
今后五年乃至到2010年全市经济和社会发展的主要奋斗目标:
——基本形成靠拢沈大的经济实力。国内生产总值年均增长12%以上,全面完成“十五”计划,到2005年突破千亿元大关,到2007年比2000年翻一番,到2010年人均国内生产总值超过5000美元。地方财政收入年均增长13%以上,到2007年地方可支配财力达到75亿元,到2010年超过100亿元。城市综合竞争力显著增强,跻身省内第一集团。
|
[
"6.5亿元。"
] | 6,544
|
multifieldqa_zh
|
zh
| null |
94ac1d26cf68a448f5bddf4b5400eab51717c26ab3127df0
|
二审法院确定了什么样的赔偿金额?
|
中国人民财产保险股份有限公司高安支公司、郭光中机动车交通事故责任纠纷二审民事判决书
上诉人中国人民财产保险股份有限公司高安支公司(以下简称“人民财保公司”)因与被上诉人郭光中、江西瑞州汽运集团伟鑫汽运有限公司(以下简称“瑞州公司”)、杨丽颖、邱某、杨众财、袁国美机动车交通事故责任纠纷一案,不服江西省赣州市赣县区人民法院(2019)赣0721民初1368号民事判决,向本院提起上诉,本院依法组成合议庭进行了审理。本案现已审理终结。
人民财保公司上诉请求:变更一审判决第一项,改判上诉人少承担赔偿金额2706.55元;本案二审诉讼费用由被上诉人承担。事实和理由:1.案涉车辆存在超载情形,上诉人依保险合同约定,在第三者责任保险部分依法享有10%的绝对免赔额;2.一审判决遗漏必要当事人朱顺贵,程序违法。
郭光中、瑞州公司、杨丽颖、邱某、杨众财、袁国美均未作答辩。
郭光中向一审法院起诉请求:判令被告赔偿原告各项损失合计91255.5元并承担本案的诉讼费用。
一审法院认定事实:2017年10月2日,案外人刁华新驾驶赣B×××××号普通二轮摩托车搭载原告郭光中由赣县区江口镇旱塘村往江口镇安坑村方向行驶,当车从江口镇滨江大道驶入323线国道左转弯时,与于都县往赣县区方向行驶由朱顺贵驾驶的赣C×××××号重型半挂牵引车牵引赣C×××××号挂车相撞,造成原告郭光中受伤及车辆受损的道路交通事故。经赣州市赣县区公安局交通管理大队认定,案外人刁华新和朱顺贵承担事故同等责任。赣C×××××号重型半挂牵引车的实际所有人是被告瑞州公司,并在被告人民财保公司投保了交强险和商业第三者责任险。现原告已治疗终结。因赔偿事宜与被告协商未果,故诉至法院。事发当日,原告被送往赣州市赣县区人民医院接受住院治疗。经诊断,原告右锁骨骨折、全身多处软组织挫伤,并行手术治疗。于2017年10月7日出院,共住院5天。出院医嘱建议原告维持“8”字绷带固定4周、伤后4周返院复查、避免右肩负重及剧烈运动、不适随诊。治疗期间的治疗费、诊疗费合计1605.5元均由原告自行支付。2019年1月17日,经江西赣州司法鉴定中心鉴定,原告因此次交通事故构成十级伤残、护理期60天。原告支付鉴定费1300元。另查明,原告郭光中为农业家庭户口,系赣县区古田小学在校生,事故发生前随其父母共同居住、生活于古田圩镇,其同意放弃对案外人刁华新的赔偿请求。事故车辆赣C×××××号重型半挂牵引车系被告邱某、杨丽颖、杨众财、袁国美的家属杨泳(已去世)于2017年9月25日在被告瑞州公司分期付款购买。事故发生时,朱顺贵系杨泳雇请的驾驶员。杨泳为其事故车辆在被告人民财保公司投保了交强险和100万元的商业第三者责任险,且不计免赔,事故发生在保险期间内。
一审法院认为,《中华人民共和国道路交通安全法》第七十六条规定,机动车发生交通事故造成人身伤亡、财产损失的,由保险公司在机动车第三者责任强制保险责任限额范围内予以赔偿;不足部分,机动车之间发生交通事故的,由有过错的一方承担赔偿责任。机动车与非机动车驾驶人、行人之间发生交通事故的,非机动车驾驶人、行人没有过错的,由机动车一方承担赔偿责任;有证据证明非机动车驾驶人、行人有过错的,根据过错程度适当减轻机动车驾驶人一方的赔偿责任;机动车一方没有过错的,承担不超过10%的赔偿责任。案外人朱顺贵和刁华新分别承担此事故的同等责任,一审法院确认朱顺贵和刁华新分别承担50%的责任。原告的损失先由被告人民财保公司在交强险责任限额内承担,超出交强险应由朱顺贵承担的责任部分,由被告人民财保公司在商业第三者责任险限额内承担;不足部分,由被告邱某、杨丽颖、杨众财、袁国美在杨泳的遗产范围内承担。因原告放弃对刁华新的赔偿请求,其余50%由原告自行承担。原告郭光中的各项损失,一审法院确定如下:关于医疗费1605.5元,根据原告提供的医疗费票据,予以确定。关于住院伙食补助费和营养费,均为250元,根据原告的实际住院天数,确定为5天,按50元每天计算。关于护理费8053.81元,根据原告的实际住院天数和伤情,确定为60天,护理费标准参照一人本地服务业在岗职工平均工资48994元每年计算。关于残疾赔偿金67638元(33819元/年×20年×10%),计算标准按照城镇居民人均可支配收入33819元每年计算。参照司法鉴定机构作出的司法鉴定意见书,确定原告的伤残等级为十级伤残。关于交通费50元,原告未提供相应票据及说明发生的具体时间及乘坐人员,按原告的就医地点、人数及次数,酌情确定。关于精神损害抚慰金5000元,原告为十级伤残,一审法院根据其伤残等级酌情确定其精神损害抚慰金。关于鉴定费1300元,根据原告提供的鉴定费发票予以确定。以上合计84147.31元,先由被告人民财保公司在交强险责任限额内承担30016.41元,余款54130.9元由被告人民财保公司在商业第三者责任险限额内承担50%,计27065.45元,其余50%由原告自行承担。被告未提供证据证明其主张,不利后果由其自行承担。为此,依据《中华人民共和国合同法》第六十条、《中华人民共和国侵权责任法》第六条、第四十八条、《中华人民共和国道路交通安全法》第七十六条、《最高人民法院关于审理人身损害赔偿案件适用法律若干问题的解释》第十七条、第十八条、第十九条、第二十一条、第二十二条、第二十三条、第二十四条、第二十五条和《最高人民法院关于确定民事侵权精神损害赔偿责任若干问题的解释》第十条之规定,判决如下:一、限被告中国人民财产保险股份有限公司高安支公司于本判决生效之日起七日内向原告郭光中赔偿医疗费、营养费、住院伙食补助费、护理费、残疾赔偿金、精神抚慰金、交通费和鉴定费合计人民币57081.86元。二、驳回原告郭光中的其他诉讼请求。案件受理费2080元,减半收取1040元,由被告邱某、杨丽颖、杨众财、袁国美在杨泳的遗产范围内负担。
二审中,当事人均未提交新的证据。本院对一审查明的事实予以确认。
本院认为,根据《中华人民共和国保险法》第十七条规定,保险人对于免责条款既要向投保人履行提示义务,还应当向投保人履行明确说明义务,二者缺一不可。事故车辆在上诉人处投保了附加不计免赔的商业第三者责任险,上诉人未提交充分的证据证明其已就“购买了不计免赔险种仍需扣除10%的超载绝对免赔率”履行了明确说明义务,即不符合《最高人民法院关于适用中华人民共和国保险法解释(二)》第十一条规定的“常人能够理解的解释说明”,故上诉人主张的免责条款对投保人不生效。本案中,朱顺贵系受杨泳雇请作为事故车辆的驾驶员,根据《中华人民共和国侵权责任法》第三十五条规定:“个人之间形成劳务关系,提供劳务一方因劳务造成他人损害的,由接受劳务一方承担侵权责任。”被上诉人郭光中向雇主方主张相关权利,符合法律规定。综上所述,上诉人的上诉请求不能成立,应予驳回;一审判决认定事实清楚,适用法律正确,应予维持。依照《中华人民共和国民事诉讼法》第一百七十条第一款第一项规定,判决如下:
驳回上诉,维持原判。
二审案件受理费50元,由上诉人中国人民财产保险股份有限公司高安支公司负担。
本判决为终审判决。
|
[
"人民币57081.86元。"
] | 2,975
|
multifieldqa_zh
|
zh
| null |
681a3146fff714cfdc68c4a9ca0b6663d104d73e75facee1
|
郗鉴拒绝了谁的建议?
|
郗鉴(东晋重臣、书法家)
郗鉴(269年-339年),字道徽。高平郡金乡县(今山东省金乡县)人。东晋重臣、书法家,东汉御史大夫郗虑玄孙。郗鉴少年时孤贫,但博览经籍、躬耕吟咏,以清节儒雅著名,不应朝廷辟名。晋惠帝时曾为太子中舍人、中书侍郎。永嘉之乱时,聚众避难于峄山。其后被琅邪王司马睿授为兖州刺史。永昌初年,入朝任领军将军、安西将军、尚书令等职。参与讨平王敦之乱、苏峻之乱,并与王导、卞壸等同受遗诏辅晋成帝。累官司空、侍中,封南昌县公。咸康四年(338年),拜太尉。他拒绝外戚庾亮废王导的建议,阻止了朝中的士族斗争。咸康五年(339年),郗鉴去世,年七十一。获赠太宰,谥号“文成”。郗鉴工于书法,现有《灾祸帖》存于《淳化阁帖》中,原有文集十卷,今已遗失,《全晋文》录其作品。
TA说 从流民首领到制衡门阀士族的东晋能臣,此人却常被史家低估2018-09-26 21:51 提起东晋,史家向来重论王谢桓庾四大盛门及其领头人物。但有这么一个人,并非出身顶级门阀,以“流民帅”身份南下,却两拜三公之位,制衡门阀士族,拱卫京师,为明帝托孤重臣,对东晋偏安江左贡献极大。他就是郗鉴,一个常被世人低估的东晋能臣。...详情 相关新闻 内容来自 郗鉴人物生平 郗鉴初入仕途 郗鉴是东汉末年的御史大夫郗虑的玄孙,从小孤贫,但仍然博览经籍,即使耕作时仍不断吟咏文章,以儒雅著名。及后任赵王司马伦的掾属,但察觉到赵王有夺权篡位之心后,他便称病辞官。 永康二年(301年),司马伦篡位称帝,其党羽都擢升要职,但郗鉴则闭门自守,不与他们接触。同年,司马伦被推翻,惠帝复位,郗鉴参司空(刘寔)军事,后历任太子中舍人、中书侍郎。 后来被东海王司马越辟为主簿,举贤良,但郗鉴都不接受。征东大将军苟晞征辟郗鉴为从事中郎,因苟晞和司马越不和,郗鉴亦不应召,苟晞也未强迫他。 [1] 郗鉴避乱峄山 永嘉五年(311年),汉赵军队攻陷洛阳,并俘掳晋怀帝,北方陷入空前的混乱,郗鉴亦被乞活军首领陈午部众所获。同乡人张萛先前要和郗鉴相交,郗鉴不予理睬,这时,张萛到陈午的军营来探视看望郗鉴,既而召郗鉴为卿。郗鉴对张萛说:“我们同处一乡,但情义不曾相通,你怎么能乘着混乱这样胡为呢!”张萛非常惭愧,知趣地退走了。陈午因为郗鉴素有有名望,打算推郗鉴为首领,只因郗鉴及时逃脱而未能成事。 直到陈午兵败溃散,郗鉴才回归故乡。当时正值大饥荒之年,州中人士平素感于郗鉴恩义的,都来接济资助于他。郗鉴将所得到的馈赠,分别送给亲族和乡里孤贫老弱,靠他的接济得以幸存的人很多,大家相互商议说:“如今天子流亡在外,中原无主,我们应依靠仁德之人,才能够渡过难关,免得死于乱中。”大家就推举郗鉴为主,一千多户一起跟随郗鉴,到鲁地的峄山中避难。 [2] 晋元帝司马睿镇守江左时,以郗鉴为龙骧将军、兖州刺史,出镇邹山。当时郗鉴与荀藩所派的李述和刘琨所派的刘演同居兖州刺史,三人由不同行台承制任命,各据一郡,并各自为政,互相对立。同时兖州亦正受徐龛和石勒两股军事力量侵扰。在战事不息而没有外援之下闹饥荒,虽然人民要捕野鼠燕子等动物来充饥,但仍不叛离郗鉴,反而人数渐多,三年之间就拥众数万。司马睿因而加授其为辅国将军、都督兖州诸军事。 [3] 当时兖州以郗鉴为方伯,阮放为宏伯,胡毋辅之为达伯,卞壶为裁伯,蔡谟为朗伯,阮孚为诞伯,刘绥为委伯,羊曼为濌伯,八人并称“兖州八伯”。 [4] 郗鉴入朝任职 永昌元年(322年),郗鉴因后赵逼近的压力退守合肥。同年,被征为领军将军,到建康后改授尚书,郗鉴因病而不接任。不久,发生王敦之乱,元帝被软禁,因而忧愤而死。元帝驾崩后,由太子司马绍继位,即明帝。明帝即位后因畏惧大权在握的王敦,内外交困,便想以郗鉴为外援。 太宁元年(323年),明帝任命郗鉴为兖州刺史、都督扬州江西诸军、假节,镇合肥。王敦对此十分忌惮,于是表郗鉴为尚书令,征召他回朝。 [5] 郗鉴助平王敦 郗鉴回建康时经过王敦驻屯的姑孰 ,并与王敦相见。王敦对他说:“乐广其人无才,一个后生四处流荡,言行有背于名教朝纲,看看他的实际才能,怎么比得上满奋呢。”郗鉴回答说:“相比一定要同类型的人才行。乐广为人性情平淡,见识深远,处于倾危之朝,不随意亲附疏远于人。在愍怀太子被废时,可以说柔中有刚,不失正体。满奋是失节之人,怎能和乐广相提并论。”王敦又说:“愍怀太子被废之际,和他来往就会给自己带来危机,人怎么能死守着常理呢?以此相比,满奋不弱于乐广是很清楚的。”郗鉴说:“大丈夫洁身北面侍君,谨守三纲之义,怎么可以偷生而变节,这样有何面目居于天地之间!如果是天道已终,也当随之存亡。” 王敦早就有了无君野心,听到郗鉴这番话,心中大为不满,便不再与之相见,将郗鉴扣留下来不让他离开。王敦党徒常常诬陷郗鉴,但郗鉴仍然神态自若,一点儿也不害怕。王敦对钱凤说:“郗道徽是儒雅之士,有名望地位,怎么能随便加害于他呢!”将他释放。郗鉴回朝后便与明帝商议平灭王敦之事。 [6] 太宁二年(324年),钱凤等人领兵进逼建康,明帝以郗鉴为假节行卫将军、都督从驾诸军事。当时王敦军尚未完成集结,有人认为应率先由明帝亲自领兵进攻。但郗鉴认为敌军兵多不能力敌,而且王敦军来是已经惹来百姓极大的怨恨和反抗意识,亦无大方略,只求一战取胜。故此认为应当拖长战事,让其他反抗力量形成并对王敦进攻,藉以取胜。明帝听从了他的意见。郗鉴以尚书令的身份统领各屯营御敌,不久又派兵奇袭并大败王含军,四方义兵亦冒起,最终成功讨平王敦之乱。 [7] 郗鉴辅政重臣 王敦之乱被平定后,温峤上表提议,请求宽恕王敦的佐吏部属,郗鉴认为,先王推崇君臣礼教,崇尚为气节而捐躯,若是昏庸腐败的君主,才可开放城门以迎义师。王敦的僚属虽说多为王敦所逼,但居于叛逆的伪朝之中,没有出关投诚的义举,按照前代的古训,应该加以责罚。温峤又奏请因钱凤之母年高八十,应该免于治罪,朝廷同意所奏。 郗鉴因功获封高平侯,赐绢四千八百匹。明帝因郗鉴有才识名望,朝廷大小事情都询问他,并诏令郗鉴为朝廷起草表疏诏告,任其简易从事。王导提议追赠周札官职,郗鉴认为不合赏罚之理,王导不听,郗鉴于是驳斥他说:“王敦叛乱,相持很久不能入城,因为周札为他打开城门,才使王师遭到失败。如果王敦先前的举动,如同齐桓公、晋文公一样是正义的,那么先帝不就成了周幽王、厉王那样的昏暴之君吗?”朝臣们对此虽没有反对的,但也没人支持。 太宁三年(325年),迁任车骑将军、都督徐兖青三州军事、兖州刺史、假节,出镇广陵。 同年,明帝驾崩,郗鉴与王导、卞壶、温峤、庾亮、陆晔等一起接受遗诏,辅佐年幼的成帝司马衍。郗鉴因而晋位车骑大将军、开府仪同三司,加散骑常侍。 [8] 郗鉴义兵勤王 咸和元年(326年),郗鉴加领徐州刺史。 咸和二年(327年),苏峻和祖约发动叛变,进攻建康。郗鉴知道后打算亲自领兵营救,但朝廷却以防御北方进攻而阻止,郗鉴唯有派司马刘矩领三千人保卫建康,但次年建康便沦陷,刘矩亦退还。 中书令庾亮在建康失陷时出走,到寻阳投靠温峤,并宣庾太后口诏,升郗鉴为司空。郗鉴所在的广陵临近后赵边境,城孤粮绝,军民因对北方南侵的畏惧而没有坚守的决心。 郗鉴接受了诏命后,感激涕零,设立坛场,宰杀白马,与三军一起对天盟誓,誓言说:“贼臣祖约、苏峻不恭顺天命,不怕王师诛讨,凶暴逆行,破坏国家纲纪,无视五常之伦理,动摇国家根基,威逼胁迫幼小的君王,毁坏国家的栋梁支柱,残害忠良之臣,祸及黎民百姓,使天地神祗祖宗灵位无所归依。所以天下为之怨恨,亿万人民为之泣血,我们奉旨讨伐,以除灭元凶。过去戎狄危及周室,齐桓公与诸侯会盟以扶王室,董卓欺凌汉宫,各路豪杰聚义致讨,护卫君亲之义,古今一样。现今主上陷于危难,百姓处于倒悬,忠臣志士无不心存报国之念。凡入我同盟者,一经盟誓之后,齐心合力,以救社稷。若二寇不消灭,决不退缩偷安。有谁违背誓言,天神不容!”郗鉴登坛后慷慨陈辞,使三军士气大振。 郗鉴见此,于是派将军夏侯长通知温峤,并预计苏峻会挟持成帝到会稽,建议温峤在重要据点立营据守以阻其去路,同时又断绝粮运和坚壁清野,据守京口等待苏峻因缺乏物资溃败。温峤深表同意。 [9] 咸和三年(328年),陶侃获推举为盟主,郗鉴加都督扬州八郡军事。郗鉴后率众渡江,在茄子浦与陶侃会合,又修筑白石垒。不久王舒和虞潭战败,郗鉴与后将军郭默回屯京口,修筑大业、曲阿和庱亭三垒抵抗并分散对方军力,但随即就被围攻,郭默更逃出驻守的大业垒,令士兵震惊;但郗鉴仍坚持固守。不久苏峻堕马被杀,大业垒得以解围。 咸和四年(329年),郗鉴派参军李闳追击南逃吴兴的苏逸等人,将苏逸斩杀并收降其余众共一万多人。 [10] 郗鉴经营京口 苏峻之乱平定后,郗鉴以功升任司空,加侍中,解任八郡都督,改封为南昌县公,并以先前的爵位封其子郗昙。 咸和六年(331年),石勒部将刘征再次侵扰东南诸郡。郗鉴驻屯京口,并加都督扬州之晋陵郡、吴郡诸军事,率兵将刘征击退。 [11] 郗鉴协调士族 丞相王导在成帝继位后一直参与辅政工作,而他行事作风不拘小节,对自己委任将领的犯法行为多作容忍,招到朝臣不满,其他士族亦试图借此废掉王导,削弱琅琊王氏的影响力。陶侃就曾于成帝咸和年间打算起兵废掉王导,但因郗鉴反对而没有成事。 咸康四年(338年),郗鉴升任太尉。当时,征西将军庾亮也想罢黜王导,并寻求郗鉴的支持,但郗鉴表示反对;庾亮再写信游说郗鉴,但郗鉴坚拒,最终庾亮亦唯有放弃。郗鉴阻止了朝中主要士族的剧烈斗争,让经历了两次大动乱的东晋能够维持安定。 咸康五年(339年),郗鉴病重,将府中事务交给长史刘遐,上疏请求辞职,并推荐蔡谟为都督、徐州刺史,来接替自己。还推荐自己的侄子郗迈为兖州刺史。此疏上奏后,朝廷便任命蔡谟为太尉(郗鉴)军司。 [12-13] 同年,郗鉴病逝,享年七十一岁。成帝派御史持节护丧事,以太牢礼祭祀,追赠太宰,谥号文成。 [14] 郗鉴主要成就 永嘉之乱时,郗鉴避难于峄山、邹山,招抚流民,抵抗石勒等部,聚众至数万。 [2] [3] 晋明帝即位后,郗鉴回到建康,与明帝商议平灭图谋不轨的大将军王敦。 [6] 太宁二年(324年),统领各屯营对抗进攻建康的叛军大将钱凤等部,又派兵奇袭并大败叛党王含,成功讨平王敦之乱。 [7] 咸和二年(327年),苏峻之乱爆发,郗鉴坚守广陵。 [9] 之后更渡江,与勤王义军会合,旋即回屯京口,修筑大业、曲阿和庱亭三垒,以抵御叛军进攻。咸和四年(329年),派部下追斩逃窜的叛军首领苏逸等,收降残部一万余人。 [10] 郗鉴与重臣王导、卞壸等同受遗诏辅晋成帝,统领南下流民,长年屯驻于京口(北府),以防御后赵侵扰,并护卫建康朝廷。 [8] [11] 他拒绝大将陶侃、外戚庾亮废王导的建议,“协调当权诸门阀士族之间的关系” [15] ,阻止了朝中的士族斗争。 [16] 郗鉴个人作品 郗鉴工于书法,有《灾祸帖》存于《淳化阁帖》中。 郗鉴有文集十卷传世,今已佚。《全晋文》录有《上疏逊位》、《周札加赠议》、《又驳》、《书》。 [17] 郗鉴人物评价 纪瞻:伏见前辅国将军郗鉴,少立高操,体清望峻,文武之略,时之良干。昔与戴若思(戴渊)同辟,推放荒地,所在孤特,众无一旅,救援不至。然能绥集残余,据险历载,遂使凶寇不敢南侵。但士众单寡,无以立功,既统名州,又为常伯。若使鉴从容台闼,出内王命,必能尽抗直之规,补衮职之阙……以鉴年时,则与若思同;以资,则俱八坐。况鉴雅望清重,一代名器。 [18-19] (《请徵郗鉴疏》) 王敦:郗道徽儒雅之士,名位既重,何得害之! [16] (《晋书》引) 陶侃:司空鉴简素贞正,内外惟允。 [20-21] (《上表逊位》) 司马衍:惟公道德冲邃,体识弘远,忠亮雅正,行为世表,历位内外,勋庸弥著。乃者约峻狂狡,毒流朝廷,社稷之危,赖公以宁。功侔古烈,勋迈桓文。 [16] [22] (《赠郗鉴爵谥册》) 孙绰:摛藻风云,策名帝录。肇阶方尺,遂隆台岳。王室未休,吾何以豫?兴言再慨,思康天步。将俾皇化,归之大素。彼苍者天,曾不遐祚。哲人其萎,民斯攸慕。嗟尔后昆,式瞻宏度。 [23] (《太宰郗鉴碑》) 房玄龄:①道徽儒雅,柔而有正,协德始安,颇均连璧。 [16] (《晋书》)②道徽忠劲,高芬远映。 [16] (《晋书》) 洪迈:百年之间,会稽王昱(司马昱)、道子(司马道子)、元显(司马元显)以宗室,王敦、二桓(桓温、桓玄)以逆取,姑置勿言,卞壶、陆玩、郗鉴、陆晔、王彪之、坦之(王坦之)不任事,其真托国者,王导、庾亮、何充、庾冰、蔡谟、殷浩、谢安、刘裕八人而已。 [24] (《容斋随笔》) 胡三省:庾亮之谋,微郗鉴拒之于外,孙盛谏止于内,必再乱天下矣。 [25] (《资治通鉴》注) 王夫之:①其时,纪瞻、卞壶、陶侃、郗鉴之俦,林立于江左,而以上流兵柄授之于王敦,导岂有不逞之谋哉? [26] (《读通鉴论》)②郗公爱子死而不哭,卞令力疾战而丧元,二君子者,无诸己非诸人,危言以定褒贬,非导之所能也。 [27] (《读通鉴论》)③东晋之臣,可胜大臣之任者,其为郗公乎! [27] (《读通鉴论》)④峻虽反,主虽危,而终平大难者,郗鉴、温峤也,以死殉国者,卞壶也,皆亮所引与同卫社稷者也。 [27] (《读通鉴论》) 蔡东藩:君明还要仗臣忠,一德同心始立功。莫道茂弘堪寄命,赤心到底让郗公。 [28] (《两晋演义》) 田余庆:苏峻乱平后,江左相对安定,无内战七十年,遂得以拒胡族于淮汉,息斯民于江左,郗鉴所起的积极作用,是巨大的……大臣之任,不重在操持庶政,而重在执道经邦,东晋皇权不振,大臣更应如此。郗鉴南来后,最重要的邦国大计,莫过于协调当权诸门阀士族之间的关系,杜绝觊觎,以稳定一个抗胡政权,使人民得以生存。郗鉴在这方面的作为,与其它门阀士族之居位者相比较,可称述者较多,可指责者较少。 [15] (《东晋门阀政治》) 郗鉴轶事典故 郗鉴体有三反 名臣卞壸曾经指出郗鉴身上的三种矛盾现象: 侍奉君主很正直,却喜欢下属奉承自己(方于事上,好下佞己); 很注意加强清廉节操方面的修养,却非常喜欢计较财物得失(治身清贞,大修计校); 自己喜欢读书,却讨厌别人做学问(自好读书,憎人学问)。 [29] 郗鉴相互推崇 晋明帝曾问名士周顗 :“你自己认为你和郗鉴相比,谁更强些?”周顗说:“郗鉴和臣相比,似乎更有功力。”明帝又问郗鉴,郗鉴说:“周顗和臣相比,有国士家风。” [30]
|
[
"郗鉴拒绝了外戚庾亮废王导的建议。"
] | 5,941
|
multifieldqa_zh
|
zh
| null |
25256db5d953fa971b88f06502dfecacbc5532aea7fb6d91
|
奇力锅炉公司支付了多少预付款?
|
新风光电子科技股份有限公司与江苏奇力锅炉有限公司买卖合同纠纷二审民事判决书
上诉人江苏奇力锅炉有限公司(以下简称奇力锅炉公司)因与被上诉人新风光电子科技股份有限公司(以下简称新风光公司)买卖合同纠纷一案,不服江苏省盐城市亭湖区人民法院(2015)亭兴商初字第0022号民事判决,向本院提起上诉。本院受理后,依法组成合议庭进行了审理。本案现已审理终结。
新风光公司一审诉称:2012年9月,新风光公司(我公司原名称为:山东新风光电子科技发展有限公司)与奇力锅炉公司签订了工业产品买卖合同,约定新风光公司向奇力锅炉公司销售2套高压变频器,合同总价款为470000元。合同签订后,新风光公司按约向奇力锅炉公司履行了合同义务,并完成对高压变频器的安装调试工作,但奇力锅炉公司却未按照合同约定足额支付货款,新风光公司多次要求奇力锅炉公司支付该款,但奇力锅炉公司拒不支付。现诉请法院依法判令:奇力锅炉公司向新风光公司支付欠款17万元及损失8000元。
奇力锅炉公司一审辩称:欠款金额属实,但新风光公司提供的高压变频器存在质量问题,高压变频器的使用单位石嘴山市众利达电力有限公司多次来函说明该产品存在质量问题并要求修理,如不能修理要求更换,该单位扣留了奇力锅炉公司80多万元的货款,现要求奇力锅炉公司尽快处理好产品的质量问题,避免扩大损失;合同约定是35个工作日交货,而实际收货时间是2013年6月份,安装调试是2013年12月份,新风光公司未按合同约定交付构成违约。请求驳回新风光公司诉讼请求。
经审理查明:2012年9月6日,山东新风光电子科技股份有限公司(出卖人,山东新风光电子科技股份有限公司于2015年3月10日将公司名称变更为新风光电子科技股份有限公司)与奇力锅炉公司(买受人)签订了产品销售合同一份,合同约定:“一、…奇力锅炉公司向新风光公司购买风光JD-BP-37-500F型高压变频器1台,价款23万元;风光JD-BP-37-630F型高压变频器1台,价款24万元,合同总价款47万元。…三、出卖人对质量负责的期限:质保期自调试完毕之日起一年(货到30天买受人原因造成设备无法调试,自货到31天开始计算质保期时间…)。四、交货方式和地点:出卖人汽运至买受人指定的现场交由宁夏日盛众利达电厂收货。…八、检验标准、方法、地、地点及期限收到预付款35天到货。…十、结算方式:合同签订后5日内预付合同总额的30%,发货前付合同总额的30%,安装调试完毕之日起15日内或由于买受人原因造成设备无法调试时按货到1个月内付合同总额的30%,满1年质保期后7日内付清余款10%…。十一、安装调试:出卖人应买受人要求派1名技术人员到现场指导安装。十二、违约责任:如出卖人提供的产品质保期内无质量问题,买受人如不按约付款,以逾期付款额为基础,超过1个月按银行利息计算逾期付款违约金,卖方不能按时交货,以合同为基础,7日内按每日千分之三计算逾期交货违约金,超过7日按每日千分之五计算逾期交货违约金,由于卖方产品技术质量问题或运输过程中产生的一切损失由卖方承担…”。双方还进行了其他约定。
上述合同签订后,奇力锅炉公司于2012年9月21日用银行承兑汇票支付预付款10万元、于2012年10月30日用银行承兑汇票支付货款20万元。
案涉货物于2012年11月20日到达用户现场;第1次调试时间为2012年11月21日至22日、第2次调试时间为2013年4月6日至22日,相关产品现场安装调试服务单载明案涉设备均已装配完毕(虽奇力锅炉公司现场接洽人张同荣陈述产品现场安装调试服务单其名字不是其本人所签,但张同荣陈述其作为奇力锅炉公司现场接洽人,其均在现场且设备已安装到位)。
2015年4月30日、7月10日,设备使用单位石嘴山市众利达电力有限公司因设备质量问题向奇力锅炉公司发出函件要求对设备进行维修。
原审法院另查明,原审庭审中,奇力锅炉公司陈述,其实际收到新风光公司案涉设备的时间为2013年6月份;安装调试时间为2013年12月份。
原审法院认为:新风光公司和奇力锅炉公司签订的合同,不违背法律的强制性规定,属有效合同,应受法律保护。本案中,奇力锅炉公司向新风光公司购买高压变频器设备,双方应按约履行合同义务。原审庭审中,奇力锅炉公司陈述,其实际收到新风光公司案涉设备的时间为2013年6月份;安装调试时间为2013年12月份。按照双方合同中“安装调试完毕之日起15日内或由于买受人原因造成设备无法调试时按货到1个月内付合同总额的30%,满1年质保期后七日内付清余款10%…”的约定,奇力锅炉公司付清余款条件已成就。故新风光公司要求奇力锅炉公司给付货款17万元人民币的诉讼请求依法应予以支持。关于新风光公司提出的损失8000元的诉讼请求。双方合同约定“如出卖人提供的产品质保期内无质量问题,买受人如不按约付款,以逾期付款额为基础,超过1个月按银行利息计算逾期付款违约金”,因设备使用单位石嘴山市众利达电力有限公司于2015年4月30日、7月10日因设备质量问题向奇力锅炉公司发函要求对设备进行维修,已超过新风光公司与奇力锅炉公司约定的“质保期自调试完毕之日(安装调试时间为2013年12月份)起一年”,故原审法院按照双方约定自“满1年质保期后7日内付清余款”即2014年1月8日起至实际给付之日止,按中国人民银行同期同档贷款基准利率予以支持(以新风光公司主张的8000元为限)。奇力锅炉公司抗辩称案涉产品出现质量问题,奇力锅炉公司未提供证据对其该抗辩意见予以佐证,且奇力锅炉公司陈述的产品出现质量问题并非在质保期内,故对奇力锅炉公司该抗辩意见,不予采信。奇力锅炉公司抗辩称新风光公司未按合同约定交付构成违约,因与本案非同一法律关系,且奇力锅炉公司未提出反诉,原审法院不予一并处理。依照《中华人民共和国民法通则》第一百零八条,《中华人民共和国合同法》第一百零九条、第一百一十二条、第一百一十三条第一款,第一百三十条、第一百五十九条、《最高人民法院关于民事诉讼证据的若干规定》第二条之规定,原审法院作出判决:奇力锅炉公司于判决发生法律效力之日起十日内向新风光公司支付货款17万元及逾期利息(自2014年1月8日起至实际给付之日止,按中国人民银行同期同档贷款基准利率计付,且以新风光公司主张的8000元为限)。如果奇力锅炉公司未按判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条之规定,加倍支付迟延履行期间的债务利息。案件受理费3860元,由奇力锅炉公司负担。
宣判后,奇力锅炉公司不服原审法院判决,向本院提起上诉称:一、原审认定事实不清,未审查被上诉人的过错。案涉合同签订后,上诉人按约支付了预付款,而被上诉人却未能及时履行交付产品的义务。上诉人自2012年10月份支付完毕预付款后,直到2013年6月份才收到案涉设备,更在2013年12月份才将设备安装调试完毕。然而对于被上诉人这一严重违约行为,一审却并未审查。被上诉人将案涉设备交付使用单位石嘴山市众利达电力有限公司后,使用单位就不断地电告、发函给上诉人控诉设备的质量问题。设备一直是不停的坏,不停的修,到现在都没有能够正常使用过。被上诉人交付的产品是不合格产品,是被上诉人的又一严重违约行为,可原审中却未对被上诉人交付产品的质量问题进行审查。因被上诉人交付的产品不能正常使用,导致使用方扣留了上诉人80多万元的货款,给上诉人造成了极大的经济损失。被上诉人交付了不能正常使用的设备,且历经多次修理,仍不能正常使用,已经构成根本违约。上诉人认为,如果被上诉人交付的是合格产品,当然可以按照合同约定适用一年保质期的条款,可被上诉人交付的是不符合使用标准的产品,在此情况下,上诉人享有法定解除权,可随时解除合同。现上诉人要求被上诉人继续修理设备直至不再出现故障,或者立即更换设备,且保证更换后的设备符合规定的产品质量标准。二、一审适用法律不当。被上诉人交付的产品的质量不合格,不能正常使用,给使用单位造成极大困扰,法院应当首先审查被上诉人的违约行为,被上诉人应当及时修理或更换,并承担由此造成的损失,承担违约责任。综上所述。一审对案件事实审查不全面,只片面看质保期限,而忽略了产品质量不符标准的违约问题。对因产品质量问题给上诉人造成的损失,被上诉人需承担赔偿责任。同时,被上诉人应及时继续修理,或者更换符合标准的设备,直至该产品能够正常使用。请求二审法院撤销一审判决,改判上诉人不承担支付货款义务,一、二审诉讼费用由被上诉人承担。
被上诉人新风光公司答辩称:1、上诉人没有证据证明被上诉人交付的设备是有质量问题。从设备交付直到一审开庭,上诉人从未对设备的质量问题提出任何异议,在一审中上诉人也没有提供有效的证据证明被上诉人的设备存在质量问题,因此被上诉人交付的设备是合格产品。2、被上诉人已经按照合同约定履行完毕了所有合同义务,上诉人也应按照合同约定及时支付货款。因此上诉人的上诉理由明显不能成立,请求法院依法驳回上诉人的上诉请求。
本院经审理查明,原审法院查明的事实有相应证据证实,本院予以确认。
本案二审中的争议焦点为:1、被上诉人交付的设备是否存在质量问题,上诉人是否应当支付剩余货款;2、被上诉人是否存在迟延交付设备的违约情形,被上诉人是否应当承担赔偿损失的违约责任。
本院认为,当事人对自己提出的诉讼请求所依据的事实或反驳对方诉讼请求所依据的事实,应当提供证据加以证明。在作出判决前,当事人未能提供证据或者证据不足以证明其事实主张的,由负有举证证明责任的当事人承担不利的后果。关于第一个争议焦点,上诉人认为被上诉人交付的设备存在质量问题且是不合格产品。上诉人与被上诉人签订的产品销售合同中明确,质保期自调试完毕之日起一年。上诉人奇力锅炉公司陈述,案涉设备于2013年12月份安装调试完毕。如果案涉设备存在质量问题,上诉人在设备安装调试中即应能够发现或知道,并应按约及时向被上诉人提出质量异议。但上诉人未能举证证明其在质保期内提出过质量异议。上诉人认为被上诉人交付的是不合格产品,但未能提供证据证实。因此,上诉人认为被上诉人交付的设备存在质量问题构成违约、应承担赔偿损失的违约责任,上诉人不应支付货款的上诉理由,依据不足,本院不予采信。关于第二个争议焦点,上诉人认为被上诉人迟延交付案涉设备构成违约,并要求被上诉人承担赔偿损失的违约责任,上诉人一审中对此未提出反诉,一审法院在本案中对此不予审查处理并无不当。综上,上诉人奇力锅炉公司的上诉理由均不能成立,本院不予支持。原审判决认定事实清楚,适用法律正确,判处得当,应予维持。依照《中华人民共和国民事诉讼法》第一百七十条第一款第(一)项之规定,判决如下:
驳回上诉,维持原判决。
二审案件受理费3860元,由上诉人江苏奇力锅炉有限公司负担。
本判决为终审判决。
|
[
"10万元。"
] | 4,460
|
multifieldqa_zh
|
zh
| null |
1a0baf25d7431f32becd0a34034a2b88927fa168bcccf698
|
产品的总行程是多少?
|
'M a k e i t e a s y Z-ECG-10 产品手册 Product Brochure 主营:工业机器人/协作机器人/电动夹爪/ 智能电缸/自动化升级 版本号:V_2022.06.24 慧灵科技(深圳)有限公司 Huiling-tech Robotic Co.,Ltd.
M a k e i t e a s y 三指电动夹爪 Z-ECG-10 三指电动夹爪 Z-ECG-10 产品特点 ·夹持掉落检测、区域输出功能 ·力、位、速度可控,可通过Modbus精准控制 ·三指定心夹爪 ·控制器内置:占用空间小,方便集成 ·多种控制方式:485(Modbus RTU),I/O 推动一场电动替换气动的革命国内首家内部集成伺服系统的小型电动夹爪 高度集成 ·完美替代空压机+过滤器+电磁阀+节流阀+气动夹爪·千万次循环使用寿命,与日本传统气缸保持一致 1
M a k e i t e a s y 应用场景图 三指电动夹爪 Z-ECG-10 规格参数 型号:Z-ECG-10 总行程 夹持力 重复定位精度 推荐夹持重量 传动方式 运动元件油脂补给 单向行程运动时间 电机类型 重量 尺寸规格 控制器放置方式 额定电压 额定电流 峰值电流 防护等级 使用温度范围 使用湿度范围 参数 10mm 3-10N ±0.2mm ≤0.3kg 齿轮齿条+直线导轨 每六个月或者动作一百万次/回 0.3s 伺服电机 0.5kg 73*73*95.5mm 内置 24V 0.2A 0.6A IP20 5-55℃ RH35-80(无结霜) 2
M a k e i t e a s y 尺寸安装图 三指电动夹爪 Z-ECG-10 3
M a k e i t e a s y 线序说明 红色 黑色 橙白色 橙色 蓝色 蓝白色 紫色 紫白色 三指电动夹爪 Z-ECG-10 24V+ GND 485- 485+ IN1 IN2 OUT1 OUT2注意: 1. 请在接线时务必确认电源线正负极正确,485通讯线与I/O线正确,由于接线错误导致烧毁不在正常保修 范围内 ;2. 485与24V夹爪内部未隔离,如需要隔离需要客户使用其它设备进行隔离 。 RS485通讯Z-ECG-10的RS485通讯使用Modbus RTU协议,支持功能码包括:0x03,0x06 0x10,默认通信参数如下图: 波特率 ID 数据位 停止位 校验 115200 1 8 1 无 4
M a k e i t e a s y 通讯协议 三指电动夹爪 Z-ECG-10 功能组 地址 功能 读写 属性 默认值 (数据类型) 说明 0x0000 初始化 R/W 0(int) 1,单方向校准,(校准方向可以设置) 0x0001 保留 R/W 0(int) 0x0002 夹持位置 R/W 控制 0x0004 夹持速度 R/W 最大值 (float) 最大值 (float) 单位 mm,取值范围:0~10 单位 mm/s,取值范围:1~100 0x0006 夹持电流 R/W 0.5(float) 单位 A,取值范围:0.1~0.5 0x0016 使能电机 R/W 1(int) 写0关闭电机输出,写1使能电机 0x0017 0X0040 0X0041 0X0042 0X0044 0X0046 0x0050 夹持点位 控制点 初始化状 态反馈 夹持状态 反馈 夹持位置 反馈 夹持速度 反馈 夹持电流 反馈 错误警告信 息(保留) 状态 反馈 R/W 0(int) 夹持点位位置模式控制参数, 选择通信触发的点位,取值范围:0~7。 R R R R R R 0(int) 0:未初始化,5:初始化完成,其它:初始化中 0(int) 最大值 (float) (float) 0(float) 0(int32) 0:到位,1:运动中,2:夹持,3:掉落 单位 mm 单位 mm/s 单位 A 0x0080 ID R/W 1(int) 取值范围 [1--247] ,保存参数后重启有效 0x0081 波特率 R/W 4(115200) (int) 0--8:baud9600,baud19200,baud38400,baud57600,baud115200,baud153600,baud256000,baud460800,baud921600 0x0082 初始化方向 R/W 0(int) 设置位置校准方向。0:张开校准,1:闭合校准。 参数 配置 0x0083 自动初始化 设置 R/W 0(int) 0x0084 保存参数 R/W 0(int) 设置位置校准模式。0:上电自动校准,1:手动控制校准。 保存参数后重启有效 写1保存参数,注意:不要在实时控制时使用此命令, 仅在实际使用前配置参数使用 0x0085 0x0090 恢复默认 参数 I/O模式 开关 R/W 0(int) 写1恢复默认参数 R/W 0(int) 0:关闭I/O模式,1:打开I/O模式 5
M a k e i t e a s y 指示灯含义夹爪有两个指示灯,分别指示夹持的状态 红灯常亮 绿灯常亮 绿灯闪烁 蓝灯常亮 蓝灯闪烁 工作流程 三指电动夹爪 Z-ECG-10 未初始化 初始化完成 运动中 夹住物体 物体掉落1.夹爪上电会先自动初始化,夹爪向外张开后,夹爪即完成初始化流程。 手动初始化指令: 设备地址 功能代码 寄存器起始地址 寄存器内容 CRC校验码 01 06(HEX) 00 00 00 01(初始化) 48 0A 回复:01 06 00 00 00 01 48 0A注意:初始化时请确保没有物体挡住手指,防止识别零点位置出错,可以通过0x0083设置是否上电自动初始化。2.这时可以通过命令控制夹爪夹持 闭合夹爪: 设备地址 功能代码 寄存器起始 地址 寄存器长度 字节数 寄存器内容 CRC校验码 01 10(HEX) 00 02 00 02 04 00 00 00 00 (0(float)) 72 76 回复:01 10 00 02 00 02 E0 08 设置夹持速度200: 设备地址 功能代码 寄存器起始 地址 寄存器长度 字节数 寄存器内容 CRC校验码 01 10(HEX) 00 04 00 02 04 43 48 00 00 (200(float)) 67 CE 回复:01 10 00 04 00 02 00 09 6
M a k e i t e a s y 设置夹持电流0.2: 三指电动夹爪 Z-ECG-10 设备地址 功能代码 寄存器起始 地址 寄存器长度 字节数 寄存器内容 CRC校验码 01 10(HEX) 00 06 00 02 04 3E 4C CC CD(0.2(float)) 2B 2F 回复:01 10 00 06 00 02 A1 C9 读取夹持状态: 设备地址 功能代码 寄存器起始地址 寄存器内容 CRC校验码 01 03(HEX) 00 41 00 01 D4 1E 回复:01 03 02 00 00 B8 44 (00 00表示到位,0:到位,1:运动中,2:夹持,3:掉落) I/O功能使用I/O功能时需要先设置相关参数首先打开软件,点击设备连接,选择485串口号,以及ID和波特率后连接设备,然后按如下步骤设置I/O 参数: 7
M a k e i t e a s y(1)打开I/O功能 三指电动夹爪 Z-ECG-10(2)设置点位信息点击1点位信息,选择2夹持点位,在下图3号框内设置点位信息,可以点击<运行>测试点位设置 8
M a k e i t e a s y(3)保存参数 三指电动夹爪 Z-ECG-10输入状态与控制点位如下表所示:NPN型有效为0V,PNP型有效为24V IN1 无效 有效 无效 有效输出状态指示的夹爪状态如下表所示:NPN型有效为0V,PNP型有效为24V OUT1 无效 有效 无效 有效 9 IN2 无效 无效 有效 有效 OUT2 无效 无效 有效 有效 控制夹持点位 1 2 3 4 夹持状态 到位 运动中 夹持 掉落
M a k e i t e a s y 慧灵科技(深圳)有限公司 Huiling-tech Robotic Co.,Ltd. 电话:0755-36382405 邮箱:hitbot@hitbot.cc 网址:www.hitbot.cc 地址:广东省深圳市宝安区西乡街道航城大道华丰国际机器人产业园E栋二层
'
|
[
"10mm。"
] | 3,520
|
multifieldqa_zh
|
zh
| null |
ab232381202b5616f6d30abde4950fb649b32b0a36527b18
|
邓某为什么会成为毒品贩子?
|
原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密。前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。
原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。网上真人娱乐取款 原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。
原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。九五至尊糖果派对单机游戏原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。原标题:深夜荒地公厕却很“热闹” 里面竟藏着一个秘密前段时间,在哈尔滨大庆市杜蒙县一个偏僻的公厕出现了奇怪的现象,平时人都很少的地方,一到晚上就突然变得热闹起来。这是位于杜蒙县火车站附近公路旁的一个公厕,附近除了几处民房之外,都是荒野,到了夜间很少有人经过。但前段时间,这个偏僻的公厕却突然热闹起来,到了夜间人来人往,甚至还有人大老远的开车过来。知道的是公厕,不知道的还以为是哪个著名旅游景点呢!这个公厕到底为什么会吸引这么多的人来呢?有人放东西,还有人取东西,这总不能是快递中转站吧。侦查员通过调查掌握,一个叫做邓某的人经常与社会上一些吸毒人员接触密切,这些人频繁光顾这个厕所,极有可能是在进行毒品交易!邓某住在离公厕一百米左右的平房,几乎每晚都会往返公厕一次,侦查员分析,他这是在“埋雷”。通过对邓某的继续追踪,一个新发现,更加证实了侦查员关于邓某贩毒的猜测。这是杜蒙县一歌厅附近监控录像拍下的画面,两个人和邓某碰头后,三人一起走到停车场的一辆铲车旁,大约逗留了4分钟左右,三人分头离开。这时,侦查员断定邓某就是在进行毒品交易。通过调查,侦查员还掌握了与邓某频繁接触的下线人员,可奇怪的是,邓某很少外出,而且也没有邮寄过包裹,那么毒品是从哪来的呢?侦查员围绕邓某做了进一步的调查,这个邓某是杜蒙县人,原来居住在太阳镇内的楼房内。可前段时间,邓某却偏偏在这个荒凉的地方租下了一间平房居住,而这个不合常理的出租屋,似乎隐藏着什么秘密!警方猜测,这个隐秘的出租屋是不是邓某制毒的窝点呢?侦查员伪装成出租车司机从出租屋附近经过,试图从邓某丢弃的生活垃圾中寻找一些蛛丝马迹。在丢弃的垃圾中,侦查员一无所获。不过这时,侦查员经过两个月的调查,已经掌握了邓某大概出没的规律。12月4日晚,侦查员决定在邓某妻子送饭时,寻找时机进行抓捕。当天侦查员在杜蒙县、大庆市以及哈尔滨市,抓获了团伙成员十一人,并在邓某的制毒窝点缴获了制毒工具、制毒原料,以及11.04克液态冰毒。而侦查员将邓某抓获时,邓某似乎正在屋内制毒。对于一些专业的化学名词,邓某脱口而出。但殊不知,邓某只有小学文化。邓某未成年的时候曾因故意伤害罪被判处有期徒刑,出狱后通过狱友接触到了毒品,再加上玩网络赌博输了近二十万元,从此就一发不可收拾。偶然一次机会,邓某学到了研制冰毒的技术。由于不具备相关的化学常识,在最初实验的过程中,邓某还差点将一间出租屋引燃。而邓某在出租屋里研究出来的毒品,都是通过这个荒野中的厕所进行交易,由下线散到大庆、哈尔滨等地。侦查员经过大量工作,终于将这个制贩毒案件成功告破。如果邓某当初把这些精力放在正经的地方,应该也会有所作为吧,如今,就算是后悔也来不及了。
|
[
"出狱后接触到毒品并输掉大量赌资。"
] | 8,997
|
multifieldqa_zh
|
zh
| null |
b86406918eaf3274cab9cf5032d98faa011b752087bb7415
|
文章主要讲了哪些历史人物?
|
安土桃山时代
安土桃山时代又称织丰时代(1573年-1603年),织田信长与丰臣秀吉称霸日本的时代。以织田信长的本城安土城和丰臣秀吉的本城桃山城(又称“伏见城”)为名。历时30年。上承室町时代,下启江户时代。也把1467年的应仁之乱到1615年大阪之阵,包括安土桃山时代在内称为广义的战国时代。时代特征是由战国时代的分裂走向丰臣、德川时代的统一,伴随着现代化趋势。安土桃山时代日本出现了强大的军事领导者。他们击败了相互作战的诸大名,并且统一了日本。这个时代三个主要人物相继成为这个时期的主导者:织田信长(1573年至1582年)、丰臣秀吉(1582年至1598年)、德川家康(1598年至1615年)。三个主要人物持续统治了这个时期,织田信长,丰臣秀吉和德川家康。他们作为主要领主出现,并统率着大量的军队。随着他们实力的增长,他们都向京都的宫廷寻求支持。织田信长在1571年凭借装备精良的正规军击败了天台宗的僧兵,并且烧掉了日本中世纪的标志——佛教圣山、天台宗的大本营比睿山,还杀死了数千的僧侣。1573年,放逐了室町幕府末代将军足利义昭,开创了历史上的安土桃山时期。织田平定了大半个日本,秀吉继之统一天下,后丰臣氏被德川氏取代。织田信长和丰臣秀吉进行了许多先进的为政举措,推动了日本的现代化。
安土桃山时代历史:安土时代 应仁之乱后,日本各地大名纷纷崛起,战火纷飞,民不聊生。16世纪中叶,一位决心以武力统一日本、结束乱世的枭雄出现,他就是织田信长。永禄三年(1560年),织田信长在桶狭间以两千人马击败今川义元二万五千大军,名声大振。1567年,消灭斋藤并迁都于其本城稻叶山,改名岐阜,从此天下布武。1568年,占领日本首都京都(日语把这一行动称为上洛)。之后统一近畿,并准备进攻山阴、山阳。在此期间,信长修筑了气势宏大、壮丽明快的安土城。因此,信长的时代被称为“安土时代”。 [2] 织田信长在清州(现日本名古屋地区)时推行军事改革,实行“民兵分离”政策,在还处于农业为主的日本有了一支长期稳定的军事力量,从而军事实力迅速强大起来。与此同时美浓地区的斋藤家(在织田信长主政织田家时期,斋藤家与织田家是亲家,即同盟关系)日渐衰落,在”斋藤三老“和竹中半兵卫相继背叛斋藤家转而投靠织田家后,织田信长发动了对斋藤家的战争,占领了斋藤家的居城稻叶山城。后经扩建,织田信长将新城取名”岐阜“(取周文王起于岐山(凤鸣岐山)和孔子之乡曲阜之意)。同时织田信长宣称“天下布武”,表明了武力统一天下的决心。之后,他又趁着正亲町天皇和足利将军请他帮助恢复他们在尾张的领地和权力的时候,取得了统一全国的合法地位。1568年9月,织田信长占据京都,扶立足利义昭为将军,并控制了天皇,挟天子以令诸侯,加快了他统一全国的步伐。 在这些主要步骤之后,他通过大规模的战争控制了大约三分之一的日本。 安土桃山时代大名联盟 织田信长 1560年,全国最强守护大名今川义元试图进攻京都,但1560年5月在桶狭间之战被信长击败战死。信长得到了天皇的支持,并在将军的继位斗争中安置了他自己的候选人。军队撤退后,信长已然控制了幕府。在京都地区,最初的抵抗来自于佛教徒、敌对的大名和敌对的商人。为了摆脱敌人的包围,信长在1571年首先以世俗的力量击败了富有战斗性的天台宗僧人,并且破坏了他们在京都附近的的修道中心比睿山,还杀死了数千的僧侣。1573年,他战胜了当地的大名,放逐了最后一个足利将军,开创了历史上的安土桃山时期。这个时期以信长和秀吉的城堡命名。在这些主要步骤之后,信长在琵琶湖畔的安土建造了七层的,用石头墙壁围着的城堡。城堡可以承受火枪的打击,成为战国时期的标志。信长授予被征服大名封地,清除免税商业的障碍,把受贬抑的宗教团体和商人拉拢到他自己的军事体系中,因此增长了自己的实力。他通过大规模的战争控制了大约三分之一的省,还设立并实施了一系列的行政管理制度,例如系统的村庄组织,税收和标准化的量度。同时,其他的大名包括已经被信长征服的和他控制之外的,也建造了他们自己的极其坚固的城堡并使他们的驻军现代化。1577年,信长派他的主要战将,秀吉去攻占西本州的十二个省。这场战争拖延了。1582年,当信长带领军队支援秀吉的时候,被手下武将明智光秀谋反杀害。在消灭了明智光秀之后,秀吉成为信长未成年长孙(织田秀信,幼名三法师)的保护者之一。1584年,秀吉消灭了柴田胜家,逼迫织田信长三子织田信孝自杀,并迫使信长次子织田信雄投降,完全控制了京都,成为信长无可争议的继承人。秀吉生来就是没有姓氏的农民,他被藤原家收为养子,被赐姓丰臣,成为贵族,并得到了关白的职位。这意味着全日本的内政和军事都为他所控制。之后的一年中,他维持了与九个主要大名中三个的同盟,并继续在四国和北九州的战争。1590年,秀吉动用20万军队,战胜了控制东本州关东地区的最后一个敌手。剩下的大名都投降了,日本战国时代的战争就结束了。秀吉独裁控制全日本,通过直接的手段或是盟誓的陪臣。新的中央政府体系开始运作。国家被一个大名联盟统一了,但是还是分散化的。 丰臣秀吉是日本战国时期最出类拔萃的历史人物。织田信长,丰臣秀吉在进行统一日本伟大事业过程中所开辟的安土桃山时代成为日本历史中最辉煌灿烂的时代。 [2] 安土桃山时代大乱求治 十五世纪,日本在室町幕府统治时期发生了应仁之乱。各地方的守护大名为扩大自己的势力范围进行着战争,室町幕府的中央统治名存实亡。在全国性的割据战争中,许多守护大名灭亡了,同时,又有许多武士崛起成为战国大名。到了十六世纪,这种情形愈演愈烈,成为燎原之势。在这些新崛起的战国大名中,又以毛利元就和斋藤道三为突出。毛利元就原来是依附于统治日本中国地方的大诸侯大内氏的武士,社会地位低,但是机谋超群,又极具野心。当大内义隆受到家臣陶晴贤的反叛而被谋害时,毛利元就抓住时机出兵攻击远比自己强大的陶晴贤。在消灭陶晴贤的过程中,大大的扩展了自己的势力范围,进而控制了几乎整个中国地方,成为威震日本诸岛的霸主。 斋藤道三原名长井规秀,是一个卖油郎。此人智谋过人,具有雄才大略。他侍奉美侬国(今歧阜县)守护大名土歧氏。1542年春。他突然起兵发动兵变,驱逐了家主土歧赖艺,自领美侬国战国大名。 在原有的守护大名中,也不乏佼佼者。甲信地区的甲斐国(今山梨县)一直由武田氏世领。其大名武田信虎的长子武田信玄起兵驱逐了父亲并取而代之。随后,武田信玄东征西讨,雄霸信浓,成为甲斐之虎。此外,越后的上杉氏、关东的后北条氏、东海道的今川氏、九州地区的岛津氏以及四国地区的长宗我部氏也有出色的表现。 在尾张国(今爱知县),在十六世纪中叶,出现了一位出色的英雄,他就是向来被人非议的“尾张大傻瓜”织田信长。1548年,织田信长继承父业成为织田家主。此时,他的势力极其弱小,没有人会在意他。但是。美侬国的大名斋藤道三独具慧眼,断定信长必成霸业。1556年,他把女儿斋藤归蝶嫁给了信长,并要把领下的美侬国作为嫁妆。其子斋藤义龙对此十分不满,杀害了自己的父亲,成为家主,并与信长为敌。 1560年春,控制了骏河、远江、三河三国的大诸侯今川义元经过充分准备后,集中了大批军队向毗邻的尾张国发动了战争,并势不可挡地连克尾张数城,兵临尾张国居城清州城(今名古屋市)下,企图打开进军京都的通道。当时,织田信长势单力薄,灭亡只是瞬息间的事,就连他的部将也认为无力回天。但是,奇迹在织田信长手上发生了。5月17日深夜,织田信长单骑率几百名亲兵冒雨突向正在桶狭间休息的今川义元大军,斩下了武勇无双免得今川义元的首级。信长的部将们闻讯纷纷赶来助战,一夜之间,3000人的信长军队全歼了来犯的25000人今川军队。“桶狭间会战”改写了日本历史,它把织田信长推向了历史的前台。 1562年,在今川家为人质的松平家家主松平元康(即德川家康)乘今川氏桶狭间会战失败后元气大伤之际,在三河国冈崎城(今爱知县)独立。织田信长与德川家康结盟,命家康抵御武田信玄的扩张,开始了北伐美侬国,为岳父报仇的征程。 “墨俣筑城”是织田信长从尾张开始向外发展的一个具有战略意义的事件。这个事件的主角就是丰臣秀吉。
|
[
"织田信长和丰臣秀吉。"
] | 3,366
|
multifieldqa_zh
|
zh
| null |
c464612fd58ce0dcdff5729d367548370b3f48076b14852c
|
在2012年,铜仁市的财政总收入增长了多少?
|
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和其他列席会议的同志提出意见。
一、2012年政府工作回顾
2012年是撤地设市后的第一年,也是我市经济社会发展取得显著成效的一年。在省委、省政府和市委的坚强领导下,在市人大和市政协的监督、支持下,市人民政府紧扣主基调、主战略,抢抓国发2号文件和武陵山片区扶贫攻坚规划的历史性机遇,努力克服国内经济下行等不利因素影响,加快“三化”同步,推进“一业”振兴,全面完成了市一届人大一次会议确定的各项目标,开创了发展提速、转型加快、结构向优、活力增强、民生改善的新局面。
2012年,是发展速度明显加快、经济保持高位运行的一年。预计,全年地方生产总值447亿元,增长17%,实现了人均GDP破万元。全社会固定资产投资700亿元,增长65.1%;财政总收入63.73亿元,增长25.89%;公共财政收入36.57亿元,增长28.73%;社会消费品零售总额106.2亿元,增长18%;城镇居民人均可支配收入16338元,增长18%;农民人均纯收入4802元,增长20%。固定资产投资增速全省第二,城镇居民人均可支配收入增速全省第一,旅游总收入增速全省第三,税收收入增速全省第四,农民人均纯收入增速全省第六。
2012年,是基础设施大为改善、发展条件不断夯实的一年。交通运输建设突飞猛进。长昆铁路加快建设,铜玉城际铁路实质性开工前期准备有序推进;铜大高速建成通车,新增高速公路56公里,结束了铜仁中心城区与外界无高速公路连接的历史;杭瑞高速铜仁段、思剑高速加快建设,铜仁至松桃、沿河至德江、江口至石阡高速实质性开工,铜仁至怀化、铜仁环城高速前期工作基本完成,在建高速公路里程513.1公里;实施国省干道改造60公里,完成通村油路建设1426公里,通村油路率从上年的22.5%提高到31%;铜仁凤凰机场改扩建工程实质性开工,铜仁至贵阳航班加密至每天往返8个班次,至广州航线复航实现周往返4个班次;乌江航道整治工程和通航设施建设加快推进。水利建设“三位一体”规划深入实施。松桃道塘、石阡花山水库已下闸蓄水,德江长丰水库建设加快,江口鱼粮、玉屏白岩河、印江栗子园、松桃盐井、思南过水湾5座中型水库开工建设,实施71座水库除险加固工程,万山小云南、大兴水利枢纽工程等8座中型水库和松桃陆家坝、玉屏青山冲等5座小(1)型水库项目前期工作有序开展。全年新增解决农村饮水安全34万人,新增、改善、恢复灌溉面积14万亩,增加烟水配套灌溉面积5.45万亩,农村人均有效灌溉面积达到0.62亩;完成石漠化治理面积138.96平方公里,森林覆盖率达到52.98%,提高1.51个百分点。电力、通信等基础设施建设加快推进。沙沱电站准备下闸蓄水,铜松500千伏输电线路工程等6个项目开工建设,电力保障能力进一步加强;全市移动电话拥有率达42%,移动通信基站达3900个,互联网用户达14万户。
2012年,是发展质量不断提升、经济结构更加优化的一年。预计三次产业结构由上年的28.93:27.93:43.14调整为26.80:29.50:43.70,实现由农业经济向工业经济实质性转型,经济增长的协调性不断增强,质量进一步提高。工业经济平稳较快增长。启动建设黔东工业聚集区,推动工业经济集群发展。全市12个工业园区开工建设基础设施项目119个,完成投资83.9亿元,基本实现“五通一平”,建成标准厂房120万平方米,园区基础设施建设取得阶段性突破;大兴工业园区被认定为省级高新技术产业园区,大龙开发区被省确定为“511”产业示范园区,碧江区、印江县、沿河县工业园区被认定为省级经济开发区。开工、续建工业项目507个,建成投产204个,创年度投产工业项目历史最好水平,全市规模工业企业从上年的236家增加到368家,完成规模以上工业增加值70亿元,增长21%。在工业经济总量快速扩张的同时,轻重工业比例从上年的19.8:80.2调整为28.2:71.8,工业结构持续调优、效益继续向好;民营经济所占比重由上年的45%提高到48%,县域经济比重由上年的70%提高到75%,经济活力更加增强。现代农业稳步推进。以实施“三个万元”工程为抓手,以现代农业产业园区建设为载体,加快发展茶叶、蔬果、核桃、中药材、油茶五大主导产业,全市粮经比从上年的47:53调整为43:57,茶园面积达103.5万亩,居全省第二。规划建设畜牧产业示范区8个、生态环保型网箱养殖示范园区3个、特种野猪养殖场176个、竹鼠养殖场233个、大鲵人工养殖场31个,肉类总产量25.4万吨,增长12.79%。规划建设农业产业园区28个,松桃县、江口县扶贫产业示范园区被列为省级试点;新增县级以上龙头企业134家、农民专业合作社535家,农产品加工转化率提高到34.3%;组建茶叶行业协会,启动茶叶品牌整合工作。完成烟叶收购70.49万担。预计农林牧渔业总产值197亿元,增长9.8%。以文化旅游产业为核心的服务业快速增长。启动环梵净山“金三角”文化旅游创新区建设,成功举办市第一届旅发大会、贵州梵净山文化旅游节、中华龙舟大赛等节会赛事,在央视、凤凰卫视等高端媒体开展了铜仁形象宣传,梵净山、大明边城、石阡温泉群创建为国家4A级景区,万山汞矿遗址列入中国申报世界文化遗产预备名录,预计全年旅游收入158.8亿元,增长75.5%。现代物流、会展、商贸等服务业加快发展,公路旅客周转量和货物周转量分别增长67.9%和52.8%,预计服务业增加值195亿元,增长20%。
|
[
"2012年,铜仁市的财政总收入增长了25.89%。"
] | 2,344
|
multifieldqa_zh
|
zh
| null |
95c1287ed87364578a97ee0a5ccc4ce95f74b24e6fef7251
|
禹在治理九州的过程中遇到了哪些困难?
|
本紀·史 記 卷 二 夏本紀第二_史志地理_扫花网
本紀·史 記 卷 二 夏本紀第二
夏禹,【集解】謚法曰:「受禪成功曰禹。」【正義】夏者,帝禹封國號也。帝王紀云:「禹受封爲夏伯,在豫州外方之南,今河南陽翟是也。」名曰文命。【索隱】尚書云「文命敷于四海」,孔安國云「外布文德教命」,不云是禹名。太史公皆以放勳、重華、文命爲堯、舜、禹之名,未必爲得。孔又云 「虞氏,舜名」,則堯、禹、湯皆名矣。蓋古者帝王之號皆以名,後代因其行,追而爲謚。其實禹是名。故張晏云「少昊已前,天下之號象其德;顓頊已來,天下之號因其名」。又按:系本「鯀取有辛氏女,謂之女志,是生高密」。宋衷云「高密,禹所封國」。【正義】帝王紀云:「父鯀妻脩己,見流星貫昴,夢接意感,又吞神珠薏苡,胸坼而生禹。名文命,字密,身九尺二寸長,本西夷人也。大戴禮云『高陽之孫,鯀之子,曰文命』。楊雄蜀王本紀云『禹本汶山郡廣柔縣人也,生於石紐』。」括地志云:「茂州汶川縣石紐山在縣西七十三里。華陽國志云『今夷人共營其地,方百里不敢居牧,至今猶不敢放六畜。」按:廣柔,隋改曰汶川。禹之父曰鯀,鯀之父曰帝顓頊,【索隱】皇甫謐云:「鯀,帝顓頊之子,字熙。」又連山易云「鯀封於崇」,故國語謂之「崇伯鯀」。系本亦以鯀爲顓頊子。漢書律曆志則云「顓頊五代而生鯀」。按:鯀既仕堯,與舜代系殊懸,舜即顓頊六代孫,則鯀非是顓頊之子。蓋班氏之言近得其實。顓頊之父曰昌意,昌意之父曰黃帝。禹者,黃帝之玄孫而帝顓頊之孫也。禹之曾大父昌意及父鯀皆不得在帝位,爲人臣。
當帝堯之時,鴻水【索隱】一作「洪」。鴻,大也。以鳥大曰鴻,小曰鴈,故近代文字大義者皆作「鴻」也。滔天,浩浩懷山襄陵,下民其憂。堯求能治水者羣臣四嶽皆曰鯀可。堯曰:「鯀爲人負命毀族,不可。」四嶽曰:「等之未有賢於鯀者,願帝試之。」於是堯聽四嶽,用鯀治水。九年而水不息,功用不成。於是帝堯乃求人,更得舜。舜登用,攝行天子之政,巡狩。行視鯀之治水無狀,【索隱】言無功狀。乃殛鯀於羽山以死。【正義】殛音紀力反。鯀之羽山,化爲黃熊,入于羽淵。熊音乃來反,下三點為三足也。束??發蒙紀云:「鱉三足曰熊。」天下皆以舜之誅爲是。於是舜舉鯀子禹,而使續鯀之業。
堯崩,帝舜問四嶽曰:「有能成美堯之事者使居官?」皆曰:「伯禹爲司空,可成美堯之功。」舜曰:「嗟,然!」命禹:「女平水土,維是勉之。」禹拜稽首,讓於契、后稷、皋陶。舜曰:「女其往視爾事矣。」
禹爲人敏給克勤;其德不違,其仁可親,其言可信;聲為律【索隱】言禹聲音應鍾律。,身爲度,【集解】王肅曰:「以身為法度。」【索隱】按:今巫猶稱「禹步」。稱以出;【集解】徐廣曰:「一作「士」。」索隱按:大戴禮見作「士」。又一解云,上文聲與身爲律度,則權衡亦出於其身,故云「稱以出」也。亹亹穆穆,爲綱爲紀。
禹乃遂與益、后稷奉帝命,命諸侯百姓興人徒以傅土,行山表木,【集解】尚書「傅」字作「敷」。馬融曰:「敷,分也。」【索隱】尚書作「敷土隨山刊木」。今案:大戴禮作「傅土」,故此紀依之。傅即付也,謂付功屬役之事。若尚書作「敷」,敷,分也,謂令人分布理九州之土地也。表木,謂刊木立爲表記,與孔注書意異。定高山大川。【集解】馬融曰:「定其差秩祀禮所視也」。駰案:尚書大傳曰「高山大川,五嶽、四瀆之屬」。禹傷先人父鯀功之不成受誅,乃勞身焦思,居外十三年,過家門不敢入。薄衣食,致孝于鬼神。【集解】馬融曰:「祭祀豐絜。」卑宮室,致費於溝淢。【集解】包氏曰:「方里爲井,井閒有溝,溝廣深四尺。十里爲成,成閒有淢,淢廣深八尺。」陸行乘車,水行乘船,泥行乘橇,【集解】徐廣曰:「他書或作『蕝』。」駰案:孟康曰「橇形如箕,擿行泥上」。如淳曰「橇音『茅蕝』之『蕝』。謂以板置泥上以通行路也「泥」上原有「其」字,據高山本刪。按:徐鍇說文解字繫傳「欙」字條、御覽卷八二引史記如淳注並作「其」字,漢書卷二九溝洫志顏師古注引同。」。【正義】按:橇形如船而短小,兩頭微起,人曲一腳,泥上擿進,用拾泥上之物。今杭州、溫州海邊有之也。山行乘檋。【集解】徐廣曰:「,一作『橋』,音丘遙反。」駰案:如淳曰「檋車漢書卷二九溝洫志顏師古注引如淳無「車」字。,謂以鐵如錐頭,長半寸,施之履下,以上山不蹉跌也」。又音紀錄反。【正義】按:上山,前齒短,後齒長;下山,前齒長,後齒短也。檋音與是同也。左準繩,右規矩,【集解】王肅曰:「左右言常用也。」【索隱】左所運用堪爲人之準繩,右所舉動必應規矩也。載四時,【集解】王肅曰:「所以行不違四時之宜也。」以開九州,通九道,陂九澤,度九山。令益予眾庶稻,可種卑溼。命后稷予眾庶難得之食。食少,調有餘相給,以均諸侯。禹乃行相地宜所有以貢,及山川之便利。
禹行自冀州始。冀州:既載【集解】孔安國曰:「堯所都也。先施貢賦役,載於書也。」鄭玄曰:「兩河閒曰冀州。」【正義】:按理水及貢賦從帝都爲始也。黃河自勝州東,直南至華陰,即東至懷州南,又東北至平州碣石山入海也。東河之西,西河之東「西河」,原作「南河」。尚書禹貢「夾石碣石,入于河」孔穎達疏:「東河之西,西河之東,南河之北,是冀州之境也。」今據改。,南河之北,皆冀州也。壺口,治梁及岐。【集解】鄭玄曰:「地理志壺口山在河東北屈縣之東南,梁山在左馮翊夏陽,岐山在右扶風美陽。」【索隱】鄭玄曰:「地理志壺口山在河東北屈縣之東南,梁山在左馮翊夏陽,岐山在右扶風美陽。」【正義】括地志云:「壺口山在慈州吉昌縣西南五十里冀州境也。梁山在同州韓城縣東南十九里,岐山在岐州岐山縣東北十里,二山雍州境也」孔安國曰:「從東循山理水而西也。」既脩太原,至于嶽陽。【集解】孔安國曰:「太原今爲郡名。太嶽在太原西南。山南曰陽。」【索隱】嶽,太嶽,即冀州之鎮霍太山也。按:地理志霍太山在河東彘縣東。凡如此例,不引書者,皆地理志文也。【正義】括地志云:「霍太山在沁州沁原縣西七八十里「霍太山」,黃本、彭本、柯本、凌本、殿本作「霍山」,下文「至于太嶽」正義引括地志同。。」覃懷致功,【集解】孔安國曰:「覃懷,近河地名。」鄭玄曰:「懷縣屬河內。」【索隱】按:河內有懷縣,今驗地無名「覃」者,蓋「覃懷」二字或當時共爲一地之名。至於衡漳。【集解】孔安國曰:「漳水橫流。」【索隱】案:孔注以衡爲橫,非。王肅云「衡,漳,二水名。」地理志清漳水出上黨沾縣,東北至阜城縣入河。濁漳水出上黨長子縣,東至鄴入清漳也。【正義】括地志云:「故懷城在懷州武陟縣西十一里。衡漳水在瀛州東北百二十五里平舒縣界也。」其土白壤。【集解】孔安國曰:「土無塊曰壤。」賦上上錯,【集解】孔安國曰:「上上,第一。錯,雜也,雜出第二之賦。」田中中,【集解】孔安國曰:「九州之中爲第五。」常、衛既從,大陸既爲。【集解】鄭玄曰:「地理志恒水出恒山,衛水在靈壽,大陸澤在鉅鹿。」【索隱】此文改恒山、恒水皆作「常」,避漢文帝諱故也。常水出常山上曲陽縣,東入滱水。衛水出常山靈壽縣,東入虖池。郭璞云「大陸,今鉅鹿北廣河澤是已」。爲亦作也。鳥夷皮服。【集解】鄭玄曰:「鳥夷,東北之民賦食鳥獸者尚書禹貢「島夷皮服」孔穎達疏引鄭玄注作「東方之民搏食鳥獸者」。。」孔安國曰:「服其皮,明水害除。」【正義】括地志云:「靺鞨國,古肅慎也,在京東北萬里已下,東及北各抵大海。其國南有白山,鳥獸草木皆白。其人處山林閒,土氣極寒,常爲穴居,以深爲貴,至接九梯。養豕,食肉,衣其皮,冬以豬膏塗身,厚數分,以禦風寒。貴臭穢不絜,作廁於中,圜之而居。多勇力,善射。弓長四尺,如弩,矢用楛,長一尺八寸,青石爲鏃。葬則交木作槨,殺豬積槨 上,富者至數百,貧者數十,以爲死人之糧。以土上覆之,以繩繫於槨。頭出土上,以酒灌酹,繩腐而止,無四時祭祀也。」夾右碣石,【集解】孔安國曰:「碣石,海畔之山也。」入于海。【集解】徐廣曰:「海,一作『河』。」【索隱】地理志云「碣石山在北平驪城縣西南」。太康地理志云「樂浪遂城縣有碣石山,長城所起」。又水經云「在遼西臨渝縣南水中」。蓋碣石山有二,此云「夾右碣石入于海」,當是北平之碣石。
濟、河維沇州:【集解】鄭玄曰:「言沇州之界在此兩水之閒。」九河既道,【集解】馬融曰:「九河名徒駭、太史、馬頰、覆釜、胡蘇、簡、絜、鉤盤、鬲津。」雷夏既澤,雍、沮會同,【集解】鄭玄曰:「雍水、沮水相觸而合入此澤中,地理志曰雷澤在濟陰城陽縣西北。」【索隱】爾雅云「水自河出爲雍」也。【正義】括地志云:「雷夏澤在濮州雷澤縣郭外西北。雍、沮二水在雷澤西北平地也。」桑土既蠶,於是民得下丘居土。【集解】孔安國曰:「大水去,民下丘居平土,就桑蠶。」其土黑墳,【集解】孔安國曰:「色黑而墳起。」草繇木條。【集解】孔安國曰:「繇,茂;條,長也。」田中下,【集解】孔安國曰:「第六。」賦貞,作十有三年乃同。【集解】鄭玄曰:「貞,正也。治此州正作不休,十三年乃有賦,與八州同,言功難也。其賦下下。」其貢漆絲,其篚織文。
|
[
"禹遇到了山川地势复杂、土壤贫瘠、水患频繁等问题。"
] | 3,675
|
multifieldqa_zh
|
zh
| null |
4790b222821945c96a12a0d762cb39d25d2aef973f0a27c0
|
主人公身边陆续出现了什么样的人物?
|
超强兵王在都市 江城子_杭州趣阅_超强兵王在都市最新章节_笔趣阁
笔趣阁 > 超强兵王在都市最新章节列表
作 者:江城子_杭州趣阅
最新更新:正文_第1545章 药到病除
关 键 词:超强 兵王 都市 江城 杭州 趣阅
厌倦了战场的刀光剑影,兵王吴敌选择回到了都市。自此以后,他的身边就不断有美女纷纷上门。邻家可人的大姐姐,冷艳高贵的女总裁,妩媚动人的交际花,还有火爆热辣的女警花。面对着花花世界,吴敌说他喜欢海。其实,他喜欢浪……
《超强兵王在都市》正文
正文_第1章美女,喝一杯
正文_第2章邻家有女初长成
正文_第3章我只有十个巴掌
正文_第4章你这个流氓
正文_第5章这样不公平
正文_第6章看够了没有?
正文_第7章我是她男朋友
正文_第8章每桌再来一份
正文_第9章大点声音我听不见
正文_第10章不敢开口
正文_第11章同意不同意?
正文_第12章闹够了没有?
正文_第13章剁你三刀
正文_第14章说话算话
正文_第15章蜻蜓点水
正文_第16章江山如画
正文_第17章心潮微荡
正文_第18章阿虎上茶
正文_第19章以牙还牙
正文_第20章少爷英明
正文_第21章您猜,几箭?
正文_第22章困兽之斗
正文_第23章我不是他的对手
正文_第24章破例
正文_第25章好笑的笑话
正文_第26章管教无方
正文_第27章我是他邻居
正文_第28章美女夜敲门
正文_第29章还是你的
正文_第30章少女心事
正文_第31章温柔乡,英雄冢
正文_第32章有恃无恐
正文_第33章要地还是要命?
正文_第34章知道他是谁吗?
正文_第35章鞍前马后
正文_第36章美人如玉
正文_第37章不讲道理
正文_第38章你说我敢不敢
正文_第39章领带很漂亮
正文_第40章我完全赞成
正文_第41章卖艺不卖身
正文_第42章投其所好
正文_第43章什么都没有
正文_第44章谁是土鳖?
正文_第45章车中睡美人
正文_第46章西山飙车
正文_第47章美女钟倩倩
正文_第48章精湛的漂移
正文_第49章阴谋诡计
正文_第50章狭路相逢
正文_第51章我帅吗?
正文_第52章不,是我可以一试
正文_第53章王者归来
正文_第54章抱一下怎么了?
正文_第55章总裁在下我在上
正文_第56章来者不善
正文_第57章一定很疼吧?
正文_第58章大家一起喝
正文_第59章小二,上酒
正文_第60章怎么还没来?
正文_第61章左撇刀白阳明
正文_第62章让你三刀
正文_第63章一刀封侯
正文_第64章你拿什么还?
正文_第65章有种的男人
正文_第66章警官,别怕
正文_第67章时候不早了
正文_第68章特殊对待
正文_第69章怪人张星宇
正文_第70章因祸得福
正文_第71章画地为牢
正文_第72章只手遮天
正文_第73章还望先生原谅
正文_第74章金鹰战队
正文_第75章受人所托
正文_第76章真的很好看
正文_第77章东湖东山
正文_第78章这墙,透风!
正文_第79章那你就去死好了
正文_第80章不哭不上吊
正文_第81章见风使舵
正文_第82章见义勇为
正文_第83章你更不配!
正文_第84章恭敬不如从命
正文_第85章掌灯等郎归
正文_第86章主动和拒绝
正文_第87章两人小幸福
正文_第88章河东河西
正文_第89章昔我故友叼似卿
正文_第90章狗眼看人低
正文_第91章人不可貌相
正文_第92章低调做人,高调做事
正文_第93章唱歌给你听
正文_第94章双簧
正文_第95章为了找到你
正文_第96章老友重逢
正文_第97章我要出尽风头
正文_第98章浪漫的夜晚
正文_第99章玉女秦水瑶
正文_第100章同台表演
正文_第101章小妖精哪里逃?
正文_第102章停车坐爱枫林晚
正文_第103章最美的风景
正文_第104章美人在床
正文_第105章角色扮演
正文_第106章百口难辩
正文_第107章出事
正文_第108章狼子野心
正文_第109章盛大的晚宴
正文_第110章伪装者
正文_第111章龙有逆鳞,触者杀之!
正文_第112章高手温白
正文_第113章一龙双凤
正文_第114章孤胆英雄
正文_第115章请不要浪费我的时间
正文_第116章一起上吧,我赶时间
正文_第117章真以为我不敢杀你?
正文_第118章威胁
正文_第119章高手出击
正文_第120章龙争虎斗
正文_第121章很讲信用的人
正文_第122章羞辱
正文_第123章温暖的怀抱
正文_第124章刚刚好
正文_第125章随便看看
正文_第126章致命的诱惑
正文_第127章远方来的小姨
正文_第128章皇家驿站
正文_第129章我有男朋友了
正文_第130章绵里藏针
正文_第131章九六年拉菲
正文_第132章城里人真会玩
正文_第133章同台的原因
正文_第134章我帮不上你
正文_第135章什么要求都可以
正文_第136章这个热度够不够?
正文_第137章我的刀法怎么样?
正文_第138章威慑
正文_第139章站住不动
正文_第140章离职风潮
正文_第142章随便多少钱
正文_第143章毋庸置疑
正文_第144章守株待兔
正文_第145章一掷千金
正文_第146章狂犬吠日
正文_第147章杀一个人
正文_第148章偷袭
正文_第149章不可能的事
正文_第150章瓮中捉鳖
正文_第151章心狠手辣
正文_第152章看一场烟火
正文_第153章机不可失
正文_第154章最安全的地方
正文_第155章能不能快点
正文_第156章薛虎的心结
正文_第157章美女姐姐的秘密
正文_第158章半夜看球
正文_第159章好奇害死猫
正文_第160章少女的心事
正文_第161章昨夜枪响
正文_第162章背后的故事
正文_第163章送钟
正文_第164章放在你头上
正文_第165章名医高翔
正文_第166章我姓高
正文_第167章已经成功
正文_第168章榕树好看吗?
正文_第169章情动一吻
正文_第170章这个保镖,有点爆表
正文_第171章生命高于一切
正文_第172章偏偏为她开了口
正文_第173章引狼入室
正文_第174章房间里的大浴缸
正文_第175章两不相欠
正文_第176章从今往后,我保护你
正文_第177章还有什么好说的?
正文_第178章吴先生说不要
正文_第179章蒋丽求医
正文_第180章这般了得
正文_第181章很好的狡辩
正文_第182章无地自容
正文_第183章喜欢不喜欢?
正文_第184章同居一屋
正文_第185章睡在你怀里
正文_第186章梧桐树下
正文_第187章别有洞天
正文_第188章插花之登云梯
正文_第189章没有旁人来过
正文_第190章真正的杀手
正文_第191章闯出来的名号
正文_第192章三只大耗子
正文_第193章神来之笔
正文_第194章鹤立鸡群
正文_第195章八仙过海,各显神通
正文_第196章高熙的礼物
正文_第197章我真想知道
正文_第198章够不够资格?
正文_第199章真是可笑
正文_第200章终于开了口
正文_第201章告诉我
正文_第202章好财更好色
正文_第203章有些话想和你说
正文_第204章风中喝问
正文_第205章喊点人过来
正文_第206章削死他
正文_第207章把头抬起头来
正文_第208章江湖和道
正文_第209章猫戏老鼠
正文_第210章丧心病狂
正文_第211章同归于尽
正文_第212章再去枫林晚
正文_第213章情动
正文_第214章爱
正文_第215章是我主动的
正文_第216章明珠售楼部
正文_第217章自知之明
正文_第218章一介刁民
正文_第219章态度
正文_第220章滚人
正文_第221章好风凭借力
正文_第222章暂时不营业
正文_第223章赌
正文_第224章赌注不兑现
正文_第225章没有你这么不孝的孙子
正文_第226章这样的男人
正文_第227章屋里进了贼
正文_第228章睁开眼看好
正文_第229章偷鸡不成蚀把米
正文_第230章睡美人之媚
正文_第231章南山南
正文_第232章率先发难
正文_第233章拼酒
正文_第234章真是一个软蛋
正文_第235章现场直播
正文_第236章纵马奔腾
正文_第237章彩头
正文_第238章汗血宝马
正文_第239章得意忘形
正文_第240章它疯了吗?
正文_第241章好看
正文_第242章赏你一个香吻
正文_第243章卖弄
正文_第244章真是痛快
正文_第245章舞剑
正文_第246章你要杀我?
正文_第247章茶汤如血
正文_第248章你有没有这个幸运?
正文_第249章来杀
正文_第250章分道扬镳
正文_第251章百分之百
正文_第252章同房
正文_第253章煎熬
正文_第254章两个人的狩猎
正文_第255章公平
正文_第256章真正的杀招
正文_第257章不要你的命
正文_第258章阴影面积
正文_第259章你来干什么?
正文_第260章有文化的无赖
正文_第261章谁是小白脸?
正文_第262章守护者
正文_第263章腿万年
正文_第264章按摩
正文_第265章白云山
正文_第266章这座山有古怪
正文_第267章借宿
正文_第268章诡谲
正文_第269章真地好好笑
正文_第270章深夜十二点
正文_第271章 秘密
正文_第272章 吴玄机
正文_第273章天碑
正文_第274章观碑悟道
正文_第275章不得玄妙
正文_第276章凭你?也配?
正文_第277章象形文字
正文_第278章徐徐上山
正文_第279章走马观花
正文_第280章一日看尽百玄碑
正文_第281章再遇秦水瑶
正文_第282章谁是傻比?
正文_第283章你好坏
正文_第284章水潭沐浴
正文_第285章动情
正文_第286章不顾一切
正文_第287章孙渺的风情
正文_第288章脱了
|
[
"主人公身边陆续出现了众多美女,有邻家可人的大姐姐,冷艳高贵的女总裁,妩媚动人的交际花,还有火爆热辣的女警花。"
] | 4,133
|
multifieldqa_zh
|
zh
| null |
c9d98e3c86f1a4709342c8cc8e08681c3bf2180136c81634
|
许茂忠是在什么时间将此案诉至法院的?
|
许茂忠与黄长青、中国太平洋财产保险股份有限公司肇庆中心支公司道路交通事故人身损害赔偿纠纷一审民事判决书
原告许茂忠为与被告黄长青、中国太平洋财产保险股份有限公司肇庆中心支公司(以下简称太平洋保险肇庆支公司)机动车交通事故责任纠纷一案,于2014年1月23日诉至本院。本院同日受理后,依法由审判员郑佳适用简易程序独任审理,于2014年3月11日公开开庭进行了审理。原告许茂忠及其委托代理人赵有水到庭参加诉讼。被告黄长青、太平洋保险肇庆支公司经本院传票传唤,无正当理由拒不到庭,本院依法缺席审理。本案现已审理终结。
原告许茂忠诉称:2012年10月24日上午12时,原告在外伍村驾驶电动三轮车路过被告黄长青家门口时,被告黄长青驾驶辽06-33078号拖拉机实施倒车的过程中,不慎碰撞后方原告驾驶的电动三轮车,造成原告受伤、电动三轮车损坏的道路交通事故。根据临安市公安局交通警察大队道路交通事故认定书的认定,被告黄长青负事故的全部责任。原告受伤后送到於潜人民医院治疗,住院27天,共花去医疗费13461.89元。为依法保护原告的合法权益,特根据相关法律规定向法院起诉,请求判令被告黄长青赔偿原告医疗费13461.89元、陪护费2160元、交通费500元,共计人民币16121.89元,被告太平洋保险肇庆支公司在机动车交通事故责任强制保险限额内给予赔付;本案诉讼费用由被告黄长青承担。
为支持其主张,原告许茂忠在庭审中向本院提供证据如下:
证据一、道路交通事故认定书(简易程序)、交通事故损害赔偿调解终结书各1份,欲证明本案交通事故发生的经过情况及被告黄长青承担本案事故全部责任,且本案事故已经交警部门调解终结的事实。
证据二、临安市於潜人民医院门诊病历、住院病历各1份,欲证明原告因本案交通事故受伤后的治疗经过及伤势情况。
证据三、临安市於潜人民医院住院收费收据、发票遗失证明、费用清单各1份,欲证明原告因本案事故受伤在临安市於潜人民医院治疗及支付医疗费的情况。
证据四、临安市於潜人民医院的医疗诊断证明书1份,欲证明原告因伤住院期间需一人陪护的事实。
证据五、交通费发票1组,欲证明原告因本案事故受伤治疗花费交通费500元的事实。
证据六、机动车交通事故责任强制保险单一份,欲证明被告黄长青驾驶的辽06-33078号拖拉机在被告太平洋保险肇庆支公司处投保了交强险,本案事故发生与保险期限内的事实。
被告黄长青未在法定期限内进行答辩,亦未提供相关证据。
被告太平洋保险肇庆支公司向本院书面答辨称:1、本案事故应按照法律规定及保险合同的约定在机动车交通事故责任强制保险责任限额范围内分项进行赔偿;2、对原告的具体诉求,其中医疗费在机动车交通事故责任强制保险医疗费用赔偿限额10000元内赔付,发票遗失的不予认可,应提供原始发票,护理费同意按照住院天数27天、40元每天的标准赔偿,交通费应当以正式票据为凭,并与就医地点、时间、人数、次数相符合。综上,请求法院公正判决。
被告太平洋保险肇庆支公司未向本院提供证据。
对原告许茂忠提供的以上证据,被告黄长青未到庭,视为其放弃举证、质证的权利,被告太平洋保险肇庆支公司书面答辩时对证据三中临安市於潜人民医院出具的发票遗失证明有异议,不予认可,对其余证据均未提出异议。本院认为,该发票遗失证明系由原告许茂忠因本案事故受伤后进行治疗的医疗机构所出具,符合有效证据的形式要件,对其证明效力本院予以确认;对原告许茂忠提供的其余证据,本院进行审核后确认其证明效力。
根据上述有效证据及原、被告的陈述,本院查明事实如下:
2012年10月24日12时许,被告黄长青驾驶辽06-33078号拖拉机在临安市潜川镇外伍村地段实施倒车过程中,不慎碰撞后方由原告许茂忠驾驶的三轮电动车,造成原告许茂忠受伤、三轮电动车损坏的道路交通事故。原告许茂忠受伤当日即被送往临安市於潜人民医院治疗并住院,并于同年11月20日出院。2012年10月25日,临安市公安局交通警察大队作出了第1800283964号《道路交通事故认定书(简易程序)》,认定被告黄长青承担事故的全部责任,原告许茂忠无责任。事故发生后,被告黄长青已为原告许茂忠支付医疗费8000元。
另查明:辽06-33078号机动车在被告太平洋保险肇庆支公司投保了机动车交通事故责任强制保险,被保险人为被告黄长青,本案交通事故发生于保险期限内。
本院认为,原告许茂忠主张的医疗费13461.89元、护理费2160元,符合法律规定且有相应证据证明,相关赔偿数额亦属合理,本院予以支持。原告主张的交通费500元,结合其就医地点、时间、次数,本院酌情确定300元。综上,原告许茂忠因本案事故造成的具体损失,本院确认如下:医疗费13461.89元(含被告黄长青支付的8000元)、护理费2160元、交通费300元,以上共计15921.89元。
机动车交通事故责任强制保险(以下简称交强险)是指由保险公司对被保险机动车发生道路交通事故造成本车人员、被保险人以外的受害人的人身伤亡、财产损失,在责任限额内予以赔偿的强制责任保险。上述规定确立了保险公司在交强险范围内对事故承担先行赔付且无过错赔付的基本原则,即投保交强险的机动车发生交通事故,致第三者人身伤亡、财产损失的,由保险公司首先在责任限额内予以赔付。本案中,被告黄长青驾驶的肇事机动车在被告太平洋保险肇庆支公司处投保了交强险,期间发生交通事故,造成原告许茂忠受伤,被告太平洋保险肇庆支公司理应在本案交强险各项责任限额范围内分项予以赔付。因本院所确认的原告许茂忠的13461.89元医疗费损失扣除被告黄长青已支付的8000元后尚未超过本案交强险的医疗费用赔偿限额,其护理费2160元、交通费300元等损失合计亦未超过死亡伤残赔偿限额,故被告太平洋保险肇庆支公司理应在本案交强险各项责任限额范围内赔付原告许茂忠的损失,至于被告黄长青已支付的8000元由其依照有关规定自行向被告太平洋保险肇庆支公司进行理赔。据此,依照《中华人民共和国道路交通安全法》第七十六条第一款、《中华人民共和国侵权责任法》第三条、第十六条、第四十八条、《最高人民法院关于审理人身损害赔偿案件适用法律若干问题的解释》第十七条第一款、第十九条、第二十一条、第二十二条、《最高人民法院关于审理道路交通事故损害赔偿案件适用法律若干问题的解释》第十四条第一款、《机动车交通事故责任强制保险条例》第二十一条第一款、《中华人民共和国民事诉讼法》第一百四十四条之规定,判决如下:
一、原告许茂忠因道路交通事故受伤造成的医疗费、护理费、交通费共计人民币15921.89元,扣除被告黄长青已支付的8000元,余款7921.89元由被告中国太平洋财产保险股份有限公司肇庆中心支公司在辽06-33078号号机动车投保其公司的机动车交通事故责任强制保险责任限额范围内赔偿给原告许茂忠,款限本判决生效之日起十日内付清。
二、驳回原告许茂忠的其他诉讼请求。
如果被告中国太平洋财产保险股份有限公司肇庆中心支公司未按本判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条之规定,加倍支付迟延履行期间的债务利息。
本案受理费400元,减半收取200元,由原告许茂忠负担102元,被告黄长青负担98元,被告黄长青负担部分限于本判决生效之日起十日内交纳。
如不服本判决,可在判决书送达之日起十五日内,向本院递交上诉状,并按对方当事人的人数提出副本,上诉于浙江省杭州市中级人民法院,并向浙江省杭州市中级人民法院预交上诉案件受理费400元。对财产案件提起上诉的,案件受理费按照不服一审判决部分的上诉请求预交。在上诉期满之日起七日内仍未交纳的,按自动撤回上诉处理(浙江省杭州市中级人民法院开户银行为工行湖滨分理处,帐号为12×××68)。
附:相关法律条文
一、《中华人民共和国道路交通安全法》
第七十六条机动车发生交通事故造成人身伤亡、财产损失的,由保险公司在机动车第三者责任强制保险责任限额范围内予以赔偿;不足的部分,按照下列规定承担赔偿责任:
(一)机动车之间发生交通事故的,由有过错的一方承担赔偿责任;双方都有过错的,按照各自过错的比例分担责任。
(二)机动车与非机动车驾驶人、行人之间发生交通事故,非机动车驾驶人、行人没有过错的,由机动车一方承担赔偿责任;有证据证明非机动车驾驶人、行人有过错的,根据过错程度适当减轻机动车一方的赔偿责任;机动车一方没有过错的,承担不超过百分之十的赔偿责任。
……
二、《中华人民共和国侵权责任法》
第三条被侵权人有权请求侵权人承担侵权责任。
第十六条侵害他人造成人身损害的,应当赔偿医疗费、护理费、交通费等为治疗和康复支出的合理费用,以及因误工减少的收入。造成残疾的,还应当赔偿残疾生活辅助具费和残疾赔偿金。造成死亡的,还应当赔偿丧葬费和死亡赔偿金。
第四十八条机动车发生交通事故造成损害的,依照道路交通安全法的有关规定承担赔偿责任。
三、《最高人民法院关于审理人身损害赔偿案件适用法律若干问题的解释》
第十七条受害人遭受人身损害,因就医治疗支出的各项费用以及因误工减少的收入,包括医疗费、误工费、护理费、交通费、住宿费、住院伙食补助费、必要的营养费,赔偿义务人应当予以赔偿。
……
第十九条医疗费根据医疗机构出具的医药费、住院费等收款凭证,结合病历和诊断证明等相关证据确定。赔偿义务人对治疗的必要性和合理性有异议的,应当承担相应的举证责任。
医疗费的赔偿数额,按照一审法庭辩论终结前实际发生的数额确定。器官功能恢复训练所必要的康复费、适当的整容费以及其他后续治疗费,赔偿权利人可以待实际发生后另行起诉。但根据医疗证明或者鉴定结论确定必然发生的费用,可以与已经发生的医疗费一并予以赔偿。
第二十一条护理费根据护理人员的收入状况和护理人数、护理期限确定。
护理人员有收入的,参照误工费的规定计算;护理人员没有收入或者雇佣护工的,参照当地护工从事同等级别护理的劳务报酬标准计算。护理人员原则上为一人,但医疗机构或者鉴定机构有明确意见的,可以参照确定护理人员人数。
护理期限应计算至受害人恢复生活自理能力时止。受害人因残疾不能恢复生活自理能力的,可以根据其年龄、健康状况等因素确定合理的护理期限,但最长不超过二十年。
受害人定残后的护理,应当根据其护理依赖程度并结合配制残疾辅助器具的情况确定护理级别。
第二十二条交通费根据受害人及其必要的陪护人员因就医或者转院治疗实际发生的费用计算。交通费应当以正式票据为凭;有关凭据应当与就医地点、时间、人数、次数相符合。
四、《最高人民法院关于审理道路交通事故损害赔偿案件适用法律若干问题的解释》
第十四条道路交通安全法第七十六条规定的“人身伤亡”,是指机动车发生交通事故侵害被侵权人的生命权、健康权等人身权益所造成的损害,包括侵权责任法第十六条和第二十二条规定的各项损害。
……
五、《机动车交通事故责任强制保险条例》
第二十一条被保险机动车发生道路交通事故造成本车人员、被保险人以外的受害人人身伤亡、财产损失的,由保险公司依法在机动车交通事故责任强制保险责任限额范围内予以赔偿。
……
六、《中华人民共和国民事诉讼法》
第一百四十四条被告经传票传唤,无正当理由拒不到庭的,或者未经法庭许可中途退庭的,可以缺席判决。
|
[
"2014年1月23日。"
] | 4,656
|
multifieldqa_zh
|
zh
| null |
0d334e5ea5df28b76fdd6c5ae46f7a7a8748d2de72f2dc60
|
本产品安全手册由哪家公司出版?
|
'产品安全手册 1 MFC-J2320/J2720 日本名古屋市瑞穗区苗代町 15 番 1 号 邮编:467-8561 兄弟工业株式会社 尝试操作本产品或执行任何维修前,请仔细阅读这本小册子。未能遵循这些说 明可能会增加发生火灾、触电、烧伤或窒息的危险。对于因用户未遵循本手册 中的说明而导致的任何损坏, Brother 概不承担任何责任。 如何使用本手册: 1 使用产品前,请先通读整本手册。请妥善保管好本手册,以便日后查阅。 2 请认真遵循本手册中的说明,并始终确保遵循产品上标注的所有警告事项与说 明进行操作。 3 如果阅读本手册后对产品使用方法仍有疑虑,请联系 Brother 呼叫中心。 4 为确保您能理解所有说明,请仔细阅读本手册中使用的符号和惯例。 版本 A SCHN 1 1
本说明书中使用的符号和惯例 本说明书中使用的符号和惯例如下。 请遵循产品上标注的所有警告事项与说明进行操作。 1 粗体 粗体字表示计算机屏幕上 的按钮。 斜体 斜体字强调应当注意的要 点或提示您参考相关主题。 [xxxxx] 括号内的文字表示产品液 晶显示屏上显示的信息。 提示 本手册中的所有插图均基于MFC-J2720。 警告 警告图标表示可能导致死亡或重伤 的潜在危险情况。 注意 注意图标表示可能导致轻微或中度 伤害的潜在危险情况。 重要事项 重要事项图标表示可能导致财产损 失或产品功能丧失的潜在危险。 提示 提示图标指明操作环境、安装条件 或特殊使用条件。 禁止图标:表示禁止执行的操 作。 此图标表示禁止使用易燃喷雾 剂。 此图标表示禁止使用酒精等有 机溶剂和液体。 触电危险图标:警告您避免可 能发生的触电伤害。 火灾隐患图标:提醒您可能会 引发火灾。 2
编辑及出版说明 1 本产品手册的编辑出版旨在提供截至出版时最新的产品安全信息。手册中包含的 信息如有更改,恕不另行通知。 如需获取电子版说明书,请访问我们的服务支持网站:http://www.95105369.com。 请使用 Brother 原装墨盒 Brother 多功能一体机使用特定墨水工作,建议使用原装 Brother 墨盒以便取得最 佳效果。如果使用其他品牌墨水或墨盒, Brother 将不保证取得最佳效果。不推 荐使用 Brother 原装墨盒以外的其他墨盒,也不推荐使用其他来源的墨水来填充Brother 墨盒。如果由于使用与本产品不兼容或非 Brother 原装墨盒而对打印头或 其他部件造成损坏,都不在保修范围之内。 选择产品的安放位置 1 3
警告 安放环境的温度应保持在 10°C 至 35°C 之间,湿度应保持在 20% 至 80% 之间( 无凝露 )。 切勿将本产品暴露于阳光直射、温度过高、有明火、有腐蚀性气体、潮湿或多 尘的环境中。 否则,可能会造成触电、短路或火灾,也可能会损坏产品或造成产品无法运行。 切勿将本产品放置在化学品附近或化学品可能会泄漏的地方。 如果本产品接触到化学品,可能会造成火灾或触电。 特别是有机溶剂或液体,例如苯、油漆稀释剂、去光水或除臭剂,可能会导致 塑料外壳和 / 或电缆融化或溶解,从而造成火灾或触电。它们或其它化学品也 可能导致产品发生故障或褪色。 注意 请将本产品放置在桌子等平坦、水平、牢固且不易受到摇晃和震动的表面上。 安放位置必须靠近电话插座和标准接地电源插座。 切勿在本产品上放置重物。切勿将本产品放置在不稳固的推车、台子或桌子上, 特别是产品附近有儿童时更是如此。本产品较重,可能会摔落,从而导致您或他 人受伤或产品严重损坏。对于带扫描功能的产品,如果平板扫描器破裂,会增加 受伤的风险。 请勿将本产品放置在人员往来频繁的地方。如果不得不放置在人员往来频繁的 地方,请确保本产品处于不会被意外撞倒的安全位置,否则可能会导致您或他 人受伤或产品严重损坏。 4
重要事项 • 切勿在本产品上放置任何物品,否则可能会增加产品因过热而出现故障的风险。 • 切勿在本产品前放置任何可能会阻碍接收传真或打印页面的物品。切勿在接收 传真或打印页面的输出通道上放置任何物品。 • 切勿将本产品放置在扬声器、非 Brother 无绳电话的主机等干扰源附近,否则 可能会影响本产品的电子元件正常运行。 • 切勿将本产品放置在倾斜或不平整的表面上。安装墨盒后切勿倾斜产品,否则 可能会导致墨水溢出,从而造成产品内部损坏。 5
一般注意事项 警告 1 塑料袋用于包装产品,不是玩具。请将这些塑料袋存放于儿童不易触及的地方 并将其正确处理掉,以防窒息危险。 切勿在任何医疗电气设备附近使用本产品。本产品发出的无线电波可能会影响 医疗电气设备,导致医疗电气设备出现故障,进而可能造成医疗事故。 对于装有心脏起搏器的用户 本产品会产生弱磁场。如果靠近本产品时发现心脏起搏器出现异常情况,请立 即远离产品并就医。 禁止使用易燃物品、任何类型的喷雾剂或有机溶剂 / 含酒精或氨的液体清洁产 品的内部或外部,否则可能会造成火灾或触电。请使用柔软的无绒干抹布清洁 产品。关于如何清洁产品,请参见高级说明书。 注意 请等到纸张从产品中输出后再将其取出,否则辊轮可能会夹伤您的手指。 请勿将手或其它异物伸入墨盒插槽,否则可能会造成人身伤害。 如果拉伸纸盒以备使用 A3、Legal 或 Ledger 等较大尺寸的纸张,请妥善放置本 产品,确保纸盒不会伸出桌子边缘外,以避免有人撞到纸盒,导致产品摔落或 人身伤害。 6
为了防止受伤,请注意不要将手指置于下图所示区域。 (MFC-J2320) 7
将纸盒尺寸从 A3、Legal 或 Ledger 调整到原始尺寸时,请小心不要将手指夹入 纸盒底部的缝隙或沟槽中。 切勿触摸图中所示的阴影部分,否则产品边缘可能会划伤您的手指。 请勿在下图所示的阴影部分上施加任何重力或压力,否则可能会导致自动进稿 器原稿托板 (1) 突然打开。 1 8
切勿握住扫描器盖板、卡纸清除盖、手动进纸槽盖、MP 纸盒或操作面板来移动 产品,否则产品可能会从您的手中滑落。 搬运产品时,请双手握住产品两侧的凹槽把手。 9
搬运产品时,如果已拉伸纸盒以备使用 A3、 Legal 或 Ledger 等较大尺寸的纸 张,请取出纸盒,否则纸张的重量可能会导致纸盒掉落并导致您受伤。 如果墨水沾到皮肤上或者误入眼中或口中,请立即采取以下步骤: • 如果墨水沾到皮肤上,请立即用水和肥皂清洗。 • 如果墨水误入眼中,请立即用清水冲洗。如果置之不理,可能会造成红眼或 轻微发炎。如发现任何异常,请立即就医。 • 如果墨水误入口中,请立即吐出来并就医。 • 更换墨盒时,请注意不要让墨水误入眼中。 • 请将墨盒置于儿童不易触及的地方。 • 严禁吞食墨水。 • 切勿摇晃墨盒,否则可能会有墨水渗漏。 • 切勿拆解墨盒,否则墨水可能会误入眼中或沾到皮肤上。 切勿用手抚摸打印纸张边缘, 否则纸张的锋利边缘可能会造成您受伤。 重要事项 • 断电将会导致产品内存中的信息丢失。 • 切勿将本产品连接到与大功率家电或耗电量巨大的其它设备共用同一电路的电 源插座上。否则,本产品与其它产品同时运行时,可能会产生超额电压,从而 造成断路器跳闸或保险丝熔断。 • Brother 建议您仅使用 Brother 原装墨盒。 使用非 Brother 原装墨盒可能会造成打印头损坏,也可能会导致颜色或打印质 量不稳定。 10
安全连接产品 警告 1 产品内有高压电极。接触产品内部部件前,包括进行清洁等日常维护前,请确 保您已从电源插座上拔下产品电源线,并确保已从产品上拔下所有电话线(RJ-11) 或以太网电缆。 切勿用湿手插拔插头。 始终确保产品插头完全插入电源插座中。 切勿让插头、电源插座或本产品上积满灰尘。 切勿尝试自行维修本产品。打开或拆除盖板可能会造成触电或其他危险,而由此 造成的损坏不在保修范围内。如果需要任何维修,请联系 Brother 特约维修站。 11
切勿让插头或电源插座接触到任何液体。 如果有水、其他液体或金属物体进入到本产品内部,请立即从电源插座上拔下 产品电源插头,然后联系 Brother 特约维修站。 本产品必须连接到符合标签上所标明的额定电压范围内的接地交流电源上。切 勿将本产品连接到直流电源或变压器上,如果无法确定您使用的是哪种电源, 请联系专业电工。 电源线安全性: • 切勿在电源线上放置任何物品。 • 切勿将本产品放置在电源线会被踩踏的地方。 • 切勿将本产品放置在电源线会被拉伸或拉紧的地方。 • 否则,可能会导致电源线损坏或磨损。 本产品配备一个三芯接地型插头。该插头仅适用于接地型电源插座。这一特性 有助于保证安全。如果您无法将产品电源插头插入电源插座中,请联系专业电 工为您更换插座。切勿将随机附带的接地型插头插入非指定插座中,否则可能 会导致触电伤害。 12
安装或改装电话线时请多加注意。 除非电话线已从墙上插座上拔下,否则切勿触碰未经绝缘的电话线或接线端。 切勿在雷雨天气安装电话线。严禁将墙上电话插座安装在潮湿的地方。 如果电源线已经损坏或磨损,切勿使用本产品或处理电源线。拔下产品电源插 头时,切勿碰触到损坏或磨损部分。 拔下产品电源插头时,切勿握住交流电源线中间部位。切勿在电源线上放置任 何物品。切勿将本产品放置在电源线会被踩踏的地方。否则可能会造成触电或 火灾。 Brother 强烈建议您不要使用任何类型的电源拖线板。 13
维修产品 警告 1 如果本产品摔落或者机壳损坏,则可能会造成触电伤害。此时,请从电源插座 上拔下产品的电源插头,并联系 Brother 特约维修站。 如果产品异常发烫、冒烟、释放出一些强烈刺鼻的气味或者您不小心将任何液 体泼洒到本产品上,请立即从电源插座上拨下产品电源插头,并致电 Brother 特 约维修站。 重要事项 遵循使用说明书进行操作时,如果本产品无法正常使用,只可以按照使用说明 书中述及的操作方法进行调整。操作不当可能会造成产品损坏,并增加专业维 修人员的工作量。 14
重要安全说明 1 1 请仔细阅读本说明书中所有的说明。 2 请妥善保管好本说明书,以便日后查阅。 3 请遵循产品上标注的所有警告事项与说明进行操作。 4 清洁产品外部和平板扫描器前,请先从墙上插座中拔出本产品的电源插头。请 勿使用液体或喷雾清洁剂清洁本产品。请使用湿抹布擦拭本产品。 5 请勿将本产品放置在水源附近。 6 请勿将本产品放置在不稳固的推车、台子或桌子上。否则,本产品可能会摔落 而导致严重损坏。 7 机壳内及产品背面或底部的沟槽和开口用于通风;为确保产品正常使用并防止 过热,请勿堵塞或遮盖上述通风口。请勿将本产品放置在床、沙发、地毯或其 他类似表面上,以免堵塞通风口。请勿将本产品放置在散热器或加热器附近或 上方。除非通风状况良好,否则本产品不能进行嵌入式安装。 8 本产品必须连接到符合标签上所标明的额定电压范围内的接地交流电源上。请 勿将本产品连接到直流电源上。如果无法确定,请联系专业电工。 9 本产品配备一个三芯接地型插头。该插头仅适用于接地型电源插座。这一特性 有助于保证安全。如果您无法将产品电源插头插入电源插座中,请联系专业电 工为您更换插座。请勿损坏接地型插头的保护部件。 10请勿在电源线和本产品上放置任何物品。请勿踩踏电源线。 11本产品与电源拖线板配套使用时,请确保与电源拖线板连接的所有产品的额定 电流总值不超过电源拖线板的额定电流值。 12请勿在本产品前放置任何可能会阻碍打印输出的物品。请勿在接收传真的输出 通道上放置任何物品。 13打印期间请勿触摸文档。 14切勿将任何物品塞入本产品机壳的沟槽内,否则可能会触及危险高压部位或使 部件短路,从而造成火灾或触电。切勿在本产品上泼洒任何液体。 15请勿尝试自行维修本产品。打开或拆除盖板可能会造成触电和 / 或其他危险, 而由此造成的损坏不在保修范围内。如果需要任何维修,请联系 Brother 授权 维修站并由其维修人员处理所有维修事宜。本产品随机附带一份特约维修站列 表以供您参考,或请直接联系 Brother 呼叫中心。 16发生以下情况时,请从墙上电源插座中拔出本产品的电源插头,并联系Brother 授权维修站人员处理维修事宜: \uf06e 电源线损坏或磨损。 \uf06e 有液体漏入本产品。 \uf06e 本产品遭雨淋或被水浸泡。 15
\uf06e 遵循使用说明书进行操作时,如果本产品无法正常使用,只可以按照使用说 明书中述及的操作方法进行调整。操作不当可能会造成产品损坏,并增加专 业维修人员的工作量。 \uf06e 本产品摔落或机壳已损坏。 \uf06e 如果产品性能发生明显变化,则表示需要维修。 产品保修和责任 1 本手册中的任何内容均不影响现有的产品保修条款,也不会追加任何产品保修条 款。未能遵循本手册中的安全说明可能会导致产品的保修条款失效。 警告 切勿让本产品接触到水。不要在浴缸、水槽和游泳池等静水以及冰箱等含水的 电器周围或潮湿的地下室中使用本产品。 切勿在雷雨天气使用本产品,否则可能由于闪电而导致电击的危险。 切勿将本产品放置在气体泄漏区域。 本产品必须使用随机附带的电源线。 注意 本产品必须安装在靠近电源插座的地方。遇到紧急情况时,必须立即从电源插 座上拔下产品电源插头以彻底切断电源。 16
认可信息 本设备设计应用于两芯模拟 PSTN 线路。 Brother 公司声明,如果在原购买国以外的国家使用本产品,本产品可能无法正 常使用。同时,如果在其他国家的公共通信线路上使用本产品, Brother 公司将 不予以任何保证。 局域网连接 重要事项 在不超过额定电压的情况下将本产品连接到局域网。 无线电干扰 本产品符合 EN55022 (CISPR Publication 22)/B 类标准。将产品连接到计算机 时,请确保您使用的 USB 接口电缆的长度不超过 2 米。 1 1 1 17
有关本设备的无线电功能的注意事项 1 1 确保在有效无线通信范围内使用本产品,如下所示: \uf06e 使用频率:2.4 - 2.4835 GHz \uf06e 等效全向辐射功率 (EIRP):≤ 100 mW \uf06e 最大功率谱密度:≤ 10 dBm / MHz (EIRP) \uf06e 载频容限:20 ppm \uf06e 带外发射功率 ( 在 2.4 - 2.4835 GHz 频段以外 ): ≤ -80 dBm / Hz (EIRP) \uf06e 杂散发射 ( 辐射 ) 功率 ( 对应载波 ±2.5 倍信道带宽以外 ): ≤ -36 dBm / 100 kHz (30 - 1000 MHz) ≤ -33 dBm / 100 kHz (2.4 - 2.4835 GHz) ≤ -40 dBm / 1 MHz (3.4 - 3.53 GHz) ≤ -40 dBm / 1 MHz (5.725 - 5.85 GHz) ≤ -30 dBm / 1 MHz ( 其它 1 - 12.75 GHz) 2 不得擅自更改发射频率、加大发射功率 ( 包括额外加装射频功率放大器 ),不 得擅自外接天线或改用其它发射天线。 3 使用时不得对各种合法的无线电通信业务产生有害干扰;一旦发现有干扰现象 时,应立即停止使用,并采取措施消除干扰后方可继续使用。 4 使用微功率无线电设备,必须忍受各种无线电业务的干扰或工业、科学及医疗 应用设备的辐射干扰。 5 不得在飞机和机场附近使用。 18
产品中有害物质的名称及含量 商标 1 brother 是兄弟工业株式会社的商标或注册商标。 Microsoft、 Windows、 Windows NT、 Windows Vista、 Windows Server、 SharePoint、 Internet Explorer、 Outlook、 PowerPoint 和 Windows Phone 是微 软公司在美国或其他国家的注册商标或商标。 Apple、Macintosh、Mac OS、Safari、iPad、iPhone、iPod touch 和 OS X 是苹 果公司在美国和其他国家的注册商标。 AirPrint 是苹果公司的商标。 Nuance 和 PaperPort 是 Nuance Communications 公司或其成员机构在美国或其 他国家的商标或注册商标。 Memory Stick PRO Duo、Memory Stick Duo、MagicGate、Memory Stick Micro和 M2 是索尼公司的商标。 SDHC 标识是 SD-3C 公司的商标。 AOSS 是 Buffalo 公司的商标。 Wi-Fi、 Wi-Fi Alliance 和 Wi-Fi Protected Access 是 Wi-Fi Alliance 的注册商标。 WPA、 WPA2、 Wi-Fi Protected Setup、 Wi-Fi Protected Setup 标识和 Wi-FiDirect 是 Wi-Fi Alliance 的商标。 Flickr 是雅虎公司的注册商标。 Android、 Google Cloud Print、 Google Drive、 Picasa Web Albums 和 GooglePlay 是 Google 公司的商标。使用这些商标之前,须先获得 Google 公司的许可。 Mozilla 和 Firefox 是 Mozilla Foundation 公司的注册商标。 UNIX 是 Open 集团在美国和其他国家的注册商标。 Linux 是 Linus Torvalds 在美国和其他国家的注册商标。 Bluetooth ( 蓝牙 ) 文字商标是 Bluetooth SIG 公司的注册商标,兄弟工业株式会社 已获得许可使用上述商标。 Intel 是 Intel 集团在美国或其他国家的商标。 EVERNOTE 是 Evernote 公司的商标,经授权方可使用。 本说明书中提及的软件名称都有一份软件许可协议,此协议指明了其相应的所有者。 Brother 产品、相关文档和任何其他资料中出现的任何公司的任何品牌名称和产 品名称都是其相应公司的商标或注册商标。 20
开放源代码许可备注 本产品包含开放源代码软件。 1 若要查看开放源代码许可备注,请转到 Brother Solutions Center (Brother 解决方案 中心 ) 网站 (http://support.brother.com) 上您产品型号主页中的说明书下载选项。 版权与许可 ©2015 Brother Industries, Ltd。版权所有。 本产品包含由以下厂家开发的软件: ©1983-1998 太平洋软件有限公司。版权所有。 ©2008 Devicescape 软件有限公司。版权所有。 本产品包含由 ZUKEN ELMIC 公司研发的 "KASAGO TCP/IP" 软件。 其他信息 FlashFX® 是 Datalight 公司的注册商标。 FlashFX® 版权所有 1998-2010 Datalight 公司 美国专利局 5,860,082/6,260,156 FlashFX® Pro™ 是 Datalight 公司的商标。 Reliance™ 是 Datalight 公司的商标。 Datalight® 是 Datalight 公司的注册商标。 版权所有 1989-2010 Datalight 公司。保留所有权利。 1 1 21
关于复印的法律限制 1 蓄意造假而复制某些条款或文件是违法行为。以下为不能复制的文件类型。如果 对任何项目或文档有疑问,我们建议您咨询法律顾问或相关法律部门: \uf06e 货币 \uf06e 债券或其他债务证明 \uf06e 存折 \uf06e 义务服兵役文件或草拟文件 \uf06e 护照 \uf06e 邮票 ( 作废的或未作废的 ) \uf06e 移民文件 \uf06e 福利文件 \uf06e 政府机构签发的支票或汇票 \uf06e 身份证明徽章或勋章 此外,某些国家法律规定,机动车驾驶证和所有权证明不可用于复印。 不可复制受版权保护的作品,但是一些受版权保护的作品可以被部分复制以进行 “ 合理使用 ”。多份复制将被视为不正当使用。艺术作品等同于受版权保护的作品。 22
www.brotherearth.com
'
|
[
"兄弟工业株式会社。"
] | 8,493
|
multifieldqa_zh
|
zh
| null |
72606964555f71890369c33645d5bc3476644121d5fe23da
|
被告人王德山被捕的时间是什么时候?
|
王德山盗窃一审刑事判决书
通辽市科尔沁区人民检察院以科检公诉刑诉(2014)318号起诉书指控被告人王德山犯盗窃罪,于2014年3月12日向本院提起公诉。本院依法组成合议庭,于2014年3月27日公开开庭审理了本案。通辽市科尔沁区人民检察院指派检察员陈春杰、代理检察员吴丹丹出庭支持公诉,被告人王德山到庭参加诉讼。现已审理终结。
通辽市科尔沁区人民检察院指控,2013年2月18日9时许,被告人王德山在通辽市某局办公楼内,盗窃崔某的老人头牌男式皮质背包一个,包内有人民币12150.00元、黑色袋鼠牌钱包一个。经鉴定,老人头牌男式皮背包价值人民币340.00元,黑色袋鼠牌钱包价值人民币120.00元。被盗物品共价值人民币12610.00元。
为证明上述指控,公诉机关当庭出示并宣读了失主报案材料及陈述、通话记录、价格鉴定意见书、户籍证明、抓获经过、刑事判决书及释放证明、被告人供述等证据材料。公诉机关认为,被告人王德山以非法占有为目的,秘密窃取他人财物,作案一起,侵犯财产价值人民币12610.00元,数额较大,其行为触犯了《中华人民共和国刑法》第二百六十四条之规定,应当以盗窃罪追究其刑事责任。属累犯,应从重处罚。提请依法判处。
被告人王德山对公诉机关指控的盗窃经过及罪名无异议,辩解盗窃现金的数额为人民币8000.00元。
经审理查明,2013年2月18日9时50分许,被告人王德山溜入通辽市某局办公楼寻机作案,趁305号办公室无人之机,盗走崔某放在沙发上的老人头牌男式皮质背包一个(经鉴定,价值人民币340.00元),内有现金人民币12150.00元、黑色袋鼠牌钱包一个(经鉴定,价值人民币120.00元),被盗财物共计价值人民币12610.00元。被告人王德山翻出现金后,将背包丢弃于通辽市某局办公楼外树丛内,后被他人拾得并退还失主。被盗现金被挥霍。
2013年11月1日,被告人王德山被公安机关抓获归案。
上述事实,有下列证据予以证明:
1、户籍证明,证明被告人王德山的自然情况。
2、崔某报案材料及陈述,证实2013年2月18日上午,崔某放在通辽市某局305号办公室内沙发上的老人头牌男式皮质背包被盗,内有袋鼠牌钱包一个、现金人民币12150.00元、证件及银行卡等物品。被盗现金中的人民币10000.00元是韩某某让其转交他人的购买树苗款,其余现金是其本人的零用钱。当日14时许,被盗老人头牌男式皮质背包被他人拾到,已退还崔某。
3、证人韩某某证言,韩某某与崔某系朋友关系,证明韩某某交给崔某现金人民币10000.00元,系委托崔某帮忙转交他人的购买树苗款。
4、视频资料,证明2013年2月18日9时50分许,被告人王德山进入通辽市某局305号办公室,之后拿一黑色背包出去。
5、价格鉴定意见书,证明经鉴定,被盗老人头牌男式皮质背包价值人民币340.00元,黑色袋鼠牌钱包价值人民币120.00元。
6、通辽市中级人民法院(2003)通刑终字第127号刑事附带民事判决书、本院(2009)科刑初字第191号刑事判决书、释放证明,证明被告人王德山曾因犯罪被判处有期徒刑以上刑罚。
7、抓获经过,证实2013年11月1日9时许,被告人王德山在通辽市科尔沁区被公安机关抓获归案。
8、被告人王德山的供述,被告人王德山对公诉机关指控盗窃作案的时间、地点、手段等予以供认,辩解盗窃现金的数额为人民币8000.00元。
上述证据由公诉机关当庭出示和宣读,经被告人王德山质证,对失主崔某的报案材料及陈述、证人韩某某的证言提出异议,对其他证据均无异议,质证意见为,盗窃现金的数额为人民币8000.00元。本院审查认为,失主崔某发现被盗后立即向公安机关报案,对被盗现金的来源、数量及特征等多次陈述稳定客观,失主对自己钱财的掌握情况符合日常生活经验和常识范围,且有韩某某的证言相佐证,应予采信;被告人王德山对盗窃数额的辩解无证据证明,显属避重就轻,不具有可信性,质证意见不能成立。公诉机关出示的证据来源合法,内容客观,能够证明本案事实,予以采信。
本院认为,公诉机关指控被告人王德山犯盗窃罪的事实清楚,证据确实、充分,罪名成立。被告人王德山以非法占有为目的,秘密窃取他人财物,侵犯财产数额较大,其行为已构成盗窃罪,应受刑罚处罚。被告人王德山曾因犯罪被判处有期徒刑以上刑罚,刑罚执行完毕后,在五年以内再犯应当判处有期徒刑以上刑罚之罪,是累犯,应当从重处罚。被告人王德山关于盗窃现金数额的辩解,无事实依据,不予采纳。根据被告人王德山犯罪的事实、性质、情节、社会危害程度和悔罪表现,依照《中华人民共和国刑法》第二百六十四条、第六十五条第一款之规定,判决如下:
被告人王德山犯盗窃罪,判处有期徒刑二年,并处罚金人民币二万元。
(刑期从判决执行之日起计算。判决执行以前先行羁押的,羁押一日折抵刑期一日,即自2013年11月1日起至2015年10月31日止。所处罚金于本判决生效后立即缴纳。)
如不服本判决,可在接到判决书的第二日起十日内,通过本院或者直接向通辽市中级人民法院提出上诉。书面上诉的,应当提交上诉状正本一份,副本两份。
|
[
"2013年11月1日9时许。"
] | 2,140
|
multifieldqa_zh
|
zh
| null |
d96e8e188e74cee444a4ad05c931df12a05734ecdeb23dce
|
2018年韶关市的重点工作有哪些?
|
各位代表:
我代表市人民政府向大会作政府工作报告,请予审议,并请政协各位委员和其他列席人员提出意见。
2018年:铆足干劲抓落实
过去一年,我们以习近平新时代中国特色社会主义思想为指导,深入学习贯彻党的十九大、习近平总书记对广东重要讲话和一系列重要指示精神,全面贯彻落实党中央、国务院和省委、省政府的各项决策部署,在市委的坚强领导下,紧紧围绕省委“1+1+9”工作部署和“一核一带一区”区域发展新格局要求,坚持稳中求进工作总基调,狠抓“三大主题”工作、“三大重点”民生和“三大基础”工程,统筹做好稳增长、促改革、调结构、惠民生、防风险各项工作,经济社会发展取得新成效,人民生活水平稳步提高。
——实现了经济平稳增长。预计地区生产总值1330亿元(预计数,下同),增长5%。固定资产投资663亿元,增长5%。地方一般公共预算收入94.7亿元、增长6.8%,其中税收收入60.2亿元、增长11.3%。社会消费品零售总额751亿元,增长9.3%。
——推动了产业转型升级。国家级“绿色制造系统”、省重点实验室取得零的突破。装备制造业增加值和投资分别增长11%、60%,均居珠西装备制造产业带八市第二位。现代服务业和营利性服务业分别增长7%和17%。净增高新技术企业64家,高技术制造业增加值增长20%。
——提升了城市发展格局。五大片区建设实现破题,芙蓉新区完成投资72.7亿元,韶州公园一期竣工,小岛片区百年东街西立面整治基本完成,芙蓉北片区“三城一市场”进展顺利,莲花大道全线贯通,曲江大道、新白线等城市交通大动脉加快推进。城市提升项目完成投资66亿元,实现“三个翻番”目标。
——夯实了生态文明基础。市区空气质量优良率达90.4%;考核断面水质全面达标优良比例达100%,是全省唯一无黑臭水体的设区市;实施最严格水资源管理工作考核排名全省第四。粤北生态特别保护区初步划定1000平方公里,山水林田湖草生态保护修复工程列入全国试点,“全国绿化模范城市”通过省级验收。
——优化了政务服务环境。“一门式一网式”政务服务模式延伸至镇村,“马上办”服务模式走在全省前列,成为全省第四个建立“网上中介超市”地级市。企业开办时间压缩至3.5个工作日,企业开办便利度跃升粤东西北首位。全年为企业减负36亿元。新登记市场主体增长13.5%,其中新登记企业增长29.7%。
——改善了群众民生福祉。全市民生投入251.7亿元、增长5.4%,占财政总支出74.2%。居民人均可支配收入2.36万元,增长8%。6471户1.97万人实现预脱贫。省推进教育现代化先进县(市、区)实现全覆盖,新增学位1.29万个。公立医院综合改革效果排名全省第三。
一年来,我们主要做了以下工作:
一、突出产业振兴,激活发展动能。加快钢铁、有色等传统产业转型升级,开展技术改造三年行动计划,实施技改项目220个、完成投资55亿元。港珠澳大桥使用韶钢牌钢材达17.9万吨,占主体工程用钢量的70%。启动百家优质企业倍增计划,纳入计划企业增速高于全市规上工业22.1个百分点。首次实施“企业管理标杆培训计划”。规上工业实现利润89亿元,增长3.5%。培育壮大新兴支柱产业,组建特钢和先进装备产业联盟,引进、开工亿元以上装备制造业项目分别为11个和9个,珠西装备制造产业带韶关配套区建设扎实推进;广东联通BPO一期、“华南数谷”云计算中心一期和华为·鹰硕智慧城市项目启动建设,智能指挥中心完成主体工程;曹溪文化小镇“三个一”项目基本建成,“大珠玑”项目开工,云门山旅游项目一期竣工,全市接待游客和旅游收入分别增长12%和13.8%;华南农产品交易中心、中农批商贸城等项目稳步推进,我市被列为省流通标准化试点城市;利民制药新生产线建成投产,东阳光药业、萱嘉医药等项目加快建设;举办韶关首届“中国农民丰收节”暨生态农业博览会和第28届中国兰花博览会,新增省级现代农业产业园5个和省农业类名牌产品35个、均居全省第一,新增省级重点农业龙头企业12家。实施园区三年提升计划,完成基础设施投资18亿元、增长45%;省级产业园实现县域全覆盖;开工项目130个、投产65个;规上工业增加值106亿元、增长12%。规上民营工业增加值87亿元、增长11%;东阳光公司成为我市首个产值超百亿元的民营企业。
二、突出城乡统筹,促进协调发展。坚持规划引领,基本实现中心城区控规“一张图”。芙蓉新区全面提速,完成清表交地6073亩、房屋拆迁45万平方米,综合客运枢纽一期、城投商务中心等12个项目完工,市妇幼保健中心、滨江商务中心等15个项目动工。老城区提质升级,市西河体育中心改造工程、3个亲水平台、浈江滨江景观带等项目完工,新建30个“五小”公园。10个主要交通节点和10个重要干线景观提升工程有序推进,完成9个全国老旧小区试点改造。实行网格化管理,首期“十大最差路段”完成整改,全国文明城市创建工作扎实推进。完成水田垦造2万亩、拆旧复垦2300亩,治理违建134.3万平方米,“三旧”改造完成率全省第一。乡镇(镇街)“139”提升工作在全省推广。推进基础设施建设,武深、汕昆高速韶关段建成通车,韶新高速完成投资25亿元,北江航道扩能升级和南水水库泄洪河道整治工程进展顺利,开工建设旅游公路104公里,完成国省道改造119公里、生命安全防护工程整治234公里、农村公路硬底化454公里、山区中小河流治理215公里和山塘加固97宗。全域推进农村人居环境综合整治,村庄规划覆盖率提升至80%,60%以上完成“三清三拆三整治”,省定贫困村基本达到干净整洁村标准;新增中国美丽休闲乡村1个,省级休闲农业与乡村旅游示范镇3个、示范点5个。新增南雄珠玑文化小镇等4个省级特色小镇。农村土地承包经营权确权登记颁证基本完成。
三、突出生态建设,推进绿色发展。继续筑牢粤北生态屏障,森林覆盖率、有林地面积、活立木蓄积量和自然保护区面积均稳居全省第一。深入打造广东绿色生态第一市,全面划定生态红线,完成造林更新34万亩、森林碳汇造林5万亩,建成乡村绿化美化省级示范点126个。车八岭被评为“全国林业科普基地”。创建省级林下经济示范基地7个,仁化被评为省级林下经济示范县,翁源江尾被评为“广东省森林小镇”。落实中央和省环保督察“回头看”反馈问题整改,蓝天、碧水、净土保卫战扎实推进,扩大烟花爆竹禁燃范围,实行建筑工地和渣土运输常态化管理,完成韶钢脱硝改造。实现河长制管理全覆盖,调整水源地保护区范围,划定禁养区3440平方公里,关闭或搬迁畜禽养殖场264个,处理“散乱污”案件569宗,新建生活污水管网615公里,完成市级饮用水源地保护区违法项目整治,县级以上集中式饮用水源水质达标率100%。土壤防治先行区建设按期推进,依法关闭并复绿6个矿点,大宝山片区土壤污染治理修复取得阶段成效。
四、突出改革创新,增强发展活力。深入推进供给侧结构性改革,完成商品房去库存22万平方米,金融机构杠杆率不低于4%监管要求。电力体制改革成效显著,市场化交易用户达611家,占比全省最高。深化基础性改革,开展公立医院改革试点,推行“县管校聘”改革和中考招生制度改革,基本完成农信社改制。成功举办2018丹霞天使投资全球高峰会,组建东阳光新兴产业母基金等5支基金、总规模达13.5亿元,投放14个项目、资金3.1亿元。实施科技创新三年行动计划,市财政科技经费增至1亿元、增长6.8倍;新增省级企业研发机构21家、增长52.5%,亿元以上企业研发机构覆盖率达45.2%;专利申请量、授权量增幅分居全省第一和第二;国家高新区创建工作顺利推进,众投邦加速器、达安创谷孵化器建成运营;我市企业在第七届中国创新创业大赛上获得第三名;举办首届企业人才活动周等系列活动。新增工业类省名牌产品11个,建成中广测省级紧固件检测平台。开展“驻粤领团韶关行”活动,积极参与粤港澳大湾区、“红三角”等城际交流合作。成立产业研究院和6支招商小分队,招商引资新签约项目215个,新开工项目88个,新投产项目34个,到位资金98.5亿元。完成快件监管场所项目建设,货物进口和出口通关时间分别压缩75.8%和52.1%。
五、突出民生福祉,促进发展共享。提高基本医疗保险待遇标准和职工医保年度最高支付限额,减轻群众看病负担2.55亿元。企业职工、城乡居民养老金和失业保险金标准进一步提高。扶持异地务工人员返乡就业创业,举办204场专场招聘活动,城镇登记失业率控制在3.5%以内。建成棚户区改造房2284套,完成农村危房改造5220户。解决了27.5万农村人口饮水问题。新建改扩建旅游厕所110所,位居全省首位。筹集各类精准扶贫资金23.3亿元,实施产业扶贫项目3.6万个,符合条件的贫困人口全部纳入低保,荣获“十佳精准扶贫创新城市”称号。九龄高级中学、风采实验学校、始兴丹凤小学投入使用,公办幼儿园和普惠性民办幼儿园覆盖率达87.9%。完成6间乡镇卫生院标准化和380间村卫生站规范化建设,粤北人民医院入围省“登峰计划”,乐昌、南雄和翁源第二人民医院完成主体工程,全市引进基层医疗卫生人才490名。建成1430个村(社区)综合性文化服务中心,新建10间风度书房并投入使用。乳源成为全国首批新时代文明实践中心建设试点县。完成市级气象科普场所建设。建成“放心餐馆、放心药店”274家、“明厨亮灶”单位1693家。深刻汲取新丰练溪托养中心事件教训,全面改进敬老院、福利院管理工作。安全生产形势平稳,森林防火形势明显向好。大力开展扫黑除恶专项斗争,打掉涉黑组织4个、恶势力犯罪集团11个,查处涉黑涉恶腐败和保护伞110人。民族宗教、国防教育、人民防空、应急管理、防灾减灾、打击走私、档案管理、妇女儿童、残疾人、地方志、红十字会等事业取得新发展。
六、突出自身建设,打造有为政府。旗帜鲜明讲政治抓政治,坚决做到“两个维护”,坚守政治纪律和政治规矩。自觉接受市委领导,加强市政府党组建设,坚持向市人大报告工作、向市政协通报情况,办理人大代表议案建议84件、政协提案276件。统筹推进数字政府和智慧城市建设。建立市政府系统“争先进位”奖优罚劣、第三方评估、闭环工作等机制,推动形成大抓落实、真抓落实的工作格局。深入推进法治政府建设,全市行政机关负责人出庭应诉381宗,完成地方性法规、规章、规范性文件设定的证明事项清理。做好“七五”普法工作,实现村(社区)法律顾问全覆盖。积极创建模范机关,推进“两学一做”学习教育常态化制度化。严格落实党风廉政建设责任制,践行中央八项规定精神,狠抓中央巡视反馈意见整改,加大审计监督力度,严控“三公”经费。
各位代表,过去的一年,成绩来之不易。这是在习近平新时代中国特色社会主义思想的指引下,全市人民团结拼搏、攻坚克难的结果。在此,我代表市人民政府,向全市人民,向各位人大代表、政协委员,向各民主党派、各人民团体、各界人士,向中省驻韶有关单位和人民解放军、武警部队官兵,致以崇高的敬意!向所有关心和支持韶关发展的港澳同胞、台湾同胞、海外侨胞及国际友人,表示衷心的感谢!
同时,我们更清醒认识到存在的困难和挑战。当前,我市发展周期性矛盾和结构性矛盾相互叠加,短期性问题和长期性问题彼此交织,经济形势复杂,面临压力很大:经济发展速度不快,产业结构不优,市场主体不多,新旧动能转换任务艰巨;重大项目、优质项目缺乏,产业项目支撑不足,有效投资乏力;县域经济薄弱,城乡发展不平衡不充分,基础设施领域和教育、医疗、养老等民生领域短板仍然突出;生态治理任务繁重,生态环境质量仍有短板;安全生产、信访维稳、金融风险防范等压力仍然存在;一些政府部门担当不够、作风不实、效率不高、服务意识不强,等等。对这些问题,我们一定高度重视,切实加以解决。
2019年:砥砺前行开新局
2019年是新中国成立70周年,也是我市全面建成小康社会关键之年。今年政府工作的总体要求是:高举习近平新时代中国特色社会主义思想伟大旗帜,全面贯彻党的十九大和十九届二中、三中全会以及中央经济工作会议精神,全面贯彻落实习近平总书记对广东重要讲话和对广东工作一系列重要指示精神,认真学习贯彻省委十二届六次全会和李希书记在韶调研讲话精神,按照市委的决策部署,坚持稳中求进工作总基调,以供给侧结构性改革为主线,坚持生态优先、绿色发展,坚持融入珠三角、服务大湾区,抢抓新发展理念深入贯彻、粤港澳大湾区建设、“一核一带一区”区域发展新格局三大历史机遇,狠抓“三大主题”工作,继续打好三大攻坚战,切实保障和改善民生,全力筑牢粤北生态屏障,打造绿色发展韶关样板,争当北部生态发展区高质量发展排头兵。
一是坚持全域保护。认真贯彻落实习近平生态文明思想,统筹山水林田湖草生命共同体,加快建设粤北生态特别保护区,打好大气、水、土壤污染防治攻坚战,强化生态屏障和水源涵养地功能,力争生态文明建设走在全省前列,打造绿色发展韶关样板。
二是坚持高质量发展。聚焦产业生态化、生态产业化,推进绿色发展、集约发展和创新发展,着力提升质量和效益,引进培育产业龙头项目,构建完整产业链和供应链,加快向产业链价值链的高端延伸,推动经济发展质量变革、效率变革和动力变革。
三是坚持平衡协调。加强“两个文明”建设,统筹推进经济社会与城乡融合协调发展,持续用力补短板,加快乡村振兴,坚决打赢脱贫攻坚战,增强中心城区首位度,提高基础设施一体化和基本公共服务均等化水平,打造共建共治共享社会治理格局。
四是坚持改革开放。用好改革开放关键一招,坚持市场化、社会化改革方向,在更高起点、更高层次、更高目标上把改革开放不断推进深入,充分激发发展活力。积极参与“一带一路”建设,以差异化协同发展为着力点加快融入粤港澳大湾区。
今年我市经济社会发展主要预期目标是:地区生产总值增长6%、实际执行时努力争取更好结果,人均生产总值增长5%,工业增加值增长6%,固定资产投资增长8%,社会消费品零售总额增长9%,一般公共预算收入增长6%,R&D经费投入占地区生产总值比重1.3%,居民人均可支配收入增长与经济增长基本同步,主要污染物总量减排、居民消费价格指数等约束性指标完成省下达目标任务,城镇登记失业率控制在3.5%以内。
围绕以上目标,我们将重点做好以下八个方面工作:
一、大力发展实体经济,构建现代产业体系
坚持做优存量和做大增量并举,加快产业结构调整,加强科技创新引领,提高供给体系质量,搭好产业“四梁八柱”,促进新旧动能换挡提质。
加快传统优势工业转型升级。实施产业转型升级工程,提升钢铁、电力等七大传统优势产业,全力支持韶钢、韶能、东阳光、利民制药等支柱性企业做大做强,夯实经济发展基本盘面。深入实施工业技改三年行动计划,推动企业扩产增效、智能化改造、设备更新,完成技改投资65亿元以上。支持韶钢建设高端优特钢生产基地。推进智能制造,建设人工智能实验室,争创钢铁行业国家级智能制造试点。推进“互联网+先进制造业”信息化改造,打造2个以上工业互联网应用标杆示范项目。建立工业大数据平台,推动企业“小升规”,新增规上工业企业30家,“一企一策”支持50家重点工业企业加快发展。
加快新兴支柱产业培育发展。用好珠西产业带政策,强化上下游产业配套,加快去年85个集中动工和签约项目落地建设,动工建设韶铸搬迁、宏大精锻等项目,力促金志利、一本机械设备等项目建成投产,推动广汽测试场项目落地,装备制造业增加值增长8%以上。加快省公安厅、省档案局备份平台项目建设,推进华为·鹰硕智慧城市、云计算中心、广东联通BPO等项目建设,打造“华南数谷”大数据产业园。实施大健康产业发展三年行动计划,加快莞韶生物医药、东阳光健康和南雄南药健康等专业园区建设,推动利民制药增资扩产和东阳光系列产品产业化,加快萱嘉医药等重点项目建设,新增产值超亿元医药健康企业2个以上。创建国家全域旅游示范市,全力抓好丹霞山南门、西南门、西门和东南门规划建设,建设曹溪博物院,推进“大南岭”片区旅游重点项目建设,实施珠玑古巷改造提升工程,优化高铁站到各县(市、区)主要旅游景区的交通服务体系,全市接待游客和旅游收入分别增长10%和12%以上。推进粤北国际物流中心建设,提升韶南大道汽车商贸产业带,推进南雄国家级和乐昌、翁源省级电子商务进农村综合示范县建设。
实施创新驱动发展战略。大力实施科技型企业三年倍增计划,新增高新技术企业30家、企业研发机构40家以上。推进孵化育成体系建设,新增省级孵化器(众创空间)2家,争取省实验室在我市布局。推进质量强市和商标品牌战略。加强知识产权开发、保护和利用,万人发明专利拥有量(件)增长10%以上。深化科技金融融合,推动投资基金向创新企业投放,争取科技信贷增长30%以上。落实三项人才新政,办好创新创业大赛和企业人才活动周,推进人才公寓建设,力争引进各类科技人才500人和创新创业团队6个以上。实施重大科技专项,加大科技项目引进培育力度。
加强园区平台建设。深入实施园区三年提升计划,开展“十组团”共建攻坚行动,做大做强“2+10”园区承载平台。成功创建国家高新区,支持南雄、乳源等创建省级高新区。完善莞韶园基础设施,启动甘棠东和龙归片区建设。建成华南装备园综合服务大楼,实现园区主干道与周边高速、干线公路连通,开工建设表面处理中心和污水处理中心。着力构建市区东部科技新城、南部装备园、西部国家高新区的产业发展新格局。完善园区公共服务和生活配套,建成省级液压件产业计量测试中心,加快面向中小企业的检验、检测等公共技术服务平台建设。全市产业园完成固定资产投资100亿元、其中基础设施12亿元,规上工业增加值增长10%。
促进民营经济高质量发展。完善市县领导干部挂点联系服务企业制度和“政企通”微信平台,着力破解“市场的冰山、融资的高山、转型的火山”。推出促进民营经济高质量发展政策,力争降低企业成本30亿元以上。提高信贷支持精准度,开展“政银担”“过桥贷”“助保贷”,推广应收账款融资业务。拓宽企业管理标杆培训覆盖面,落实百家优质企业倍增计划,力争纳入计划企业工业增加值增长20%。发挥商会、协会的桥梁纽带作用,支持企业开拓国内外市场。新增“四上”企业150家,推动10家左右企业到新三板挂牌,民营经济增加值增长7%。
二、切实加强项目组织,夯实经济发展基础
坚持以项目为抓手,推动“五个一批”项目滚动接续,聚焦项目动工建设和落地见效,持之以恒扩大有效投资,实施重点项目181项,完成年度投资330亿元。
加强产业项目招引。发挥产业研究院作用,深度研究全市产业基础和产业链条,引进一批建链、补链、强链项目。健全招商项目共建共享合作利益分配制度,建立“项目超市”,夯实招商主体跟踪服务落地责任,推动招商项目市域内统筹落地。建立招商项目库、政策库、地图库“三库合一”信息平台,提高签约项目落地率、履约率。出台新的招商引智奖励办法。启动建设标准厂房40万平方米、建成10万平方米以上,增强招商引资吸引力。提升招商引资引智质量和实效,着力引进投资超10亿元的产业项目,力争产业项目新签约230个以上、总投资330亿元以上,新开工100个以上、完成年度投资110亿元以上。各县(市、区)当年引进并动工3个、预备3个5000万元以上的工业项目。办好世界韶商大会,促进乡贤回归创业。
推进基础设施项目建设。完善“四纵五横”高速公路网络,加快韶新、雄信高速公路等重大项目建设,推进武深高速始兴连接线、韶赣高速欧山互通等项目前期工作。加快丹霞机场及进场道路建设,完成87公里国省道改造。完成“大南华”旅游通道,启动“大丹霞”旅游公路建设,加快环南岭旅游公路建设,完成旅游公路投资18亿元。支持各县(市、区)创建“四好农村路”示范县。推进北江航道扩能升级,开工建设北江航道上延工程、韶关港乌石综合交通枢纽,完成南水水库泄洪河道整治,建成南水供水工程38公里原水管道。完成电网基建投资10亿元,加快500千伏丹霞输变电站、220千伏华电南雄输变电配套工程等项目建设,全面完成“十三五”农村水电增效扩容改造。落实信息基础设施建设三年行动计划,推进20户以上自然村光网建设。
落实项目要素保障。建成市域“多规合一”数据平台。制定低效用地评价管控体系,处置闲置低效用地,消化批而未供土地5000亩,完成拆旧复垦2000亩;实施差异化用地政策,探索“标准地”制度,着力扭转“项目等地”局面。树立“大财政”理念,盘活国有资产资源,全面统筹财政资金、产业基金、股权资产,集中财力办大事。出台政府投资项目工程变更和概算、预算调整管理办法。加强政银企合作,放大基金效应,争取政策性优惠贷款向重点项目倾斜;推动政府与社会资本合作,鼓励发行企业债,激发民间投资潜力。
|
[
"三大主题工作、三大重点民生和三大基础工程。"
] | 8,672
|
multifieldqa_zh
|
zh
| null |
25a2d0bc8c62a59753aea23a7c5ee1469201d3781d3558e5
|
原告请求赔偿的损失总额是多少?
|
陈忠环与中国人民财产保险股份有限公司双辽支公司、郭世营机动车交通事故责任纠纷一审民事判决书
原告陈忠环与被告中国人民财产保险股份有限公司双辽支公司、郭世营机动车交通事故责任纠纷一案,本院受理后,依法组成合议庭,公开开庭进行了审理。原告的委托代理人孟祥军到庭参加诉讼,被告郭世营、被告中国人民财产保险股份有限公司双辽支公司的委托代理人李鹏到庭参加诉讼,本现已审理终结。
原告向法院提出诉讼请求:1、请求法院依法判令二被告赔偿原告各项损失40754.95元。包括:住院费26175.43元、一级护理费248.16元×14天=3474.24元、护理费124.08元×2天=248.16元、误工费98.12元×76天=7457.12元、伙食补助费100元×16天=1600元、营养费100元×16天=1600元、交通费200元。2、诉讼费由二被告承担。事实与理由:2015年10月8日15时50分,董洪武驾驶吉C-69450号中通牌大客车沿新市街(双辽市物化楼南门十字路口左侧)由南向北行驶,行至事故地点时,原告要求停车下车,但被告的车在慢行过程中打开门让原告下车时,原告下车摔倒受伤,后原告被送往双辽市中心医院治疗。被告郭世营系肇事车辆实际所有人,此肇事车辆在中国人民财产保险股份有限公司双辽支公司投保了座位险、交强险和商业第三者责任险。因赔偿一事原告与二被告协商未果,故诉至法院,请求法院在保险公司应赔偿险种内赔偿原告各项损失40754.95元,如保险公司不保护或不在险种赔偿内的部分赔偿由被告郭世营承担赔偿,诉讼费由二被告承担,保护原告的合法权益。
被告中国人民财产保险股份有限公司双辽支公司(以下简称“保险公司”)辩称,1.原告应提供真实合法有效事故责任证明。2.应提供驾驶人合法有效的驾驶证、行车证及从事客运运输上岗的资格证。3.应提供保险合同。4.诉讼费保险公司不承担。5.应提供合同中约定旅客的票务合同,以证明与车辆有运输合同关系。否则不能认定属于客运承运人责任险的赔偿范围。
被告郭世营辩称,我是肇事客车的车主,驾驶人是我雇佣的司机。事故确实发生了,原告属实在下车过程中摔倒受伤了,我是保的全险,我不能赔偿。我当时已经向保险公司报案。
原告围绕诉讼请求依法提交了以下证据:1、原告身份证复印件、道路交通事故证明各一份,证明该起事故的发生过程,原告是适格主体。保险公司对事故证明本身真实性无异议,但是该事故无法认定,无交通事故现场。郭世营对该证据异议,原告属实坐我的车,事发生后,我现报的保险公司,我认为这事和交警没有关系,我就没有报交警队。2、双辽市中心医院住院病历、医疗费票据、诊断书、费用清单。证明原告在双辽市中心医院住院16天,一级护理3天,二级护理13天,医疗费26175.43元。二被告对该证据无异议。3、照片四张,证明此次发生地段为禁停路段,有禁停标准,司机未阻止乘客下车,造成乘客受伤。保险公司对照片真实性无异议,但此次事故的责任并不应由车辆驾驶人承担全部责任,本案乘客到了运输下车的地点,停车也是应乘客的要求,所以乘客也应有责任,因本次事故无法划分,按照公平原则,理应按各50%责任划分。郭世营称事故发生在此路段,该路段确实是禁停路段,但是我们过了这个禁停牌停车的。
被告郭世营向本院提交了保险单,证明肇事车辆在保险公司处投保了客运承运人责任保险。原告及保险公司对该证据无异议。
上述证据来源合法,客观真实,与本案具有关联性,本院予以采信。
经审理查明,2015年10月8日15时50分,董洪武驾驶吉C-69450号中通牌大客车沿新市街(双辽市物华楼南门十字路口左侧)由南向北行驶。行至事故地点时,原告要求停车下车,但该路段禁止停车,客车司机却让原告下车,原告在下车过程中摔倒受伤,并送往双辽市中心医院治疗。
另查明,董洪武驾驶吉C-69450号中通牌大客车是城市公共客运车辆,实际所有人为郭世营,其雇用董洪武驾驶该车辆,董洪武拥有驾驶资格及从业资格。
本院认为,本案原告陈忠环乘坐客运车辆,在双辽市物华楼南门十字路口东侧要求下车,在下车时摔倒受伤。虽然客运车辆应原告要求而停车,但该路段属于禁停路段,客运车辆明知该路段禁止停车,却违法交通法规让原告下车,应当对该事故承担主要责任。原告作为乘客对交通法规没有知情的义务,但其对于自己摔倒应当尽到一定的注意义务,故应对该事故承担20%的责任。
本院认为,《中华人民共和国侵权责任法》第十六条规定“侵害他人造成人身损害的,应当赔偿医疗费、护理费、交通费等为治疗和康复支出的合理费用,以及因误工减少的收入。《最高人民法院关于审理人身损害赔偿案件适用法律若干问题的解释》第十七条第一款规定:受害人遭受人身损害,因就医治疗支出的各项费用以及因误工减少的收入,包括医疗费、误工费、护理费、交通费、住宿费、住院伙食补助费、必要的营养费,赔偿义务人应当予以赔偿。据此,本案原告请求赔偿的医疗费、护理费、误工费、伙食补助费、交通费、营养费均属于合理赔偿范围,本院予以保护。
原告陈忠环各项损失共计36671.21元,具体数额如下:
1、医疗费26175.43元,以医疗费票据为准;
2、住院伙食补助费1600.00元(100.00元/天×16天);
3、护理费2357.52元,包括一级护理3天(124.08元/天×3天×2),二级护理13天(124.08元/天×13天);
4、误工费5838.26元(2134.17元/月×2月+98.12元/天×16天),依据农民收入标准,根据医嘱要求出院后卧床全休两个月,原告54岁,作为农民,其仍有劳动能力。
5、交通费200.00元,虽然原告未提供票据,但原告在入院及出院过程中确实需要花费交通费用,考虑事故发生地、医院及原告家庭地址,本院认为原告诉请的数额合理。
6、营养费500.00元,虽然原告请求1600.00元,但考虑原告年龄较大,酌情给付500.00元为宜。
根据《中华人民共和国保险法》第六十五条规定:“保险人对责任保险的被保险人给第三者造成的损害,可以依照法律的规定或者合同的约定,直接向该第三者赔偿保险金。责任保险的被保险人给第三者造成损害,被保险人对第三者应负的赔偿责任确定的,根据被保险人的请求,保险人应当直接向该第三者赔偿保险金。被保险人怠于请求的,第三者有权就其应获赔偿部分直接向保险人请求赔偿保险金。”据此,对于原告的合理经济损失,郭世营至今未赔付原告,故保险公司应直接将赔偿金支付给原告。
另保险公司提供的《中国人民财产保险股份有限公司道路客运承运人责任保险条款》第二十六条第二款规定:“对于每次事故,保险人对法律费用的赔偿金额不超过保险单明细表列明的累计责任限额的5%,但在保险期间内该项赔偿金额之和不得超过该累计责任限额的30%。”故保险公司辩称不承担诉讼费用的理由,无法律依据,本院不予支持。
综上所述,依据《中华人民共和国合同法》第六十条、《中华人民共和国侵权责任法》第六条第一款、第十六条、《最高人民法院关于审理人身损害赔偿案件适用法律若干问题的解释》第十七条、第十九条、第二十条、第二十一条、第二十二条、第二十三条、第二十四条、《中华人民共和国保险法》第六十五条之规定,判决如下:
被告中国人民财产保险股份有限公司双辽支分公司赔偿原告陈忠环医疗费、住院伙食补助费、护理费、误工费、交通费、营养费的80%,共计人民币29336.97元,此款于判决生效后即付。
如果未按本判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条规定,加倍支付迟延履行期间的债务利息。
案件受理费817.00元由被告中国人民财产保险股份有限公司双辽支分公司负担。
如不服本判决,可在判决书送达之日起十五日内,向本院递交上诉状,并按对方当事人的人数提出副本,上诉于吉林省四平市中级人民法院。
|
[
"40754.95元。"
] | 3,242
|
multifieldqa_zh
|
zh
| null |
5ead549d2ec119a554f7a034a136fb9ee59bfe38f597b3cd
|
如果对判决不服,应该向哪个法院提起上诉?
|
中国人民财产保险股份有限公司湘潭市分公司与刘勇保证保险合同纠纷一审民事判决书
原告中国人民财产保险股份有限公司湘潭市分公司与被告刘勇保证保险合同纠纷一案,本院于2020年10月13日立案后,依法适用简易程序,公开开庭进行了审理。原告中国人民财产保险股份有限公司湘潭市分公司委托诉讼代理人田田、被告刘勇均到庭参加诉讼。本案现已审理终结。
原告中国人民财产保险股份有限公司湘潭市分公司诉请:1、判令被告向原告支付代偿款等各项费用44546.16元;2、被告承担本案的诉讼费用。
被告刘勇辩称,答辩人不清楚借款金额、实际到账金额及利息是多少,且按照被答辩人提供的银行还款明细,借款的利息超过了借款本金,事实上答辩人借款已经全部清偿,不需要承担还款责任。
查明的事实
经审理查明:被告刘勇因需向中国光大银行股份有限公司湘潭河西支行贷款,于2016年1月14日向原告中国人民财产保险股份有限公司湘潭市分公司投保《个人信用贷款保证保险保险单》(保单号:PBBR20164303000000××××)。被保险人为中国光大银行股份有限公司湘潭河西支行;保险金额66349.42元;每月保险费845.25元;保险期间自个人贷款合同项下贷款发放之日起,至清偿全部贷款本息之日止;保险人赔偿后,投保人需向保险人归还全部赔偿款项和未付保费,从保险人赔偿当日开始超过30天,投保人仍未向保险人归还全部赔偿款项,则视为投保人违约,投保人需以尚欠全部款项为基数,从保险人赔偿当日按照每日千分之一开始计算违约金,保险人基于投保人违约而理赔后,保险人有权追回赔偿款项、违约金、理赔及催收产生的其他费用。保单生效后,2016年2月3日,中国光大银行股份有限公司湘潭河西支行与被告刘勇签订《个人贷款合同(无担保条款)》(合同编号:50651616000040),中国光大银行股份有限公司湘潭河西支行依约向被告刘勇发放贷款60000元,贷款期限为36月,自2016年2月3日至2019年2月3日,贷款借据对贷款期限实际起始日与实际到期日另有约定的,以贷款借据中的约定为准;贷款年利率按照中国人民银行公布的同期基准利率4.75%上浮40%执行,首期执行贷款年利率为6.65%;等额还本付息还款方式;借款人未按约定期限归还贷款本金的,贷款人有权对逾期贷款计收罚息,罚息利率为本合同约定的贷款执行利率基础上上浮50%,罚息计算期间自逾期之日起至当期应付本息全部清偿之日止,逾期期间,如遇中国人民银行上调同期贷款基准利率,罚息利率自基准利率调整之日起相应上调。同日,中国光大银行股份有限公司湘潭河西支行向被告刘勇指定账户发放贷款60000元。被告刘勇收到贷款后,未按期足额偿还贷款。2017年11月22日,原告中国人民财产保险股份有限公司湘潭市分公司依据其与被告刘勇签订的《个人信用贷款保证保险单》向中国光大银行股份有限公司湘潭支行贷款本息32155.97元。原告中国人民财产保险股份有限公司湘潭市分行履行代偿义务后,被告刘勇未按保证保险单约定归还原告全部理赔款项。原告为维护其合法权益,遂诉至本院,请求判如所请。庭审中,原告明确其诉讼金额组成为:代偿金额+(保费×3期)+违约金。
上述事实,有原、被告双方当事人身份信息、中国人民财产保险股份有限公司个人信用贷款保证保险投保单、中国人民财产保险股份有限公司个人信用贷款保证保险保险单、个人贷款合同(担保单条款)、中国光大银行湘潭支行贷款借据、代偿债务确认书、消费信贷对账单、当事人当庭陈述等予以佐证。
判决的理由和结果
本院认为:依法成立的合同,具有法律约束力。当事人双方应当按照合同的约定全面履行义务。被告刘勇与中国光大银行股份有限公司湘潭河西支行签订的《个人贷款合同》以及被告刘勇与原告中国人民财产保险股份有限公司湘潭市分公司签订的《中国人民财产保险股份有限公司个人信用贷款保证保险保险单》均系合同双方当事人真实意思表示,内容未违反法律法规规定,合法有效。本院对上述两份合同均予以认可。被告未按照与光大银行签订的《个人贷款合同》约定履行按期还款义务,原告按照《中国人民财产保险股份有限公司个人信用贷款保证保险保险单》的约定,履行了理赔还款义务。原告承担还款义务后,被告未按照保证保险合同约定归还款项,其应当按照合同约定承担相应的责任。《中国人民财产保险股份有限公司个人信用贷款保证保险保险单》约定,保险理赔后,被告需向原告归还全部理赔款、未付保费、违约金(从原告理赔当日开始计算,按每日0.1%向原告缴纳违约金)、理赔及催收产生的其他费用。现原告提交证据证明其已依约向光大银行支付贷款本息32155.97元,被告自2016年2月26日起未再依约支付保费,逾期保费为2535.75元(845.25元×3期),故原告主张要求被告向原告返还贷款本息32155.97元及逾期保费2535.75元的诉讼请求,本院予以支持;关于违约金,被告至今未向原告归还理赔款,因原告诉请金额过高,本院酌情认定违约金为其代偿金额及逾期三期保费总额的20%,即6938.34元[(32155.97元+2535.75元)×20%]。
被告刘勇辩称答辩人不清楚借款金额、实际到账金额及利息是多少。本院认为,被告对其保证保险单和个人贷款合同上的签名无异议,其作为完全民事行为能力人,知道或者应当知道在合同上签名的效力,且款项系汇至其本人账户,其称不知道实际到账金额,与常理不符。被告辩称按照根据银行还款明细,借款的利息超过了借款本金,事实上答辩人借款已经全部清偿,不需要承担还款责任。本院认为,被告认为利息高于本金,与事实不符,银行还款流水有本息金额及本金金额的体现,本息金额高于本金金额并无不妥,且被告对中国光大银行股份有限公司湘潭支行出具的《贷款债务与权益转让确认书》并无异议,故对被告该辩解意见,本院不予采纳。
综上所述,依照《中华人民共和国合同法》第八条、第六十条第一款、第一百零七条,《中华人民共和国保险法》第十四条、《最高人民法院关于适用中华人民共和国合同法若干问题的解释(二)》第二十九条,《中华人民共和国民事诉讼法》第一百四十四条之规定,判决如下:
一、刘勇在本判决生效之日起十日内一次性向中国人民财产保险股份有限公司湘潭市分公司支付贷款本息32155.97元、逾期保费2535.75元、违约金6938.34元,合计41630.06元;
二、驳回中国人民财产保险股份有限公司湘潭市分公司的其他诉讼;
如果未按本判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条规定,加倍支付迟延履行期间的债务利息。
案件受理费920元,减半收取460元,由刘勇负担。
如不服本判决,可以在判决书送达之日起十五日内向本院递交上诉状,并按对方当事人的人数提出副本,上诉于湖南省湘潭市中级人民法院。
|
[
"湖南省湘潭市中级人民法院。"
] | 2,832
|
multifieldqa_zh
|
zh
| null |
9b68370fb6e7556f1c145af721e968061b39aeb5527880ef
|
凤凰是如何附体到镭射眼的身上的?
|
X战警(美国漫威漫画旗下的超级英雄团队)
X战警(X-Men)是美国漫威漫画旗下的超级英雄团队,初次登场于《X战警》第1期(1963年9月)。这个世界上人类中的一小部分存在基因变异,这部分变种人拥有各种各样的超能力。而世界对于这样一群异类产生了恐惧。万磁王为了争取更多变种人的权利,他聚集了一批部下不断针对人类进行破坏。而X教授致力于人类与变种人之间和谐生存,他创办了X学院,招募变种人学生,教导他们知识,让他们能合理运用自己的能力。培养他们成为X战警,保卫人类与变种人。
X战警团队介绍 X战警(X-MEN)是美国漫画界的宗师级主笔JACK KIRBY和STAN LEE在六十年代所创作的,一系列英雄组合中人气度最高的一支。X战警的所有成员,都是所谓的"变种人"(MUTANTS),他们的遗传基因中具有一个产生突变的“X基因”,导致他们天生有异于常人的特性,而X教授(Professor X)就是世上拥有强大的心灵感应(omega class telepathy)的一名变种人,他开设了一所学校,教导和训练那些受世人憎恨和恐惧的变种人使用自己的超能力。最初的学员有Cyclops、Beast、Ice Man、Jean和Angel,他们就是第一批的X战警,被称之为Origin 5。镭射眼(Cyclops)是第一代的队长。1975年,当第一代X战警在一次任务中失陷时,X教授招募了暴风女、金刚狼等新队员救出他们。不久,镭射眼的恋人琴·葛蕾(Jean Grey)蜕变成残酷的凤凰女,大肆破坏后自取灭亡;镭射眼和一个酷似琴的姑娘结婚,发现夙敌万磁王(Magneto)被教授请来主持学校,于是退出了。 随后,随着琴·格雷(Jean Grey)的回归,镭射眼和一些已退休的队友组建了X-FACTOR(X因子),作为X战警的一个分支组织。但他的妻子却与他们反目成仇;万磁王再次叛离,X战警与X因子汇合。在80到90年代,还涌现了许多变种人为主的队伍:泽维尔学校新一届学生组成的New Mutants(新变种人),镭射眼儿子链索从未来回来发起的强硬组织X-Force(X-特攻队),X战警旧成员在英国发起的Excalibur(圣剑),马萨诸塞学院的Generation X(X世代)。 90年代后期变种人处境日益艰难。X教授和万磁王的恶念产生的怪物几乎毁灭世界;镭射眼与天启合体(后被他的妻子琴分离),而琴又被敌人Xorn杀害;万磁王统治了一个曾经压迫变种人的小国家,局面开始转变时却遭到哨兵机器人的屠杀;绯红女巫精神错乱导致全世界数以百万计的变种人丧失了超能力,只剩下数百人;X战警纽约附近的学校基地被毁,退到旧金山,又逐渐退到太平洋上的人造岛“乌托邦”,作为变种人最后的避难所;一个变种人女孩霍普(Hope)的出现使这个种族重新有了延续的可能;金刚狼与镭射眼在如何照顾下一代方面发生分歧,带领大批年轻变种人回到纽约,在旧校舍基础上建立了一所新学校;凤凰之力再次降临地球,镭射眼坚信它会使变种人免受灭绝之灾,而复仇者们认为它会带来整个地球的毁灭,于是X战警和复仇者为了得到Hope(疑似凤凰宿主)而开战;由于钢铁侠(Iron Man)制造的机器将凤凰之力打散,从而使凤凰附体到镭射眼等X战警身上。最终化身黑暗凤凰的镭射眼与两大战队为敌,被Hope和绯红女巫制服,消散的凤凰之力终于使新的变种人继续涌现。 由于背景设定在半未来,所以X战警的剧情发展十分多样化,时光旅行、平行世界、基因实验都是常见的主题。1984年,一个被称为“未来过去之日”的世界里,几乎所有变种人都被失控的机器哨兵消灭;1994到1995年间,编剧们甚至设定出了另一个平行世界“天启时代”(Apocalypse Time),将所有角色的正邪、背景全部颠倒:由于X教授提前死亡,魔头Apocalypse统治了美国,原先是X战警宿敌的万磁王成了X战警新的首领,率领众人在已成废墟的土地上苟延残喘;2005年,万磁王的女儿绯红女巫扭曲现实,制造出变种人统治地球的“M皇室”世界;这样的变化增加了漫画的内涵。 X战警角色介绍 X战警(X-Men) 主队历届成员 注1:以下为漫画正史人物,若有平行世界人物会特别说明 注2 :两个主要聚居地是:太平洋人工岛“乌托邦”,纽约西切斯特的琴·格雷高等学校 注3:除特殊情况,下表“身份和隶属”中不特别标明角色是“X战警”,因为整表人物都是X战警 注4:初代的5位X战警(下表镭射眼到惊奇女孩) 注5:初代X战警从以前的世界穿越到了当代,与年长的自己共存 形象绰号姓名身份和隶属能力和特点现状 X教授 Professor X 查尔斯·弗朗西斯·泽维尔 创始人 泽维尔学校校长,教师 X合作社(X-Corporation)发起人 基诺沙的圣剑(Excalibur) 最强大的心灵感应及思想控制能力。 死亡。(被凤凰附身的镭射眼杀死) 镭射眼 Cyclops 斯科特·萨默斯 队长 (X-Factor)队长 泽维尔学校校长,教师 变种人领袖 X特攻队(X-Force)指挥 Champions 从眼中射出高能射线。 一度成为黑暗凤凰 成年:死亡。(死于泰瑞根迷雾) 少年:Champions成员、X战警蓝队成员 冰人 Iceman 罗伯特·德雷克 冠军斗士(Champions) 防卫者(Defenders) X因子 制造并控制冰,身体转化成冰。 欧米伽级。 成年:泽维尔变种人教育及扩展学院高级教员 少年:X战警蓝队成员 天使/天使长 Angel/Archangel 沃伦·肯尼思·沃辛顿三世 继承家族产业的大富豪 冠军斗士 防卫者 X因子 X特攻队 背后有一对大翅膀,可飞翔。 被改造成天使长后翅膀金属化,发射钢羽飞刀 二次变异后可切换以上形态,血液可治疗血型相容者 成年:跟随万磁王行动 少年:X战警蓝队成员 野兽 Beast 亨利·麦考伊 昵称汉克 跨多个领域的科学家 复仇者(Avengers) 防卫者 X因子 天剑(S.W.O.R.D.) 秘密复仇者(Secret Avengers) 简·格雷学校副校长 强化的体力、耐力、速度、敏捷性和感觉。高智商 误用药物变成类似猿猴的长毛形态 二次变异成类似狮子的形态 后变异成接近猩猩的形态 成年:新复仇者队员 管理琴·格雷学校 少年:X战警蓝队成员 惊奇女孩/凤凰 Marvel Girl/Phoenix 琴·格雷-萨默斯 镭射眼的女友 X因子 凤凰之力宿主 泽维尔学校校长,教师 意念移物,心灵感应 与凤凰之力融合,可操纵巨大的能量,在亚原子层面控制物质 成年:于大事件“凤凰涅槃”中被凤凰复活,现为X战警红队领队 少年:X战警蓝队领队 拟态者 Mimic 卡尔文·蒙特戈莫瑞·兰金 X战警队长 黑暗X战警 同时复制其他多个变种人的能力 不详 变形人 Changeling 凯文·悉德尼 因子三(Factor Three) 变形成别人的模样。一定程度的心灵感应 和万磁王一伙 北极星 Polaris 洛娜·达恩 万磁王的女儿 X因子 信徒(Acolytes) 阻星者(Starjammers) 控制磁场 X因子调查局 冲击波 Havok 亚历克斯·萨默斯 镭射眼的二弟 X因子队长 阻星者 复仇者 吸收宇宙能量,发射离子冲击波 复仇者 佩特拉 Petra 不明 莫拉·马克塔格特博士收容的学生 控制大地与土石 死亡 摇弋 Sway 苏珊妮·陈 香港移民,莫拉收容的学生 控制时间流动,呈现历史影像 死亡 达尔文 Darwin 阿曼多·穆诺兹 黑人与拉美混血,莫拉收容的学生 身体根据外界环境自动变异出适应性的能力 死亡 伏尔坎 Vulcan 加布里埃尔·萨默斯 镭射眼的三弟,莫拉收容的学生 希阿(Shi'ar)帝国皇帝 控制多种不同形式的大量能量,在宇宙飞行 欧米伽级。 疑似死亡 夜行者 Nightcrawler 科特·瓦格纳 德国人 魔形女和Azazel的儿子 英国圣剑(Excalibur)队长 天主教修士 X极端裁决执行队(X-Treme Sanctions Executive) 散发出烟雾的瞬间移动,但须知道地形 爬墙,尾巴可抓物,暗处潜行 X战警金队、红队成员 金刚狼 Wolverine 詹姆斯“罗根”·豪利特 加拿大人 美国士兵 X小队(Team X)特工 加拿大阿尔法战队(Alpha Flight) 加拿大H部、K部 X武器(Weapon X)杀手 防卫者 X极端裁决执行队 复仇者 X特攻队 简·格雷学校校长 生于19世纪;有治愈能力;天生拥有骨爪,后在实验中骨骼被灌注艾德曼金属,获得金属爪;永生;的嗅觉 管理琴·格雷学校 领导X特攻队 参与复仇者行动 失去自愈因子,被艾德曼金属覆盖,已死亡(由X-23担任新金刚狼。暮狼寻乡宇宙中的老年金刚狼穿越到了全新全异宇宙,并且跟随X战警金队行动。)现已复活 海妖 Banshee 西恩·卡西迪 爱尔兰豪门后裔 国际刑警 因子三 马萨诸塞的泽维尔学校校长 X世代(Generation X)领导人 X合作社 声波尖啸,用于攻击、防御和飞行 死亡 暴风女 Storm 奥罗罗·蒙罗 婚后为: 奥罗罗·伊夸迪· 特查拉-瓦坎达斯 非洲祭司世家后裔 扒手 X战警队长 X极端裁决执行队队长 瓦坎达国前王后(已离婚) 复仇者 非凡X特攻队 操作气候产生冰雪、风暴、闪电等。御风飞行 疑似欧米伽级 工作于琴·格雷学校,领导非凡X特攻队。X战警金队成员。 太阳火 Sunfire 吉田四郎 日本豪门后裔 6大英雄(Big Hero 6,日本战队) 天启四使徒 掠夺者(Marauders) 产生原子能火焰,飞行,控制多种辐射 复仇者成员 钢力士 Colossus 皮奥特·尼古拉耶维奇“皮特”·拉斯普廷 俄罗斯奇人拉斯普廷的后裔 信徒 圣剑 凤凰五人组 可以把自身变成钢铁,强度低于艾德曼金属。 从邪神处获得Juggernaut力量 X战警金队成员,即将与幻影猫结婚。 雷鸟 Thunderbird 约翰·普罗德斯达 印第安阿帕奇族人 复员军人 超常的力量、速度、耐力 死亡 幻影猫 ShadowCat (还用过代号Spirite、Ariel以及顶替过Star-Lord) 凯瑟琳“凯蒂”·普莱德 犹太人 英国圣剑 简·格雷学校校长 银河护卫队 改变自身和所接触物体的微观结构,以穿透各种固体。可干扰电子设备,在空中行走 银河护卫队成员(已解散)、X战警金队领队 洛克希德 Lockheed 外星小龙,依恋凯蒂 天剑 宠物复仇者 飞行,喷火,说多种语言,一定的精神力 不详 罗刹女 Rogue 安娜·茉莉(姓氏不明) 魔形女的养女 兄弟会 复仇者 以肌肤碰触吸收他人生命力(包括记忆、意志、知识、人格)获得对方的超能力。现可控制性地一次性吸收使用数人的超能力。 琴·格雷学校高级教员。非凡复仇者成员。 凤凰/惊奇女孩(新任) Phoenix /Marvel Girl 雷切尔·安妮·格雷 平行世界地球811的镭射眼与简之女 X极端裁决执行队 阻星者 意念移物,心灵感应 曾经获得凤凰之力 琴·格雷学校高级教员、X战警金队成员 万磁王 Magneto 马克斯“马格纳斯”·埃森哈特 化名: 艾瑞克·兰瑟 犹太人 变种人兄弟会创始人 信徒们的领袖 基诺沙的圣剑 操纵磁场,控制金属、悬浮、制造力场、干预精神、发出能量攻击 训练年轻变种人、领导非凡X战警 灵蝶 Psylocke 伊丽莎白“贝特茜”·布拉多克 英国豪门后裔 X极端裁决执行队 变种人姐妹会 非凡X特攻队 心灵感应、意念化武士刀、精神能量剑;抗精神攻击;念力移物 与一个日本女杀手交换了身体。擅长格斗 现已成为欧米伽级变种人 跟随万磁王行动 远射 Longshot 来自一个叫Mojoverse的宇宙,是当地科学家制造的基因改良人 X因子调查局 改变概率,导致对自己有利的事件发生 强化的体力、敏捷和痊愈力和触物感知 独自漫游 眩光 Dazzler 阿丽森·布莱尔 流行歌手 英国圣剑 平行世界X极端裁决执行队 吸收声波能量,转化为光能 神盾特工 锻造者 Forge 不明 印第安夏安族人 政府设备提供者 X因子 理解和发明各种机械 右手和左腿是机械假肢 传承本族法术 参与链索的队伍 牌皇 Gambit 雷米·埃提尼·勒博 新奥尔良法裔盗贼团伙首领养子,神偷 天启四使徒 掠夺者 使接触的非生命物体产生爆炸性能量 强化的体能和迷惑力 琴·格雷学校高级教员 李千欢/神奇女 Jubilee/Wondra 茱碧琳·李 美籍华人 X世代 X合作社 新战团(New Warriors) 曾经可以发射能量火花 M日后失去能力,被吸血鬼咬后具有吸血鬼能力 X世代领队 毕肖普 Bishop 卢卡斯·毕肖普 平行世界地球1191的未来人,是澳大利亚变种人Gateway在这个可能性未来的曾孙 XSE(泽维尔安全执法队) X极端裁决执行队 O*N*E(国家紧急事务办公室) 吸收大多数形式的能量,转化为超级体能,或增幅发射 掌握时间旅行技术。右臂换成高科技假肢 被吸血鬼感染 随暴风的队伍行动 复仇使 Revanche “观音” 日本黑道组织的女杀手 心灵感应、精神刀、移情 与灵蝶交换身体 死亡 加农炮 Cannonball 萨缪尔· 扎查利“萨姆”·格思里 矿工 新变种人(New Mutants)队长 X特攻队队长 X合作社 X极端裁决执行队 复仇者 新复仇者 发射化学热能,产生力场,用于飞行和撞击 琴·格雷学校下级教员 随复仇者战斗 约瑟夫 Joseph 未知万磁王的克隆人 制造和控制磁场 死而复生,追杀反变种人份子,被万磁王制服 塞西利亚·雷耶斯医生 Dr. Cecilia Reyes 塞西利亚·雷耶斯 黑人女医生 身体周围产生无形力场 协助学校的队伍 骨髓 Marrow 萨拉·拉什曼 流浪变种人团体莫洛克(Morlocks) X单元(X-Cell) 产生多余的骨骼作为武器,强化体能,两颗心脏 M日后失去能力 滥用变异药物导致骨骼所长失控 双蛆怪 Maggott 雅弗 南非黑人 消化系统是两只大蠕虫,可离体活动,吞吃各种东西 不详 雷鸟(第三任) Thunderbird 尼尔·沙拉 印度人 产生热离子冲击,飞行 在旧金山 电索 Cable 内森·克里斯托弗·查尔斯·萨默斯 镭射眼与简的克隆人生的儿子 Askani(局外人)领袖 雇佣兵六人团(Six Pack) X特攻队创始人 意念移物,心灵感应 由于感染机械化病毒,身体左半边大部分变成机械 掌握时间旅行技术和多种先进科技 组建新X特攻队 月星 Moonstar (曾用代号Psyhe、Mirage) 达妮里·月星 印第安夏安族人 新变种人队长 北欧女武神 天盾(S.H.I.E.L.D.)特工 X特攻队 X合作社 制造精神幻象,与动物交流 成为女武神时可感知死亡;骑白色飞马“明光” M日后失去能力 擅用弓箭 与包含大量女英雄的防卫者(Defenders)合作 贤哲 Sage 特萨 地狱火俱乐部 X极端裁决执行队 英国圣剑 流放者(Exiles) 心灵感应,计算机般的大脑,高速处理大量信息,感知变种特征 作为流放者成员在平行世界活动 白皇后 White Queen 艾玛·格瑞丝·弗罗斯特 大企业业主 地狱火俱乐部 马萨诸塞学院校长 X世代领导人 泽维尔学校校长 黑暗X战警 凤凰五人组 心灵感应 二次变异后身体可转化为类似钻石的结构。两种能力不能同时使用 训练年轻变种人 Xorn Kuan-Yin(观音)Xorn 中国人 教师 人格分裂,认为自己是万磁王,把学生组成兄弟会 头内有一颗恒星,产生高热、控制电磁场和重力 死亡 幽禁Chamber 乔纳森·伊凡“乔纳”·斯塔斯摩 X世代 阿卡巴族(Clan Akkaba) 新战团 教师 巨大的精神能量导致他的下巴和胸口被炸掉,形成一个发光的空腔 使用心灵感应交流;可发射能量冲击 琴·格雷学校下级教员 斯塔西X Stacy X 米兰达·里瓦尔德 X青楼(X Ranch) 新战团 控制荷尔蒙,皮肤似蛇 M日后失去能力;使用科技装备,可爬墙、跳远、有金属触手 因重操旧业,遭万磁王责罚 救生员 Lifeguard 希瑟·卡梅隆 澳大利亚海滨救生员 有外星希阿人的血统 决心拯救别人时根据情况产生特定超能力 希阿的鸟人血统使她长出金色皮肤、翅膀和爪子 留在乌托邦,负责旧金山地区街区行动 气流 Slipstream 戴维斯·卡梅隆 救生员的弟弟 有希阿血统 通过能量流通道瞬移 不详 北辰 Northstar 让-保罗·博比尔 加拿大阿尔法战队 最著名的同性恋英雄之一 超级速度,飞行,发射闪光 一度回到阿尔法战队,协助学校的队伍 Husk 佩吉·伊丽莎白·格思里 炮弹的妹妹 X世代 地狱火俱乐部 通过“蜕皮”改变身体结构 琴·格雷学校下级教员 红坦克 Juggernaut 凯因·马可 X教授没有血缘关系的兄弟 独行反派 圣剑 不是变种人,获得邪神之力而具有超强体力与耐力 不详 Xorn Shen(神)Xorn 中国人,前一个Xorn的兄弟 头内有一个黑洞,控制能量,心灵感应 M日后失去能力 不详 魔形女 Mystique 不明 化名:瑞雯·达克霍姆 自组变种人兄弟会 X因子 掠夺者 随意变成其他人模样,连声音、指纹等身体特征也一样。能模拟一些超能力 跟X战警一起行动 征途 Warpath (曾用代号雷鸟) 詹姆斯·傲星 初代雷鸟的弟弟 地狱狮(Hellions) X特攻队 X合作社 超常体力、耐力、速度、感觉,可飞行 使用一对vibranium金属刀 不详 幻象女士 Lady Mastermind 瑞甘·文加德 反派幻象大师的女儿 掠夺者 变种人姐妹会 制造精神幻觉 跟随魔形女和剑齿虎 剑齿虎 Sabretooth 维克多·克里德 X小队 掠夺者 兄弟会 X武器 金刚狼的同父异母兄弟 超常体力、敏捷性和感觉;尖牙利爪;快速自愈;抗精神攻击 死而复生,性格逆转 终极哨兵 Omega Sentinel 卡里玛·沙潘达 印度女警 基诺沙的圣剑 被改造成生化哨兵机器人,全身都是武器 居住于琴·格雷学校 铠 Armor 枥木久子 日裔女学生 制造意念铠甲 就读于琴·格雷学校 赫普兹芭 Hepzibah 地球人无法读出 外星人Mephitisoid族 阻星者 X特攻队 半人半猫,强化的敏捷性和感知,利爪,分泌的荷尔蒙能干扰思维,夜视 不详 小精灵 Pixie 梅根·贵恩 模范组(泽维尔学校学生小组) 以蝴蝶翅膀飞行,散布幻觉的微尘,一定的魔法,最常用的是瞬移 协助学校的队伍 羯磨 Karma Xi'an "Shan" Coy Manh 越南裔 新变种人 精神附体于若干人,控制其行动 左腿是机械假肢 琴·格雷学校下级教员 太阳黑子 Sunspot 罗伯托“伯比”·达科斯塔 巴西黑白混血儿 新变种人 流浪团体坠落天使(Fallen Angels) 继承家业的富豪 地狱火俱乐部黑王 X特攻队 X合作社 复仇者 吸收太阳能,转化为超常体力,全身覆盖一层黑色;可飞行和发射能量攻击 买下A.I.M组织,成立新复仇者 极光 Aurora 珍妮-玛丽·博比尔 与北辰是双胞胎,有多重人格 加拿大阿尔法战队 超级速度和耐力,飞行,发射强光 回到阿尔法战队 岩浆 Magma 阿玛拉·朱理安那·奥丽维安斯·阿奎拉 新罗马城议员之女 新变种人 英国大使之女 地狱狮/新地狱狮 X合作社 X极端裁决执行队 控制地质运动,制造地震和火山喷发,操纵熔岩,全身岩浆化 不详 天遣博士 Doctor Nemesis 詹姆斯·尼古拉·布拉德利 纳粹的战斗轴心(Battle-Axis) X俱乐部(X-Club)科学家 X特攻队 长生,强化免疫力和视力,高智商,使用特制手枪 随链锁行动 拳击手 Box 马迪森·杰弗里斯 加拿大阿尔法战队 黄道十二宫(Zodiac) X武器 X俱乐部 以意念重塑金属、塑料和玻璃。擅长机械领域 负责科研工作 秘客 Magik 伊尔亚娜·尼科列夫娜·拉斯普廷 钢力士的妹妹 新变种人 凤凰五人组 制造空间通道,在地狱边缘空间Limbo修习魔法,使用灵魂剑和魔甲,一度转化成邪恶的黑暗女童 训练年轻变种人 拿摩 Namor the Sub-Mariner 奈莫·麦肯齐 人类与亚特兰蒂斯海底人的混血儿 亚特兰蒂斯统治者 二战英雄队伍侵袭者(Invaders)队员 全胜中队(All-Winners Squad)队员 防卫者 光照会 复仇者 黑暗X战警 凤凰五人组 内阁 两栖体质,以水为能
|
[
"钢铁侠制造的机器将凤凰之力打散,使凤凰附体到镭射眼身上。"
] | 8,489
|
multifieldqa_zh
|
zh
| null |
8fe99f3d7b385e8a5e179b1159fa5158ff0f084c3f35360b
|
万小霞提供的第二组证据证明了什么?
|
王年方、汪尧文商品房销售合同纠纷二审民事判决书
上诉人王年方、汪尧文、夏华中(以下简称王年方等三人)因与被上诉人万小霞、原审被告湖北隆泉房地产开发有限公司(以下简称隆泉公司)商品房销售合同纠纷一案,不服湖北省汉川市人民法院(2018)鄂0984民初415号民事判决,向本院提起上诉。本院于2018年8月17日立案受理后,依法组成合议庭进行了审理。本案现已审理终结。
王年方等三人上诉请求:1.依法驳回万小霞对王年方等三人的诉讼请求;2.依法判令本案的诉讼费和其他费用由万小霞承担。事实与理由:一、万小霞主张逾期办证违约金超过诉讼时效,丧失胜诉权,人民法院依法应驳回其诉讼请求。我国《民法总则》第一百八十八条规定向人民法院请求保护民事权利的诉讼时效期间为三年。法律另有规定的,依照其规定。诉讼时效期间自权利人知道或者应当知道权利受到损害以及义务人之日起计算。本案中,王年方等三人与万小霞签订的《商品房买卖合同》第十五项明确约定出卖人应当在商品房交付使用后的180日内,将办理权属登记需由出卖人提供的资料报产权登记机关备案。如因出卖人的责任,买受人不能在规定期限内取得房地产权属证书的,双方同意按照下列第三项处理:3.产权总证由开发商办理,并承担相关税费,分户产权证由开发商代办,买受人承担相关费用和契税。按照《民法总则》第一百八十八条的规定,向人民法院请求保护民事权利的期限为3年。万小霞于2018年1月9日向汉川市人民法院提起诉讼,明显超过了诉讼时效。王年方等三人在一审中也未提供证据证明,诉讼时效中断的法定事由。因此万小霞依法丧失胜诉权,法院应驳回其诉讼请求。二、一审法院追加王年方等三人为本案被告,判令王年方等三人承担连带赔偿责任程序不符合法律规定,二审法院应依法纠正。1.一审法院认定隆泉公司及王年方等三人挂靠开发涉案房地产,没有任何证据予以证明。属于事实认定错误。2.即使有相关的合作开发协议,一审法院在本案商品房销售合同纠纷中,也不应对其他协议的效力予以认定。即一审法院在隆泉公司的诉请范围之外,认定其他合同效力,影响了其他当事人的权利义务,实属不当。3.一审判决王年方等三人与隆泉公司承担连带赔偿责任,没有法律依据。4.根据合同相对性原则,本案《商品房买卖合同》的双方当事人为万小霞与隆泉公司,该合同纠纷的责任主体应仅限双方当事人,即隆泉公司。一审追加王年方等三人为被告程序违法,判决王年方等三人承担连带赔偿责任,没有任何法律依据。综上所述,一审判决适用法律错误,实体处理不当。请求二审法院依法支持上诉请求,驳回万小霞的诉讼请求。
万小霞二审辩称,一、万小霞主张逾期办证违约金未超过诉讼时效。万小霞和全体业主推荐的代表,先后于2013年3月,2014年9月、10月,2015年4月、5月,2016年3月、7月,2017年3月、8月,2018年1月向人民法院提起民事诉讼至今,分别采取口头请求、书面投寄信函和张贴维权告示,派代表到省、市政府机关和有关职能部门上访,要求王年方等三人为小区业主办理好房产证。万小霞主张自己权利的所有行为,均符合法定时效的规定。二、王年方等三人与隆泉公司已形成挂靠关系。一审法院在审理过程中,追加王年方等三人为被告,与被挂靠人隆泉公司为共同诉讼人参与诉讼,依法共同承担民事责任。万小霞围绕上述追加请求,向一审法院提交了商品房买卖合同、付款凭证、挂靠证明和王年方等三人向隆泉公司申请雕刻公章的请示报告等证据。充分证明王年方等三人与隆泉公司形成实际挂靠关系的法定事实。三、一审法院将王年方等三人与隆泉公司列为共同诉讼人参加诉讼的程序合法。一审庭审调查、质证的过程中,王年方等三人对万小霞的追加请求和隆泉公司证明其是隆泉公司的挂靠人的真实性均无异议,表示认同。四、王年方等三人与万小霞签订的商品房买卖合同合法有效,具有法律约束力。万小霞依合同约定,全面履行了自己的义务,应受法律保护。王年方等三人未按合同约定履行自己的义务,其行为已构成违约,应依法承担违约的民事责任。五、万小霞主张权利的行为均在法定的时效之内,王年方等三人主张万小霞向人民法院起诉超过法定时效的理由不能成立。六、一审法院追加王年方等三人为本案被告,认定与隆泉公司为共同诉讼人,依法共同承担民事责任的事实清楚,证据充分,符合法律规定。综上。王年方等三人的上诉理由不能成立,请求二审法院驳回上诉,维持原判。
隆泉公司述称,一审法院已经核实王年方等三人与隆泉公司为挂靠关系,王年方等三人与隆泉公司签订了挂靠协议,并向隆泉公司交纳了挂靠费用。所有项目的建设和费用都是由王年方等三人负责,隆泉公司没有收取任何费用。
万小霞向一审法院提出诉讼请求:1.判令隆泉公司及王年方等三人办齐各项手续,协助万小霞办理不动产权证;2.判令隆泉公司及王年方等三人支付前期逾期办证违约金99224元(以购房款为基数,按银行贷款年利率4.75%,自2012年1月1日起算至起诉之日止),并按同样方式支付起诉之后的违约金直至隆泉公司及王年方等三人履行完义务之日止;3.判令隆泉公司及王年方等三人退还万小霞的办证费28929元,并赔偿万小霞的经济损失(按贷款年利率4.75%的四倍,从交费之日后6个月起算至隆泉公司及王年方等三人履行完义务之日止);4.诉讼费由隆泉公司及王年方等三人承担。
一审法院认定事实:2010年9月11日,万小霞与隆泉公司签订了一份商品房买卖合同,购买其开发的汉川市隆泉商业城综合楼x号楼x单元x号房。合同约定万小霞应付购房款为368636元,隆泉公司及王年方等三人应于2011年6月30日前向万小霞交付经验收合格的商品房,其中合同第十五条约定:出卖人应当在商品房交付使用后180日内,将办理权属登记需由出卖人提供的资料报产权登记机关备案。如因出卖人的责任,买受人不能在规定期限内取得房地产权属证书的,双方同意按下列第3项处理:3.产权总证由开发商办理,并承担相关税费,分户产权证由开发商代办,买受人承担相关费用及契税。该商品房买卖合同还约定了买受人逾期付款的违约责任(合同第七条)、出卖人逾期交房的违约责任(合同第九条)。此后万小霞按合同约定支付了购房款368636元,于2012年2月16日收房,并另外支付了办理房屋产权证的费用28929元。万小霞支付的购房款和办证费用实际上均由王年方等三人所收取,三人合伙,以隆泉公司名义,开发、建设和销售汉川市隆泉商业城综合楼房地产项目,隆泉公司除向三人收取管理费12万元外,未参与该房地产项目的任何开发、建设、销售行为。该房地产项目具备商品房预售许可证,2013年1月,王年方等三人办理了该房地产项目的产权总证,但未及时为万小霞等买受人办理产权分户登记备案手续。2017年8月28日,隆泉公司及王年方等三人通知各买受人领取销售不动产发票,准备办理产权证。万小霞多次向隆泉公司及王年方等三人维权无果后,遂对隆泉公司提起诉讼,在审理过程中,万小霞向一审法院申请追加了王年方、汪尧文、夏华中三人为被告,要求其与隆泉公司共同承担责任。
一审法院认为:本案万小霞、隆泉公司及王年方等三人对事实和证据均无争议,双方当事人争议的焦点在于隆泉公司及王年方等三人应否承担责任、及如何承担责任。
一、关于隆泉公司及王年方等三人的责任:隆泉公司允许他人以其名义实施民事行为,所产生的法律后果依法均应由其自己承担,隆泉公司认为自己无责的抗辩理由于法有悖,一审法院未予支持;且王年方等三人名为挂靠,实质上是借用隆泉公司的资质,进行房地产开发。隆泉公司及王年方等三人出借、借用资质的行为,违反了有关房地产资质管理的强制性法律法规,隆泉公司及王年方等三人之间的约定无效,根据《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第五十四条之规定,参照建筑行业出借资质行为的法律规定,隆泉公司及王年方等三人为共同诉讼人,造成他人损失的,隆泉公司及王年方等三人应当承担连带赔偿责任。
二、关于逾期办理产权证的违约责任:隆泉公司及王年方等三人之间的关系不影响本案商品房买卖合同的效力,该商品房买卖合同合法有效,万小霞的合法权益应予以保护。交付房屋并办理产权登记备案手续,是房地产出卖人的基本义务,相关法律、法规对商品房出卖人办理房屋产权证书的义务和期限均有明确规定。隆泉公司作为房地产出卖人、合同相对方,之前未依法为各买受人办理分户产权登记备案手续,收取办证费用后,至今仍未为万小霞办理相关产权证书,违反法律规定和合同约定,其依法应当承担违约责任。涉案商品房买卖合同第十五条关于产权登记的约定,为格式条款,且隆泉公司及王年方等三人选择的第3项,实际上是对产权办理方式的约定,并非对违约责任的约定。本案商品房买卖合同中约定的违约责任仅有逾期付款和逾期交房两种,对于出卖人逾期办证的违约责任,合同中并无约定,隆泉公司及王年方等三人选择的格式条款显然是规避其违约责任。双方当事人对此违约责任无明确约定,根据《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条第二款规定,合同没有约定违约金或者损失数额难以确定的,可以按照已付购房款总额,参照中国人民银行规定的金融机构计收逾期贷款利息的标准计算,即在同期银行贷款利率基础上加收30%-50%。万小霞以其所付购房款为基数,按照2017年度中国人民银行1-5年期贷款年利率4.75%计算违约金,此计算标准在法律规定范围内,一审法院予以支持;对于违约金的计算时间,即使隆泉公司及王年方等三人违约,万小霞也有及时减损的法定义务,而不能任凭违约时间延长以增长违约金,且违约金请求权属于债权请求权,应当适用诉讼时效的法律规定。鉴于隆泉公司及王年方等三人持续违约,违约金亦处于持续计算中,故一审法院从万小霞起诉主张权利之日倒推三年,在三年之内的违约金一审法院予以保护,即按万小霞诉求的标准计算三年的逾期办证违约金,为52531元(368636元×年利率4.75%×3年),万小霞的此诉求一审法院部分支持,超出三年的违约金一审法院未予支持。
三、关于办理产权证的费用:隆泉公司及王年方等三人收取了相关办证费用,但未及时为万小霞办理产权证,仍属于逾期办理产权证的违约行为,因此给万小霞造成的经济损失,一审法院同样适用《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条第二款的规定,参照中国人民银行规定的金融机构计收逾期贷款利息的标准计算万小霞的损失额,即在同期银行贷款利率基础上加收30%-50%。万小霞要求按银行贷款年利率4.75%的4倍计算过高,一审法院依法调整为按万小霞诉求年利率的1.5倍,即年利率7.13%予以计算,万小霞超出此计算标准的诉求一审法院未予支持;损失起算时间万小霞要求自交费之日起后延6个月,即自2012年8月17日起算,万小霞对自己权利的处分不违反法律规定,一审法院予以支持;鉴于隆泉公司及王年方等三人长期违约拖延履行,对于万小霞现要求隆泉公司及王年方等三人退还费用自行交费办理产权证的诉求,一审法院予以支持。
综上,依照《中华人民共和国合同法》第八条、第五十二条、第五十八条、第六十条第一款、第一百零七条,《中华人民共和国民法总则》第一百八十八条,《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条,《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第五十四条,《中华人民共和国民事诉讼法》第一百四十二条之规定,遂判决:一、隆泉公司于判决生效之日起二十日内,协助万小霞办理位于汉川市隆泉商业城综合楼1号楼1单元801号房屋的产权登记手续,相关费用由万小霞自行负担;二、隆泉公司于判决生效之日起二十日内,向万小霞赔付逾期办证违约金52531元;三、隆泉公司于判决生效之日起二十日内,向万小霞退还办证费用28929元,并赔偿相应经济损失(以28929元为基数,按年利率7.13%,自2012年8月17日起算至判决确定的履行之日止);四、王年方等三人与隆泉公司承担连带赔偿责任;五、驳回万小霞的其他诉讼请求。如未按判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条规定,加倍支付迟延履行期间的债务利息。一审案件受理费2863元由万小霞负担500元,隆泉公司及王年方等三人负担2363元。
本案二审期间,王年方等三人、隆泉公司未向本院提交新证据;万小霞围绕其诉讼主张向本院提交了两组证据。本院组织当事人进行了证据交换和质证。万小霞提交的证据如下:
第一组证据:拟证明起诉符合法定时效的证据。
证据一:全体业主要求办证书面告示一份。拟证明:全体业主要求开发商及时办证的请求。
证据二:全体业主联名举报信一份。拟证明:全体业主要求查处不良开发商,要求开发商及时办理产权证的请求。
证据三:业主代表与开发商汪尧文的协议笔录一份。拟证明:开发商同意在2014年年底办好产权证的承诺。
证据四:业主联名向相关职能部门信访材料邮寄回单及汉川城乡规划局的反馈意见。拟证明:要求开发商为业主办理产权证的请求。
证据五:部分业主因小孩入学无房产证而苦恼,要求开发商办证,开发商出具缴费凭证一份。拟证明:各业主税票于2016年6月29日开具,因开发商其他相关手续未完善,导致不能办证。
证据六:业主代表到市信访局上访,业主代表到省信访局上访。拟证明:小区业主曾到湖北省、汉川市等信访部门反映过问题。
证据七:开发商在小区张贴通知一份。拟证明:开发商通知小区业主于2017年8月28日可以开始办证,事实上还不能办产权证。
证据八:汉川市法院周院长主持案外调解的音频资料U盘一个。拟证明:开发商汪尧文、王年方、夏华中三人与业主代表为赔偿事宜进行过约谈。
证据九:第一次向法院提出诉讼。拟证明:用法律维权。
证据十:双方面对面协商办证事宜的书面材料一份。拟证明:小区业主在上诉后和开发商协商过办证事宜。
证据十一:开发商设置的小区管理人员的书面证明材料一份。拟证明:小区业主从2012年至今为办理产权证维权的过程。
第二组证据:拟证明王年方等三人与隆泉公司为挂靠关系的证据。
证据一:被挂靠人隆泉公司出具的书面证明材料一份。拟证明:王年方等三人是隆泉公司的挂靠人,与隆泉公司存在事实上的挂靠关系。
证据二:开发商王年方等三人为开发隆泉景苑项目的方便,向隆泉公司书面申请雕刻公章的请示报告。拟证明:王年方等三人与隆泉公司属于挂靠与被挂靠的关系。
证据三:一审庭审笔录。拟证明:王年方等三人对万小霞指控其与隆泉公司存在挂靠关系以及该公司证明王年方等三人与隆泉公司存在事实上的挂靠关系的真实性与证据均无异议,表示认同。
王年方等三人对上述两组证据的质证意见如下:第一组证据:对证据一真实性有异议,该证据为照片打印,没有提取照片过程的公证证据,对证明目的不予认可;对证据二真实性有异议,因该举报信书写和起草方均为本案被上诉人,故只能作为当事人陈述,需要其他证据予以印证,对其证明内容不予认可;对证据三无异议;对证据四无异议;对证据五真实性无异议,对证明目的有异议,该份证据只能证明业主涉案房产依法缴纳了税费,不能达到其证明目的;对证据六无异议;对证据七真实性有异议,没有提取照片过程的公证证据,对证明目的不予认可;对证据八认为取得程序不合法,真实性不能确定,不予认可;对证据九真实性无异议,对证明目的有异议,该份诉状只能证明万小霞向隆泉公司主张权利,没有向王年方等三人主张过权利;对证据十有异议,出具该证明是本案当事人,只能作为当事人陈述,没有证据相互印证,不予认可;对证据十一有异议,证明人未出庭作证,其签名真实性无法核实,不予认可。第二组证据:对证据一有异议:1.该证据不属于新证据;2.在一审当中,段志勇未出庭作证;3.该证明加盖隆泉公司公章,隆泉公司作为本案当事人,是否作为本案当事人陈述,定性不明;4.隆泉公司涉及到自己权利义务的陈述需要有相关证据佐证。对证据二真实性无异议,对证明目的有异议:刻制公章属于隆泉公司内部经营管理系统,不能证明挂靠行为。对证据三有异议,一审王年方等三人委托代理人为一般代理,无权对涉及王年方等三人利益的重大事实予以自认。
隆泉公司对上述两组证据的质证意见为:对该两组证据没有任何异议,均认可其真实性及证明目的。
本院认证认为:对万小霞提交的两组证据,王年方等三人仅对上述证据的真实性、合法性、关联性提出了质疑,但未提交证据证明自己的观点,故本院对上述证据的真实性、合法性、关联性均予以认可。第一组十一份证据证明其主张逾期办证违约金的时间形成了证据链;第二组三份证据独立来看均属于孤证,但三份证据均证明同一事实,能够互相印证。故本院对万小霞提交证据的证明目的予以认可。
经审理查明,一审查明事实属实,本院依法予以确认。另查明,万小霞自2013年3月,2014年9月、10月,2015年4月、5月,2016年3月、7月,2017年3月、8月,2018年1月向人民法院起诉,期间主张权利未间断。
依照《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第三百二十三条的规定,第二审人民法院应当围绕当事人的上诉请求进行审理。故本院认定本案二审讼争的焦点为:一、万小霞主张逾期办证违约金是否超过诉讼时效;二、王年方等三人应否对隆泉公司承担的责任承担连带责任。
本院认为,万小霞与隆泉公司签订的商品房买卖合同,是双方当事人真实意思表示,未违反法律禁止性规定,依法成立、有效。双方均应按照合同的约定履行合同。
一、万小霞主张逾期办证违约金未超过诉讼时效。二审中,万小霞提交的十一份证据证明,自2013年3月15日起至今,未间断主张其权利。根据《中华人民共和国民法总则》第一百八十八条的规定,万小霞主张逾期办证违约金的诉讼请求未超过诉讼时效。王年方等三人的该项上诉理由,本院不予采信。
二、一审法院依照万小霞的申请,追加王年方等三人为本案被告,符合法律规定。王年方等三人的该项上诉理由不成立,本院依法不予采信。
三、王年方等三人应对隆泉公司承担的责任承担连带责任。王年方等三人借用隆泉公司资质,出资进行开发房地产,虽成立项目公司,但按照合同的约定独自履行义务,分享收益,二者应为非法人型合作开发的联营体。王年方等三人在上诉状中自认本案中,上诉人与被上诉人签订的《商品房买卖合同》足以说明,一审中,万小霞、王年方等三人与隆泉公司对事实和证据均无异议。王年方等三人作为实际的收益人,根据《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》第七条第一项的规定,应当对隆泉公司应承担的责任承担连带责任。权利与义务对等,利益与责任同在。王年方等三人不能只享有权利不履行义务,亦不能只收获利益而不承担责任。是故,王年方等三人的上诉请求不能成立,依法应予驳回。
另外,一审法院宣判后,万小霞未提起上诉,视为其认可一审判决。一审认定四被告出借、借用资质的行为,违反了有关房地产资质管理的强制性法律法规,四被告之间的约定无效与《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》的规定相悖,故对一审判决的该认定予以纠正;王年方等三人的该上诉理由本院予以采信。
综上,一审判决认定事实清楚,适用法律不当,但实体处理正确,依法应予维持。上诉人王年方等三人的上诉请求本院依法予以驳回。经合议庭评议,依照《中华人民共和国民事诉讼法》第一百七十条第一款第一项之规定,判决如下:
驳回上诉,维持原判。
二审案件受理费2363元,由上诉人王年方、汪尧文、夏华中负担。
本判决为终审判决。
适用法条:
《中华人民共和国民事诉讼法》
第一百七十条第二审人民法院对上诉案件,经过审理,按照下列情形,分别处理:
(一)原判决、裁定认定事实清楚,适用法律正确的,以判决、裁定方式驳回上诉,维持原判决、裁定;
《中华人民共和国民法总则》
第一百八十八条向人民法院请求保护民事权利的诉讼时效期间为三年。法律另有规定的,依照其规定。
诉讼时效期间自权利人知道或者应当知道权利受到损害以及义务人之日起计算。法律另有规定的,依照其规定。但是自权利受到损害之日起超过二十年的,人民法院不予保护;有特殊情况的,人民法院可以根据权利人的申请决定延长。
《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》第七条第一项
七、关于联营合同解除后的财产处理问题
(一)联营体为企业法人的,联营体因联营合同的解除而终止。联营的财产经过清算清偿债务有剩余的,按照约定或联营各方的出资比例进行分配。
联营体为合伙经营组织的,联营合同解除后,联营的财产经清偿债务有剩余的,按照联营合同约定的盈余分配比例,清退投资,分配利润。联营合同未约定,联营各方又协商不成的,按照出资比例进行分配。
|
[
"证明了王年方等三人与隆泉公司为挂靠关系。"
] | 8,481
|
multifieldqa_zh
|
zh
| null |
61ada6c035b9191b469868778691b149f7ee8cb55c7aec0c
|
规档云的联系电话是多少?
|
'规档云产品手册 更安全、规范的企业档案智能管理云 www.guidangyun.com 上海兑观信息科技技术有限公司 电话:021-50710282 邮箱:market@guidangyun.com 地址:上海市浦东新区郭守敬路498号15栋201-203室 扫一扫 关注规档云公众号 锦天城律师事务所高级合伙人 孙林中信证券投资银行管理委员会 陈熙颖南京大学信息管理学院教授 颜祥林 复旦大学管理学院教授 窦一凡 共同推荐
Contents 目录 01 02 03 04 公司简介 Company Profile 企业档案管理现状和痛点 Status and Pain Points 产品介绍 Product Description 主要功能介绍 Key Features 安全保障 规范管理 智能管理 05 市场声音 Market Voice 专业人士推荐 客户评价 06 我们的服务 Our Services
公司简介 COMPANY PROFILE 企业荣誉 ENTERPRISE HONOR上海兑观信息科技技术有限公司是以人工智能技术为核心的企业档案管理解决方 截止2020年5月已经获得 高新技术企业证书、软件企业证书、软件产品证书 案供应商。公司综合利用机器视觉、自然语言理解等人工智能技术,为客户提供安全、 获得软件著作权 18项 规范、智能的档案管理产品和服务,帮助客户规范管理并高效利用档案,推动中国整体 档案管理水平的提升。 获得专利 3项 申请专利 8项公司位于上海市浦东软件园内,技术团队来自于复旦大学、同济大学等知名院校, 发表国际知名学术期刊和会议论文 13篇 硕士以上学历超过三分之二。 高新技术企业证书 软件企业证书 软件产品证书 使 命 MISSION 帮助客户规范管理数据资产 愿 景 VISION 推动领先技术在档案管理中的应用,提供可靠、高效 的档案规范管理解决方案和服务,成为档案智能化 管理专家 价值观 VALUES 创新求实,诚信负责,成就客户 01 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 02 专利证书 软著证书 学术论文
企业档案管理现状和痛点 STATUS AND PAIN POINTS 产品介绍 PRODUCT DESCRIPTION 企业档案管理现状 大多数中小企业 规档云 更安全、规范的企业档案智能管理云 由国内顶尖计算机与档案学博士团队,联合国内一线 券商、律师事务所的资深专业团队,按企业满足IPO 审核要求的底稿清单预设档案类目,利用图像识别、 无专业人员 无管理规范 无管理工具 自然语言理解等智能算法,自主研发的企业档案智能 行政人员受限于专 业 知 识,仅 负 责 保 管印鉴、合同,不具 备全面企业档案管 理能力 各部门产生的资料 种 类 繁 多,没 有 明 确的规范定义哪些 属 于 企 业 档 案,应 该归档保存 应该归档的资料散 落在各个部门、各台 电脑上,没有系统支 持统一归档管理 管理云 规档云系统架构图 企业档案管理痛点 传统档案管理系统,繁琐低效 类目层级多,操作困难 文件可检索载体类型少,使用不便 不符合企业用户使用习惯,培训成本高 功能常规,无法满足企业高效管理需求 管理制度缺乏,规范难度大 缺乏企业档案管理制度缺乏企业档案管理专业人才 缺乏企业档案分类意识 企业档案管理缺乏关联性,完整性差 存放散乱,安全难以保障 传统硬件介质存储,如U盘、硬盘等,丢 失率高、感染病毒几率大 个人网盘存储,资料泄露风险高 企业档案使用踪迹无法追溯 使 用 管 理 安 全 合规支持 合规模块推荐 应用层 智能关联提醒 智能缺失提醒 档案管理 智能去重 智能分类 智能命名 实物关联 图文转换 档案利用 图文检索 分享下载 双层PDF 统计报表 用户管理 操作记录 视图管理 集团管理 各 级 别 标 准 规 范 日 志 记 录 权 限 控 制 算法层 全文搜索引擎 文本分类引擎 OCR 全文识别 NLP 数据分析 ...... 数据层 对象储存 图象储存 索引储存 日志储存 用户数据储存 ...... 安全可信存储 03 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 04
功能介绍 KEY FEATURES 安全保障 规范管理 智能管理 数据分享加密 数据分享限时限次、设置提取码,防止文件滥用 限次分享:文件分享设置有限下载次数,超次链接失效 限时分享:文件分享设置链接失效时间,逾期无法下载 限次分享 限时分享 多重安全策略 双云数据备份、加密存储等多重安全策略,确保档案信息安全 双云数据备份:将数据加密备份到国内两大云服务运营商,防止数据丢失 独立加密 U-Key :独立 U-key 身份验证,多重身份核验保障 高 SSL 安全级别:保障用户数据传输安全 加密储存 双云备份限时分享 限次分享水印防泄密 档案使用可追溯 档案使用监控 下载、预览、分享档案时,系统自动生成水印,亦可自定义水印,档案使用踪迹可追溯 水印防泄密:浏览、下载、分享自动添加水印,防止文件滥用 档案使用踪迹可追溯:系统自动记录,借阅记录可查询 05 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 06 水印设置 借阅记录查询
功能介绍 KEY FEATURES 安全保障 规范管理 智能管理 总览企业档案管理概况 清晰了解企业各部门档案管理情况,辅助管理决策 企业管理者可查看企业整体档案数据统计,及时了解企业档案管理情况 部门管理者可查看部门档案数据统计,及时了解部门档案管理情况 洞悉企业档案利用趋势变化 定向查看企业各部门档案使用频率,了解工作动态 管理者可根据自身需求查看和对比不同类目的档案操作情况,了解企业档案整体利用趋势 全局掌握企业档案动态 预设档案基础类目 权限管理灵活设置 规范档案信息著录 定期归档提醒 借阅到期提醒 掌握企业档案借阅流向 根据档案借阅情况排序展示,知悉档案使用状态 更直观的反映每份档案的使用情况,规范档案借阅管理 07 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 08
预设档案基础类目 预设十大企业档案基础类目:行政工商档案、监管及风控档案、资产档案、财务档案等 满足企业IPO 审核要求的底稿清单预设档案类目,高效支持企业应对各类尽职调查及申报的基础资料准备 清晰界定归档范围,有效避免企业档案缺失带来的持续影响 定期归档提醒 定期向各类目档案管理人员发送消息,提醒上传档案,并归档 归档参数设置:定期归档时间、提醒方式 十大档案类目 子集类目 配置提醒参数 提醒界面 权限管理灵活设置 按类目设置管理权限,专人专管,权责分明 各级类目管理、查阅权限分离,可自由配置相应责任人 集团、子公司、部门自上而下穿透式管理,档案规范管理有条不紊 借阅到期提醒 实物档案借阅到期后,系统会通过邮件和短信等通知方式提醒及时归还实物档案 类目权限管理 集团管理 逾期邮件通知 逾期系统通知 规范档案信息著录 档案信息自动著录,提高档案规范管理效率 自动预填著录信息:系统会根据档案内容和属性,自动生成档案著录信息,如档号、密级、标题、保管期限等 内部、外部借阅 内部借阅自动验证公司成员,严格管理内部的档案借阅 外部借阅提供提取码和查看、下载权限控制,控制外借的档案 预填著录信息 档案信息浏览 内部借阅 外部借阅 09 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 10
功能介绍 KEY FEATURES 安全保障 规范管理 智能管理 智能搜索 智能分类 智能查重 关联提醒 双层 PDF 智能推荐 智能搜索 支持搜索各种不同类型的主流载体档案内容 智能搜索:提供关键字、问答式、以图搜图等搜索方式 支持类型:文本文件、图片文件、表格文件、音频文件、多媒体文件 关键字搜索 支持搜索类型 智能分类 根据上传档案的标题和内容,智能推荐类目,辅助管理人员归档 自动解析:提取文件标题及内容中关键字,作为自动分类依据 自动分类:根据自动解析出的关键字,通过智能算法推荐类目 上传 自动分类 智能查重 根据上传文件的属性和内容,系统智能判断是否存在相同的文件,并给予提醒 根据属性判断:系统计算上传文件的MD5码,判断是否存在相同文件 根据内容判断:系统根据上传文件内容找出相似文件 11 11 更安全规范的企业档案智能管理云 安全 规范 智能 更安全规范的企业档案智能管理云 12 相同文件提醒 相同文件展示
关联提醒 系统智能判断档案之间的关联性,提醒上传其它相关档案,保障档案资料的完整性 关联性:根据档案中的关键字,自动匹配并提示与之相关的其他档案 市场声音 MARKET VOICE 专业人士推荐 RECOMMENDATIONS 关联文件缺失提醒 提醒界面 双层 PDF 智能生成可编辑文字图层,方便内容获取,提高利用效率 文本层:生成可编辑的文字图层,方便内容获取 图片层:以只读方式留存,防止档案被恶意篡改,确保档案存储和查阅的一致性 缺失档案目录智能推荐 算法智能判断上传文件归属档案目录,智能提醒缺少的档案类目 目录缺失提醒 缺失目录自动创建 孙 林 浦东新区十大杰出青年律师 上海市锦天城律师事务所高级合伙人 对企业的底稿资料整理过程中,经常收到一大堆杂乱无章的资料,整理难度大,耗时长,更为麻 烦的是,很多关键资料漏存,后补资料流程繁琐,导致融资或者上市延期,甚至失去机会 。规档云 按IPO核查标准预设类目,保障企业档案的完整性,预防档案缺失,其中关联提醒功能,能够智能 判断档案之间的关联性,定时提醒上传,特别实用。 陈熙颖 保荐代表人 中信证券投资银行管理委员会 IPO注册制改革后,促使越来越多企业走上上市进程,在帮这些拟上市公司整理底稿清单过程中, 收到的资料形式多样,杂乱无章,常常发现资料漏存,后补流程特别麻烦,也浪费了很多时间。企 业非常需要一款能够帮助他们规范管理档案的工具,规档云按照IPO审核标准预设类目,可以让 企业在平时日常管理中就开始规范管理档案,保障企业档案的完整性,加快资本审核进程。 颜祥林 南京大学信息管理学院教授 著有《 档案信息网络传播:法律问题与策略 》《 数字档案馆项目风险管理体系的整体构建 》 规档云是一款特别适合中小型企业使用的档案管理系统。区别于市面上综合档案馆以及大型企 业档案管理软件,规档云能够解决当下大多数中小企业档案无管理规范、无管理工具的痛点,并 结合人工智能技术,服务于企业文档规范化、一体化和智能化管理,符合企业信息化发展趋势。 窦一凡 复旦大学管理学院信息管理与信息系统教授 进入知识经济时代以后,企业档案和历史记录中沉睡的大量数据也可以有机会成为真正的数据 资产,可以帮助企业更好地认识自身的经营轨迹和合作网络,甚至成为新的商业模式。然而对于 大多数企业而言,把大量数据从档案库搬到数字平台的过程的难度令人望而却步,而规档云的 出现不仅能帮助企业实现管理档案的规范化和数字化,更能帮助企业进一步提升档案的利用价 值,转变形成为真正的企业数据资产。 13 更安全规范的企业档案智能管理云 更安全规范的企业档案智能管理云 14
市场声音 MARKET VOICE 我们的服务 OUR SERVICES 客户评价 CUSTOMER EVALUATION 来自上海闪马智能科技有限公司CEO的评价 闪马智能是一家AI技术公司,专注于视频大数据算法研发及应用落地。 公司目前业务繁忙,项目众多,产生的各种档案资料数量非常巨大,管理难度较高。 公司一直想加强项目的档案管理,但是没找到非常合适的工具,在使用规档云后,不 仅帮助我们建立起了档案管理规范,还帮企业保障了档案的完整性、安全性。在公司 投融资、争取政府项目资助的时候,能快速准确的提供各种材料。 来自上海联恩贸易发展有限公司CEO的评价 我们是一家将近700人左右的电商公司,并且公司的规模正在以每年50%的速度快 速增长。 公司一直对档案管理很重视,但始终苦于没找到合适的管理工具,公司档案目前仍 然散落在各个部门各个角落,无法形成公司竞争力的有效沉淀。用了规档云后,不仅 帮我们提升了档案利用价值,还建立起了档案管理规范,非常有利于企业价值的积 累,促进公司的快速发展。 来自上海兆煊微电子有限公司CEO的评价 我们是一家初创型芯片研发企业,致力于无线连接芯片和语音信号处理芯片的开发 和应用方案设计。 公司目前正在筹备融资。规档云在我们在企业发展初始阶段,就按照IPO核查标准建 立起一套规范的档案管理制度,帮助我们在融资尽调阶段快速、完整地提供出审核 材料,节省了大量的人力和时间。 来自润迅通信集团有限公司CEO的评价 我们是一家规模3000人左右的通讯科技公司,旗下有多家子公司。 虽然公司有自建档案管理方式,但缺乏专业的档案管理规范和标准。尤其是企业管 理层无法清晰了解各子公司、各公司部门档案管理情况。使用规档云后,不仅帮助我 们从总公司到分公司实现了档案穿透式规范管理,其中档案统计报表功能,还帮助 企业管理层清晰了解公司档案管理状态,通过档案数据趋势分析,来辅助管理决策。 规档云能够帮助企业把档案利用价值最大化,这点对于企业管理而言非常有用。 售前咨询 我们拥有资深档案领域专家,为您提供企业档案管理咨询服务。 售后服务 专属售后服务经理,为您提供产品使用咨询服务及技术支持, 帮助您更好地使用产品。 免费培训 不定期为您提供企业档案规范管理、资本视角企业档案规范管 理、项目申报企业档案规范管理等培训。'
|
[
"19901949665。"
] | 5,623
|
multifieldqa_zh
|
zh
| null |
386045621ce60fcf01c23339d70d9a40727f4fa8cc4aaae8
|
黃智海居士的解釋方法有哪兩種?
|
阿彌陀經白話解釋 黃智海居士演述
阿彌陀經白話解釋
黃智海居士演述
印光法師鑒定
阿彌陀經白話解釋序 (印光法師序)
淨土法門,實為十方三世一切諸佛,上成佛道、下化眾生之通規,亦為末法時代一切眾生,仗佛慈力,即生了脫之要道。良以如來所說一切法門,無非令眾生出生死、成佛道耳;但以上根者少,中下者多,故能於即生了脫者,雖在正像,尚不多見,況末法人根陋劣、壽命短 促、知識希少、邪外縱橫之時乎?
由是如來預鑒機宜,特開淨土一門,俾一切若聖若凡、上中下根,同事修持,同於現在往生淨土。上根則速成佛道,下根則亦預聖流,較彼一代所說仗自力法門,下手易而成功高,用力少而得效速,以佛力法力,不可思議;加以眾生信願行力,則無論功夫淺深、罪業輕重, 皆得蒙佛慈力,接引往生也。
以故如來于諸大乘經,咸皆帶說。如華嚴、法華、楞嚴等。其專說者。則有《阿彌陀經》、《無量壽經》、《觀無量壽佛經》。此三經中,凡彌陀之誓願、淨土之莊嚴、三輩九品之生因、十方諸佛之讚歎,悉皆顯示無遺。而《阿彌陀經》言簡義周,最易受持。由是古人列為 日課,無論若宗若教若律,皆于暮時讀誦。是舉天下之若僧若俗,無不以淨土為歸者。然雖如是行持,若不諦審佛祖立法之所以然者,猶然不以求生西方為事。殆所謂『日用不知,習矣不察』者乎?即通宗通教之高人,尚多崇尚自力法門,不肯仰仗佛力。其志固高,其事實 難?生做到。倘惑業未能淨盡,再一受生,多半迷失;不但所期皆成畫餅,且有因福造業、後生墮落之虞。由是言之,誠堪畏懼。
須知淨土法門,為一代時教中之特別法門,不可以與通途法門並論。若不明此義,以仗自力通途法門之義,疑仗佛力特別法門之益,而不肯信受,則其失大矣!佛說難信,蓋即指此。若無此執,則誰不信受奉行焉?近來世道人心,陷溺已極,無可救藥。凡有具正知見之偉人 傑士,莫不以提倡因果報應、生死輪回,為挽回狂瀾之據。精修淨業,求生西方。為究竟安穩之法。一倡百和,無不率從。由是吃素念佛、改惡修善者,日見其多。
所可惜者,普通善信。未嘗學問,雖日讀彌陀經,究不知所說者為何義;縱有疏鈔要解等注,亦非彼所能閱。黃智海居士,利人心切,取疏鈔要解之義,以白話解釋之,俾彼稍識字者,亦得了知經義。由是更加精進,竭誠修持,并以轉化有緣,則現生身心清淨,優入聖賢之 域;臨終感應道交,直登極樂之邦;其為利益,莫能名焉。爰書大義,,以貢閱者。
民國十六年丁卯夏曆正月常慚愧僧釋印光謹撰
阿彌陀經白話解釋序二 (諦閑法師序)
佛以無上妙慧,觀一切眾生。知其根性大小不同,而以方便智、說方便法:為闡提人說十善;為小乘人說四諦;為中乘人說十二因緣;為大乘人說六波羅蜜。皆對病根,投以良藥。此蓋方便教中不易之典也。
復以徹底大悲,鑒六道群機,識其道緣,淺深匪一,以殊勝異方便智,說殊勝異方便法:
為上根人,說觀想念佛法,即《觀無量壽佛經》前十二觀皆是也;
為中根人,說觀像念佛法,第十三觀是也;
為下根人,說稱名念佛法;
為最下根、業重障深人,說臨終十稱念佛,即得往生法,第十六觀是也。
可見佛無棄人,唯人自棄耳。獨有《佛說阿彌陀經》之信願持名念佛,尤為方便之方便,殊勝之殊勝。
須知持名有二種持法:
一者「事持」,但將『阿彌陀佛』四字,驀直持去,持至一心不亂,臨終決定往生,即不可以中下根論。
二者「理持」,正持名時,能知離心無佛、離佛無心,心佛不二,即是實相念佛。若加信願,臨終上品上生,非最上利根者不能。故知持名念佛,普被三根,無機不攝,至圓頓、最直捷。七日成功,片言即證;橫超三界,豎徹五時,誠為稀有難信之法門。故感六方諸佛,異 口同音,稱揚勸信。釋迦如來,四辯八音所親宣也。
經中,初則詳陳依正莊嚴以啟信;中則特勸應求往生以發願;後則正示執持名號以立行。一經旨宗,唯信願行,義無餘蘊,文相昭然。嗚呼!時至末法,鈍根者多;五濁繁興,三災頻仍。而此經者,持誦固多,研詳實寡。雖有雲棲疏鈔、靈峰要解,類皆文言法語,自非初機 淺識人能得實益。
上海黃子涵之,有鑒於斯,先以淺近苦切之詞,編成白話,說明兩土苦樂形容,俾知此土有三毒四倒、六道輪回之苦,而生厭離;彼國有七珍八德、九品蓮華之樂,而生忻慕。詳言彼方其國,無有三途八難、瓦礫泥砂,純以珍寶而為莊嚴;其人無有九惱十纏、死生老病,純 以聖賢而為眷屬。庶幾初機人修淨業者,知所趣向,遂命名曰《初機淨業指南》,出數千部書,風行海內,可謂煞費婆心矣。
茲仍以淺近白話文字,取諸祖意,解釋此經,語甚夷易,事出常談。覽其詞,能識其心;識得心,不待境靜,而心自靜。不提心念,而佛自念。可謂大悲芬陀利、法炬陀羅尼,隨俗而即俗明真,變淨而以淨覆穢,若空穀之答響,洪鐘不待叩矣!
噫!道本無言,非言不顯。且此經者,我佛不得已而言之也。言有不達,道無以明,是則前祖之疏解。亦不容其已也。言既高深,鈍根難入。今用白話文字,解釋佛經。又寧得而已之哉?
予故知以白話之淺言,暢經中之深義;既甚便於初機,深有裨於法化,俾彼讀者,由淺而知深、即近而悟遠。因是書之言,而知疏解之言;因疏解之言,而悟佛經之言。佛言悟矣,信以之而真、願以之而切、持名念佛之行以之而相續不斷、求生極樂之心,可勇決矣。
時維民國丁卯夏釋諦閑述於四明觀宗寺之密藏居
阿彌陀經白話解釋說明原因同了看的方法 (黃智海居士序)
修行的方法很多,但是有些方法,不是我們這些根機淺薄的人,能夠做得到的。有些方法,做起來很難、很長久,恐怕等不到修成功,修行的心,已經退了;或是修還沒有修成功,人倒已經要死了。還有些方法,做起來,若是不十分明白裡頭的道理,往往就要著魔的,只有 這個念佛修到西方極樂世界去的方法,最是穩當,最是容易。
這個方法,凡是大乘經裡頭,(什麼叫做「大乘」?下邊「皆是大阿羅漢」一句的解釋裡頭,會講明白的,都帶說著的)若是專門說這個方法的,有三部經,一部是《無量壽經》,一部是《觀無量壽佛經》,一部就是這《阿彌陀經》。前二部經,很長的,讀也很不容易,並 且經的句子,文理很深,所講的道理,同了修行的方法,又不是人人都能夠懂得、都能夠做得到的。
只有這部《阿彌陀經》,說得最簡便,最明白,所以念佛的人,都要天天念的。但是佛經的文理,是很不容易懂的,雖然從前有許多高明的大法師,把這部《阿彌陀經》,詳詳細細的解釋,可惜都是文理很深的,讀書人還可以懂得,若是不懂文理的善男信女們,就不會明白 了。
我看見許多信佛的善男信女們,大半都會念《阿彌陀經》的,但是這些善男信女們,口裡頭儘管念,究竟《阿彌陀經》講些什麼?念了有什麼好處?那就不曉得的多了。有些婦人們,竟然把這部《阿彌陀經》看得很輕的,說道念了《阿彌陀經》,死了去做起鬼來,可以抵得 多少錢用。
咳!這真是笑話了,《阿彌陀經》的好處,說也說不盡,那裡只可以抵做錢用呢,況且一個人死了,總要盼望生到西方極樂世界去,纔可以免得這生了又死,死了又生的無窮無盡的苦惱,那裡可以打這種做鬼的主意呢?
我因為可憐這些善男信女們,白用功夫,所以我把這部《阿彌陀經》,一段一段分開了,再把他一句一句,用白話來詳詳細細的解釋明白,並且用兩種方法來解釋:
一種解釋,叫做解,就是下面前邊一種小字,開頭有一個【解】字的,這是完全照了經的字句,簡簡單單解釋的。
但是有好多地方,只不過照字句解釋,還恐怕不明白,一定再要把他的來根,大略說幾句,纔會懂得的,這種的解釋,就是下面後邊一種小字,開頭有一個﹝釋﹞字的。若是讀這本經的人,只要曉得些大略的意思,那麼只要看【解】,倘然要曉得明白些的那未看了【解】, 再看﹝釋﹞,都可以隨便的。
不過我雖然用白話來解釋,但是我仍舊照了從前許多很高明的大法師,用文理來解釋的話,把他改做白話罷了,並沒有一句,照我自己的意思解釋的。
還恐怕有不妥當的地方,教人看了,倒反誤人,所以又請了普陀山的印光老法師改正過的。你們讀這本經的人,可以放心,不會還有錯誤的了。
但願你們看了這本白話解釋的《阿彌陀經》,大家照這本經上所說的方法,一心一意的,相信西方真有這種極樂世界,時時刻刻,發出願心來,要想到西方極樂世界去,只消天天念佛,一定可以去的。
念佛越念得多越好,自己念了,還要勸勸你們的父母兄弟,親戚朋友,大家都發心,一同做善人,一同念佛,一同要想到西方極樂世界去。
平常時候,各種善的事情,都要去做做,各種惡的事情,一些些也不要做,那麼一定會成功的。若是我說了謊,騙你們,我死了去到閻羅王那裡,要受拔舌的罪的。
你們相信了我的話,將來我同你們,都到西方極樂世界去,做阿彌陀佛的弟子,同了觀世音、大勢至、文殊、普賢、許多的大菩薩,還有往生的許多最上等的善人,(往生的往字、就是去字的意思,往生、就是生到西方極樂世界去。)常在一塊兒,親近阿彌陀佛,聽佛說法, 就可以漸漸的修行,漸漸的進步上去,一直到成佛的地位了。
|
[
"一種是直接解釋,是照了經的字句,簡簡單單解釋;一種是用來根解釋,要把來根大略說幾句。"
] | 3,650
|
multifieldqa_zh
|
zh
| null |
c0965efc3a3198cc3cb782ba195cb037e3ea6846aad9066a
|
一审判决认为郭海燕、范舒炜之间是否存在真实的股权转让关系?
|
郭海燕、范舒炜股权转让纠纷二审民事判决书
上诉人郭海燕因与被上诉人范舒炜股权转让纠纷一案,不服河南省新乡市卫滨区人民法院(2017)豫0703民初1166号民事判决向本院提起上诉。本院于2018年1月26日立案后依法组成合议庭公开开庭进行了审理。上诉人郭海燕及委托诉讼代理人李琦、扈文静,被上诉人范舒炜及委托诉讼代理人张在范均到庭参加诉讼,本案现已审理终结。
上诉人郭海燕的上诉请求:依法撤销原审判决,改判范舒炜向郭海燕支付股权转让款770000元及利息261030元,并由范舒炜承担本案的一、二审诉讼费用。事实和理由:一审法院对郭海燕及范舒炜间的股权转让协议的真实性予以认可,但一审法院在无任何证据的情况下,仅从母子关系认定双方不存在真实的股权转让协议无事实依据。郭海燕曾在新乡市红旗区人民法院诉请其为案涉股权的实际所有人,该院认定双方之间的股权转让协议合法有效,范舒炜所举证据也可证明郭海燕从未放弃对案涉股权的权利,在此情况下,一审法院认定双方之间是赠与合同关系没有事实与法律依据。
被上诉人范舒炜辩称:一审判决有充分的事实依据及法律依据,应予维持。郭海燕将股权赠与唯一的儿子范舒炜,符合常理和家庭伦理。从2011年7月到本案起诉六年的时间里,郭海燕从未向范舒炜要求股权转让款;虽然郭海燕称2016年6月2日在新乡市红旗区法院请求确认其为真正的权利人,其从未放弃对案涉股权的权利,但此时股权过户到范舒炜名下已有5年,不能以其是案涉股权的实际股东否认两者之间实质上的股权赠与关系。在郭海燕向新乡市红旗区法院提交的起诉书中称儿子当时在上大学,平时就根本没有时间参与公司的实际经营管理,郭海燕以为这不过是走走形式,为了方便工作让儿子挂个名而已,并不是真正意义上的股权转让,范舒炜也没有付转让费,因此郭海燕认为范舒炜只是名义股东,实际股东是郭海燕。由此可知,郭海燕自认双方不是真正意义上的股权转让,而是股权赠与。签订形式上的股权转让协议是工商部门的硬性要求,即无论当事人间真正的法律关系性质、内心意愿如何,均要求其以股权转让协议的方式呈现,但这并不能反映本案法律关系的实质,一审法院未以股权转让协议作为认定案件性质正确。一审法院根据《中华人民共和国合同法》第一百五十八条将案涉协议认定为赠与合同符合上述规定。
郭海燕向一审法院起诉请求:要求判令范舒炜向郭海燕支付股权转让款770000元整及利息261030元,并承担诉讼费用、保全费用及其他费用。
一审法院认定事实:郭海燕、范舒炜系母子关系。2011年7月8日,郭海燕、范舒炜双方签订了新乡市万灵实业有限公司股权转让协议,该协议约定:郭海燕同意将持有新乡市万灵实业有限公司的58.33%的股权共计770000元出资额转让给范舒炜,范舒炜同意按此价格及金额购买上述股权。出资转让于2011年12月25日完成。协议签订后,郭海燕、范舒炜到工商行政管理局办理了股权转让手续。2016年6月,郭海燕向新乡市红旗区人民法院提起诉讼,请求确认范舒炜是新乡市万灵实业有限公司的名誉股东,实际股东是郭海燕,股权归郭海燕所有。其在诉状中称:双方签订股权转让协议后,范舒炜还在上大学,没有时间参与公司的实际经营与管理,为了方便工作,让范舒炜挂了个股东的名字而已,并不是真正意义上的股份转让,范舒炜也没有付转让费,因此郭海燕认为,范舒炜仅是名誉上的股东,实际股东是郭海燕,股东权依然归郭海燕所有。
一审法院认为,从郭海燕、范舒炜之间签订的股权转让协议及履行协议的情况看,郭海燕、范舒炜之间不存在真实的股权转让关系,范舒炜系郭海燕唯一的儿子,2011年7月双方签订的股权转让协议只是形式上的,双方当事人真实的意思表示应当是股权赠与,因为在双方达成股权转让协议后,自2011年7月郭海燕起诉之日起,长达六年时间,郭海燕从未向范舒炜索要过股权转让款770000元,从范舒炜向该院提交的证据及郭海燕在新乡市红旗区人民法院的起诉书可以看出:双方签订股权转让协议后,范舒炜还在上大学,没有时间参与公司的实际经营与管理,为了方便工作,让范舒炜挂了个股东的名字而已,并不是真正意义上的股份转让,范舒炜也没有付转让费,因此郭海燕认为,范舒炜仅是名誉上的股东,实际股东是郭海燕,股东权依然归郭海燕所有。可以证明郭海燕、范舒炜之间并不是真正意义上的股份转让,实质上是一种股权赠与关系,因此郭海燕要求范舒炜支付股权转让款770000元的理由不能成立,该院不予支持。根据《中华人民共和国民事诉讼法》第六十四条、最高人民法院《关于民事诉讼证据的若干规定》第二条之规定,判决如下:驳回郭海燕要求范舒炜支付股权转让款770000元以及向郭海燕支付利息261030元的诉讼请求。案件受理费14079元,由郭海燕承担。
本院二审期间,郭海燕提交了新的证据材料为:1、2016年8月29日新乡市红旗区人民法院民二庭开庭笔录一份,证明郭海燕与范舒炜之间是股权转让的法律关系。2、新乡市红旗区人民法院(2016)豫0702民初2033号民事判决书一份,证明当事人双方间是有偿的股权转让协议,而非股权赠与协议。
范舒炜发表质证意见为:对该证据1和2的真实性均无异议,范舒炜在开庭笔录中所陈述的抗辩理由仅是为了否认股权代持关系,根据庭审笔录第4页和判决书第3页中范舒炜的答辩意见反而可以证明双方为股权赠与关系。本院认证,从郭海燕提交的证据1开庭笔录中的陈述可以看出,范舒炜对该股权转让协议的答辩意见为股权转让或股权赠与,答辩目的仅是为了对抗郭海燕关于股权代持的主张,并不足以认定为股权转让协议的性质为股权赠与或股权转让,故本院不予采信。一审查明的事实,本院予以确认。
本院认为,本案的争议焦点为双方在案涉股权转让合同中的意思表示的性质。双方签订关于万灵公司股权转让协议,且有相应的万灵公司的股东会决议予以确认。郭海燕曾认为案涉万灵公司的股份仍为郭海燕实际所有,范舒炜仅是名义股东,而范舒炜则否认双方存在股份代持情形并陈述案涉股权转让协议性质是股权转让或股权赠与。行为人的意思表示必须通过相应的行为表现出来,该二人均为完全行为能力人,应对自己的行为、意思承担相应的民事责任。当双方对股权转让协议的意思表示发生争议时,应根据其外在行为表现来进行推断。根据双方签订的股权转让协议上的名称、内容及签字可以明显推断出双方签订的是股权转让协议,并非赠与合同。双方系母子关系,仅以郭海燕长时间未向其子范舒炜催要过相应股权转让款,不足以推定双方在股权转让协议中的意思表示是股权赠与。郭海燕关于为了方便工作,让范舒炜挂个股东名字而已,并不是真正意义上股权转让,范舒炜也没有支付转让费的陈述明显与股权转让协议的内容、性质相悖,且也推断不出股权赠与的意思表示,另范舒炜也不能证明其与郭海燕有股权赠与的一致意思表示,故应以双方签订书面股权转让协议所体现的股权转让的意思表示为准。范舒炜应按照协议约定支付相应的股权转让款。关于利息部分,因双方在合同中并未约定,故从郭海燕起诉之日2017年7月4日起计算,利率按同期银行贷款利率计算。案涉协议中并未明确约定付款时间,郭海燕曾在原审法院起诉确认股权归其所有可以表明其从未放弃过相应股权的有关权利,郭海燕一方并未怠于履行,故本案并不超过诉讼时效。上诉人郭海燕主张范舒炜应当支付转让款及利息等理由成立,本院予以支持。综上,原审认定事实清楚,但适用法律不当,应予纠正。依照《中华人民共和国民事诉讼法》第一百七十条第一款第(二)项之规定,判决如下:
一、撤销河南省新乡市卫滨区人民法院(2017)豫0703民初1166号民事判决;
二、范舒炜于本判决生效后十日内支付郭海燕转让款770000元及利息(利息以770000元为计算基数,从2017年7月4日计算至本判决确定的履行期限届满之日止,利率按照银行同期贷款利率计算。)
三、驳回郭海燕的其他诉讼请求。
一审案件受理费14079元,二审案件受理费14079元,由被上诉人范舒炜承担。
本判决为终审判决。
|
[
"没有。"
] | 3,304
|
multifieldqa_zh
|
zh
| null |
d6245c470659e2102aca48e660e554029cdaabc97f759b34
|
2009年铜川市的旅游综合收入增长了多少?
|
2010年铜川市人民政府工作报告
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和其他列席人员提出意见。
一、2009年工作回顾
2009年,面对国际金融危机的严重影响,全市上下在市委的正确领导下,认真贯彻落实“保增长、保民生、保稳定”的各项政策措施,坚定信心,克难攻坚,全面完成了市十四届人大五次会议确定的各项任务,继续保持经济快速发展的良好势头。全年实现生产总值155.86亿元,增长15.2%,增速居全省第一位;财政总收入21.06亿元,增长31.5%,其中地方财政收入10.08亿元,增长34.3%,增速居全省第一位,提前实现了省委、省政府提出的“十一五”末财政总收入达到20亿元的目标;城镇居民人均可支配收入13717元,增长24.6%,增速居全省第二位;农民人均纯收入3968元,增长20.5%,增速居全省第三位。
(一)重大项目建设取得新成效。把抓项目、抓投资作为保增长的重中之重,争取到国家政策性项目资金6.74亿元。全市固定资产投资完成88.12亿元,增长39%。市级65个重点项目有20个完工或基本完工,完成投资45.8亿元。采煤沉陷区治理累计完成投资12.2亿元,主要建设项目基本竣工。满意日产4500吨和声威第二条日产4500吨水泥熟料生产线、旺仔牛奶生产线等11个重大项目建成投产。陕煤化集团PVC管材、陕煤建司管件设备厂迁厂扩建、铜铝公司3万吨铝合金棒等20个重点项目开工建设。与陕煤化集团、陕有色集团签订的总投资150亿元的航汽铝工业园项目启动实施。延安大学铜川校区、陕西体育专修学院等项目前期工作进展顺利。
(二)工业经济保持较快增长。出台了工业保增长十条措施,落实省、市财政贴息1398万元,协调企业贷款6亿元,全力以赴帮助企业渡过难关。全市规模以上工业实现增加值79.57亿元,增长13.8%。主要工业产品电解铝产量23万吨,增长6.8%;煤炭1915万吨,增长4.2%;水泥748万吨,增长3.5%;水泥熟料590万吨,增长9.5%。工业产销率达到94.6%,较年初最低时回升5.6个百分点。
(三)“三农”工作扎实推进。全年粮食总产23.3万吨,增长1.3%;新栽水果15.46万亩、干杂果5.98万亩,农民人均达到4.5亩果。水果总产47.1万吨,优果率达到79%。印台区被评为省级一县一业苹果示范区。新增奶牛3334头,肉、蛋、奶产量分别增长39.9%、65.3%和35.5%。在40个村实施互助资金试点。投资1.4亿元,完成移民搬迁7236人。新建通村油路和水泥路377公里、通乡油路137.4公里,90%的行政村开通了班车。新修基本农田3.8万亩,土地开发整理新增耕地4100亩。农村自来水入户1.12万户,解决了5.11万人的饮水安全问题。新建农村户用沼气池4110口。龙潭水库开工建设。农村土地经营权流转6.47万亩,占耕地面积的7.5%。植树造林35.05万亩,治理水土流失163.1平方公里,森林覆盖率达到44.8%。我市荣获陕西省绿化模范城市称号。出台了加快推进县域工业化、城镇化等政策措施,全市三个区均获“陕西省城区经济社会发展争先进位奖”。
(四)消费市场稳中趋旺。成功举办了玉华冰雪节、药王养生文化节等活动。药王山、照金香山、玉华宫等景区旅游基础条件得到改善。全年接待国内外游客430万人次,旅游综合收入6.5亿元,分别增长17%和25%。新开工住宅117.8万平方米,竣工54.6万平方米,分别是上年的2.9倍和2倍;房地产交易额7.2亿元,增长157%。建成“新网工程”连锁店120个、“双百市场”2个,家电下乡百户购买率达到18%。全社会消费品零售总额39.48亿元,增长17.7%。
(五)节能减排工作取得新突破。建筑节能改造18万平方米。药王山周边水泥粉尘污染治理工程完成投资1.15亿元,区域环境面貌明显改观。关闭了骊山水泥厂、市水泥厂、东风建材厂的水泥生产线,淘汰落后产能120万吨,在全省率先实现水泥生产无旋窑落后工艺、无立窑的目标。投资8300万元实施煤烟污染治理,改造燃煤锅炉89台,新建清洁能源锅炉40台。全市万元生产总值能耗下降5.84%,化学需氧量、二氧化硫排放量分别削减2.7%和4%。市区空气质量二级以上天数334天,其中一级以上天数增加11天,空气质量持续好转。
(六)城市化步伐明显加快。规划建设八个工业园区,拉大城市框架。新区基础设施完成投资4.3亿元,建成长宁南路、朝阳西路、太阳商城西区道路、南部工业园区部分道路及排水工程。新时代商业广场建成营业。完成了北市区一、二马路路灯改造和玉华路人行天桥、3个城市街头广场建设任务,铺设人行道7.4万平方米。更新和增加城市公交20辆。发展天然气用户5316户,城市气化率达到69%。新增城市绿地50万平方米,城市绿化覆盖率达到39.4%。新耀垃圾无害化处理一期工程基本建成,新耀污水处理工程完成总投资的55%。23个建制镇完成基础设施建设投资4700万元。
(七)改革开放不断深化。秦岭水泥公司破产重整工作基本完成,西北耐火材料厂等6户企业政策性破产后续工作进展顺利。处置了企业在资产经营公司的11亿元债务。医药卫生体制、文化管理体制改革有序推进。基本完成集体林权制度主体改革任务。54个部门完成会计集中核算向国库集中支付的转轨。非公有制经济增加值占到生产总值的41.06%,提高了3.64个百分点。签约招商引资项目102个,到位资金42.18亿元。全市金融机构各项贷款余额80.83亿元,增长15%。与6家金融机构签署了5年投放90亿元的政银战略合作协议,到位资金10亿元。
(八)民生工程建设取得新进展。实施民生工程项目1282个,完成投资13.38亿元。投资1.37亿元,完成了60所农村初中校舍改造、161所中小学校舍安全工程建设任务。“蛋奶工程”受惠学生3.3万人。王益区“双高普九”通过省上评估验收。落实资金7356万元,对2.85万名家庭经济困难中小学生进行补助。开发科技成果7项,推广转化科技成果10项。率先在全省实现规范化村卫生室全覆盖,新农合参保率93.1%,位居全省前列。认真落实计生家庭奖励优待等政策,实施农村已婚育龄妇女健康检查项目,全市人口自然增长率4.34‰。市图书馆二期工程基本竣工,6个乡镇综合文化站和20个村文化室建成使用。开展了庆祝建国60周年系列文化活动,耀州区荣获全国文化先进区称号,宜君县被命名为省级文明县城。新发展数字电视用户1.9万户。完成了44个村农民体育健身工程,成功举办了市第十届运动会。新增城镇就业1.59万人,城镇登记失业率4.2%;转移农村劳动力7.5万人。发放小额担保贷款2.3亿元。城镇职工医疗保险实现市级统筹,解决了1.3万名国有困难企业离退休人员的医疗保险问题。保障农村低保对象3.79万人、城镇低保对象7.32万人。农村五保供养标准提高到每人每年1856元。为265名城镇退役士兵发放自谋职业资金581.4万元。为高龄老人发放了保健费补贴。发放个人住房公积金贷款1.4亿元,增长125%。开工建设廉租住房18.23万平方米,竣工4.86万平方米,保障低收入家庭3747户。为5471户居民发放住房租赁补贴817.9万元。开工建设经济适用住房35.27万平方米,竣工24.89万平方米。投资2400万元,对李家塔地区危险地段812户群众实施搬迁,解决了矿区1720户群众用水问题。完成了青年路、三里洞棚户区改造任务和川口、小河沟等6个棚户区改造一期工程。
(九)政府自身建设不断加强。坚持依法行政,自觉接受人大和政协的监督。在价格管理、药品监管、文物保护等10个方面专题向市人大常委会报告工作,办理人大代表建议101件、政协提案166件。定期向老干部、民主党派和各界人士通报工作情况,主动听取意见。扎实开展大接访、信访积案化解活动,赴省集体访、进京非正常访人数分别下降63%和8.9%。强化重点行业和领域的安全监管,健全公共突发事件应急机制,加强社会治安综合治理,全市社会大局和谐稳定。深入开展学习实践科学发展观活动,加快政府职能转变,强化行政监察、审计监督和工作督查,全面落实党风廉政建设责任制,努力改进作风,政府机关的服务水平和工作效率不断提高。
司法、统计、盐务、质监、税务、人防、地震、气象、档案、外事、残联、慈善、民族宗教等工作都取得了新的成绩。
各位代表,这些成绩的取得,是市委统揽全局、科学决策的结果,是市人大、市政协和社会各界强化监督、大力支持的结果,是全市人民同心同德、共克时艰、狠抓落实的结果。在此,我代表市人民政府,向奋战在全市各条战线上的广大干部群众、驻铜部队指战员、武警官兵、公安干警以及中省驻铜各单位致以崇高的敬意!向大力支持政府工作的各位代表、各位委员和社会各界人士表示衷心的感谢!
在充分肯定成绩的同时,也要清醒地看到存在的问题,主要是:资源性产业比重大,环境容量有限,调整产业结构和转变发展方式日益紧迫;骨干项目少,项目落地难、推进慢的问题依然突出;县域经济实力不强,非公有制经济发展不足,城乡居民收入水平仍然不高;安全生产和维护稳定的压力较大;政府职能转变、作风建设还需进一步加强等。对此,我们一定要采取有力措施加以解决。
二、2010年主要任务
今年是实施“十一五”规划的最后一年,也是我市加快推进城市转型的关键之年。做好今年的工作,对于保持经济平稳较快发展、全面实现“十一五”规划目标具有十分重要的意义。
总体上看,今年的经济发展环境好于去年,但面临的形势仍然复杂。我们既要看到不利因素,更要看到加快发展的难得机遇和有利条件。一是国家出台了应对金融危机保持西部地区经济平稳较快发展的意见,全面实施关中—天水经济区发展规划,启动实施陕甘宁革命老区振兴规划,为我们加快发展提供了良好的外部环境。二是省政府出台了促进铜川资源型城市可持续发展的若干意见,我市将在政策、项目和资金等方面获得中省的大力支持。三是铜川与中省大企业、大集团的合作进一步加强,与华能集团、国电集团、陕煤化集团、陕有色集团、陕汽集团、陕投集团等签订了一系列战略合作协议,为铜川今后一个时期的发展奠定了基础。四是经过多年的实践探索,逐步走出了一条符合铜川发展实际的路子,全市上下抓机遇、谋发展、促和谐的能力不断增强,这是我们加快发展的重要保证。
今年经济社会发展的主要预期目标是:生产总值增长13.5%,固定资产投资增长30%,财政总收入和地方财政收入增长18%,城镇居民人均可支配收入和农民人均纯收入增长16%,城镇新增就业1.5万人,城镇登记失业率控制在4.5%以内,居民消费价格涨幅3%左右,人口自然增长率控制在5.5‰以内。
全面完成上述目标任务,必须认真贯彻党的十七届三中、四中全会精神和省委十一届五次全会、市委十届六次全会精神,以科学发展观为指导,以资源型城市转型为主线,走扩大内涵、创新发展的路子,把绿色经济、低碳经济、循环经济作为新的发展理念,把加快资源转化和壮大新兴产业作为结构调整的主攻方向,把园区建设作为推进工业化、城镇化的战略重点,把开展项目建设落实年活动作为重要抓手,把保障和改善民生作为根本目的,把确保生产安全和社会和谐稳定作为第一责任,全力做好以下九项工作:
(一)以实施关中—天水经济区发展规划为契机,加快铜川大城市建设步伐
围绕建成区人口达到55万、面积达到60平方公里的大城市目标,构筑“北市区—黄堡—董家河—耀州区—新区—坡头”大城市格局。主动融入西安大都市圈,增强城市综合实力和竞争力。
扩大城市规模。根据关中—天水经济区发展规划,以西铜同城化发展为目标,编制城市区域空间规划。强化规划的指导作用,加大项目策划包装力度,提升城市资产运营效益。超前做好重大基础设施项目策划和实施工作,加快西铜、铜黄高速第二通道铜川段工程建设进度。力争凤(翔)合(阳)高速公路和耀旬二级公路开工建设。启动铜川铁路连接线项目和西铜城际铁路项目前期工作。
完善城市功能。坚持南市区开发建设与北市区改造提高并重、内涵发展与外延扩张相结合,加快推进城市建设。完成新区长青南路、铁诺南路等道路建设任务,开工建设西环路、华原西道、北环西段等道路,改造咸丰路、长虹路等道路非机动车道。启动新区物流园区、会展中心项目建设。加大耀州区旧城改造和新区城中村改造力度。改造提升樱花苑和金谟广场,扩建新区牡丹园。加快实施城市供水、污水管网改造工程,开工建设北市区垃圾处理厂。完成芳草路路桥建设项目前期工作,实施外贸路路桥等城市道路工程,努力改善北市区城市路网结构。
不断提升城市品位。实施国家卫生城市、国家绿化模范城市和省级园林城市创建工作,力争用2-3年时间实现创建目标。启动数字化城市管理系统建设工程。加快新川、东风、骊山和市水泥厂破旧厂房拆除步伐,搞好生态恢复。大力开展背街小巷改造和小景点、小绿地、小活动场所建设。将城市架空线缆逐步并入地下。启动城市分片集中供热工程。全面完成燃煤锅炉改造任务,新建清洁燃料锅炉30台,新发展天然气用户6000户,城市气化率达到72%,市区空气质量持续好转。实施造林绿化十大工程,突出新耀连接带、新区环线道路、高速公路绿色宽幅林带、三条流域带等重点区域,造林绿化20万亩,治理水土流失150平方公里。启动赵氏河国家湿地公园建设。深入开展210国道铜川沿线环境综合整治,年度完成80%以上的治理任务,努力打造纵贯南北的景观走廊。
(二)扎实推进项目建设,保持固定资产投资的强劲增势
围绕开展“项目建设落实年”活动,继续坚持多年来行之有效的制度和措施,推动前期项目早落地、在建项目早建成、投产项目早见效,确保全年固定资产投资完成115亿元。
集中精力抓好重点项目建设。今年安排市级重点项目80个,年度完成投资80.3亿元。市级领导归口包联重点项目,抽调千名干部下企业包抓项目,实行重点项目周检查、月考核、季奖评制度。市财政安排资金2200万元,用于推进项目建设。力争陕汽零部件加工基地、陕煤化集团PVC管材、陕煤建司管件设备厂迁厂扩建、安川机电设备制造等34个项目建成投产;加快航汽铝工业园、凤凰日产4500吨水泥熟料生产线、龙潭水库、保障性住房等22个项目进度,力争超额完成年度建设任务;加快推进华能铜川电厂二期、秦岭第二条日产4500吨水泥熟料生产线、延安大学铜川校区、陕西体育专修学院等20个项目,力争尽快开工建设。抓紧做好闽商工业园、新型高分子复合材料园等项目前期工作,力争尽快付诸实施。
优化项目建设环境。简化项目审批程序,落实国债项目直通车制度。坚持供储并重、多措并举,加大土地储备力度,市级土地储备动态保持在2000亩以上。加大批而未用土地的处置力度,全力保障项目用地需求。深入整治投资环境,严厉打击阻碍项目建设的不法行为。不断拓宽融资渠道,确保争取中省政策性资金4亿元以上。
加强项目策划工作。以关中—天水经济区发展规划和省上12个产业调整振兴规划为指导,编制完成资源型城市转型规划和循环经济发展规划,精心包装一批新的产业类、基础类、民生类项目,做到申报一批、开工一批、储备一批,确保后续项目建设和投资长期稳定增长。超前谋划,抓紧编制“十二五”规划,描绘好未来五年的发展蓝图,努力在新一轮发展机遇中赢得先机!
(三)着力转变发展方式,不断壮大工业经济实力
按照“大集团引领、大项目支撑、集群化推进、园区化承载”的战略部署,加快产业结构调整和升级,做大做强传统支柱产业,培育发展新兴产业,推进新型工业化进程。
强化经济运行协调。继续坚持经济运行季度分析、重点企业旬报等制度,突出抓好重点行业、骨干企业和主要产品的跟踪分析,及时协调解决好企业在资金、市场、生产经营等方面的困难和问题。全年规模以上工业总产值完成230亿元,增长17%;增加值完成92.3亿元,增长16%。
增强企业技术创新能力。支持企业与科研院所、高等院校开展合作,加快科技成果转化,力争全年开发新产品10个、技术创新项目5个。围绕工业支柱产业,建设6个工程技术中心。组建陕西铜川建材研究院。启动国家级水泥质检中心建设。以麟字特种电源公司为依托,做大做强大功率LED光源产业。推进信息化与工业化融合,提高工业企业重点生产环节的自动化、智能化和现代化管理水平。
促进产业循环发展。依托华能集团、陕煤化集团等企业,引进实施一批煤炭转化项目,发展煤电产业和煤化工,推进煤炭就地转化。加快在建的4条新型干法水泥生产线建设,力争使水泥产能超过2000万吨。千方百计保障现有发电机组满负荷运转,确保110千伏裕丰输变电工程竣工投运,开工建设110千伏柳湾输变电工程,启动铜川第四座330千伏输变电工程建设前期工作。延伸铝业产业链,大力发展高附加值的合金铝、环保型材,努力实现煤电铝产业产值过百亿元目标。积极承接东部产业转移,建设陶瓷产业孵化基地,使建筑陶瓷产能达到2000万平方米。加大扶持力度,使食品医药、装备制造、电力电源等产业尽快成长为新的经济增长点。
加快工业园区建设。认真落实市委、市政府《关于加快工业园区建设推进城市化进程的决定》,加快新区南部、坡头、黄堡、董家河4个市级工业园区建设步伐。高起点做好园区规划,大力推进园区水、电、路、气、讯等基础设施建设,增强园区吸引力。土地、财税、投融资等政策优先向园区倾斜,重大产业项目优先向园区摆布。积极开展城乡用地增减挂钩试点,加快盘活园区存量资产。将园区开发建设和服务保障工作,纳入市级工业园区管委会、所在区县及市级有关部门年度目标考核。每个市级工业园区力争完成固定资产投资5-6亿元,生产总值增长18%以上。
继续加大节能减排力度。加快工业和建筑领域的节能新技术、新产品的推广应用,强化评估审查,从严控制高耗能、高排放行业增长,全市万元生产总值能耗下降4.9%,化学需氧量、二氧化硫排放量分别削减2%和1.5%。完成药王山周边水泥粉尘污染治理任务,推进清洁生产。新耀污水处理厂、宜君县污水处理厂、崔家沟煤矿监区生活污水处理厂建成投运,扩建西川煤矿生活污水处理设施,漆水河出市断面水质达到国家四类标准。
(四)大力推进“三化”进程,促进县域经济发展
认真落实全市县域经济工作会议精神,加快推进农业产业化、县域工业化和城镇化进程,增强县域经济实力,实现争先进位目标。
推进农业产业化发展。市本级财政安排“三农”支出8311万元,增长37.4%。实施粮食单产提升和高产创建工程,新修基本农田2.5万亩,耕地保有量147.5万亩,粮食总产稳定在20万吨。新栽水果13万亩、干杂果3万亩,大力推广四项新技术,提升果园管理水平。启动果园确权发证抵押贷款工作。实施果区人工防雹增雨基地项目,提高抗御自然灾害能力。加快养殖小区建设,推进奶牛、肉牛、生猪的规模化、标准化养殖。扩大设施农业种植规模,因地制宜发展药材、烤烟等产业。稳妥推进农村土地承包经营权流转,发展多种形式的规模经营。大力发展农民专业合作经济组织,提高农民组织化程度。
加快推进县域工业化。以惠塬、王家河、顺金、彭镇4个区县工业园区为载体,加快县域工业集中区建设,做大做强县域工业规模。加大对涉农加工企业、劳动密集型企业和大工业配套企业的扶持力度,进一步促进中小企业发展。市财政列支400万元,扶持区县工业园区建设,并根据每个园区发展情况继续加大支持力度。市开发投资公司对入园企业优先进行融资担保。区县工业园区要在招商引资、产业项目发展等方面取得突破,确保每个园区完成基础设施投资2亿元以上。
积极推进城镇化进程。下放管理权限,创新推进城镇化的体制机制,加快宜君县城和坡头、黄堡、董家河、照金、陈炉、红土等重点镇建设,力争重点镇基础设施建设完成投资2.3亿元以上。完成县乡公路60公里、通村公路200公里,全市所有行政村通达油路或水泥路,新投放通村客运车辆150辆。启动建设20个新农村示范村。实施20个扶贫开发重点村建设,移民搬迁4500人。解决农村3万人安全饮水问题,力争用两年时间让全市农村群众都喝上放心水。积极实施农村清洁工程,改善生产生活条件。鼓励符合条件的农业转移人口逐步变为城镇居民,让农民有一个幸福生活的美好家园。
(五)加快服务业发展,增强消费需求的拉动作用
全面落实促进消费的各项政策,努力扩大消费需求。全社会消费品零售总额完成47亿元,增长19.2%。
切实提升消费能力。认真落实中、省增加居民收入的各项政策,努力增加城乡居民特别是低收入群众的收入。提高企业退休人员基本养老金、部分优抚对象待遇和城乡居民最低生活保障水平,实施公共卫生与基层医疗卫生事业单位绩效工资。继续做好家电、汽车、摩托车、农机具下乡工作,力争家电下乡销售额增长20%以上。
进一步优化消费环境。加快实施《铜川市城市商业网点总体规划》,在提升北市区商业服务水平的同时,抓好南市区特别是新区商业网点布局和建设。加快建设九洲国际大厦、正阳国际广场等项目,做好渭北现代建材城、新区陶瓷贸易集散地的规划和项目争取工作。改造提升省级重点镇所在地的供销社,加快农产品批发市场、农资物流配送网点等项目建设,“新网工程”建设完成投资4600万元以上。强化市场监管,保障消费安全。
加快发展旅游产业。重点建设照金香山、玉华宫、药王山、陈炉四大景区。完成照金香山景区纪念馆扩建、英雄群雕、游客服务中心等建设项目,加快玉华宫景区综合休闲娱乐中心建设,全力推进药王山、陈炉景区综合开发与保护,完成大唐国瓷园详规编制工作,园区建设完成投资5-6亿元。大力发展乡村游和农家乐,规划建设一批示范村。继续办好玉华冰雪节、药王养生文化节等活动。全年接待国内外游客495万人次,实现旅游综合收入10.5亿元,分别增长25%和62%。力争通过2-3年的努力,形成以照金香山为中心,集红色旅游、宗教文化、休闲养生等为一体的南部旅游板块,以玉华宫为中心,集佛教文化、休闲避暑、滑雪狩猎等为一体的北部旅游板块。
(六)深入推进改革开放,增强加快发展的活力
进一步解放思想,扎实推进重点领域和关键环节的改革,形成更具活力、更加开放的体制机制。
积极推进各项改革。加大国企改革力度,继续做好市整流变压器厂、市水泥厂等企业政策性破产后续工作,加快市纺织厂、市灯泡厂、市钢铁厂等企业改革步伐。健全非公有制经济发展的体制机制,全面清理融资、土地等方面的歧视性规定。开展基层医疗机构药品“三统一”试点,完成年度医药卫生体制改革任务。完善文化创新的各项政策,推进文化体制改革。全面完成市、区县政府机构改革任务,继续推进乡镇机构改革。
加大招商引资力度。发挥企业招商引资的主体作用,落实招商引资任务,实行目标责任考核。继续实施“走出去、引进来”战略,充分发挥驻外机构和各类投资促进机构的作用,加强与友好城市、企业集团的联系,增强招商引资的针对性。加大环境整治力度,强化对引进企业的服务,促进以商招商;创造条件,调动中省驻铜单位再投资的积极性。筹备好厦洽会等参会工作,积极参加省上组织的赴台招商活动。全年招商引资合同利用资金45亿元以上,到位资金25亿元以上。
转变外贸增长方式。抓住中国—东盟自由贸易区全面启动的机遇,调整优化出口产品结构,重点培育苹果、服装、植物油提取等出口产品,鼓励医药、电池和管件等有出口潜力的产品实现自营进出口。力争全年实现外贸进出口额1500万美元。
(七)做好财政金融工作,强化支撑发展能力
坚持政府推动与市场机制相结合,充分发挥公共财政的引导作用,最大限度地撬动社会投资,为加快发展提供强有力的资金保障。
狠抓增收节支工作。认真落实国家税费改革政策,支持企业加快发展,做强支柱财源,做大后续财源,培育新的增长点。依法加强税收征管,做到应收尽收。加大价格调节基金、水土流失资源补偿费等非税收入的管理力度。继续深化部门预算改革,加快国库集中支付改革步伐,将市级所有单位纳入改革范围。严格控制一般性支出,保障发展需求。
创新资金投入方式。捆绑使用“三农”、民生、社会事业等方面的资金。充分发挥财政资金的引导作用和乘数效应,逐步建立以贴息担保、参股和风险投入为主的投入机制。尝试设立各类产业发展资金和创业投资引导资金,建立担保风险补偿机制,运用市场手段,加快优势资源开发和主导产业发展。
加强金融和融资工作。积极推进信用担保公司、小额贷款公司建设,尽快盘活划拨市开发投资公司的资产,加大信贷资金支持实体经济的力度。拓宽融资渠道,尝试发行企业债券。强化投融资平台建设,深化与国家开发银行、省农行和省信用联社等金融机构的战略合作,不断扩大政府信用贷款规模。深入推进金融生态环境建设,为金融企业营造良好的发展环境。加强对市级金融机构的考核,全年新增贷款30亿元,较上年增长35%。
各位代表,铜川正处在城市转型的关键时期,经济发展面临诸多困难,财政刚性支出不断增加,保民生、上项目、搞建设的压力很大。我们一定要在用好财政资金的同时,解放思想,转变观念,加大融资力度,以更多更好的融资成果为铜川发展注入新的“血液”,增添新的动力。
(八)切实保障和改善民生,维护社会和谐稳定
今年安排民生工程项目1736个,计划完成投资16.55亿元。继续加大公共财政投入,优先配套民生项目资金,切实做好解民忧、惠民生的各项工作。
千方百计扩大就业。认真落实促进就业的各项政策措施,抓好大学毕业生和返乡农民工创业、就业困难人员就业援助等工作,鼓励自主创业、自谋职业等灵活就业。全年发放小额担保贷款1亿元。开工建设市级人力资源市场。大力实施人人技能工程,全年职业技能培训1.5万人,劳务输出5.5万人。
全力做好社会保障工作。市本级财政安排社会保障资金1.11亿元,增长9.6%。探索建立统筹城乡的社会保障体系,稳妥推进农村新型养老保险试点,认真落实养老保险接续转移、医疗保险异地结算等政策。逐步解决城镇集体企业未参保超龄人员和农村电影放映员、代理教师、农技人员、医疗卫生人员的基本生活保障问题。推行新农合门诊统筹,财政补助标准由100元提高到120元。城市低保由每人每月187元提高到193元,农村低保由年人均785元提高到1196元,农村五保供养由年人均1856元提高到2104元,城乡低保做到动态管理下的应保尽保。落实好国家生源地助学贷款政策,资助新录取家庭困难大学生400名、中职生3000名、高中生1000名。继续为残疾人办好“十件实事”。开工建设宜君县中心敬老院,完成1个区级、3个街道和60个农村社区服务中心项目建设。新增城市住房租赁补贴户1380户。发放住房公积金贷款1.5亿元。启动实施乡镇干部保障性住房工程。加强房地产市场调控,增加中小户型、中低价位普通商品房用地供应。加快推进中央下放煤矿棚户区改造项目,新开工建设安置房170万平方米,其中廉租房28万平方米,安置困难群众4000户。力争用2-3年时间,全面完成沉陷区滑塌区棚户区改造任务。
加快发展社会事业。投资1.17亿元,改造58所中小学的校舍和生活设施。铜川职业技术学院通过教育部教学工作水平评估验收。加大耀州区职教资源整合力度,全市中职招生5000人。印台区“双高普九”通过省上评估验收,完成王益区教育强区、耀州区义务教育均衡发展合格区创建任务。稳妥推进中小学布局调整工作。扩大“蛋奶工程”覆盖面。高度重视幼儿教育工作,50%以上的乡镇建有中心幼儿园。推广转化科技成果8项,民营科技企业技工贸收入超过4亿元。开工建设新区医院二期工程,认真实施好城乡居民健康档案、农村已婚育龄妇女健康检查、65岁以上老年人免费体检等项目。继续稳定低生育水平,全面落实计生奖励优待政策,做好流动人口计生服务工作。完成市档案馆主体工程建设任务。启动铜川体育文化艺术中心项目前期工作,实施40个行政村农民体育健身工程,为7个社区配送体育健身器材。新增数字电视用户1万户,农村电影放映7200场,完成270个自然村广电“村村通”工程。启动新区图书大厦前期工作,建成5个乡镇综合文化站,办好市第二届文化艺术节。
全力维护社会和谐稳定。深入推进社会矛盾化解、社会管理创新、公正廉洁执法三项重点工作。扎实抓好信访“三无”区县创建活动,积极建设区县联合接待大厅,落实“三个一”联合接待模式,妥善解决信访突出问题。高度重视安全生产工作,强化政府的监管责任和企业的主体责任,突出抓好煤矿、道路交通、非煤矿山安全监管,杜绝重特大事故发生。抓好中小学校和幼儿园安全工作,提高安全防范意识。继续深入开展“平安铜川”创建活动,依法防范和严厉打击各类违法犯罪行为,不断提高人民群众的安全感。完善应急预警机制,有效预防和处置各类突发公共事件。继续搞好普法教育。加大对工会、共青团、妇联等人民团体的支持力度。重视做好国防教育、双拥共建等工作。
各位代表,政府工作的最终目标是促进经济发展,保障和改善民生。我们一定要始终把民生问题作为一切工作的出发点和落脚点,努力为人民群众多办实事,多予实惠,创造更多福祉,让铜川人民生活得更有尊严!
(九)加强自身建设,努力建设人民满意的服务型政府
以转变政府职能为重点,深化行政管理体制改革,大力推进服务型政府建设,努力为各类市场主体创造公平的发展环境,为人民群众提供良好的公共服务。
坚持依法行政。严格依照法定权限和程序行使权力、履行职责,自觉接受人大及其常委会的依法监督,主动接受政协的民主监督。认真办理人大代表议案、建议和政协提案,广泛听取老干部、民主党派和无党派人士的意见,主动接受社会公众和舆论监督。强化行政问责,对失职渎职、不作为和乱作为的,严肃追究责任。各级行政机关及其公务员要自觉遵守宪法和法律,严格依法行政,努力提高政府公信力。
加快转变政府职能。不断健全覆盖全民的公共服务体系,全面增强基本公共服务能力。推进政企政事分开,支持中介组织、行业协会在社会管理和公共服务中发挥更大作用。完善重大事项集体决策、专家咨询、社会公示与听证等制度,推进决策的科学化和民主化。深化行政审批制度改革,积极推行集中审批、网上审批。完善政府信息公开制度,提高政府工作透明度。
努力改进工作作风。牢固树立服务基层、服务群众意识,不断提高工作质量。加强政府工作人员教育、培训和管理,严肃纪律,坚决纠正松、散、懒现象。认真解决企业改制、征地拆迁、劳动争议等领域损害群众利益的突出问题,保障人民群众的合法权益。大力精简会议、文件,减少应酬和事务性活动。创先争优,强化目标责任考核,加大督查力度,促进各项工作落实。
切实加强廉政建设。认真执行《中国共产党党员领导干部廉洁从政若干准则》,落实党风廉政建设责任制。强化审计监督和行政监察,加大对扩大内需第三、第四批项目的监督检查。坚持勤俭行政,反对铺张浪费,不断降低行政成本。全体政府工作人员一定要牢记宗旨,勤勉尽责,为民、务实、清廉,绝不辜负全市人民的期望。
各位代表,铜川正处在一个千载难逢的发展机遇期和经济转型时期。站在新起点,谋求新发展,实现新跨越,是历史赋予我们的神圣职责。让我们在中共铜川市委的坚强领导下,认真贯彻落实科学发展观,进一步解放思想,开拓创新,同心同德,扎实工作,为开创经济社会发展新局面而努力奋斗!
|
[
"25%。"
] | 12,946
|
multifieldqa_zh
|
zh
| null |
2291b8e2aa2cdd2dde54693039d39d89aa9b22cf09f0f01c
|
如何考核导师培训?
|
'南 京 医 科 大 学 文 件南医大研〔2022〕2 号关于印发《南京医科大学研究生指导教师培训 方案(试行)》的通知各学院、部门、直属单位、附属医院:为深入推进研究生教育改革,加强研究生指导教师队伍建 设,完善导师岗位管理制度,充分发挥导师在研究生培养过程中 第一责任人的作用,全面提升我校导师队伍整体素质,特制定本 方案。现予以印发,请遵照执行。附件:《南京医科大学研究生指导教师培训方案(试行)》南京医科大学研究生院2022 年 1 月 13 日
附件:南京医科大学研究生指导教师培训方案(试行)一、培训目标深入推进研究生教育改革,加强研究生指导教师(以下简称 导师)队伍的建设,完善导师岗位管理制度,努力打造一支“政 治优良、师德高尚、学养深厚、术业精进、治学严谨、指导有方、 潜心育人”的新时代高素质导师队伍。通过规范导师培训,全面提升我校导师队伍的整体素质,充 分发挥导师在研究生培养过程中第一责任人的作用,切实提高研 究生培养质量。二、培训原则1. 针对性原则:以问题为导向,有针对性地解决导师在教 育教学中的困惑与问题。2. 时效性原则:紧密结合教育教学中的热点问题和实际需 求。3. 系统性原则:以学校整体发展为本,保证培训对象的全 面性和培训内容的多样性,使导师队伍的整体水平得以提升。4. 自主性原则:在导师个人自主学习和学校组织集中培训 的基础上,各二级培养单位自行定期分类组织导师培训活动,并—2—
及时向研究生院汇报培训情况。5. 开放性原则:在校内导师间互帮互助的基础上,鼓励校 际间的合作与交流。三、培训对象1. 拟聘任导师的人员2. 在岗导师四、培训内容1. 师德师风:导师政治素质、社会责任感,以德立身、以 德立学、以德施教,全过程育人、全方位育人。2. 规章制度:国家、江苏省和学校有关研究生招生、培养、 管理、学位授予等工作以及导师管理相关的规章制度。3. 学术道德与学术规范:学术道德、学术规范解析,学术 腐败和学术不端行为及相关典型案例介绍。4. 研究生指导方法:新型教学方法、信息技术、团队合作 精神、研究生带教经验、研究生优质教学资源(课程、教材、案 例)建设方法等。5. 心理健康:导师自我压力管理、研究生日常人文关怀、 研究生心理健康问题的应对与疏导等。6. 就业指导:毕业生职业倾向、最新就业形势、各类岗位 能力要求与发展前景等。7. 实验室安全:实验室设施和环境、危险化学品的使用和 防护、通风柜的安全使用、实验室的安全设备等。—3—
五、培训方式1. 自主学习导师自学相关文件资料,内容包括但不限于学校每年更新发 布的《导师手册》,研究生教育相关书目或期刊,如《德育新论》、 《中国古代教育论著选》、《中国著名特级教师教学思想录》、《学 位与研究生教育》、《研究生教育研究》等。自主学习由导师个人不定期自行开展。2. 集中培训通过线上“导师云课堂”或线下培训会,对师德师风、研究 生教育规章制度、学术道德与学术规范、研究生指导方法、研究 生心理健康、实验室安全等内容进行系统培训。集中培训由学校组织开展,每学年至少 1 次。3. 分类培训(1)专题讲座:结合研究生教育教学的热点问题和实际需求, 邀请专家学者,重点针对科学研究指导、专业实践指导、导师立 德树人、师生关系处理、研究生心理疏导、研究生安全教育、毕 业生就业指导等开设专题讲座。(2)交流研讨会:按照导师类型或导师从事学科专业分组开展 交流讨论。相同类型的导师“老”带“新”传授经验,交流各类 研究生的教学体会,研讨各类研究生带教方法和技巧,研究生代 表可受邀从学生角度提出对导师指导的想法和观点。相同或相近 学科专业领域内的导师开展学科前沿进展讨论和学术交流,启发—4—
科研思维。分类培训由各二级培养单位组织开展,每学年应选择以上两 种形式中的一种至少举办 1 次。4. 校际学习交流推荐各二级培养单位在岗导师代表组团参加省级及以上或 国内双一流高校导师研修班,交流学习、启发思考,研修结束后 在二级培养单位分类培训时交流学习成果。校际学习交流由学校组织开展,每学年 1 次。六、培训考核导师培训考核采用积分制。每三学年为一轮次,一轮培训结 束时,各二级培养单位统计本单位导师积分情况,导师培训积分 汇总表见附件 1。每位导师每一轮次至少获得 3 个培训积分,同 种培训方式最多只计 1 次。导师培训情况将与导师资格聘任及招 生资格审核挂钩,并纳入导师聘期考核指标体系。1. 自主学习:认真学习相关材料,一轮培训结束后向二级 培养单位提交自主学习反馈表,南京医科大学研究生指导教师自 主学习反馈表见附件 2。完成可计 1 个培训积分。2. 集中培训:认真进行线上课程学习或线下培训。所有拟 聘任导师的人员均须参加集中培训。学习完毕且考试合格可计 2 个培训积分。3. 分类培训:认真参加专题讲座和交流研讨会。完成可计 1 个培训积分。—5—
4. 校际学习交流:学习结束形成心得体会并在二级培养单 位进行交流分享。完成可计 3 个培训积分。七、保障措施1. 落实经费支持学校层面按照每位导师每学年不低于 100 元的标准设立导师 培训专项经费,用于集中培训和校际学习交流。学院层面根据实 际情况设置导师培训专项经费,为导师参加相关培训提供保障。2. 完善导师奖励制度学校每两年评选 1 次“十佳研究生导师”“优秀研究生导师” 和“优秀研究生导师团队”,对获奖者进行奖励,弘扬典型的示范 引领作用。获评以上荣誉称号的导师和导师团队成员、省级优秀硕士/ 博士学位论文指导教师作为主讲人在学校或二级培养单位举办的 培训中做 1 次经验分享,即可免除本轮导师培训。校级及以上研究生优质教育资源建设项目负责人、研究生教 育研究课题主持人作为主讲人在学校或二级培养单位举办的培训 中做 1 次经验分享,可计 2 个培训积分。3. 完善管理监督制度各二级培养单位需认真制定培训方案,至少提前一周向研究 生院报备培训活动的时间、地点、形式和主题,研究生院安排督 导随机抽查。若督导评价为不合格,则取消该单位下一届“十佳 研究生导师”、“优秀研究生导师”和“优秀研究生导师团队”的—6—
评选资格。督导评价表见附件 3。每一轮考核结束后,各二级培养单位向研究生院上交本轮导 师培训活动的总结报告,包括文字、照片、影像材料、导师培训 积分汇总表等。八、本办法由研究生院负责解释,自公布之日起施行。—7—
南京医科大学校长办公室 2022 年 1 月 13 日印发 —8—
'
|
[
"采用积分制,每位导师每一轮次至少获得3个培训积分。"
] | 2,725
|
multifieldqa_zh
|
zh
| null |
22dd5faa34d83c6e8074540e28a448e92af3791024dd4335
|
西北农林科技大学图书馆何时开始使用计算机流通管理系统?
|
历史沿革_西北农林科技大学图书馆
西北农林科技大学图书馆的发展历史可以追溯到1934年,随着我国西北第一所高等农业学府——原西北农业大学前身国立西北农林专科学校在杨陵的创办,这所高校的图书馆也开始了它艰难的创业历程。建馆初期,全馆只有7名工作人员,馆舍面积数百平方米,馆藏图书仅有从(上海)国立劳动大学图书馆及其农学院图书室接收来的四百多册,馆内设施设备十分简陋。在随后的几十年,在杨凌地区先后诞生的原陕西省农业科学院前身西北农业科学研究所(1952年)、原西北水利科学研究所前身西北水工实验室(1954年)、原水土保持研究所前身中国科学院西北农业生物研究所(1956年)、原陕西省中国科学院西北植物研究所前身中国科学院西北植物研究所(1965年)、原西北林学院(1980年)、原陕西省林业研究所(1980年)等7个教学科研单位都组建形成了各具特色的图书情报资料机构。1999年,随着2所大学与5所科研院所合并成立新的西北农林科技大学,由7个单位图书情报资料机构合并组建而成的西北农林科技大学图书馆正式诞生。
一、原西北农业大学图书馆
(一)初创时期(1935-1949年)
国立西北农林专科学校筹建于1932年。1934年4月,国民政府在陕西武功张家岗校址举行了教学大楼的奠基典礼,宣告我国西北第一所高等农业学府成立。图书馆也在此时期进入了筹备阶段。
1932年春,(上海)国立劳动大学农学院奉国民政府令停办。适值中央政治会议通过建设西北专门教育初期计划案,即将劳动大学农学院的农场及一部分图书仪器拨归国立西北农林专科学校。由于运输过程中损失,初期仅接收(上海)国立劳动大学图书馆及其农学院图书室移交的图书451册。
1935年8月,李仪祉先生将其于1932年在陕西省立高级中学(西安)创办的水利专修班移至国立西北农林专科学校,同时带回一批书刊。
1936年,国立西北农林专科学校正式招生,辛树帜教授担任校长。他在担任校长期间,有“三宝”之说。主要是抓三件事:一是聘请名教授,二是充实图书、仪器,三是为学生毕业后谋出路。建校初期,经费相对充足,辛树帜教授又比较注意节约开支,大部经费都用来购置图书仪器。有次曾亲自赴当时的北平购置图书仪器,开支达十万元之多。
1936年7月,图书馆正式开放。学校任命黄连琴先生为图书馆主任,另有员工5名。同时在《西北农林(创刊号)》上公告了图书馆《阅览及借书规则》。当时学校仅有教职员工108名,学生101人。
同年,学校成立图书馆委员会和购置委员会,黄连琴同时兼任两会的委员。同年12月,图书馆工作人员达到9名。图书馆面积561平方米,设有一个书库和两个阅览室。
1937年,西北农林专科学校的教学楼(原农专大厦)建成,图书馆搬至一楼东南角,馆舍面积有较大的增加。
1938年,图书馆接收了由前西安临时大学移交的中文图书87册。此期间,图书馆除购进部分图书外,还接收了辛树帜校长和石声汉、傅斯年、顾颉刚等教授、学者赠送的一批图书。为避免战争损坏,学校将部分重要图书迁往陕南沔县存置。
1939年4月,国立西北农林专科学校与国立西北联合大学农学院、河南大学农学院畜牧兽医系合并成立国立西北农学院,教职员工达到250名左右。随着国立西北农学院的组建,图书馆亦随之更名为国立西北农学院图书馆,当时有可容纳15000册图书的书库和60个座位的混合阅览室各一个,有过期期刊、线装书库各一个。另外,图书馆还购进全套《国闻周报》及《东方杂志》、《万有文库》第一、二集,《四部丛刊》、《四部备要》正编各一部。此时,图书馆馆藏图书已达40073册。
抗日战争期间,学校长期处于不安定状态,图书馆人事变动频繁,工作无所进展。当时虽然收赠、购进一些抗日宣传读物,但经常遭到“查禁”、“封存”的禁锢。1940-1941年期间,日寇飞机三次轰炸学校,死伤学生多人。图书馆所在的农专大厦(即今3号教学楼)也中弹数枚,部分建筑受到相当大的破坏。
1945年至抗战胜利后,图书馆曾先后接受国外赠送图书3批,并补充抗日战争时期所缺期刊数种。
1949年5月20日,学校解放。此时图书馆馆藏图书达41707册,其中期刊合订本1676册。
新中国成立之前,图书馆作为学校教学科研的支柱,虽历经了战乱袭扰,但在广大师生的共同努力下,馆藏图书资料得以比较完整地保存,并以科学的方法进行管理。例如,分类采用《杜威十进分类法》和《中国十进分类法》等,这些都为日后图书馆的发展创造了较好的条件。
(二)发展壮大时期(1950-1978年)
图书馆在这一时期发展主要表现为:一是馆藏文献数量急剧增加,1978年馆藏文献总量已经超过52万册,与1949年相比增加了13倍;二是明确了图书馆作为学校教学科研服务的学术性机构的作用与地位,同时还建立、健全了图书馆业务机构,制订了各项管理制度;三是图书馆基础业务实现了规范化管理,业务与服务不断深入,范围不断扩大;四是独立馆舍的建成,为全面提升图书馆文献保障能力创造了条件。尽管在1966-1970年期间,图书馆出现了停滞状况,但图书馆不断发展壮大的总趋势没有发生根本性的改变。
1、快速发展阶段(1950-1966年)
新中国成立后,随着国民经济的恢复和发展以及国家对高等教育投入的不断增加,国内高等学校也得以快速发展。解放初期,西北农学院全校仅有教职员工608名,至1966年底,全校教职员工已发展到1169名;在校学生由解放初期的585名发展至上世纪60年代初期的2194名。
随着学校规模的迅速扩大,图书馆进入了第一个快速发展时期。1956年馆藏总量近170000余册;1961年馆藏总量达到258000余册;1965年馆藏总量达到310000余册,全馆工作人员也由解放初期的6名增加到32名。
同时,图书馆的业务管理和理论研究工作也取得了长足进展。其中上世纪50年代图书馆范世伟主编出版的《图书分类法》在国内图书馆界具有一定影响;编印的《汉语拼音著者号码表》(即“字帖式著者号码表”)为省内外一些图书馆所采用; 1954年由院长辛树帜发起邀集十余位教师参加,在图书馆成立了“祖国农业遗产研究小组”,后改名为“古农研究室”,利用馆藏的一批古籍农业文献资源开展农业历史方面的研究。另外,60年代图书馆的书目索引编制也取得了明显的服务成效。
在内部管理与服务环境方面,图书馆也有了较大变化:
1951年5月,图书馆设主任1名,综理馆务,1名主任馆员辅助主任处理馆务,下设编目、出纳、阅览、期刊四部分,分别由5名馆员负责,2名工人协助工作。另有书库1个;混合阅览室1个,连接书库,陈列期刊200册;参考室1个,藏书2000册;期刊报纸储藏室1个以及公共阅报处1处。
1956年,根据全国高等学校图书馆工作座谈会会议精神以及教育部有关条例,学校加强了对图书馆的领导,将原来图书馆由教务处领导,改由一位副院长领导。1957年1月,学校决定将图书馆改为由副院长直接领导的处级单位,副院长王振华兼任图书馆馆长。图书馆在学校教学、科研工作中的地位与作用得以确立,并延续至今。
1957年,学校正式成立图书馆委员会,图书馆委员会委员大多由学校当时的知名专家教授组成,委员会主要负责图书馆发展与建设等重大事项工作。
同年,图书馆内部设置办公室,在办公室下分设采访、编目及流通阅览三个组以及参考书阅览室、期刊阅览室、政治书籍阅览室、教师阅览室及显微复制品阅览室,文艺书籍实行开架借阅;制定了图书借阅规则、各阅览室阅览规则和期刊及学生参考书的使用办法等一些图书馆基本的规章制度。同时学校决定将以往的图书经费按系分配的办法改为由图书馆统一管理使用。
1964年冬,新的图书馆大楼建成,时任中国科学院院长的郭沫若先生亲笔题写了“图书馆”馆名。新馆坐落在校园正中央,由主楼、侧楼、附楼3 部分组成,总面积8100 平方米。新馆的建成使用,使馆舍条件得到极大改善,面积比解放前增加了15 倍之多,馆内设施全部更新,工作人员也增至23人。新的图书大楼共设置了各专业阅览室10个,通用阅览室3个,阅览座位共870席。1965 年初,图书馆全部搬入新馆大楼,并于2月28日举行了开馆仪式。院党委陈吾愚书记在开馆仪式上对图书馆今后的工作做了重要指示。为了改善教师的阅读学习环境,学校对新馆大楼教师阅览室全部配备皮软椅,为当时全学院内办公学习的最好配置。
2、工作停滞阶段(1966-1970年)
1966年开始的“文化大革命”运动,给国家带来了一场浩劫,图书馆也难以避免的受到了影响。“文革”初期,全馆除留1名老年同志看守外,其余人员多被下放到“五.七”干校参加劳动。所幸的是由于图书馆为独立馆舍,未受到大的冲击,图书、期刊、资料等馆藏资源保存完整。
3、恢复发展阶段(1971-1978年)
按照中央1971年出版工作座谈会和全国教育工作会议“要办好图书馆”、“要积极整理藏书,恢复借阅”的指示精神,图书馆的工作人员陆续从“五七干校”返回。这一时期图书馆工作的主要任务是整理与恢复业务工作,成为国内较早恢复图书馆工作的高校图书馆之一。
1971年,为了迎接第一届工农兵新学员的到来,图书馆对馆藏30余万册藏书以及接受的原陕西工业大学8万多册图书全部整理就绪;同时还修订了部分规章制度,整理布置了7个阅览室,重新恢复图书期刊资料的订购、搜集工作,完成了恢复开馆的各项准备工作。1974至1976年学“朝农”(朝阳农学院)开门办学,图书馆成立了校外教学基地工作组,专门负责校外基地巡回送书,送书到点、站。
1978年,图书馆对馆内机构进行调整,宣传报道组改为宣传咨询组;期刊阅览室转由报刊组管理;科研处“科技情报室”划归图书馆统一领导;内部书改由流通组管理。同时还增设外文期刊阅览室,实行开架阅览;增设咨询项目,设专人负责组织答疑解难,代查文献资料。同时还创办和编印《科技情报参考》、《国外科技资料》、《科技资料》、《图书通讯》等情报资料方面的刊物。与此同时,《中国图书馆分类法》的出版,标志着我国图书馆业务工作规范化、标准化的开始。图书馆统一使用《中国图书馆图书分类法》类分中外文图书资料,各项业务工作逐步实现标准化管理,并得以较快发展。
1974年4—5月间,图书馆对《汉语拼音著者号码表》进行全面修订和检验工作。因当时省内外的图书馆索要的较多,因此,在印出后,先后发送至全国320多个图书馆,在全国同行中产生了较大影响。这一时期,由于图书馆工作快速恢复正常后,读者服务有了较大拓展,取得了显著成绩,先后受到中央电视台的采访,光明日报报道。陕西日报以“为教学科研铺路——记西北农学院图书馆”为题,对图书馆“热心服务、咨询解疑难、定位阅览、册册新书见精神”进行了宣传报道。
(三)全面发展时期(1979-1999年)
党的十一届三中全会以后,图书馆各项业务工作全面展开,科技情报服务成为图书馆工作的重要内容,在农业科技文献检索的服务与教学方面成效显著;图书馆管理改革和自动化技术应用成为这一时期图书馆发展的主要特点。
1、全面推进管理体制和运行机制改革
1979年,西北农学院被列为全国重点高等院校。这一时期,学校以教学和科研为中心的各项工作迅速恢复与发展。根据教育部“关于加强高等学校图书资料工作意见”的精神,图书馆开展了健全图书馆决策机构和以部室设置体制改革。
1979年7月,图书馆下设办公室(包括宣传咨询工作)、采编组、流通组、报刊组、情报资料室、古农学研究室等3室3组,各室主任由校党委统一任命,为校内科级干部。
1982年,学校恢复成立了图书馆委员会,作为学校图书资料情报工作的咨询机构。委员会委员包括主管图书馆工作的院长、图书馆馆长、办公室主任以及各系部关心图书馆工作的正副系主任或副教授以上人员担任。1987年11月,学校新一届图书情报委员会成立。主任委员由校长张岳教授担任,冯世良副馆长任秘书。
随着学校教育改革不断深入,教学质量和科学研究水平不断提高,为适应形势发展需要,从1987年开始,图书馆进一步加快了改革步伐,从办馆思想、服务理念等方面上发生根本性改变。形成了以岗位责任制为核心的人事管理制度,促进了图书馆各项工作的开展;1987年,学校全面开展了各类人员定编工作。为了适应这一形势需要,图书馆将以往的各业务组(室)改为部,将性质相近的业务,统一归口管理。除办公室外,设有采编部、流通阅览部、期刊部、情报咨询部、技术部等部室,并在情报咨询部下附设农业科技情报研究室。各部室主任、副主任由学校任命制改为馆长聘任制。同年经学校批准,作为试点单位试行了双向劳动优化组合,各业务部主任、副主任改由图书馆聘任,实行定编、定岗、定责、定员和聘任,并制定了图书馆岗位职责和考核办法。
从1997年5月起,图书馆开始全面实行岗位责任制管理,进一步完善了考核、奖惩规定。经过调整后的部室分别为采编部、流通部、期刊部、文献信息服务部、技术部、办公室。另外还通过民主推荐、领导考核、调换竞争、择优上岗的形式,先后举行了7个岗位28人次参加的考试,调整工作岗位20余人次,调整的范围基本涉及到全馆各个工作岗位。通过一系列改革措施的实行,极大地调动了工作人员的积极性。在工作量增大,人员减少的情况下,图书馆整体的管理水平和服务质量有了明显的提高。
2、运用现代电子信息技术,推进图书馆现代化建设
这一时期,逐步开展了以计算机技术应用为核心的服务工作,加快了图书馆现代化技术应用进程。
1981-1987年,图书馆利用世界银行第一期教育项目贷款,购置了一批现代化技术设备,开展了图书馆管理系统方面的研究工作。1987年2月,图书馆受中国农学会科技情报分会委托,主办了首次全国农业情报电子计算机系统建设研讨班,全国29个省、市、自治区农业科学院情报研究室、高等农业院校情报室、国家专业情报机构等40余名负责同志参加了研讨。
1992年,图书馆计算机流通管理系统进入了开发研究阶段。从1994年4月,计算机流通管理系统投入使用,图书馆对1975年以后入藏的中文图书实现了计算机借还和开架借阅。该系统投入使用在全国农业系统图书馆工作中走在了前列,极大地方便了读者,提高了中文图书的利用率。
1990年9月,图书馆购置AGRCOLA光盘检索数据库一套,1991年3月成立文献检索室和计算机光盘检索室,开始提供计算机检索服务。图书馆情报服务项目有:跟踪定题服务,专题文献检索服务,编印“信息简报”专题书目索引等,服务项目已扩展到校外。1998年5月,图书馆建成拥有一个28个光驱的光盘塔和16台计算机终端的光盘网络检索系统,不仅可以在系统内通过16台终端检索本馆的18种中外文数据库,而且可以检索国家图书馆60多种大型中外文光盘数据库。
1999年4月,图书馆建成多媒体网络电子文献阅览室,并与校园网连通,通过中国科研教育网可查阅因特网上有关信息。光盘检索网络和多媒体网络电子阅览室的建成和运行,为师生进行课题研究、科研立项、科技成果鉴定、撰写学术论文、电子文献阅览、因特网信息查询提供了快捷全面的服务。
3. 加强文献检索课教学工作,推进学生信息素质教育
这一时期,在积极开展各项业务工作,结合工作实践,开展业务研讨活动,根据国内大学图书馆的发展趋势,增设新的服务形式,其中在推动农业系统开展文献检索课教学方面作用最为显著。
20世纪80年代,随着科学技术的飞速发展,文献大量增加,文献需求日趋显著,人们获取信息的复杂程度也随之不断加大,文献信息检索活动开始从人们的科学研究、科学交流中分离出来。1982年7月到1985年10月,图书馆先后受全国高校图工委、中国农业图书馆协作委员会、陕西省高校图工委委托,为全国农业系统、陕西省高校图书馆系统举办参考咨询、文献检索短期讲习班、农业文献检索与利用培训课等。参加学习培训的人员包括全国19个省市农业系统以及陕西省高校图书馆共约200名学员。
1983年5月,图书馆被选定为中国农业图书馆协会副主任委员馆;中国农业图书馆协会决定由西北农学院、吉林农学院、沈阳农学院、华南农学院、浙江农业大学五院校的图书馆联合编写“农业文献检索与利用”教材,为农业系统图书馆举办检索培训做准备
1986年6月,经学校批准,图书馆成立《文献检索与利用》课教学室,文献检索课列为选修课。9月,受陕西省高校图工委委托,图书馆举办全省高校系统“文献检索与利用”教学经验交流研讨会,进一步推动了文献检索课在全省高校的创设与发展。
4.全面提高服务水平和质量,图书馆业务工作取得显著成效
从1987年开始,图书馆开架借阅图书增加到占馆藏总量的30%,其中对教师和研究生进库选书全部开放,图书馆周开放时间从50多小时提高到70小时。
1989年,由于读者到馆人次和图书借阅量大幅提高,为解决经费短缺,书源不足,图书馆开展了文艺书刊的代租和有偿服务,实行“以书养书”。虽然由于后续管理措施没有跟上,曾一度产生了一些弊端,但这项工作仍深受读者欢迎。
1979年以后,图书馆恢复并开展了国际交换工作,并开展了对外交流活动。先后与美、英、德、法、日、东南亚等16个国家与地区建立了交换关系, 1979年联合国粮农组织将西北农学院图书馆列为该组织直接建立联系的藏书单位。
长期以来,图书馆学术研究一直比较活跃,在省内外图书馆界有较大影响。为了进一步强化图书馆学术研究工作,加强各部门之间的业务沟通,解决图书馆业务工作中存在的问题,图书馆在1980-1986年期间,连续举办了7届图书馆业务研讨会。具不完全统计,截止1999年,共发表涉及图书馆各研究领域论文253篇,出版教材、专著11部。获中国图书馆学会特别奖一个,62届国际图联大会征文优秀论文1篇,陕西省社会科学学会联合会科研成果2等奖1项,西北农业大学教学成果2等奖1项。获各级学会成果奖、论文奖72篇。发表论文中载《中国图书馆学报》6篇、《情报学报》1篇、《大学图书馆学报》3篇。
1995年7月,农业部批准图书馆具有科技成果查新权。1996年7月,陕西省科委批准图书馆具有科技成果查新权。1986年5月,图书馆接受了陕西省高校图书馆检查团来校检查1981年以来图书馆贯彻执行高校图书馆工作条例情况,检查结果评价良好。1989年3月顺利通过陕西省高校图工委评估检查,图书馆被评为优秀馆。1998年2月,陕西省教育工会授予图书馆部门工会“先进集体”;3月,陕西省图书馆学会授予图书馆“学会工作先进集体”; 1999年9月,图书馆被评为学校1997-1998和1998-1999学年度管理育人、服务育人先进集体。
二、原西北林学院图书馆
(一)图书馆组建与业务规范阶段
西北林学院于1979年10月成立,其前身为西北农学院林学系。西北林学院图书馆成立于1980年10月,其前身为西北农学院林学系资料室,系处级编制,直属学院领导,李天笃教授为图书馆首任负责人。建馆初期,图书馆在该资料室的基础上,逐步购置图书,增添资料,开展少量流通业务。
1981年9月,图书馆下设办公室、
(二)图书馆现代化建设与服务业务全面拓展提高阶段
1998年7 月,为了实现馆藏中文图书流通自动化管理,全馆职工利用暑假将20余万册图书进行了清查整理、贴条码、加磁条、排架、倒架以及计算机录入等多项工作。这项工作的开展,使图书馆的服务水平上了一个新台阶,从此方便了读者,极大的提高了馆藏中文图书的利用率。图书馆采用本馆职工王立宏编制的图书馆采访、编目、流通管理软件,组织实现了图书馆采编、中文图书流通计算机管理。使图书馆的业务管理与读者服务工作上了一个新的台阶。
为了满足科研人员的需要,1993年,图书馆开始建立“我国干旱半干旱地区主要经济林文献数据库”。该数据库系统地收录了20世纪80年代到2000年我国干旱半干旱地区枣、柿、板栗等16个主要经济树种的期刊、论文、专利、标准文献的题录及摘要,累计库存达15000余条。2003年该数据库被列为“陕西省科技图书文献共享服务系统”,受到了很多读者的关注。
随着图书馆工作人员队伍的不断扩大以及服务手段和条件的逐步改善,图书馆对师生员工服务的方式和范围也在逐渐扩展。主要开展有以下几方面工作:
1.外借服务:对教师和毕业班学生实行开架借书。1997年实现了图书流通微机管理后,对全校学生全部实行开架借阅。
2.阅览服务:设立了新书阅览室、现刊阅览室、参考工具书阅览室、过期报刊查阅室,实行开架或半开架阅览。
3.检索咨询服务:设有文献检索室,收藏与学院各专业对口的国内外主要检索刊物和参考工具书1000多种。1995-1998年购置计算机13台,打印机5台,其中激光打印机2台,光盘塔1台。同时图书馆信息资源开始进入全国林业科技信息网络,成为中国学术期刊检索咨询二级站。可向师生提供手工检索、计算机检索和网络检索服务。
4.读者教育:一是对新生结合入学教育,组织新生参观图书馆,介绍学院图书馆的基本情况和所提供的各种服务。二是利用多种形式,宣传图书馆的藏书,提供各种服务,传递科技信息。三是从1987年开始,根据国家教委文件要求,对本科大学生开设了《文献检索与利用》课程。经过十多年的教学实践,该课程在教学时数、教学内容及实习等方面达到了上级的要求。
5.复制服务:1986年购置了复印机进行复印服务。1995年以后添置了打印机等现代化设备,使读者获取文献信息的手段更为快捷方便。
为了加快图书馆现代化建设,适应信息时代发展的形势,建馆以来,历任馆领导都非常重视本馆人才队伍建设,采取在职培养、短期进修等形式,先后培训20多人,其中5名大专毕业,4名本科毕业,1名获得硕士研究生学位。
另外,图书馆还鼓励职工理论联系实际开展科学研究,撰写学术论文。截止1999年,全馆职工在各类专业杂志发表论文100多篇,自编图书馆自动化管理软件3套,完成院内研究课题2项并分别荣获三等奖,撰写教学讲义2本。1998年6月,为了加强图书资料统一管理,学院撤销各系资料室,统归图书馆管理。与此同时,图书馆还与全国400多个单位建立了情报资料交换关系,并参加了国际林业协会。
三、原中国科学院水利部水土保持研究所情报期刊室
中国科学院水利部水土保持研究所于1956年成立,同年设立图书室,后又成立了资料室,图书室和资料室分属所办公室和业务计划处。1966年,水土保持研究所照相室合并到资料室。1979年,水土保持研究所将图书室与资料室合并成立情报研究室。情报研究室的成立,解决了图书与情报资料工作对期刊需求上交叉的矛盾问题,统一了领导,理顺了关系,加快了各方面工作的进展。1995年,水土保持研究所情报研究室更名为情报期刊研究室。
建所初期,所长虞宏正教授非常重视图书资料的建设工作。早在国立西北农学院担任教授期间,他曾多次督促学校对有关重要的化学期刊杂志以及过期刊物予以顶购。来到水保所担任所长以后,他同样重视图书资料的采集工作,曾经一度亲自选择部分图书、期刊进行订购,现今水保所分馆中有关化学和土壤的国内外资料收集与保存比较丰富,与他的支持与关心密不可分。据有关学生回忆:虞宏正经常到图书馆查阅资料,几乎所有与化学有关的杂志他都翻阅过。同事或学生去询问问题,他可在他房内的书架上从众多的图书中随手抽出所用的书,翻出所要的内容;或者告诉你到图书馆去查某一本书,有时甚至告诉你在哪个书架上。
在该所三十多年的建设与发展中,情报期刊室逐步形成了以黄河中游农、林、水、牧综合考察报告,黄河中上游水文资料、地形图、航测照片,以及胶体化学、水土保持、土壤类图书为特色的文献信息资源体系,为水保所的科研工作和创新工程提供了强有力的支撑。
水土保持研究所资料室的资料主要来源于所内灰色文献收集和对外交换获取。对当时收集的图书与资料,工作人员只是做了简单的登记,没有进行严格规范的分类与编目。1965年,结合社教工作,图书馆与资料室的工作人员到农村蹲点,与科研人员一起搞样板田,并提供图书、资料服务。针对科研工作需求,资料室从兰州部队购买了一批底片,冲洗出数千张黄土高原航测地形、地貌照片。这些航测照片成为资料室所藏资料的主要特色之一。
|
[
"1994年4月。"
] | 9,870
|
multifieldqa_zh
|
zh
| null |
8c37b868ddd737ad08a0ac7665a62f2770e4fbd718b3f1f0
|
万小霞提供的第二组证据证明了什么?
|
王年方、汪尧文商品房销售合同纠纷二审民事判决书
上诉人王年方、汪尧文、夏华中(以下简称王年方等三人)因与被上诉人万小霞、原审被告湖北隆泉房地产开发有限公司(以下简称隆泉公司)商品房销售合同纠纷一案,不服湖北省汉川市人民法院(2018)鄂0984民初415号民事判决,向本院提起上诉。本院于2018年8月17日立案受理后,依法组成合议庭进行了审理。本案现已审理终结。
王年方等三人上诉请求:1.依法驳回万小霞对王年方等三人的诉讼请求;2.依法判令本案的诉讼费和其他费用由万小霞承担。事实与理由:一、万小霞主张逾期办证违约金超过诉讼时效,丧失胜诉权,人民法院依法应驳回其诉讼请求。我国《民法总则》第一百八十八条规定向人民法院请求保护民事权利的诉讼时效期间为三年。法律另有规定的,依照其规定。诉讼时效期间自权利人知道或者应当知道权利受到损害以及义务人之日起计算。本案中,王年方等三人与万小霞签订的《商品房买卖合同》第十五项明确约定出卖人应当在商品房交付使用后的180日内,将办理权属登记需由出卖人提供的资料报产权登记机关备案。如因出卖人的责任,买受人不能在规定期限内取得房地产权属证书的,双方同意按照下列第三项处理:3.产权总证由开发商办理,并承担相关税费,分户产权证由开发商代办,买受人承担相关费用和契税。按照《民法总则》第一百八十八条的规定,向人民法院请求保护民事权利的期限为3年。万小霞于2018年1月9日向汉川市人民法院提起诉讼,明显超过了诉讼时效。王年方等三人在一审中也未提供证据证明,诉讼时效中断的法定事由。因此万小霞依法丧失胜诉权,法院应驳回其诉讼请求。二、一审法院追加王年方等三人为本案被告,判令王年方等三人承担连带赔偿责任程序不符合法律规定,二审法院应依法纠正。1.一审法院认定隆泉公司及王年方等三人挂靠开发涉案房地产,没有任何证据予以证明。属于事实认定错误。2.即使有相关的合作开发协议,一审法院在本案商品房销售合同纠纷中,也不应对其他协议的效力予以认定。即一审法院在隆泉公司的诉请范围之外,认定其他合同效力,影响了其他当事人的权利义务,实属不当。3.一审判决王年方等三人与隆泉公司承担连带赔偿责任,没有法律依据。4.根据合同相对性原则,本案《商品房买卖合同》的双方当事人为万小霞与隆泉公司,该合同纠纷的责任主体应仅限双方当事人,即隆泉公司。一审追加王年方等三人为被告程序违法,判决王年方等三人承担连带赔偿责任,没有任何法律依据。综上所述,一审判决适用法律错误,实体处理不当。请求二审法院依法支持上诉请求,驳回万小霞的诉讼请求。
万小霞二审辩称,一、万小霞主张逾期办证违约金未超过诉讼时效。万小霞和全体业主推荐的代表,先后于2013年3月,2014年9月、10月,2015年4月、5月,2016年3月、7月,2017年3月、8月,2018年1月向人民法院提起民事诉讼至今,分别采取口头请求、书面投寄信函和张贴维权告示,派代表到省、市政府机关和有关职能部门上访,要求王年方等三人为小区业主办理好房产证。万小霞主张自己权利的所有行为,均符合法定时效的规定。二、王年方等三人与隆泉公司已形成挂靠关系。一审法院在审理过程中,追加王年方等三人为被告,与被挂靠人隆泉公司为共同诉讼人参与诉讼,依法共同承担民事责任。万小霞围绕上述追加请求,向一审法院提交了商品房买卖合同、付款凭证、挂靠证明和王年方等三人向隆泉公司申请雕刻公章的请示报告等证据。充分证明王年方等三人与隆泉公司形成实际挂靠关系的法定事实。三、一审法院将王年方等三人与隆泉公司列为共同诉讼人参加诉讼的程序合法。一审庭审调查、质证的过程中,王年方等三人对万小霞的追加请求和隆泉公司证明其是隆泉公司的挂靠人的真实性均无异议,表示认同。四、王年方等三人与万小霞签订的商品房买卖合同合法有效,具有法律约束力。万小霞依合同约定,全面履行了自己的义务,应受法律保护。王年方等三人未按合同约定履行自己的义务,其行为已构成违约,应依法承担违约的民事责任。五、万小霞主张权利的行为均在法定的时效之内,王年方等三人主张万小霞向人民法院起诉超过法定时效的理由不能成立。六、一审法院追加王年方等三人为本案被告,认定与隆泉公司为共同诉讼人,依法共同承担民事责任的事实清楚,证据充分,符合法律规定。综上。王年方等三人的上诉理由不能成立,请求二审法院驳回上诉,维持原判。
隆泉公司述称,一审法院已经核实王年方等三人与隆泉公司为挂靠关系,王年方等三人与隆泉公司签订了挂靠协议,并向隆泉公司交纳了挂靠费用。所有项目的建设和费用都是由王年方等三人负责,隆泉公司没有收取任何费用。
万小霞向一审法院提出诉讼请求:1.判令隆泉公司及王年方等三人办齐各项手续,协助万小霞办理不动产权证;2.判令隆泉公司及王年方等三人支付前期逾期办证违约金99224元(以购房款为基数,按银行贷款年利率4.75%,自2012年1月1日起算至起诉之日止),并按同样方式支付起诉之后的违约金直至隆泉公司及王年方等三人履行完义务之日止;3.判令隆泉公司及王年方等三人退还万小霞的办证费28929元,并赔偿万小霞的经济损失(按贷款年利率4.75%的四倍,从交费之日后6个月起算至隆泉公司及王年方等三人履行完义务之日止);4.诉讼费由隆泉公司及王年方等三人承担。
一审法院认定事实:2010年9月11日,万小霞与隆泉公司签订了一份商品房买卖合同,购买其开发的汉川市隆泉商业城综合楼x号楼x单元x号房。合同约定万小霞应付购房款为368636元,隆泉公司及王年方等三人应于2011年6月30日前向万小霞交付经验收合格的商品房,其中合同第十五条约定:出卖人应当在商品房交付使用后180日内,将办理权属登记需由出卖人提供的资料报产权登记机关备案。如因出卖人的责任,买受人不能在规定期限内取得房地产权属证书的,双方同意按下列第3项处理:3.产权总证由开发商办理,并承担相关税费,分户产权证由开发商代办,买受人承担相关费用及契税。该商品房买卖合同还约定了买受人逾期付款的违约责任(合同第七条)、出卖人逾期交房的违约责任(合同第九条)。此后万小霞按合同约定支付了购房款368636元,于2012年2月16日收房,并另外支付了办理房屋产权证的费用28929元。万小霞支付的购房款和办证费用实际上均由王年方等三人所收取,三人合伙,以隆泉公司名义,开发、建设和销售汉川市隆泉商业城综合楼房地产项目,隆泉公司除向三人收取管理费12万元外,未参与该房地产项目的任何开发、建设、销售行为。该房地产项目具备商品房预售许可证,2013年1月,王年方等三人办理了该房地产项目的产权总证,但未及时为万小霞等买受人办理产权分户登记备案手续。2017年8月28日,隆泉公司及王年方等三人通知各买受人领取销售不动产发票,准备办理产权证。万小霞多次向隆泉公司及王年方等三人维权无果后,遂对隆泉公司提起诉讼,在审理过程中,万小霞向一审法院申请追加了王年方、汪尧文、夏华中三人为被告,要求其与隆泉公司共同承担责任。
一审法院认为:本案万小霞、隆泉公司及王年方等三人对事实和证据均无争议,双方当事人争议的焦点在于隆泉公司及王年方等三人应否承担责任、及如何承担责任。
一、关于隆泉公司及王年方等三人的责任:隆泉公司允许他人以其名义实施民事行为,所产生的法律后果依法均应由其自己承担,隆泉公司认为自己无责的抗辩理由于法有悖,一审法院未予支持;且王年方等三人名为挂靠,实质上是借用隆泉公司的资质,进行房地产开发。隆泉公司及王年方等三人出借、借用资质的行为,违反了有关房地产资质管理的强制性法律法规,隆泉公司及王年方等三人之间的约定无效,根据《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第五十四条之规定,参照建筑行业出借资质行为的法律规定,隆泉公司及王年方等三人为共同诉讼人,造成他人损失的,隆泉公司及王年方等三人应当承担连带赔偿责任。
二、关于逾期办理产权证的违约责任:隆泉公司及王年方等三人之间的关系不影响本案商品房买卖合同的效力,该商品房买卖合同合法有效,万小霞的合法权益应予以保护。交付房屋并办理产权登记备案手续,是房地产出卖人的基本义务,相关法律、法规对商品房出卖人办理房屋产权证书的义务和期限均有明确规定。隆泉公司作为房地产出卖人、合同相对方,之前未依法为各买受人办理分户产权登记备案手续,收取办证费用后,至今仍未为万小霞办理相关产权证书,违反法律规定和合同约定,其依法应当承担违约责任。涉案商品房买卖合同第十五条关于产权登记的约定,为格式条款,且隆泉公司及王年方等三人选择的第3项,实际上是对产权办理方式的约定,并非对违约责任的约定。本案商品房买卖合同中约定的违约责任仅有逾期付款和逾期交房两种,对于出卖人逾期办证的违约责任,合同中并无约定,隆泉公司及王年方等三人选择的格式条款显然是规避其违约责任。双方当事人对此违约责任无明确约定,根据《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条第二款规定,合同没有约定违约金或者损失数额难以确定的,可以按照已付购房款总额,参照中国人民银行规定的金融机构计收逾期贷款利息的标准计算,即在同期银行贷款利率基础上加收30%-50%。万小霞以其所付购房款为基数,按照2017年度中国人民银行1-5年期贷款年利率4.75%计算违约金,此计算标准在法律规定范围内,一审法院予以支持;对于违约金的计算时间,即使隆泉公司及王年方等三人违约,万小霞也有及时减损的法定义务,而不能任凭违约时间延长以增长违约金,且违约金请求权属于债权请求权,应当适用诉讼时效的法律规定。鉴于隆泉公司及王年方等三人持续违约,违约金亦处于持续计算中,故一审法院从万小霞起诉主张权利之日倒推三年,在三年之内的违约金一审法院予以保护,即按万小霞诉求的标准计算三年的逾期办证违约金,为52531元(368636元×年利率4.75%×3年),万小霞的此诉求一审法院部分支持,超出三年的违约金一审法院未予支持。
三、关于办理产权证的费用:隆泉公司及王年方等三人收取了相关办证费用,但未及时为万小霞办理产权证,仍属于逾期办理产权证的违约行为,因此给万小霞造成的经济损失,一审法院同样适用《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条第二款的规定,参照中国人民银行规定的金融机构计收逾期贷款利息的标准计算万小霞的损失额,即在同期银行贷款利率基础上加收30%-50%。万小霞要求按银行贷款年利率4.75%的4倍计算过高,一审法院依法调整为按万小霞诉求年利率的1.5倍,即年利率7.13%予以计算,万小霞超出此计算标准的诉求一审法院未予支持;损失起算时间万小霞要求自交费之日起后延6个月,即自2012年8月17日起算,万小霞对自己权利的处分不违反法律规定,一审法院予以支持;鉴于隆泉公司及王年方等三人长期违约拖延履行,对于万小霞现要求隆泉公司及王年方等三人退还费用自行交费办理产权证的诉求,一审法院予以支持。
综上,依照《中华人民共和国合同法》第八条、第五十二条、第五十八条、第六十条第一款、第一百零七条,《中华人民共和国民法总则》第一百八十八条,《最高人民法院关于审理商品房买卖合同纠纷案件适用法律若干问题的解释》第十八条,《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第五十四条,《中华人民共和国民事诉讼法》第一百四十二条之规定,遂判决:一、隆泉公司于判决生效之日起二十日内,协助万小霞办理位于汉川市隆泉商业城综合楼1号楼1单元801号房屋的产权登记手续,相关费用由万小霞自行负担;二、隆泉公司于判决生效之日起二十日内,向万小霞赔付逾期办证违约金52531元;三、隆泉公司于判决生效之日起二十日内,向万小霞退还办证费用28929元,并赔偿相应经济损失(以28929元为基数,按年利率7.13%,自2012年8月17日起算至判决确定的履行之日止);四、王年方等三人与隆泉公司承担连带赔偿责任;五、驳回万小霞的其他诉讼请求。如未按判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条规定,加倍支付迟延履行期间的债务利息。一审案件受理费2863元由万小霞负担500元,隆泉公司及王年方等三人负担2363元。
本案二审期间,王年方等三人、隆泉公司未向本院提交新证据;万小霞围绕其诉讼主张向本院提交了两组证据。本院组织当事人进行了证据交换和质证。万小霞提交的证据如下:
第一组证据:拟证明起诉符合法定时效的证据。
证据一:全体业主要求办证书面告示一份。拟证明:全体业主要求开发商及时办证的请求。
证据二:全体业主联名举报信一份。拟证明:全体业主要求查处不良开发商,要求开发商及时办理产权证的请求。
证据三:业主代表与开发商汪尧文的协议笔录一份。拟证明:开发商同意在2014年年底办好产权证的承诺。
证据四:业主联名向相关职能部门信访材料邮寄回单及汉川城乡规划局的反馈意见。拟证明:要求开发商为业主办理产权证的请求。
证据五:部分业主因小孩入学无房产证而苦恼,要求开发商办证,开发商出具缴费凭证一份。拟证明:各业主税票于2016年6月29日开具,因开发商其他相关手续未完善,导致不能办证。
证据六:业主代表到市信访局上访,业主代表到省信访局上访。拟证明:小区业主曾到湖北省、汉川市等信访部门反映过问题。
证据七:开发商在小区张贴通知一份。拟证明:开发商通知小区业主于2017年8月28日可以开始办证,事实上还不能办产权证。
证据八:汉川市法院周院长主持案外调解的音频资料U盘一个。拟证明:开发商汪尧文、王年方、夏华中三人与业主代表为赔偿事宜进行过约谈。
证据九:第一次向法院提出诉讼。拟证明:用法律维权。
证据十:双方面对面协商办证事宜的书面材料一份。拟证明:小区业主在上诉后和开发商协商过办证事宜。
证据十一:开发商设置的小区管理人员的书面证明材料一份。拟证明:小区业主从2012年至今为办理产权证维权的过程。
第二组证据:拟证明王年方等三人与隆泉公司为挂靠关系的证据。
证据一:被挂靠人隆泉公司出具的书面证明材料一份。拟证明:王年方等三人是隆泉公司的挂靠人,与隆泉公司存在事实上的挂靠关系。
证据二:开发商王年方等三人为开发隆泉景苑项目的方便,向隆泉公司书面申请雕刻公章的请示报告。拟证明:王年方等三人与隆泉公司属于挂靠与被挂靠的关系。
证据三:一审庭审笔录。拟证明:王年方等三人对万小霞指控其与隆泉公司存在挂靠关系以及该公司证明王年方等三人与隆泉公司存在事实上的挂靠关系的真实性与证据均无异议,表示认同。
王年方等三人对上述两组证据的质证意见如下:第一组证据:对证据一真实性有异议,该证据为照片打印,没有提取照片过程的公证证据,对证明目的不予认可;对证据二真实性有异议,因该举报信书写和起草方均为本案被上诉人,故只能作为当事人陈述,需要其他证据予以印证,对其证明内容不予认可;对证据三无异议;对证据四无异议;对证据五真实性无异议,对证明目的有异议,该份证据只能证明业主涉案房产依法缴纳了税费,不能达到其证明目的;对证据六无异议;对证据七真实性有异议,没有提取照片过程的公证证据,对证明目的不予认可;对证据八认为取得程序不合法,真实性不能确定,不予认可;对证据九真实性无异议,对证明目的有异议,该份诉状只能证明万小霞向隆泉公司主张权利,没有向王年方等三人主张过权利;对证据十有异议,出具该证明是本案当事人,只能作为当事人陈述,没有证据相互印证,不予认可;对证据十一有异议,证明人未出庭作证,其签名真实性无法核实,不予认可。第二组证据:对证据一有异议:1.该证据不属于新证据;2.在一审当中,段志勇未出庭作证;3.该证明加盖隆泉公司公章,隆泉公司作为本案当事人,是否作为本案当事人陈述,定性不明;4.隆泉公司涉及到自己权利义务的陈述需要有相关证据佐证。对证据二真实性无异议,对证明目的有异议:刻制公章属于隆泉公司内部经营管理系统,不能证明挂靠行为。对证据三有异议,一审王年方等三人委托代理人为一般代理,无权对涉及王年方等三人利益的重大事实予以自认。
隆泉公司对上述两组证据的质证意见为:对该两组证据没有任何异议,均认可其真实性及证明目的。
本院认证认为:对万小霞提交的两组证据,王年方等三人仅对上述证据的真实性、合法性、关联性提出了质疑,但未提交证据证明自己的观点,故本院对上述证据的真实性、合法性、关联性均予以认可。第一组十一份证据证明其主张逾期办证违约金的时间形成了证据链;第二组三份证据独立来看均属于孤证,但三份证据均证明同一事实,能够互相印证。故本院对万小霞提交证据的证明目的予以认可。
经审理查明,一审查明事实属实,本院依法予以确认。另查明,万小霞自2013年3月,2014年9月、10月,2015年4月、5月,2016年3月、7月,2017年3月、8月,2018年1月向人民法院起诉,期间主张权利未间断。
依照《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第三百二十三条的规定,第二审人民法院应当围绕当事人的上诉请求进行审理。故本院认定本案二审讼争的焦点为:一、万小霞主张逾期办证违约金是否超过诉讼时效;二、王年方等三人应否对隆泉公司承担的责任承担连带责任。
本院认为,万小霞与隆泉公司签订的商品房买卖合同,是双方当事人真实意思表示,未违反法律禁止性规定,依法成立、有效。双方均应按照合同的约定履行合同。
一、万小霞主张逾期办证违约金未超过诉讼时效。二审中,万小霞提交的十一份证据证明,自2013年3月15日起至今,未间断主张其权利。根据《中华人民共和国民法总则》第一百八十八条的规定,万小霞主张逾期办证违约金的诉讼请求未超过诉讼时效。王年方等三人的该项上诉理由,本院不予采信。
二、一审法院依照万小霞的申请,追加王年方等三人为本案被告,符合法律规定。王年方等三人的该项上诉理由不成立,本院依法不予采信。
三、王年方等三人应对隆泉公司承担的责任承担连带责任。王年方等三人借用隆泉公司资质,出资进行开发房地产,虽成立项目公司,但按照合同的约定独自履行义务,分享收益,二者应为非法人型合作开发的联营体。王年方等三人在上诉状中自认本案中,上诉人与被上诉人签订的《商品房买卖合同》足以说明,一审中,万小霞、王年方等三人与隆泉公司对事实和证据均无异议。王年方等三人作为实际的收益人,根据《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》第七条第一项的规定,应当对隆泉公司应承担的责任承担连带责任。权利与义务对等,利益与责任同在。王年方等三人不能只享有权利不履行义务,亦不能只收获利益而不承担责任。是故,王年方等三人的上诉请求不能成立,依法应予驳回。
另外,一审法院宣判后,万小霞未提起上诉,视为其认可一审判决。一审认定四被告出借、借用资质的行为,违反了有关房地产资质管理的强制性法律法规,四被告之间的约定无效与《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》的规定相悖,故对一审判决的该认定予以纠正;王年方等三人的该上诉理由本院予以采信。
综上,一审判决认定事实清楚,适用法律不当,但实体处理正确,依法应予维持。上诉人王年方等三人的上诉请求本院依法予以驳回。经合议庭评议,依照《中华人民共和国民事诉讼法》第一百七十条第一款第一项之规定,判决如下:
驳回上诉,维持原判。
二审案件受理费2363元,由上诉人王年方、汪尧文、夏华中负担。
本判决为终审判决。
适用法条:
《中华人民共和国民事诉讼法》
第一百七十条第二审人民法院对上诉案件,经过审理,按照下列情形,分别处理:
(一)原判决、裁定认定事实清楚,适用法律正确的,以判决、裁定方式驳回上诉,维持原判决、裁定;
《中华人民共和国民法总则》
第一百八十八条向人民法院请求保护民事权利的诉讼时效期间为三年。法律另有规定的,依照其规定。
诉讼时效期间自权利人知道或者应当知道权利受到损害以及义务人之日起计算。法律另有规定的,依照其规定。但是自权利受到损害之日起超过二十年的,人民法院不予保护;有特殊情况的,人民法院可以根据权利人的申请决定延长。
《最高人民法院〈关于审理联营合同纠纷案件若干问题的解答〉》第七条第一项
七、关于联营合同解除后的财产处理问题
(一)联营体为企业法人的,联营体因联营合同的解除而终止。联营的财产经过清算清偿债务有剩余的,按照约定或联营各方的出资比例进行分配。
联营体为合伙经营组织的,联营合同解除后,联营的财产经清偿债务有剩余的,按照联营合同约定的盈余分配比例,清退投资,分配利润。联营合同未约定,联营各方又协商不成的,按照出资比例进行分配。
|
[
"证明了王年方等三人与隆泉公司为挂靠关系。"
] | 8,481
|
multifieldqa_zh
|
zh
| null |
063b7d6c23bc70fcd2d7114f86b790c88ab91fef00615f83
|
被告人王海江犯罪的主要手段是什么?
|
王海江诈骗罪一审刑事判决书
公诉机关张家口市桥东区人民检察院。
张家口市桥东区人民检察院以张东检一部刑诉(2019)1号起诉书指控被告人王海江犯诈骗罪,于2020年1月16日向本院提起公诉。本院受理后,依法组成合议庭并适用普通程序,公开开庭审理了本案。张家口市桥东区人民检察院指派检察员闫鑫出庭支持公诉,被告人王海江到庭参加诉讼。因受新冠疫情影响,本案于2020年2月6日中止诉讼,2020年7月9日恢复审理,现已审理终结。
张家口市桥东区人民检察院起诉书指控:2019年5月至2019年7月,被告人王海江因无法偿还被害人张某的债务,虚构“高乐”、“赵佳”、“刘律师”、“胡建国”,并以上述人员的名义和被害人张某通过微信联系,谎称“高乐”、“赵佳”欠王海江钱,“高乐”、“赵佳”同意替王海江偿还欠张某的债务,“高乐”名下的一对公账户中有20余万元,但该对公账户被冻结,需要通过刷银行流水解封对公账户,只要解封冻结账户便可以偿还王海江欠张某的债务。被害人张某信以为真,为解封账户,索要欠款,共向被告人汇款1802100元。被告人将大部分赃款用于网络赌博及个人消费。被告人到案后自愿认罪认罚。
公诉机关就上述指控提供了:手机,受案登记表、立案决定书,抓获经过,银行流水,微信账单,手机号户主查询记录,亚鑫彩印工商信息,建行对公账户管理规定,办案说明,证人李某、陈某的证言,被害人张某的陈述,被告人王海江的供述与辩解,辨认笔录,收集数据恢复报告等证据。
公诉机关认为,被告人王海江以非法占有为目的,虚构事实、隐瞒真相,骗取被害人张某人民币1802100元,数额特别巨大,其行为触犯了《中华人民共和国刑法》第二百六十六条之规定,犯罪事实清楚,证据确实、充分,应当以诈骗罪追究其刑事责任。被告人自愿认罪认罚,对犯罪事实如实供述,建议判处被告人有期徒刑十一年,并处罚金。提起公诉,请依法判处。
被告人王海江对公诉机关的指控无异议,当庭自愿认罪,但辩解手机微信恢复的数据证实自己有中止犯罪的行为,张某给转钱时候都有实名认证,他应该知道都是给自己打钱。
经审理查明,2019年5月至2019年7月间,被告人王海江因无法偿还被害人张某的债务,虚构“高乐”、“赵佳”、“刘律师”、“胡建国”,并以上述人员的名义与被害人张某通过微信联系,谎称“高乐”、“赵佳”欠王海江钱,“高乐”、“赵佳”同意替王海江偿还欠张某的债务。王海江编造“高乐”名下的一个对公账户中有20余万元被冻结,需要通过刷银行流水解封对公账户,只要解除冻结,便可以偿还王海江欠张某债务的事实,骗取被害人信任。被害人张某为解封账户,索要欠款,共向被告人汇款1802100元。被告人将170余万元转付蒙扁立、农进军用于网络赌博,其余用于个人消费。2019年8月12日王海江被抓获。王海江到案后如实供述上述犯罪事实。
在审查起诉阶段,被告人王海江就指控的其犯诈骗罪签署认罪认罚具结书,同意公诉机关指控本人的罪名及有期徒刑十一年并处罚金的量刑建议。公诉机关出具量刑建议书建议判处被告人有期徒刑十一年,并处罚金。
上述事实,被告人王海江在庭审过程中均无异议,且有公诉机关提交并经开庭质证、认证的:手机,受案登记表、立案决定书,抓获经过,银行流水,微信账单,手机号户主查询记录,亚鑫彩印工商信息,建行对公账户管理规定,办案说明,证人李某、陈某的证言,被害人张某的陈述,被告人王海江的供述与辩解,辨认笔录;收集数据恢复报告等证据予以证实,足以认定。
本院认为,被告人王海江以非法占有为目的,虚构事实、隐瞒真相,骗取被害人张某人民币1802100元,数额特别巨大,其行为触犯了《中华人民共和国刑法》第二百六十六条之规定,构成诈骗罪。公诉机关指控的犯罪事实清楚,证据确实、充分,指控罪名成立。关于被告人认为被害人明知付款对象仍然转款的辩解意见,经查,与其在侦查阶段的供述不一致,且不符合逻辑思维关系,故不予采纳。关于被告人认为其构成犯罪中止的意见,经查,其本人没有自动放弃犯罪或者积极有效的防止犯罪结果的发生,故不予采纳。被告人王海江到案后如实供述犯罪事实,系坦白,依法从轻处罚。被告人在审查起诉阶段认罪认罚,依法从宽处理。公诉机关的量刑建议适当,予以采纳。依照《中华人民共和国刑法》第二百六十六条、第五十二条、第五十三条、第六十四条、第六十七条第三款,《最高人民法院、最高人民检察院关于办理诈骗刑事案件具体应用法律若干问题的解释》第一条第一款,《中华人民共和国刑事诉讼法》第十五条、第二百零一条之规定,判决如下:
一、被告人王海江犯诈骗罪,判处有期徒刑十一年,并处罚金三万元;
(刑期从判决执行之日起计算,判决执行以前先行羁押的,羁押一日折抵刑期一日,即自2019年8月12日起至2030年8月11日止。罚金于本判决生效之日起十日内缴纳。)
二、被告人诈骗被害人张某的赃款1802100元予以追缴,发还被害人;
三、犯罪工具华为(黑色)手机一部,予以没收。
如不服本判决,可在接到判决书的第二日起十日内,通过本院或者直接向河北省张家口市中级人民法院提出上诉,书面上诉的,提交上诉状正本一份,副本二份。
|
[
"虚构“高乐”、“赵佳”、“刘律师”、“胡建国”等人物,并以虚构人物的名义对被害人进行诈骗。"
] | 2,176
|
multifieldqa_zh
|
zh
| null |
501b4bb14f7ebcd2561e679e55c5fc29db91203ff50fca84
|
教师如何申报“双师双能型”教师资格认定?
|
'浙 江 科 技 学 院 文 件浙科院人〔2018〕7 号浙江科技学院关于印发“双师双能型”教师队 伍建设暂行办法的通知各二级学院(部、中心),机关各部门、直属单位:现将《浙江科技学院“双师双能型”教师队伍建设暂行办法》 印发给你们,请认真遵照执行。附件:1.浙江科技学院“双师双能型”教师资格认定申请表2.浙江科技学院“双师双能型”教师资格认定信息汇总表3.浙江科技学院派驻企业行业挂职和培训对象推荐表 浙江科技学院2018 年 7 月 12 日—1—
浙江科技学院“双师双能型”教师队伍建设暂 行办法第一章 总则第一条 为建设特色鲜明的现代化应用型大学,实现“人才 强校”战略目标和“三三”战略行动计划布局,坚持将师德师风 作为评价教师队伍素质的第一标准,鼓励应用型学科专业教师深 入生产和社会一线,进行实践锻炼和培养培训,提高教师的实践 技能和教学科研水平,努力建设一支具有应用型人才培养能力和 产学研合作能力的高素质“双师双能型”师资队伍。第二条 根据教育部、国家发展改革委和财政部《关于引导 部分地方普通本科高校向应用型转变的指导意见》(教发〔2015〕 7 号)和学校《人才发展“三三”战略行动计划(2018-2022)》 (浙科院党发〔2018〕1 号)的要求,结合学校实际,特制定本 办法。第二章 目标和任务第三条 “双师双能型”教师队伍建设,必须以提高教师实 践教学和应用能力为目标,以强化学生实践能力和创新精神培养 为宗旨,以促进学生就业创业为导向,坚持培养与引进并举、专 业进修与技能培训并重,进一步提升教师队伍综合素质,让企业 经历真正转变为企业能力。 —2—
第四条 有计划分步骤地实施“双师双能型”教师队伍培养 培训计划,到 2022 年末,建设一支熟悉行业企业需求、工作经验 丰富、实践教学能力强的专兼职结合的“双师双能型”教师队伍, 数量达到专任教师总数 70%以上。第三章 认定条件与程序第五条 认定条件(一)基本条件1.热爱高等教育事业,教书育人,为人师表,师德高尚。2.具有较强的理论基础和专业技能,胜任学校教学工作。3.具备较强的实践教学能力,能灵活运用专业理论,完成 实践实训教学的指导任务。4.具有高校教师资格证书且承担学校教学任务。(二)必备条件在具备基本条件的基础上,满足下列条件之一者,可申报“双 师双能型”教师资格认定:1.具有本专业实际工作的中级及以上非教师系列专业技术 资格,如工程师、实验师、会计师、统计师、经济师、网络工程 师等,但不含研究系列、图书资料系列、档案系列、卫生系列。2.有行业特许的资格证书或有专业技能考评员资格(至少 满足下列一项):—3—
(1)取得国家承认的、与本专业实际工作相关的行业特许 的从业资格或执业资格证书(如注册建造师、注册会计师、注册 电气工程师、注册资产评估师等)。(2)具有与本专业实际工作相关的高级(三级)以上国家 或行业的职业(技能)资格证书,如国家职业资格的高级工、“三 级/高级技能”证书等。(3)参加国家、省(自治区、直辖市)人社部门及教育行 政主管部门组织的教师专业技能培训获得合格证书,指导学生专 业实践、实训活动效果良好。(4)取得国家承认的、与本专业实际工作相关的专业技能 考评员资格。3.具有较强的应用研究及技术服务能力(至少满足下列一 项):(1)在业内(行业、企业或科研院所)从事本专业实际工 作连续 6 个月及以上或累计 1 年及以上的实践工作经历。(2)在与本专业相关的政企事业单位挂职连续 1 年以上的 实际工作经历,包括科技特派员、块状经济转型升级专家服务组 成员、农村指导员等。(3)主持 2 项及以上纵向应用技术研究项目,且成果已被 推广使用,效益良好。 —4—
(4)主持 2 项及以上横向研究与技术服务项目(含咨询等), 成果在行业企业应用并直接创造效益或有专利转让、许可,获得 2 项及以上授权专利。(5)主持 2 项及以上由企业行业参与的校内专业实践实训 教学设施建设或提升技术水平的设计安装工作,运行 2 年以上, 成果已被学校使用并取得较好效果。(6)指导学生(指排名第一)参加应用型 A 类学科竞赛(指 面向具体生产设计、开发类的学科竞赛)先后 2 次获得省级二等 奖以上成绩或 1 次获得国家级二等奖以上成绩。4.特殊情况,由学校认定委员会确定。第六条 每年 4 月,学校统一组织认定“双师双能型”教师 资格一次,具体程序如下:(一)本人对照“双师双能型”教师资格条件,于每年 4 月 上旬向所在二级学院(部、中心)(以下简称“二级学院”)提 出书面申请,填写《浙江科技学院“双师双能型”教师资格认定 申请表》(见附件 1),并提交相关证明材料。(二)二级学院组织本院学术委员会和教学指导委员会认真 审核申报者材料,并形成明确考核意见。二级学院确定的上报人 员要在本学院内公示 3 个工作日。公示无异议后,填写《浙江科 技学院“双师双能型”教师资格认定汇总表》(见附件 2),并 与相关材料报送人事处。—5—
(三)人事处会同教务处、科研处等职能部门和有关专家成 立“双师双能型”教师资格认定委员会,对二级学院上报人员的 资格进行审核,确定拟定人员,并在校内公示 5 个工作日。(四)公示无异议后,由学校颁发“浙江科技学院双师双能 型”教师资格证书。第四章 建设途径第七条 “双师双能型”教师队伍建设的主要途径是外引内 培。二级学院要结合本单位实际情况,科学制定实施方案,报学 校备案后组织实施。第八条 加大校外引进“双师双能型”教师力度。应用型专 业和“卓越计划”专业要积极引进一批具有行业资格证书或具有 5 年及以上企业、行业工作经历的技能型人才,并具有高级专业 技术职务(不含教师系列)和大学本科及以上学历,或具有中级 技术职称(不含教师系列)和研究生学历,重点引进产业领军人 才。第九条 聘请企业技术骨干或行业专家担任兼职教师。二级 学院要积极与企业、行业建立良好的合作关系,聘请有实践经验 又能胜任教学任务的企业技术骨干或行业专家来校担任兼职教 师,承担教学任务,指导教师和学生的实验实训,帮助校内教师 了解行业发展动态、提高实践能力、促进科研成果转化和教师向 “双师双能型”转化。 —6—
第十条 加强校企合作项目研究。二级学院与企业行业共建 科技合作平台,通过实践调研、科学研究、技术服务、项目开发、 人才培养模式研究等方式引导和带动一批教师参与工程实践、技 术开发和产品研发等社会经济活动,提高教师的科研创新能力和 实践动手能力,扩大服务社会的范围和社会知名度。第十一条 选派教师到企业、行业挂职或培训。选派教师到 企业生产一线进行实践操作、实践教学、技术指导、技能培训等 工作,将课堂、实验室、技能培训延伸到企业。加强教师实践(挂 职锻炼)基地建设,学校与合作单位签订培养协议,建立长期产学 研合作关系。每个二级学院均要建立相对稳定的校外教师实践培 训基地或教师实践能力培养合作共建单位。(一)选派办法1.派驻到企业、行业进行挂职或培训的人员主要从我校在 岗的专业教师特别是新引进的缺乏企业行业工作经历的专业教师 中选派,派驻时间分长期挂职锻炼和短期培训,长期挂职锻炼时 间不少于 1 年,短期培训主要利用暑期进行,时间为 1-2 个月。 每个二级学院根据自身实际情况有计划的选派教师到企业行业进 行长期挂职锻炼,至 2022 年末,“双师双能型”教师比例不低于 70%,同时,积极选派教师到企业行业进行短期培训。2.二级学院负责提名推荐拟选派人员,并明确其在派驻单 位的岗位和职责,填写《浙江科技学院派驻企业行业挂职和培训 —7—
对象推荐表》(见附件 3),经教务处、人事处审核,长期挂职 锻炼人员报校长办公会审定后实施。3.派驻人员与学校签订《浙江科技学院派驻企业行业挂职 和培训协议书》。(二)考核管理1.二级学院与派驻单位共同对派驻人员的工作业绩情况进 行考核,学校随机抽查考核情况。2.派驻人员在派驻单位期间的基本工作量以派驻单位的同 岗位职工基本工作量为标准;派驻人员的工作质量考核以派驻单 位对派驻人员工作质量的评价为重要依据。3.二级学院根据派驻人员的工作业绩、工作报告和派驻单 位对派驻人员的考核鉴定意见等情况确定派驻人员的考核等级, 报学校审核后公示。4.派驻人员在派驻单位期间,应全面完成派驻单位工作。 派驻期满后必须按期返校,并承担与派驻工作相关的专业课教学 和学生专业实践实训的指导任务。第五章 待遇第十二条 选派到企业行业挂职或培训(以下统称挂职),经 考核合格,挂职期间可享受下列待遇:(一)工资(基本工资和基础性绩效工资)和福利待遇不变, 长期挂职人员的奖励性绩效工资按照学校相关文件进行补助。 —8—
(二)交通费标准:挂职在杭州市区内的每月 80 元、杭州 市区外的其他区县每月 500 元、杭州市以外的每月 1000 元,交通 费凭票在限额内报销。在途期间(仅指首次前往派驻单位和期满返回)的城市间交 通费、伙食补助费等,按照相关差旅费管理办法报销。(三)长期挂职期满经考核合格者,可申报实践进修基金, 基金项目作为校级课题立项,经费为每项 10000 元。第十三条 教师参加的校企双方共同开展的社会生产实践、 应用技术研究项目、工程应用项目、开发研究项目、调查与对策 研究项目、文化创意项目,学校予以优先推荐申报和重点资助。第十四条 鼓励教师取得行业主管部门认可的本专业一级、 二级职业资格证书,对新取得资格证书的,学校给予人才专项经 费 3000 元资助,对已经取得职业资格证书的教师,学校报销继续 教育培训经费凭发票一次性补贴 800 元。第十五条 经学校认定为“双师双能型”教师,在职称评审、 岗位聘任、评优评先、外出访学进修及骨干教师队伍建设等方面 在同等条件下优先。第六章 附则第十六条 二级学院要高度重视“双师双能型”教师队伍建 设,采取切实可行的措施,积极鼓励和支持相关教师提高实践技 能,制定合理有效的建设方案,要优先安排“双师双能型”教师 参与科研项目研发,参与本专业范围的实验项目、实验装置开发, —9—
负责解决较为复杂的技术问题,指导青年教师进行实践能力培养 等工作。第十七条 本办法自发文之日起执行,由人事处负责解释。 浙江科技学院院长办公室 2018 年 7 月 12 日印发 —10—
'
|
[
"在每年4月向所在二级学院提出书面申请,填写《浙江科技学院“双师双能型”教师资格认定申请表》,并提交相关证明材料。"
] | 4,340
|
multifieldqa_zh
|
zh
| null |
68f488e4502c62d3d7c3ba1ac609691bbb31c91b68064223
|
2010年金华市的人均生产总值相比于2005年增加了多少元?
|
各位代表:
现在,我代表市人民政府,向大会作政府工作报告,请各位代表审议,并请市政协委员和其他列席人员提出意见。
一、“十一五”规划执行情况和过去六年政府工作回顾
过去六年,是我市发展进程中极不平凡的六年。全市人民认真贯彻落实科学发展观,围绕“发展城市群、共建大金华”战略主线,深入实施“创业富民、创新强市”和“工业强市”战略,攻坚克难,扎实工作,圆满完成了五届人大一次会议和“十一五”规划确定的主要目标任务,荣获了全国双拥模范城、国家历史文化名城、国家卫生城市、中国十佳宜居城市等称号,科学发展迈出了坚实步伐。
———综合实力大幅提升。2010年,全市实现生产总值2095亿元,比2005年增加1028亿元,年均增长12.2%;人均生产总值45031元(折合6652美元),比2005年增加21479元,年均增长11.6%;财政总收入和地方财政收入分别达到273亿元和156亿元,比2005年分别增加149亿元和88亿元,年均分别增长17%、18%;完成全社会固定资产投资778亿元,比2005年增加293亿元,年均增长9.9%;进出口总额达132亿美元,比2005年增加85亿美元,年均增长22.8%;实现社会消费品零售总额916亿元,比2005年增加498亿元,年均增长16.9%。
———主导产业快速发展。形成汽车、电子信息、现代五金、小商品、生物医药、食品加工、新型建材、棉纺织等优势工业产业集群。到2010年,全市共培育超百亿产业集群12个,荣获国家产业基地称号29项;完成规模以上工业总产值3393亿元,比2005年增加1994亿元,年均增长19.4%;工业总产值在全省的占比从2005年的6.1%提高到2010年的6.6%。服务业长足发展,服务业增加值占生产总值比重达43.1%。现代农业发展水平提升,农业总产值171亿元,比2005年增长60.3%。
———城乡面貌深刻变化。新型城市化加快推进,全市城市化水平从2005年的54.3%提高到2010年的58.5%。基础设施不断完善,实现了“县县通高速”目标,城际快速通道加快建设,市县间基本形成“一小时交通圈”,区域性铁路枢纽地位进一步强化。新农村建设成效明显,到2010年,累计完成村庄整治村4103个、污水治理村2782个,分别占行政村总数的85.3%和57.8%。
———生态建设成效明显。义乌、磐安分别通过国家级生态县(市)公示和现场核查,武义、磐安获得省级生态县称号,市区荣获联合国人居环境范例奖。全市森林覆盖率达到60.4%。累计建成全国环境优美乡镇22个、省级生态乡镇60个、市级生态乡镇95个。2010年,全市化学需氧量、二氧化硫排放量分别比2005年下降19.1%、20.2%,万元生产总值能耗下降20%,顺利完成省“十一五”下达的节能减排任务。
———群众生活不断改善。2010年,市区城镇居民人均可支配收入25029元,比2005年增加9651元,年均增长10.2%;全市农村居民人均纯收入10201元,比2005年增加4685元,年均增长13.1%,增幅居全省第二位。城乡居民储蓄存款余额2028亿元,比2005年增加1236亿元。城乡居民住房条件进一步改善,养老和医疗保障制度实现全覆盖。
六年来,我们始终坚持以科学发展观为统领,创新发展理念和发展模式,加快推进发展方式转变,全面建设惠及全市人民的小康社会。
(一)坚持工业强市,扎实推进产业转型升级。按照新型工业化要求,提升工业经济规模和质量。推动工业集聚发展。推进开发区整合提升,金华经济开发区升格为国家级经济技术开发区。实施金衢丽产业带规划,在全省率先编制了产业集群发展规划,汽车、五金、饰品、棉纺织、磁性材料5个块状经济列入省产业集群转型提升示范区试点。培育壮大企业主体,规模以上企业达到5648家,比2005年增加2580家,其中亿元以上企业达到623家,比2005年增加358家。提升民营经济发展水平,民营企业从2005年的22.9万户增加到2010年的33.8万户。强化招商选资工作,“十一五”累计引进外资22.8亿美元、内资463亿元,完成限额以上工业投资1300亿元,引进和实施了一批汽车、装备制造、新能源、新材料等方面的重大项目。积极应对国际金融危机的影响。落实了一系列“标本兼治、保稳促调”的措施,全力扩内需、促投资、保企业、拓市场。深入开展“送政策、送服务、送温暖”活动,累计减轻企业负担超过200亿元。设立企业应急解困调头基金,保障重点企业资金链安全。开展多种形式的银企对接活动,加大金融支持地方经济发展力度。2010年金融机构存款余额3987亿元、贷款余额3096亿元,分别是2005年的2.55倍、2.58倍。出台鼓励企业扩大外贸出口等政策,帮助企业搭平台、拓市场。提升企业创新能力。实施创新能力提升行动和技术创新工程,不断完善科技创新体系。2010年,全社会研发经费投入占生产总值比重为1.4%,高新技术产业增加值占工业增加值的比重为22.8%。推进技术改造“双两百工程”,“十一五”累计完成重点技改和技术创新项目1600多项。扎实推进技术创新平台和中科院金华科技园实体化建设,“十一五”累计实施市级以上科技计划项目4127项,组建市级以上高新技术研发中心158家,新申请专利3.98万件、授权专利3.2万件,新增行政认定中国驰名商标15件。每年举办工科会,设立市长质量奖,被列为国家知识产权工作示范城市。编制实施中长期人才发展规划,推进高层次人才培养工程,建立院士专家工作站6个、博士后科研工作站11个、省级重点企业创新团队4个,引进培养高级专家471人,执行海外引智项目150项。构建现代服务业体系。沃尔玛、银泰、世纪联华等落户金华,举办浙中购物节,浙中商业购物中心初具雏形,义乌国际物流中心、永康五金产业总部中心、横店影视产业实验区、浙中信息产业园、义乌国际商贸城列入省首批服务业集聚区。积极推进专业市场转型,义乌国际商贸城建设不断提升,永康五金、东阳木雕、浦江水晶、武义茶叶、兰溪纺织、磐安浙八味中药材和市区建材家居、农产品、电子数码、汽车等特色市场加快发展。积极开发购物旅游、影视文化、温泉养生、生态休闲等具有金华特色的旅游产品,推进乡村旅游发展。大力发展电子商务,被授予“中国电子商务创业示范城市”,9家行业网站被评为“全国百强”,5173网站交易额突破70亿元。
(二)坚持城乡统筹,加快提升新农村建设水平。把统筹城乡摆在重要位置,巩固和加强农业基础,“十一五”全市财政累计投入“三农”资金达313亿元。大力发展现代农业。积极扶持粮食生产,2010年全市粮食播种面积237万亩,总产量89.4万吨,连续三年被评为全省粮食生产先进市。大力推进农村土地规模经营,土地流转总面积达71万亩。努力提高农业组织化程度,农民专业合作社累计达到2324家,市级以上农业龙头企业达到247家。举办华东农交会、中国苗交会、义乌森博会等展会,促进农产品产销对接。加快发展设施农业、来料加工、“农家乐”和“兴林富民”项目,多渠道增加农民收入。扎实推进新农村建设。以“千村示范、万村整治”工程为龙头,统筹推进农房改造、安全饮用水、河道清理、村庄绿化、垃圾和污水处理等工程,完成乡村康庄工程“双百”目标,基本实现了客运班车、自来水、移动通信和互联网“村村通”,连续7年获省村庄整治建设优胜奖。到2010年,累计解决农村饮水安全人口204万;加固病险水库256座,新建加固堤防50公里,完成河道整治2204公里,开工建设兰溪三江农防加固工程。加大农村电网改造力度,建成新农村电气化村2712个。积极培育新农民。围绕提高农民就业创业能力,推进农村劳动力素质培训,“十一五”累计免费培训69万人次、转移就业40万人。加快欠发达地区发展。实施“山海协作”、结对帮扶和“低收入农户奔小康”工程,大力发展特色产业项目,加大低收入农户集中村帮扶。2010年全市人均纯收入在2500元以下农户比2007年减少了67.9%。加快下山脱贫步伐,“十一五”累计搬迁9028户、2.63万人。
(三)坚持优势共创,努力加快浙中城市群发展。按照“六共”的要求,加大浙中城市群推进力度。制定城市群区域发展规划。浙中城市群规划已经省政府正式批准,完成了县(市)域总体规划编制,完善了金华城市总体规划。推进基础设施一体化建设。杭长客专、金温扩能改造项目稳步实施。甬金、诸永、台金高速公路全线开通,东永高速开工建设,金义快速路、虹戴公路建成通车,“十一五”新增高等级公路里程866公里。义乌机场航站楼扩建工程投入使用。构建了较为完善的防洪、灌溉、供水和水资源保障体系,九峰水库封孔蓄水,金兰水库完成除险加固。加快电力建设,变电容量实现翻番,浙能兰溪电厂并网发电。3G网络和甬绍金衢成品油管道工程顺利推进。致力改善市区人居环境。推进一批重大功能性项目建设,市档案中心、博物馆、文化中心建成使用,中国婺剧院、市体育中心、文化艺术中心等项目加快建设。市区八一南街和双龙南街道路优化、城南桥至河盘桥段江堤加固、假日公园和月亮湾公园改造等工程完成,东市街延伸、通济桥拼宽改造、市民广场提升改造等工程扎实推进。深入开展国家卫生城市创建活动,建成数字城管一期,加强社区物业管理,市区环境卫生面貌明显改善。妥善解决重点难点问题。加强重大民生及基础设施项目的征迁和政策处理,推进市区老飞机场土地置换、九峰水库移民安置和铁路货场搬迁、五百滩、后垅区块开发前期工作,加快东阳红椿巷改造、永康方岩风景区综合整治,为长远发展创造了条件。加强生态共保力度。东阳、永康、浦江三个省级和武义江、孝顺溪流域两个市级重点环境污染监管区“摘帽”,推进省级开发区环境污染整治。
(四)坚持以人为本,全力保障和改善民生。把改善民生作为发展的根本取向,加大民生事业投入,群众生活更加富裕,生活质量明显提升。推进教育强市建设。9个县(市、区)全部成为省级教育强县(市、区)。十五年教育普及率达99.4%。推进城乡教育均衡协调发展,实施标准化学校建设和中小学校舍安全工程,“十一五”新建校舍253万平方米。深化教育体制改革,落实义务教育学校教师绩效工资制度。大力实施“职业教育六项行动计划”,职业教育招生规模和特色专业名列全省前茅。加强高校重点学科建设,提高了高校办学水平和质量。推进卫生强市建设。加强“健康新农村”创建和城市社区卫生服务工作,农村乡镇卫生机构标准化率达90%以上,城市社区卫生服务机构覆盖率达85%。推进医药卫生体制改革,全面实施基本药物制度。大幅提高农村合作医疗筹资水平,各级财政补助人均达129元,新农合参合率93.6%。加强突发公共卫生事件应急处置和甲型流感、手足口病等重大传染病防控。加强食品药品质量安全监管,开展农村“十小”行业质量安全整治。推进文化强市建设。大力推进文化事业繁荣发展,加强公共文化设施建设,开展“送文化”和“种文化”活动。加强文化遗产保护,推进中德合作历史文化名城保护项目,“上山文化”、“东阳龙”成功命名。基本实现主城区数字电视整体转换,完成新一轮有线电视“村村通”、有线广播“村村响”工程。推进国家级创业型城市创建。完善就业援助制度,落实促进大学生及困难群众创业就业各项优惠政策,顺利通过国家级创业型城市创建中期评估。2005年以来,全市累计新增城镇就业人口32.9万、失业人员再就业11.6万,城镇登记失业率保持在4%以下。推进社会保障体系建设。实施“五费合征”工作机制,2010年全市职工养老、医疗、失业、工伤、生育五大保险总参保人数达402万。连续6年提高企业退休人员养老金。构建覆盖城乡的新型社会救助体系,农村“五保”对象集中供养率达到99.3%。推进城镇困难群体住房保障工程,“十一五”累计建设经济适用房55万平方米,筹集廉租房保障资金3.36亿元,新增廉租房保障户4286户。深入实施残疾人共享小康工程,残疾人社会保障和服务体系更加完善。加强人口计生工作。稳定低生育水平,人口自然增长率控制在3.5%。左右,人口和计划生育公共服务体系建设取得积极进展。深入开展“平安金华”创建。妥善处置了一批突发公共事件,完成“金信信托”停业重整。实施奥运会、国庆60周年、世博会等安保工程,落实信访维稳工作责任制和重大事项社会稳定风险评估制度,深入开展“五五”普法,加强社会治安综合治理,严厉打击各种违法犯罪活动,跻身“中国30个最安全城市”。
(五)坚持改革创新,不断优化经济社会发展环境。把改革创新作为发展的根本动力。推进重点领域和关键环节改革。落实扩权强县、强镇政策,进一步增强县域经济活力,促进了中心镇建设。开展现代服务业、统筹城乡等领域综合配套改革试点,积极转变经济发展方式。深化企业产权制度改革,完善现代企业制度。推动企业上市和工业企业分离发展服务业,“十一五”新增上市企业7家、分离发展服务业企业145家。推进金融体制改革,先后引进8家股份制银行在金华设立分支机构,成立小额贷款公司、村镇银行等新型农村金融组织14家。开展城乡公交统筹发展改革,城乡客运一体化率达86%。实施集体林权制度改革、农村宅基地确权登记和转换试点。组建村级农民水务员队伍,探索建立农村水利设施长效管理机制。总结推广“义乌经验”,义乌被列为全国18个改革开放典型地区之一,义乌国际贸易综合改革试点获国务院批复。武义后陈首创的村务监督委员会制度被《村民委员会组织法》吸纳。扩大开放合作力度。金华正式成为长三角城市经济协调会成员。做好对四川青川、新疆温宿的对口支援工作,广泛开展友好城市的交流合作。积极转变政府职能。深化行政管理体制改革,加强行政效能建设,强化公共服务和社会管理职能。自觉接受人大法律监督、政协民主监督和社会监督,六年共办理人大代表建议1510件、政协提案2469件。加强依法行政,完善政府决策机制,全面推行行政执法责任制,规范行政处罚自由裁量权。深化政务和政府信息公开,被授予“全国政务公开工作先进单位”。认真开展深入学习实践科学发展观活动,创先争优和作风建设年、企业服务年、项目攻坚年等活动取得新成效。认真履行惩防体系建设工作职责,加大反腐倡廉工作力度。积极发展妇女儿童、老龄、红十字、慈善等事业。支持工会、共青团、妇联等发挥作用。做好民族、宗教、档案、外事、侨务、对台事务等工作,巩固双拥共建成果,大力支持国防建设。
2010年是“十一五”收官之年,面对复杂的形势,我们始终保持奋发有为的精神状态,强工业、调结构、促转型,抓统筹、重民生、保稳定,全面完成了市五届人大七次会议确定的目标任务,经济保持平稳较快增长,人民生活继续改善,社会保持和谐稳定。全市生产总值比上年增长12.5%,地方财政收入增长20.6%,全社会固定资产投资增长22.4%;万元生产总值能耗下降率及化学需氧量、二氧化硫削减率完成省下达目标;市区城镇居民人均可支配收入增长9.2%,全市农村居民人均纯收入增长13.3%;居民消费价格总水平涨幅4.0%;城镇新增就业6.8万人,城镇登记失业率3.02%;人口自然增长率3.26%。。
一年来,我们重点抓好以下六个方面工作。一是调结构,促发展。编制了金华新兴产业集聚区、义乌商贸服务业集聚区规划。开展工业重大项目攻坚活动,为企业解决难题6216个。加大技改力度,234个项目列入省技术改造“双千工程”,全年实现高新技术产值607亿元、占规模以上工业总产值的17.9%。积极开展产业招商,实际利用外资3.5亿美元、引进内资133亿元。启动金华现代服务业和义乌国际贸易综合配套改革试点。深化浙中商业购物中心建设,举办了两届浙中购物节,在省内外开设了一批“金华名品中心”。实施了“百场展会拓市场”工程,推动外贸出口增长,实现外贸出口额122亿美元、增长41.8%。二是强“三农”,促统筹。整合资金4亿元,推进粮食生产功能区和农业现代园区建设。全面部署开展“美丽乡村”建设,新完成整治村271个、污水治理村630个。完成农村住房改造5.14万户、农村困难家庭危房改造2979户。启动饮水安全提升工程,新增受益人口17万。三是抓协调,促融合。做好城市群规划编制工作,加快重大项目建设,推进浙中城市群发展。加大城际交通连接,基本完成330国道兰溪城区段外迁、金东曹塘澧公路、婺城莲湖公铁立交桥、义浦公路、磐新公路夹溪特大桥等主体工程,怀万线、十白线协调推进。加强旅游目的地建设,全年接待游客2945万人次,增长22.3%。提升市区城市品质,推进一批文化、体育、道路、桥梁、公园等项目建设。做好金华铁路枢纽规划布局优化,推进市区城乡公交统筹工作。四是抓生态,优环境。落实生态文明建设各项任务,抓好省级环保模范城市创建。全力打好节能减排攻坚战,加强有序用电引导,淘汰落后产能。全面推进“811”环境保护新三年行动、“531”污染防治及断面控制工程。加强城市管理,巩固创卫成果。五是惠民生,保稳定。推进基本公共服务均等化行动计划,全市新增财力的71%用于民生事业。采取积极措施稳定物价,保障群众基本生活。启动实施企业退休人员社会化管理服务,抓好基础养老金发放工作。继续推进教育优先发展战略,校舍安全工程完成投资8.3亿元,金华六中迁建主体工程完工,上海财大浙江学院按期搬迁。医药卫生体制改革有序推进,全面推行医患纠纷人民调解制度,抓好市中心医院等一批重点医院扩建改造工程。加强公共文化服务,编制了历史文化名城保护规划。组织“欢乐新农村”系列主题活动,开展了纪念艾青诞辰100周年活动。实施“固本强基”工程,提高计生依法管理水平。深入开展基层平安创建活动,认真落实信访工作责任制,确保社会稳定。强化安全生产主体责任,有效遏制了安全生产事故多发势头。六是提素质,树形象。深入开展创先争优和“深化作风建设年”活动,抓好省委巡视组意见建议的整改落实,巩固学习实践活动成果。积极推进政府信息公开和部门预算改革,开展了地方政府融资平台清理规范。认真贯彻落实《廉政准则》,加大违法违纪案件查处力度,促进了廉洁从政。
|
[
"21479元。"
] | 7,489
|
multifieldqa_zh
|
zh
| null |
31c5f574ec43360f5a60fcf17441ce6267560dd577f8f5af
|
2020年浙江省的生产总值增长了多少?
|
政府工作报告
2021年1月26日在浙江省第十三届人民代表大会第五次会议上
浙江省省长 郑栅洁
各位代表:
现在,我代表省人民政府向大会报告工作,请予审议,并请省政协委员和其他列席人员提出意见。
一、2020年主要工作和“十三五”发展成就
2020年极不平凡。在统筹推进疫情防控和经济社会发展的关键时期,习近平总书记亲临浙江视察,赋予浙江建设“重要窗口”的新目标新定位,为浙江高质量发展指明了战略方向。一年来,面对国内外形势的深刻复杂变化特别是突如其来的新冠肺炎疫情,在以习近平同志为核心的党中央坚强领导下,在省委的直接领导下,省政府坚持以习近平新时代中国特色社会主义思想为指导,全面贯彻党的十九大和十九届二中、三中、四中、五中全会精神,深入贯彻习近平总书记视察浙江重要讲话精神,忠实践行“八八战略”,奋力打造“重要窗口”,坚持“两手硬、两战赢”,扎实做好“六稳”工作,全面落实“六保”任务,为发展聚力、为企业赋能、为小康增色、为治理提效,推动经济社会发展取得新成绩。全省生产总值达到64613亿元,比上年增长3.6%,一般公共预算收入增长2.8%,城镇和农村居民收入分别增长4.2%和6.9%,三大攻坚战取得决定性成就,十方面民生实事圆满完成。
(一)疫情防控取得重大成果。“源头查控+硬核隔离+精密智控”精准有效,“一图一码一指数”创新实施,“人”“物”同防形成工作闭环,社区、入境和海上防控抓紧抓实,率先有力有效控制疫情,全省累计报告确诊病例1306例,治愈率达99.9%。防疫物资保障有力,口罩日产量从疫情之初的15.5万只,到两周内迅速破千万,医用防护服日产量从零提升到12.8万件;应急科研攻关取得积极成效。复工复产率先推进,到2月24日规上工业企业基本实现全面复工,全年规上工业增加值增长5.4%;复市复课复游稳妥有序。支援武汉、湖北主战场坚决有力,先后调配17批次2018名医务人员支援湖北武汉和荆门,实现了“打胜仗、零感染”,全面完成国家对口罩、防护服等应急物资的调拨指令;认真做好稳侨安侨暖侨工作和医疗队援助意大利工作。
(二)稳企业稳增长成效明显。“争先创优”行动助推经济强劲反弹,经济增速由一季度的-5.6%快速回升到二季度的5.8%,上半年增长0.5%,前三季度增长2.3%。以“减税减费减租减息减支”共克时艰,中央财政资金“直达市县基层、直接惠企利民”任务精准高效落实,全年为企业减负4800亿元,比年初预计的2700亿元多出2100亿元。金融支持实体经济发展力度空前,民营经济、小微企业贷款分别新增9960亿元和7887亿元,增量分别是上年的2倍和1.7倍,首贷、信用贷、无还本续贷规模居全国前列,非金融企业债券发行额9068亿元,增长59.4%。经济金融领域重大风险有效防控,企业债券违约风险、上市公司股权质押风险和企业“两链”风险稳步化解,年末不良贷款率0.98%,非法网贷机构全部出清。外贸外资稳中有升,出口25180亿元、增长9.1%,占全国份额由上年的13.4%提高到14%;实际使用外资158亿美元、增长16.4%。扩投资促消费有力有效,“六个千亿”产业投资工程深入实施,全社会固定资产投资增长5.4%;“放心消费在浙江”行动助力消费提振,数字生活服务成为新亮点,社会消费品零售总额26630亿元,比上年下降2.6%,比全国平均降幅少1.3个百分点。
(三)科技创新产业升级取得重要进展。“互联网+”、生命健康、新材料三大科创高地加快建设,杭州城西科创大走廊建设加力加速,之江实验室、西湖实验室纳入国家实验室建设序列,首批省实验室启动建设;实施“尖峰、尖兵、领雁、领航”计划,形成73项自主可控进口替代成果;实施“鲲鹏行动”,新引进培育领军型创新创业团队35个。成功举办第二届世界青年科学家峰会。数字经济逆势成长,核心产业增加值增长13%,工业互联网平台体系初步建成,企业上云积极推进,累计建成5G基站6.26万个,实现县城以上及重点乡镇全覆盖。制造业发展动能增强,传统产业改造提升2.0版全面实施,产业基础再造和产业链提升工程积极推进,新培育认定首台(套)产品263项;雄鹰行动、凤凰行动、雏鹰行动深入实施,新增单项冠军企业33家、上市公司86家,入围世界500强企业5家,新增高新技术企业6449家、科技型中小企业16032家;实施新时代工匠培育工程,首届浙江技能大赛成功举办。
(四)长三角一体化发展和“四大建设”迈出新步伐。长三角一体化发展国家战略加快落地,250个重大项目建设顺利推进,长三角生态绿色一体化发展政策率先实施,浙沪洋山合作开发有序推进。大湾区平台能级提升,各类开发区和产业集聚区全面优化整合,万亩千亿新产业平台实现增点扩面,新设金义新区和台州湾新区。大花园建设扎实推进,浙东唐诗之路启动建设,十大名山公园、十大海岛公园加快打造,培育千万级大景区12家。大通道建设明显提速,铁路和轨道交通投资增长42.5%,商合杭、衢宁等铁路建成投运,杭绍台等一批铁路加快推进,通苏嘉甬、甬舟、沪苏湖、衢丽等铁路动工建设;杭州绕城西复线、千黄高速、龙丽温高速文泰段等建成通车。大都市区建设稳步推进,杭绍甬、嘉湖、衢丽花园城市群一体化积极推进,甬舟一体化发展方案全面实施;特色小镇建设、小城市培育、未来社区试点取得积极成效,城市有机更新进一步加强,棚改开工11.6万套,老旧小区改造开工622个。
(五)改革开放实现新突破。“最多跑一次”改革走向纵深,56件个人和企业全生命周期事项实现“一件事”全流程办理,机关事业单位人员职业生涯全周期管理“一件事”改革全面完成。营商环境不断优化,深化“证照分离”改革,企业开办时间压缩至1个工作日,实现一般企业投资项目审批“最多80天”,国际贸易进出口业务全部实行“单一窗口”办理;以信用为基础的新型监管机制加快建立,实现“信用差多检查、信用好不打扰”。重点领域改革多点突破,“亩均论英雄”改革、“多规合一”改革加快推进,事业单位改革全面完成,省属国有企业混改率达77%、资产证券化率达65%。“一带一路”重要枢纽建设取得阶段性成效,自贸试验区建设加快推进,新增宁波、杭州、金义三个片区;“义新欧”班列开行1399列、增长165%;新增湖州、嘉兴、衢州、台州、丽水跨境电商综试区和湖州、绍兴、台州市场采购贸易方式试点。
(六)乡村振兴势头良好。“米袋子”“菜篮子”责任压紧压实,新建高标准农田64.9万亩,粮食总产121.1亿斤,创五年新高;新建万头以上规模化猪场157个,生猪存栏增加到628万头。“千万工程”名片持续擦亮,培育美丽乡村示范县11个、示范乡镇100个、特色精品村300个,农村人居环境测评全国第1;实施乡村全域土地综合整治工程572个,新建和改造“四好农村路”超8000公里,新增384万农村居民喝上达标饮用水;新时代美丽乡村集成改革试点启动实施。
(七)文化建设扎实推进。社会主义核心价值观深入人心,新时代文明实践中心试点扎实开展,农村文化礼堂实现“建管用育”一体化,覆盖率和惠民度进一步提升,11个设区市全部跻身全国文明城市、全部创成全国双拥模范城。优秀传统文化在传承中发展,大运河国家文化公园加快建设,良渚古城遗址等世界遗产得到有效保护和传承利用,宋韵文化品牌塑造成效初显。文化旅游加快融合,“百县千碗”品牌进一步打响,成功创建省级文旅产业融合试验区25个。
(八)生态文明示范创建持续深化。环境质量持续改善,县级以上城市空气质量六项指标首次全部达标,省控断面I—Ⅲ类水质占比提高3.2个百分点,受污染耕地安全利用面积138.4万亩,新增年危险废物利用处置能力144万吨,城镇垃圾分类覆盖面达到91.5%。生态系统保护力度加大,山水林田湖海生态保护修复工程加快实施,完成造林57万亩,发布全国首个省级生态系统生产总值核算技术规范。
(九)富民惠民安民取得新成效。就业、社保和增收工作进一步加强,城镇新增就业111.8万人,城镇调查失业率4.3%;医保支付方式改革全面实施,实现了提升医疗服务质量和节约医保基金的双目标,企业职工基本养老保险省级统筹制度得到规范;低收入农户收入增长14%。教育发展改革持续推进,新建和改扩建农村普惠性幼儿园193所、新增学位50679个,一乡镇一公办中心园实现全覆盖,义务教育招生制度改革全面落实。健康浙江行动深入实施,高血压糖尿病“两慢病”纳入全生命周期健康管理,12种慢病纳入城乡居民门诊保障范围;建成乡镇(街道)居家养老服务中心385家,新增3岁以下婴幼儿照护服务机构342家、新增托位14627个,“一老一小”服务稳步提升;公共体育提质扩面,杭州亚运会、亚残运会筹备工作扎实推进。平安建设不断深化,坚持和发展新时代“枫桥经验”,县级社会矛盾纠纷调处化解中心实现县(市、区)全覆盖,全省信访量下降28.5%;扫黑除恶专项斗争深入推进,打掉黑恶团伙3474个;海塘安澜千亿工程全面启动,新开工建设海塘171公里,成功应对新安江水库建库以来最大洪水;完成安全生产综合治理三年行动,生产安全事故起数和死亡人数均下降22%,道路交通事故起数下降3.9%、死亡人数下降16.1%,火灾起数下降23.6%、死亡人数下降50%;食品、药品安全满意率分别从上年的83.8%、85.6%,提高到85.9%、87.8%。
(十)政府治理水平进一步提升。政府数字化转型走深走实,“浙里办”“浙政钉”“浙里督”迭代升级,推出了一批场景化的多业务协同应用,“互联网+监管”持续推进,初步建成“掌上办事之省”“掌上办公之省”。法治政府加快建设,综合行政执法改革率先突破,行政复议改革模式在全国推广,完成“七五”普法。廉洁政府建设全面加强,认真落实中央八项规定精神,持续推进正风肃纪,基层减负收到了良好效果;压减政府一般性支出571亿元,将有限的财力用在惠企利民上。
各位代表!2020年主要目标任务的完成,标志着“十三五”发展胜利收官。五年来,我们深入学习贯彻习近平新时代中国特色社会主义思想,认真贯彻党中央决策部署,攻坚克难,砥砺奋进,高水平全面建成小康社会取得决定性成就。经济总量跃上6万亿元台阶,年均增长6.5%;一般公共预算收入从2015年的4810亿元增加到7248亿元,年均增长8.5%;城镇和农村居民收入分别跨上6万元、3万元台阶,年均分别增长7.5%、8.6%;人均预期寿命由78.3岁提高到79.2岁;群众安全感满意率稳定在96%以上。
这五年,我们全面践行创新发展理念,发展动能和质量显著提升。全省研发经费支出占生产总值比重从2.3%提高到2.8%,高新技术企业从6437家增加到22158家,高新技术产业增加值占规上工业比重从37.2%提高到59.6%,创新型省份建设走在全国前列。数字经济领跑全国,核心产业增加值占比达到10.9%,规上工业亩均增加值从93.9万元提高到136万元、亩均税收从18.7万元提高到27.5万元。“最多跑一次”改革和政府数字化转型取得重大突破,浙江成为审批事项最少、管理效率最高、服务质量最优的省份之一。
这五年,我们全面践行协调发展理念,城乡区域协调发展水平不断提升。城乡面貌日新月异,常住人口城镇化率从65.8%提高到71%,率先基本实现城乡同质饮水,低收入农户同步迈向高水平全面小康,城乡居民收入倍差从2.07倍缩小至1.96倍。新增高速公路1179公里、高铁325公里,实现陆域“县县通高速”,“四好农村路”建设成为全国示范。山区绿色发展、生态富民步伐加快,26县中有18个县经济增速高于全省平均,25个县城乡居民收入增速高于全省平均。
这五年,我们全面践行绿色发展理念,生态环境质量明显提升。美丽浙江建设持续推进,提前三年完成消除劣Ⅴ类水质断面任务,设区城市空气质量优良天数比例提高9.5个百分点,万元生产总值能耗从0.45吨标煤降至0.37吨标煤,森林覆盖率上升至61.2%,浙江山更青、水更绿、天更蓝、地更净,成为首个通过国家生态省验收的省份。“千万工程”获联合国地球卫士奖。
这五年,我们全面践行开放发展理念,对外开放能级加快提升。出口占全国份额提高1.9个百分点,累计实际使用外资656亿美元、增长38%。自贸试验区获批建设并实现赋权扩区,油气全产业链加快形成;跨境电商综试区实现设区市全覆盖,交易额居全国第2。宁波舟山港货物和集装箱吞吐量稳居全球第1和第3,机场旅客吞吐量突破7000万人次。G20杭州峰会及多届世界互联网大会成功举办,极大提升了浙江的国际影响力。
这五年,我们全面践行共享发展理念,人民群众获得感稳步提升。实现“两不愁三保障”突出问题、家庭人均年收入8000元以下情况、集体经济薄弱村“三个清零”,最低生活保障标准平均从每月农村570元、城镇653元,提高到城乡同标886元。学前3年到高中段的15年教育普及率达99%以上,高等教育毛入学率由56%提高到62.4%。人民群众精神文化生活更加丰富。结对帮扶的省外80个贫困县如期实现脱贫“摘帽”。
各位代表,“十三五”时期取得的成绩来之不易。这是以习近平同志为核心的党中央坚强领导的结果,是习近平新时代中国特色社会主义思想科学指引的结果,是中共浙江省委带领全省人民团结奋斗的结果。在此,我代表省人民政府向全省人民、广大建设者,向人大代表、政协委员、各民主党派、工商联、人民团体和社会各界人士,表示衷心的感谢!向中央驻浙单位、驻浙人民解放军、武警部队官兵、公安干警、消防救援队伍,表示衷心的感谢!向关心支持浙江发展的港澳同胞、台湾同胞、广大侨胞和海内外朋友们,表示衷心的感谢!
同时,我们也清醒地看到,我省经济社会发展中还存在不少困难和问题,主要是:经济高质量发展的基础尚不稳固,战略性新兴产业还未形成有力支撑,传统产业改造提升不够快;科技创新能力还不够强,关键核心技术“卡脖子”比较突出;城乡、区域发展不平衡不充分问题仍然存在;资源环境承载力不足,产业结构、能源结构还不能适应低碳发展要求;教育、医疗、养老、住房、环境保护、食品药品安全、城市治堵等方面还存在不少短板;金融、网络、供应链、安全生产等领域还存在风险隐患,一些领域的监管还存在薄弱环节,疫情冲击导致的各类衍生风险需要高度警惕,防范化解风险任务依然艰巨。一些政府工作人员办事质量和效率不高、服务意识不强,工作不实、不细等形式主义、官僚主义现象仍不同程度存在。我们一定要直面困难和问题,敢于担当、善于作为,采取更有针对性的措施,持之以恒加以解决。
二、“十四五”时期的主要目标和任务
“十四五”时期,是我国开启全面建设社会主义现代化国家新征程的第一个五年。省政府认真学习贯彻党的十九届五中全会精神,根据中共浙江省委“十四五”规划《建议》,编制了《浙江省国民经济和社会发展第十四个五年规划和二〇三五年远景目标纲要(草案)》,提请大会审议。经本次大会批准后,省政府将认真组织实施。
“十四五”时期经济社会发展的指导思想是:坚持以习近平新时代中国特色社会主义思想为指导,深入贯彻党的十九大和十九届二中、三中、四中、五中全会精神,全面贯彻党的基本理论、基本路线、基本方略,统筹推进“五位一体”总体布局,协调推进“四个全面”战略布局,坚持党的全面领导,坚持以人民为中心,坚持立足新发展阶段,坚持贯彻新发展理念,坚持深化改革开放,坚持系统观念,坚持稳中求进工作总基调,以推动高质量发展为主题,以深化供给侧结构性改革为主线,以改革创新为根本动力,以满足人民日益增长的美好生活需要为根本目的,忠实践行“八八战略”,奋力打造“重要窗口”,统筹发展和安全,率先探索构建新发展格局的有效路径,率先建设现代化经济体系,率先推进省域治理现代化,率先推动全省人民走向共同富裕,实现更高质量、更有效率、更加公平、更可持续、更为安全的发展,更加彰显生态之美、人文之美、和谐之美、清廉之美,全面提升人民群众获得感、幸福感、安全感,争创社会主义现代化先行省。
“十四五”时期经济社会发展的主要目标是:在质量效益明显提升基础上实现经济社会持续健康高质量发展,到2025年,全省生产总值、人均生产总值分别突破8.5万亿元、13万元,数字经济增加值占生产总值比重达到60%左右,常住人口城镇化率达到75%左右,研发经费支出年均增长12%、占生产总值比重达到3.3%左右,人均预期寿命超过80岁,城乡居民收入倍差缩小到1.9倍,居民综合阅读率达到92.5%,以中等收入群体为主体的橄榄型社会结构基本形成,城乡区域发展差距和居民生活水平差距持续缩小,努力打造经济高质量发展高地、三大科创高地、改革开放新高地、新时代文化高地、美丽中国先行示范区、省域现代治理先行示范区、人民幸福美好家园。
实现上述目标,必须做到“五个坚定不移”:
坚定不移推动高质量发展。贯彻新发展理念,探索构建新发展格局有效路径,深化供给侧结构性改革,提供高质量产品和服务,加强需求侧管理,大力推进科技创新,加强“卡脖子”技术攻关,深化数字浙江建设,建设现代化经济体系,实现发展规模、速度、质量、结构、效益、安全相统一。
坚定不移促进高水平均衡。坚持城乡融合、陆海统筹、山海互济,推进新型城镇化和乡村振兴战略,在协调发展中拓宽发展空间,在加强薄弱领域中增强发展后劲,想方设法解决城乡差距、地区差距、收入差距等问题,率先突破发展不平衡不充分问题,率先走出促进全省人民共同富裕之路。
坚定不移创造高品质生活。从群众最关心的地方做起,把群众最需要的事情做实,努力在更高水平上实现幼有所育、学有所教、劳有所得、病有所医、老有所养、住有所居、弱有所扶,不断实现人民对美好生活的向往和更高品质精神文化需求,让人民群众的获得感成色更足。
|
[
"3.6%。"
] | 7,348
|
multifieldqa_zh
|
zh
| null |
d982b054f226d4ed1ccc41c2e42df05e1c62449d1b85e726
|
2010年全市农村自来水入户户数是多少?
|
2010年铜川市人民政府工作报告
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和其他列席人员提出意见。
一、2009年工作回顾
2009年,面对国际金融危机的严重影响,全市上下在市委的正确领导下,认真贯彻落实“保增长、保民生、保稳定”的各项政策措施,坚定信心,克难攻坚,全面完成了市十四届人大五次会议确定的各项任务,继续保持经济快速发展的良好势头。全年实现生产总值155.86亿元,增长15.2%,增速居全省第一位;财政总收入21.06亿元,增长31.5%,其中地方财政收入10.08亿元,增长34.3%,增速居全省第一位,提前实现了省委、省政府提出的“十一五”末财政总收入达到20亿元的目标;城镇居民人均可支配收入13717元,增长24.6%,增速居全省第二位;农民人均纯收入3968元,增长20.5%,增速居全省第三位。
(一)重大项目建设取得新成效。把抓项目、抓投资作为保增长的重中之重,争取到国家政策性项目资金6.74亿元。全市固定资产投资完成88.12亿元,增长39%。市级65个重点项目有20个完工或基本完工,完成投资45.8亿元。采煤沉陷区治理累计完成投资12.2亿元,主要建设项目基本竣工。满意日产4500吨和声威第二条日产4500吨水泥熟料生产线、旺仔牛奶生产线等11个重大项目建成投产。陕煤化集团PVC管材、陕煤建司管件设备厂迁厂扩建、铜铝公司3万吨铝合金棒等20个重点项目开工建设。与陕煤化集团、陕有色集团签订的总投资150亿元的航汽铝工业园项目启动实施。延安大学铜川校区、陕西体育专修学院等项目前期工作进展顺利。
(二)工业经济保持较快增长。出台了工业保增长十条措施,落实省、市财政贴息1398万元,协调企业贷款6亿元,全力以赴帮助企业渡过难关。全市规模以上工业实现增加值79.57亿元,增长13.8%。主要工业产品电解铝产量23万吨,增长6.8%;煤炭1915万吨,增长4.2%;水泥748万吨,增长3.5%;水泥熟料590万吨,增长9.5%。工业产销率达到94.6%,较年初最低时回升5.6个百分点。
(三)“三农”工作扎实推进。全年粮食总产23.3万吨,增长1.3%;新栽水果15.46万亩、干杂果5.98万亩,农民人均达到4.5亩果。水果总产47.1万吨,优果率达到79%。印台区被评为省级一县一业苹果示范区。新增奶牛3334头,肉、蛋、奶产量分别增长39.9%、65.3%和35.5%。在40个村实施互助资金试点。投资1.4亿元,完成移民搬迁7236人。新建通村油路和水泥路377公里、通乡油路137.4公里,90%的行政村开通了班车。新修基本农田3.8万亩,土地开发整理新增耕地4100亩。农村自来水入户1.12万户,解决了5.11万人的饮水安全问题。新建农村户用沼气池4110口。龙潭水库开工建设。农村土地经营权流转6.47万亩,占耕地面积的7.5%。植树造林35.05万亩,治理水土流失163.1平方公里,森林覆盖率达到44.8%。我市荣获陕西省绿化模范城市称号。出台了加快推进县域工业化、城镇化等政策措施,全市三个区均获“陕西省城区经济社会发展争先进位奖”。
(四)消费市场稳中趋旺。成功举办了玉华冰雪节、药王养生文化节等活动。药王山、照金香山、玉华宫等景区旅游基础条件得到改善。全年接待国内外游客430万人次,旅游综合收入6.5亿元,分别增长17%和25%。新开工住宅117.8万平方米,竣工54.6万平方米,分别是上年的2.9倍和2倍;房地产交易额7.2亿元,增长157%。建成“新网工程”连锁店120个、“双百市场”2个,家电下乡百户购买率达到18%。全社会消费品零售总额39.48亿元,增长17.7%。
(五)节能减排工作取得新突破。建筑节能改造18万平方米。药王山周边水泥粉尘污染治理工程完成投资1.15亿元,区域环境面貌明显改观。关闭了骊山水泥厂、市水泥厂、东风建材厂的水泥生产线,淘汰落后产能120万吨,在全省率先实现水泥生产无旋窑落后工艺、无立窑的目标。投资8300万元实施煤烟污染治理,改造燃煤锅炉89台,新建清洁能源锅炉40台。全市万元生产总值能耗下降5.84%,化学需氧量、二氧化硫排放量分别削减2.7%和4%。市区空气质量二级以上天数334天,其中一级以上天数增加11天,空气质量持续好转。
(六)城市化步伐明显加快。规划建设八个工业园区,拉大城市框架。新区基础设施完成投资4.3亿元,建成长宁南路、朝阳西路、太阳商城西区道路、南部工业园区部分道路及排水工程。新时代商业广场建成营业。完成了北市区一、二马路路灯改造和玉华路人行天桥、3个城市街头广场建设任务,铺设人行道7.4万平方米。更新和增加城市公交20辆。发展天然气用户5316户,城市气化率达到69%。新增城市绿地50万平方米,城市绿化覆盖率达到39.4%。新耀垃圾无害化处理一期工程基本建成,新耀污水处理工程完成总投资的55%。23个建制镇完成基础设施建设投资4700万元。
(七)改革开放不断深化。秦岭水泥公司破产重整工作基本完成,西北耐火材料厂等6户企业政策性破产后续工作进展顺利。处置了企业在资产经营公司的11亿元债务。医药卫生体制、文化管理体制改革有序推进。基本完成集体林权制度主体改革任务。54个部门完成会计集中核算向国库集中支付的转轨。非公有制经济增加值占到生产总值的41.06%,提高了3.64个百分点。签约招商引资项目102个,到位资金42.18亿元。全市金融机构各项贷款余额80.83亿元,增长15%。与6家金融机构签署了5年投放90亿元的政银战略合作协议,到位资金10亿元。
(八)民生工程建设取得新进展。实施民生工程项目1282个,完成投资13.38亿元。投资1.37亿元,完成了60所农村初中校舍改造、161所中小学校舍安全工程建设任务。“蛋奶工程”受惠学生3.3万人。王益区“双高普九”通过省上评估验收。落实资金7356万元,对2.85万名家庭经济困难中小学生进行补助。开发科技成果7项,推广转化科技成果10项。率先在全省实现规范化村卫生室全覆盖,新农合参保率93.1%,位居全省前列。认真落实计生家庭奖励优待等政策,实施农村已婚育龄妇女健康检查项目,全市人口自然增长率4.34‰。市图书馆二期工程基本竣工,6个乡镇综合文化站和20个村文化室建成使用。开展了庆祝建国60周年系列文化活动,耀州区荣获全国文化先进区称号,宜君县被命名为省级文明县城。新发展数字电视用户1.9万户。完成了44个村农民体育健身工程,成功举办了市第十届运动会。新增城镇就业1.59万人,城镇登记失业率4.2%;转移农村劳动力7.5万人。发放小额担保贷款2.3亿元。城镇职工医疗保险实现市级统筹,解决了1.3万名国有困难企业离退休人员的医疗保险问题。保障农村低保对象3.79万人、城镇低保对象7.32万人。农村五保供养标准提高到每人每年1856元。为265名城镇退役士兵发放自谋职业资金581.4万元。为高龄老人发放了保健费补贴。发放个人住房公积金贷款1.4亿元,增长125%。开工建设廉租住房18.23万平方米,竣工4.86万平方米,保障低收入家庭3747户。为5471户居民发放住房租赁补贴817.9万元。开工建设经济适用住房35.27万平方米,竣工24.89万平方米。投资2400万元,对李家塔地区危险地段812户群众实施搬迁,解决了矿区1720户群众用水问题。完成了青年路、三里洞棚户区改造任务和川口、小河沟等6个棚户区改造一期工程。
(九)政府自身建设不断加强。坚持依法行政,自觉接受人大和政协的监督。在价格管理、药品监管、文物保护等10个方面专题向市人大常委会报告工作,办理人大代表建议101件、政协提案166件。定期向老干部、民主党派和各界人士通报工作情况,主动听取意见。扎实开展大接访、信访积案化解活动,赴省集体访、进京非正常访人数分别下降63%和8.9%。强化重点行业和领域的安全监管,健全公共突发事件应急机制,加强社会治安综合治理,全市社会大局和谐稳定。深入开展学习实践科学发展观活动,加快政府职能转变,强化行政监察、审计监督和工作督查,全面落实党风廉政建设责任制,努力改进作风,政府机关的服务水平和工作效率不断提高。
司法、统计、盐务、质监、税务、人防、地震、气象、档案、外事、残联、慈善、民族宗教等工作都取得了新的成绩。
各位代表,这些成绩的取得,是市委统揽全局、科学决策的结果,是市人大、市政协和社会各界强化监督、大力支持的结果,是全市人民同心同德、共克时艰、狠抓落实的结果。在此,我代表市人民政府,向奋战在全市各条战线上的广大干部群众、驻铜部队指战员、武警官兵、公安干警以及中省驻铜各单位致以崇高的敬意!向大力支持政府工作的各位代表、各位委员和社会各界人士表示衷心的感谢!
在充分肯定成绩的同时,也要清醒地看到存在的问题,主要是:资源性产业比重大,环境容量有限,调整产业结构和转变发展方式日益紧迫;骨干项目少,项目落地难、推进慢的问题依然突出;县域经济实力不强,非公有制经济发展不足,城乡居民收入水平仍然不高;安全生产和维护稳定的压力较大;政府职能转变、作风建设还需进一步加强等。对此,我们一定要采取有力措施加以解决。
二、2010年主要任务
今年是实施“十一五”规划的最后一年,也是我市加快推进城市转型的关键之年。做好今年的工作,对于保持经济平稳较快发展、全面实现“十一五”规划目标具有十分重要的意义。
总体上看,今年的经济发展环境好于去年,但面临的形势仍然复杂。我们既要看到不利因素,更要看到加快发展的难得机遇和有利条件。一是国家出台了应对金融危机保持西部地区经济平稳较快发展的意见,全面实施关中—天水经济区发展规划,启动实施陕甘宁革命老区振兴规划,为我们加快发展提供了良好的外部环境。二是省政府出台了促进铜川资源型城市可持续发展的若干意见,我市将在政策、项目和资金等方面获得中省的大力支持。三是铜川与中省大企业、大集团的合作进一步加强,与华能集团、国电集团、陕煤化集团、陕有色集团、陕汽集团、陕投集团等签订了一系列战略合作协议,为铜川今后一个时期的发展奠定了基础。四是经过多年的实践探索,逐步走出了一条符合铜川发展实际的路子,全市上下抓机遇、谋发展、促和谐的能力不断增强,这是我们加快发展的重要保证。
今年经济社会发展的主要预期目标是:生产总值增长13.5%,固定资产投资增长30%,财政总收入和地方财政收入增长18%,城镇居民人均可支配收入和农民人均纯收入增长16%,城镇新增就业1.5万人,城镇登记失业率控制在4.5%以内,居民消费价格涨幅3%左右,人口自然增长率控制在5.5‰以内。
全面完成上述目标任务,必须认真贯彻党的十七届三中、四中全会精神和省委十一届五次全会、市委十届六次全会精神,以科学发展观为指导,以资源型城市转型为主线,走扩大内涵、创新发展的路子,把绿色经济、低碳经济、循环经济作为新的发展理念,把加快资源转化和壮大新兴产业作为结构调整的主攻方向,把园区建设作为推进工业化、城镇化的战略重点,把开展项目建设落实年活动作为重要抓手,把保障和改善民生作为根本目的,把确保生产安全和社会和谐稳定作为第一责任,全力做好以下九项工作:
(一)以实施关中—天水经济区发展规划为契机,加快铜川大城市建设步伐
围绕建成区人口达到55万、面积达到60平方公里的大城市目标,构筑“北市区—黄堡—董家河—耀州区—新区—坡头”大城市格局。主动融入西安大都市圈,增强城市综合实力和竞争力。
扩大城市规模。根据关中—天水经济区发展规划,以西铜同城化发展为目标,编制城市区域空间规划。强化规划的指导作用,加大项目策划包装力度,提升城市资产运营效益。超前做好重大基础设施项目策划和实施工作,加快西铜、铜黄高速第二通道铜川段工程建设进度。力争凤(翔)合(阳)高速公路和耀旬二级公路开工建设。启动铜川铁路连接线项目和西铜城际铁路项目前期工作。
完善城市功能。坚持南市区开发建设与北市区改造提高并重、内涵发展与外延扩张相结合,加快推进城市建设。完成新区长青南路、铁诺南路等道路建设任务,开工建设西环路、华原西道、北环西段等道路,改造咸丰路、长虹路等道路非机动车道。启动新区物流园区、会展中心项目建设。加大耀州区旧城改造和新区城中村改造力度。改造提升樱花苑和金谟广场,扩建新区牡丹园。加快实施城市供水、污水管网改造工程,开工建设北市区垃圾处理厂。完成芳草路路桥建设项目前期工作,实施外贸路路桥等城市道路工程,努力改善北市区城市路网结构。
不断提升城市品位。实施国家卫生城市、国家绿化模范城市和省级园林城市创建工作,力争用2-3年时间实现创建目标。启动数字化城市管理系统建设工程。加快新川、东风、骊山和市水泥厂破旧厂房拆除步伐,搞好生态恢复。大力开展背街小巷改造和小景点、小绿地、小活动场所建设。将城市架空线缆逐步并入地下。启动城市分片集中供热工程。全面完成燃煤锅炉改造任务,新建清洁燃料锅炉30台,新发展天然气用户6000户,城市气化率达到72%,市区空气质量持续好转。实施造林绿化十大工程,突出新耀连接带、新区环线道路、高速公路绿色宽幅林带、三条流域带等重点区域,造林绿化20万亩,治理水土流失150平方公里。启动赵氏河国家湿地公园建设。深入开展210国道铜川沿线环境综合整治,年度完成80%以上的治理任务,努力打造纵贯南北的景观走廊。
(二)扎实推进项目建设,保持固定资产投资的强劲增势
围绕开展“项目建设落实年”活动,继续坚持多年来行之有效的制度和措施,推动前期项目早落地、在建项目早建成、投产项目早见效,确保全年固定资产投资完成115亿元。
集中精力抓好重点项目建设。今年安排市级重点项目80个,年度完成投资80.3亿元。市级领导归口包联重点项目,抽调千名干部下企业包抓项目,实行重点项目周检查、月考核、季奖评制度。市财政安排资金2200万元,用于推进项目建设。力争陕汽零部件加工基地、陕煤化集团PVC管材、陕煤建司管件设备厂迁厂扩建、安川机电设备制造等34个项目建成投产;加快航汽铝工业园、凤凰日产4500吨水泥熟料生产线、龙潭水库、保障性住房等22个项目进度,力争超额完成年度建设任务;加快推进华能铜川电厂二期、秦岭第二条日产4500吨水泥熟料生产线、延安大学铜川校区、陕西体育专修学院等20个项目,力争尽快开工建设。抓紧做好闽商工业园、新型高分子复合材料园等项目前期工作,力争尽快付诸实施。
优化项目建设环境。简化项目审批程序,落实国债项目直通车制度。坚持供储并重、多措并举,加大土地储备力度,市级土地储备动态保持在2000亩以上。加大批而未用土地的处置力度,全力保障项目用地需求。深入整治投资环境,严厉打击阻碍项目建设的不法行为。不断拓宽融资渠道,确保争取中省政策性资金4亿元以上。
加强项目策划工作。以关中—天水经济区发展规划和省上12个产业调整振兴规划为指导,编制完成资源型城市转型规划和循环经济发展规划,精心包装一批新的产业类、基础类、民生类项目,做到申报一批、开工一批、储备一批,确保后续项目建设和投资长期稳定增长。超前谋划,抓紧编制“十二五”规划,描绘好未来五年的发展蓝图,努力在新一轮发展机遇中赢得先机!
(三)着力转变发展方式,不断壮大工业经济实力
按照“大集团引领、大项目支撑、集群化推进、园区化承载”的战略部署,加快产业结构调整和升级,做大做强传统支柱产业,培育发展新兴产业,推进新型工业化进程。
强化经济运行协调。继续坚持经济运行季度分析、重点企业旬报等制度,突出抓好重点行业、骨干企业和主要产品的跟踪分析,及时协调解决好企业在资金、市场、生产经营等方面的困难和问题。全年规模以上工业总产值完成230亿元,增长17%;增加值完成92.3亿元,增长16%。
增强企业技术创新能力。支持企业与科研院所、高等院校开展合作,加快科技成果转化,力争全年开发新产品10个、技术创新项目5个。围绕工业支柱产业,建设6个工程技术中心。组建陕西铜川建材研究院。启动国家级水泥质检中心建设。以麟字特种电源公司为依托,做大做强大功率LED光源产业。推进信息化与工业化融合,提高工业企业重点生产环节的自动化、智能化和现代化管理水平。
促进产业循环发展。依托华能集团、陕煤化集团等企业,引进实施一批煤炭转化项目,发展煤电产业和煤化工,推进煤炭就地转化。加快在建的4条新型干法水泥生产线建设,力争使水泥产能超过2000万吨。千方百计保障现有发电机组满负荷运转,确保110千伏裕丰输变电工程竣工投运,开工建设110千伏柳湾输变电工程,启动铜川第四座330千伏输变电工程建设前期工作。延伸铝业产业链,大力发展高附加值的合金铝、环保型材,努力实现煤电铝产业产值过百亿元目标。积极承接东部产业转移,建设陶瓷产业孵化基地,使建筑陶瓷产能达到2000万平方米。加大扶持力度,使食品医药、装备制造、电力电源等产业尽快成长为新的经济增长点。
加快工业园区建设。认真落实市委、市政府《关于加快工业园区建设推进城市化进程的决定》,加快新区南部、坡头、黄堡、董家河4个市级工业园区建设步伐。高起点做好园区规划,大力推进园区水、电、路、气、讯等基础设施建设,增强园区吸引力。土地、财税、投融资等政策优先向园区倾斜,重大产业项目优先向园区摆布。积极开展城乡用地增减挂钩试点,加快盘活园区存量资产。将园区开发建设和服务保障工作,纳入市级工业园区管委会、所在区县及市级有关部门年度目标考核。每个市级工业园区力争完成固定资产投资5-6亿元,生产总值增长18%以上。
继续加大节能减排力度。加快工业和建筑领域的节能新技术、新产品的推广应用,强化评估审查,从严控制高耗能、高排放行业增长,全市万元生产总值能耗下降4.9%,化学需氧量、二氧化硫排放量分别削减2%和1.5%。完成药王山周边水泥粉尘污染治理任务,推进清洁生产。新耀污水处理厂、宜君县污水处理厂、崔家沟煤矿监区生活污水处理厂建成投运,扩建西川煤矿生活污水处理设施,漆水河出市断面水质达到国家四类标准。
(四)大力推进“三化”进程,促进县域经济发展
认真落实全市县域经济工作会议精神,加快推进农业产业化、县域工业化和城镇化进程,增强县域经济实力,实现争先进位目标。
推进农业产业化发展。市本级财政安排“三农”支出8311万元,增长37.4%。实施粮食单产提升和高产创建工程,新修基本农田2.5万亩,耕地保有量147.5万亩,粮食总产稳定在20万吨。新栽水果13万亩、干杂果3万亩,大力推广四项新技术,提升果园管理水平。启动果园确权发证抵押贷款工作。实施果区人工防雹增雨基地项目,提高抗御自然灾害能力。加快养殖小区建设,推进奶牛、肉牛、生猪的规模化、标准化养殖。扩大设施农业种植规模,因地制宜发展药材、烤烟等产业。稳妥推进农村土地承包经营权流转,发展多种形式的规模经营。大力发展农民专业合作经济组织,提高农民组织化程度。
加快推进县域工业化。以惠塬、王家河、顺金、彭镇4个区县工业园区为载体,加快县域工业集中区建设,做大做强县域工业规模。加大对涉农加工企业、劳动密集型企业和大工业配套企业的扶持力度,进一步促进中小企业发展。市财政列支400万元,扶持区县工业园区建设,并根据每个园区发展情况继续加大支持力度。市开发投资公司对入园企业优先进行融资担保。区县工业园区要在招商引资、产业项目发展等方面取得突破,确保每个园区完成基础设施投资2亿元以上。
积极推进城镇化进程。下放管理权限,创新推进城镇化的体制机制,加快宜君县城和坡头、黄堡、董家河、照金、陈炉、红土等重点镇建设,力争重点镇基础设施建设完成投资2.3亿元以上。完成县乡公路60公里、通村公路200公里,全市所有行政村通达油路或水泥路,新投放通村客运车辆150辆。启动建设20个新农村示范村。实施20个扶贫开发重点村建设,移民搬迁4500人。解决农村3万人安全饮水问题,力争用两年时间让全市农村群众都喝上放心水。积极实施农村清洁工程,改善生产生活条件。鼓励符合条件的农业转移人口逐步变为城镇居民,让农民有一个幸福生活的美好家园。
(五)加快服务业发展,增强消费需求的拉动作用
全面落实促进消费的各项政策,努力扩大消费需求。全社会消费品零售总额完成47亿元,增长19.2%。
切实提升消费能力。认真落实中、省增加居民收入的各项政策,努力增加城乡居民特别是低收入群众的收入。提高企业退休人员基本养老金、部分优抚对象待遇和城乡居民最低生活保障水平,实施公共卫生与基层医疗卫生事业单位绩效工资。继续做好家电、汽车、摩托车、农机具下乡工作,力争家电下乡销售额增长20%以上。
进一步优化消费环境。加快实施《铜川市城市商业网点总体规划》,在提升北市区商业服务水平的同时,抓好南市区特别是新区商业网点布局和建设。加快建设九洲国际大厦、正阳国际广场等项目,做好渭北现代建材城、新区陶瓷贸易集散地的规划和项目争取工作。改造提升省级重点镇所在地的供销社,加快农产品批发市场、农资物流配送网点等项目建设,“新网工程”建设完成投资4600万元以上。强化市场监管,保障消费安全。
加快发展旅游产业。重点建设照金香山、玉华宫、药王山、陈炉四大景区。完成照金香山景区纪念馆扩建、英雄群雕、游客服务中心等建设项目,加快玉华宫景区综合休闲娱乐中心建设,全力推进药王山、陈炉景区综合开发与保护,完成大唐国瓷园详规编制工作,园区建设完成投资5-6亿元。大力发展乡村游和农家乐,规划建设一批示范村。继续办好玉华冰雪节、药王养生文化节等活动。全年接待国内外游客495万人次,实现旅游综合收入10.5亿元,分别增长25%和62%。力争通过2-3年的努力,形成以照金香山为中心,集红色旅游、宗教文化、休闲养生等为一体的南部旅游板块,以玉华宫为中心,集佛教文化、休闲避暑、滑雪狩猎等为一体的北部旅游板块。
(六)深入推进改革开放,增强加快发展的活力
进一步解放思想,扎实推进重点领域和关键环节的改革,形成更具活力、更加开放的体制机制。
积极推进各项改革。加大国企改革力度,继续做好市整流变压器厂、市水泥厂等企业政策性破产后续工作,加快市纺织厂、市灯泡厂、市钢铁厂等企业改革步伐。健全非公有制经济发展的体制机制,全面清理融资、土地等方面的歧视性规定。开展基层医疗机构药品“三统一”试点,完成年度医药卫生体制改革任务。完善文化创新的各项政策,推进文化体制改革。全面完成市、区县政府机构改革任务,继续推进乡镇机构改革。
加大招商引资力度。发挥企业招商引资的主体作用,落实招商引资任务,实行目标责任考核。继续实施“走出去、引进来”战略,充分发挥驻外机构和各类投资促进机构的作用,加强与友好城市、企业集团的联系,增强招商引资的针对性。加大环境整治力度,强化对引进企业的服务,促进以商招商;创造条件,调动中省驻铜单位再投资的积极性。筹备好厦洽会等参会工作,积极参加省上组织的赴台招商活动。全年招商引资合同利用资金45亿元以上,到位资金25亿元以上。
转变外贸增长方式。抓住中国—东盟自由贸易区全面启动的机遇,调整优化出口产品结构,重点培育苹果、服装、植物油提取等出口产品,鼓励医药、电池和管件等有出口潜力的产品实现自营进出口。力争全年实现外贸进出口额1500万美元。
(七)做好财政金融工作,强化支撑发展能力
坚持政府推动与市场机制相结合,充分发挥公共财政的引导作用,最大限度地撬动社会投资,为加快发展提供强有力的资金保障。
狠抓增收节支工作。认真落实国家税费改革政策,支持企业加快发展,做强支柱财源,做大后续财源,培育新的增长点。依法加强税收征管,做到应收尽收。加大价格调节基金、水土流失资源补偿费等非税收入的管理力度。继续深化部门预算改革,加快国库集中支付改革步伐,将市级所有单位纳入改革范围。严格控制一般性支出,保障发展需求。
创新资金投入方式。捆绑使用“三农”、民生、社会事业等方面的资金。充分发挥财政资金的引导作用和乘数效应,逐步建立以贴息担保、参股和风险投入为主的投入机制。尝试设立各类产业发展资金和创业投资引导资金,建立担保风险补偿机制,运用市场手段,加快优势资源开发和主导产业发展。
加强金融和融资工作。积极推进信用担保公司、小额贷款公司建设,尽快盘活划拨市开发投资公司的资产,加大信贷资金支持实体经济的力度。拓宽融资渠道,尝试发行企业债券。强化投融资平台建设,深化与国家开发银行、省农行和省信用联社等金融机构的战略合作,不断扩大政府信用贷款规模。深入推进金融生态环境建设,为金融企业营造良好的发展环境。加强对市级金融机构的考核,全年新增贷款30亿元,较上年增长35%。
各位代表,铜川正处在城市转型的关键时期,经济发展面临诸多困难,财政刚性支出不断增加,保民生、上项目、搞建设的压力很大。我们一定要在用好财政资金的同时,解放思想,转变观念,加大融资力度,以更多更好的融资成果为铜川发展注入新的“血液”,增添新的动力。
(八)切实保障和改善民生,维护社会和谐稳定
今年安排民生工程项目1736个,计划完成投资16.55亿元。继续加大公共财政投入,优先配套民生项目资金,切实做好解民忧、惠民生的各项工作。
千方百计扩大就业。认真落实促进就业的各项政策措施,抓好大学毕业生和返乡农民工创业、就业困难人员就业援助等工作,鼓励自主创业、自谋职业等灵活就业。全年发放小额担保贷款1亿元。开工建设市级人力资源市场。大力实施人人技能工程,全年职业技能培训1.5万人,劳务输出5.5万人。
全力做好社会保障工作。市本级财政安排社会保障资金1.11亿元,增长9.6%。探索建立统筹城乡的社会保障体系,稳妥推进农村新型养老保险试点,认真落实养老保险接续转移、医疗保险异地结算等政策。逐步解决城镇集体企业未参保超龄人员和农村电影放映员、代理教师、农技人员、医疗卫生人员的基本生活保障问题。推行新农合门诊统筹,财政补助标准由100元提高到120元。城市低保由每人每月187元提高到193元,农村低保由年人均785元提高到1196元,农村五保供养由年人均1856元提高到2104元,城乡低保做到动态管理下的应保尽保。落实好国家生源地助学贷款政策,资助新录取家庭困难大学生400名、中职生3000名、高中生1000名。继续为残疾人办好“十件实事”。开工建设宜君县中心敬老院,完成1个区级、3个街道和60个农村社区服务中心项目建设。新增城市住房租赁补贴户1380户。发放住房公积金贷款1.5亿元。启动实施乡镇干部保障性住房工程。加强房地产市场调控,增加中小户型、中低价位普通商品房用地供应。加快推进中央下放煤矿棚户区改造项目,新开工建设安置房170万平方米,其中廉租房28万平方米,安置困难群众4000户。力争用2-3年时间,全面完成沉陷区滑塌区棚户区改造任务。
加快发展社会事业。投资1.17亿元,改造58所中小学的校舍和生活设施。铜川职业技术学院通过教育部教学工作水平评估验收。加大耀州区职教资源整合力度,全市中职招生5000人。印台区“双高普九”通过省上评估验收,完成王益区教育强区、耀州区义务教育均衡发展合格区创建任务。稳妥推进中小学布局调整工作。扩大“蛋奶工程”覆盖面。高度重视幼儿教育工作,50%以上的乡镇建有中心幼儿园。推广转化科技成果8项,民营科技企业技工贸收入超过4亿元。开工建设新区医院二期工程,认真实施好城乡居民健康档案、农村已婚育龄妇女健康检查、65岁以上老年人免费体检等项目。继续稳定低生育水平,全面落实计生奖励优待政策,做好流动人口计生服务工作。完成市档案馆主体工程建设任务。启动铜川体育文化艺术中心项目前期工作,实施40个行政村农民体育健身工程,为7个社区配送体育健身器材。新增数字电视用户1万户,农村电影放映7200场,完成270个自然村广电“村村通”工程。启动新区图书大厦前期工作,建成5个乡镇综合文化站,办好市第二届文化艺术节。
全力维护社会和谐稳定。深入推进社会矛盾化解、社会管理创新、公正廉洁执法三项重点工作。扎实抓好信访“三无”区县创建活动,积极建设区县联合接待大厅,落实“三个一”联合接待模式,妥善解决信访突出问题。高度重视安全生产工作,强化政府的监管责任和企业的主体责任,突出抓好煤矿、道路交通、非煤矿山安全监管,杜绝重特大事故发生。抓好中小学校和幼儿园安全工作,提高安全防范意识。继续深入开展“平安铜川”创建活动,依法防范和严厉打击各类违法犯罪行为,不断提高人民群众的安全感。完善应急预警机制,有效预防和处置各类突发公共事件。继续搞好普法教育。加大对工会、共青团、妇联等人民团体的支持力度。重视做好国防教育、双拥共建等工作。
各位代表,政府工作的最终目标是促进经济发展,保障和改善民生。我们一定要始终把民生问题作为一切工作的出发点和落脚点,努力为人民群众多办实事,多予实惠,创造更多福祉,让铜川人民生活得更有尊严!
(九)加强自身建设,努力建设人民满意的服务型政府
以转变政府职能为重点,深化行政管理体制改革,大力推进服务型政府建设,努力为各类市场主体创造公平的发展环境,为人民群众提供良好的公共服务。
坚持依法行政。严格依照法定权限和程序行使权力、履行职责,自觉接受人大及其常委会的依法监督,主动接受政协的民主监督。认真办理人大代表议案、建议和政协提案,广泛听取老干部、民主党派和无党派人士的意见,主动接受社会公众和舆论监督。强化行政问责,对失职渎职、不作为和乱作为的,严肃追究责任。各级行政机关及其公务员要自觉遵守宪法和法律,严格依法行政,努力提高政府公信力。
加快转变政府职能。不断健全覆盖全民的公共服务体系,全面增强基本公共服务能力。推进政企政事分开,支持中介组织、行业协会在社会管理和公共服务中发挥更大作用。完善重大事项集体决策、专家咨询、社会公示与听证等制度,推进决策的科学化和民主化。深化行政审批制度改革,积极推行集中审批、网上审批。完善政府信息公开制度,提高政府工作透明度。
努力改进工作作风。牢固树立服务基层、服务群众意识,不断提高工作质量。加强政府工作人员教育、培训和管理,严肃纪律,坚决纠正松、散、懒现象。认真解决企业改制、征地拆迁、劳动争议等领域损害群众利益的突出问题,保障人民群众的合法权益。大力精简会议、文件,减少应酬和事务性活动。创先争优,强化目标责任考核,加大督查力度,促进各项工作落实。
切实加强廉政建设。认真执行《中国共产党党员领导干部廉洁从政若干准则》,落实党风廉政建设责任制。强化审计监督和行政监察,加大对扩大内需第三、第四批项目的监督检查。坚持勤俭行政,反对铺张浪费,不断降低行政成本。全体政府工作人员一定要牢记宗旨,勤勉尽责,为民、务实、清廉,绝不辜负全市人民的期望。
各位代表,铜川正处在一个千载难逢的发展机遇期和经济转型时期。站在新起点,谋求新发展,实现新跨越,是历史赋予我们的神圣职责。让我们在中共铜川市委的坚强领导下,认真贯彻落实科学发展观,进一步解放思想,开拓创新,同心同德,扎实工作,为开创经济社会发展新局面而努力奋斗!
|
[
"1.12万户。"
] | 12,948
|
multifieldqa_zh
|
zh
| null |
c4fb658de4279a6edc9f352463e7064c7994ba6ffee8aa8f
|
今年我市的农民人均纯收入增长多少?
|
政府工作报告
——2012年1月14日在防城港市第五届
人民代表大会第二次会议上
市长 莫恭明
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和列席会议的同志提出意见。
2011年工作回顾
2011年是“十二五”的开局之年。在自治区党委、政府和市委的正确领导下,我市全面贯彻落实科学发展观,进一步转变发展方式,深入实施广西北部湾经济区发展规划,加快启动东兴国家重点开发开放试验区建设,团结拼搏,开拓奋进,克服资金紧张、电力不足、物价上涨等诸多困难,全市经济社会保持持续快速发展的良好势头,较好地完成了市四届人大七次会议确定的年度目标任务。
一、多项指标排全区前列,实现“十二五”良好开局
初步预计,全市生产总值突破400亿元,达418亿元,增长16%,高于全区3个百分点;财政收入突破40亿元,达44.35亿元,增长26.3%;全社会固定资产投资490亿元,增长31.5%。多项指标总量或增幅排全区前列,其中:港口
1
货物吞吐量9024万吨,海关税收超过120亿元,农民人均纯收入6500元,工业经济效益综合指数达590%,均排全区首位;外贸进出口总额、边贸成交额分别达40.5亿美元、24.5亿美元,排全区第二;生产总值、财政收入增幅排全区第三。据中国社科院2011年发布的《中国城市竞争力蓝皮书》,我市综合增长竞争力在全国294个地级以上城市中排名第七。
二、项目建设全面提速,重大基础设施不断完善
实施“项目建设提速年”,狠抓产业百项工程和重点基础设施建设,152个项目共完成投资173亿元,同比增长30%。三大项目加快推进,核电项目一期全面建设,完成投资50亿元,以自主创新技术创建国际安全施工标杆;铜镍项目一期完成投资20亿元,40万吨铜冶炼项目通过环评,铜冶炼主厂房全面施工;钢铁项目完成投资8.7亿元,建成职工休疗养中心,厂区道路、专用码头等配套工程加快推进。钦崇高速公路上思段进入路面施工阶段,南防高铁防城港段基本完成路基工程,防城至东兴高速公路、玉罗岭至李子潭一级公路、贵台至防城二级公路等一批重大交通基础设施全线施工。
三、试验区建设扎实推进,开放合作深入拓展
实施“开放突破年”,开放合作开创新局面。着力推进东兴试验区建设,试验区管委会筹备组挂牌成立并入驻京岛办公;市主要领导多次率队进京赴邕专题汇报,争取国家部委和自治区的支持;试验区实施方案已上报国家发改委,发展规划、体制机制和政策创新研究课题通过专家
2
评审;先行先试,扎实推进三大启动项目,北仑河国际商贸城动工建设,东兴—芒街跨境经济合作区已确定重点建设项目,金滩国际旅游岛项目前期工作加快。东兴口岸改造二期工程快速推进,防城港、江山、企沙等口岸联检大楼加快建设。对外交流与合作成效显著,与越南下龙市签订友好合作备忘录,与意大利热那亚市、波兰热舒夫市签署缔结国际友城意向书,成功举办防城港市首届国际文化交流活动;参加中国—东盟博览会、中国—东盟物流合作论坛等会展活动,签约项目投资额创历史新高;在东盟各国设立办事机构和投资办厂企业数量居全区第一;全市引进区外境内资金266.4亿元,增长115%,实际利用外资1.95亿美元,增长30.8%。
四、城市建设步伐加快,海湾城市特色凸显
继续以“四沿线、四片区、两景观、两改造”为重点,实施城建百项工程361项,完成投资261亿元,城市功能逐步完善,全海景生态海湾城市初具规模。全面推进城市路网建设,城市中心区、桃花湾北部片区、城南新区路网工程及北部湾大道、西湾环海大道、东湾大道等城市干道建设加快。西湾海域环境整治一期工程加快推进。桃花湾体育馆、桃花湖公园一期、市青少年活动中心竣工使用,白鹭公园基本建成。市博物馆、科技图书馆、文化艺术中心完成主体工程。北部湾财经中心、钦防高速防城港收费站及管理区改建等项目开工建设。港口汽车站、防城汽车站顺利搬迁,腾飞广场、北部湾商业中心等旧城改造项目加快推进。一批建筑面积20万平方米以上的楼盘开工
3
建设,房地产开发投资和商品房销售面积总量均排全区第五,增幅分别位居全区第二、第一。实施城乡风貌改造和村镇规划集中行动,编制完成8个乡镇总体规划方案和197个村庄规划。
五、园区经济提速发展,优势产业加快集聚
加快园区基础设施建设,企沙工业区自来水厂、220千伏中路变电站和潭松变电站,大西南临港工业园榕木江大道、污水处理厂等项目加快推进。加快打造千百亿元产业园区,园区集聚效应明显,六大园区规上工业产值达530亿元,占全市84%。大西南临港工业园入园项目91个,园区产值突破190亿元,盛隆镍合金一期项目加快建设,新磷化产业园初具规模。东湾物流加工产业园发展步伐加快,枫叶粮油及大海粮油、嘉里粮油、惠禹饲料蛋白增资扩建等项目建成投产,园区产值突破210亿元。积极扶持企业做大做强,产值超亿元企业达93家,比上年增加16家,总数居沿海三市之首,其中:大海粮油产值突破100亿元,盛隆冶金产值突破80亿元,惠禹饲料蛋白产值突破50亿元。华润水泥二期、桂人堂金花茶精深加工等26项重点技改项目竣工投产,全市完成更新改造投资73.6亿元,增长39.2%。制糖、林产林化、海产品等资源型加工业加快发展。
六、文化旅游蓬勃发展,第三产业快速提升
实施“文化旅游旺市”战略,推动文化、旅游、商贸等产业融合发展。完成旅游基础设施建设投资25.3亿元,白浪滩景区道路和接待服务设施建成使用,南山景区旅游公路建成通车,红沙群岛、皇袍山森林乐园等景区基础设
4
施逐步完善。德城国际大酒店、北港皇冠大酒店等五星级酒店加快建设。新推出红沙群岛海岛游、穿越十万大山边海游等精品线路。屏峰雨林公园创4A级景区工作通过自治区初评,西湾旅游景区、北仑河源头景区被评为3A级景区,东兴古榕度假村等16家村点被评为星级农家乐。旅游城建大篷车开进东北、华北、西北宣传推介,组织全国百家旅行社走进防城港,全年接待国内外游客685.8万人次,增长23%。成功举办京族哈节等“四大节庆”,加快建设《梦幻北部湾》海上实景演出场馆。京族独弦琴艺术被列入第三批国家级非物质文化遗产名录,那良古街保护开发工程开工建设。开展“知行合一”全民读书活动,21项文艺创作获广西“铜鼓奖”等奖项。开展“激情防城港”广场活动,组织各种文艺演出400多场。富裕路商业步行街及北部湾家具广场、月亮岛购物中心等大型商场建成开放,桃花湾集贸市场、品牌汽车冲仑4S店等专业市场开工建设,北京华联、南城百货等大型连锁超市入驻,批零住餐业快速发展,社会消费品零售总额达59.8亿元,增长18.1%;金融、通信、中介等现代服务业加快发展,预计第三产业实现增加值137亿元,增长13.8%。
七、枢纽大港实力增强,现代物流发展壮大
实施“以港立市”战略,加快建设现代化枢纽大港。加强港航基础设施建设,完成投资20.4亿元,18~22号泊位投入试运营,403~407号泊位完成码头水工工程,20万吨级进港航道通过交工验收,云约江南港区前期工作加快推进。成功拓展国际煤炭中转业务,加快打造华南煤炭储
5
备配送中心。成功开通广西首条直航东非的集装箱航线,开辟汽车整车集装箱出口业务。防城港完成货物吞吐量6168万吨,中小港完成货物吞吐量2856万吨。新增航运企业6家、船舶48艘、运力14.2万吨。东湾物流加工产业园路网、防城港东大门、市级粮食储备库、北部湾大货车物流服务中心建成使用,中外运、泰港、汇通等仓储物流基地项目加快建设。冲仑物流园建材、五金机电项目加快推进,茅岭矿业物流园启动建设。
八、全民创业活力迸发,民营经济日益繁荣
实施“全民创业年”,开展就业培训9200人次,实现农村劳动力转移就业2.1万人,城镇新增就业2.3万人,城镇登记失业率2.03%。积极破解创业资金瓶颈,发展小额贷款公司14家,实施青年和妇女创业小额贷款项目,发放创业贷款达7900多万元。新增私营企业1158户、注册资金12.7亿元,均比上年增长一倍以上;新发展个体工商户1万多户。开展全市十强私营企业和十强个体户评选表彰活动。出台扶持政策,实施微型企业发展试点,新注册微企200户。民间投资242.5亿元,增长36.6%,占全市全社会固定资产投资的49.5%,成为投资增长的主要力量。
九、三农基础不断夯实,县域经济快速发展
三农工作取得新成效。农业总产值90亿元,增长5%。粮食实现增产,甘蔗套种技术在全区推广。糖料蔗种植面积达68.8万亩,“红金系列”特色种植达145万亩,水产健康养殖基地达15万亩。防城金花茶被评为国家地理标志保护产品,华石镇火龙果基地列入全国第七批农业标准化示
6
范区。农业产业化重点龙头企业达13家,各类农民专业合作社增至136个。投资4.5亿元完善农村水利设施、村屯道路、安全饮水等基础设施,硬化农村道路220公里。完成集体林权改革。新农村示范点加快建设,“六统强基工程”、“名镇名村工程”深入实施。休闲农业发展形成新趋势,簕山等7个村被列为农业部休闲农业示范点,竹山村被评为广西休闲农业“十佳”名村,“红姑娘”红薯节入选广西十佳休闲农业名节。
县域经济实力明显提升。县域生产总值达275亿元,占全市生产总值的66%。上思县资源型产业发展取得新突破,生态旅游业发展势头良好,获评“中国氧都”,基础设施建设力度加大,全社会固定资产投资、税收增速均超过37%。东兴市全力推进试验区建设,狠抓边贸和旅游业,成功举办第五届中国边境口岸城市市长论坛等重大活动,口岸经济繁荣发展,规上工业产值增长65%以上。港口区全力服务三大项目等重大工程,农民安置区加快建设,公共配套加快完善,工业园区发展壮大,经济实力不断增强,财政收入增长28%以上,规上工业利润增长超过5倍,商品房销售面积占全市比重接近七成。防城区主动服务城建、旅游等重大项目,加大征地拆迁力度,加快旧城改造和新区开发,城市面貌明显改观;大力发展特色农业和商贸、物流业,繁荣城市经济,社会消费品零售总额占全市总量超过40%。
十、民生福祉继续改善,社会事业全面发展
民生工作成效显著。实施“民生改善年”,投资19.3
7
亿元,推进民生项目168个。在全区率先实现新型农村社会养老保险、城镇居民养老保险“全覆盖”,新农合参合率、五保供养标准均居全区前列。在全区率先实施农村义务教育阶段寄宿制学校营养改善工作。加强物价调控,实施价格临时干预,平价供应粮油等生活必需品;建立社会救助和保障标准与物价上涨挂钩机制,市本级向低收入群体发放价格补贴445万元,保障了群众的正常生活。为民办了一批实事,新建6个“菜篮子”基地;新建212个村级卫生室,实现村级卫生室标准化建设全覆盖;建成74个村级公共服务中心、93个农家书屋;开工建设保障性住房7247套,开工率100%;改造农村危旧房3677户,其中农村贫困残疾人危旧房750户;建成市流浪未成年人救助保护中心、儿童福利院和29个五保村;开工建设市老干部交流活动中心、市精神病医院;建成5个垃圾中转站和配套公共厕所;新增公共停车位4950个。
社会事业全面进步。实施“教育振兴工程”,投入2.6亿元,推进教育惠民项目35个;开工建设市委党校新校区和4所乡镇中心幼儿园,建成桃源路小学、北港小学,金海湾小学完成主体工程,成立市第三中学;职教攻坚顺利通过自治区验收,市职教中心完成主体工程。深化医药卫生体制改革,市中医医院成为我市首家“三甲”医院。实施防治艾滋病攻坚工程、母婴健康“一免二补”幸福工程和地中海贫血防治计划。计生优质服务“国优”覆盖率达75%,人口出生率14.33‰,低于责任指标1.67个千分点。参加广西第十二届运动会获金、银、铜牌各13枚,创
8
历史最好成绩。成立自治区级磷化工工程技术研究中心、盛隆新材料研究中心和广西首家红木家具专业鉴定检验室。3—20公里兴边富民行动基础设施建设大会战任务全面完成,第三批整村推进贫困村扶贫开发通过自治区验收。十万山华侨林场体制改革取得突破性进展。全面推进生态文明示范区建设,全市生态环境质量保持良好,获评“中国白鹭之乡”。“五五”普法、第六次全国人口普查均获全区先进。口岸联检、国资管理、气象服务、宗教、档案、修志、妇女儿童、残疾人、红十字、防震减灾等各项社会事业取得新成效。
社会管理进一步加强。依法做好信访工作,积极化解社会矛盾纠纷。市公安局新指挥中心建成投入使用,配备全区最先进的视频指挥系统。警务机制改革取得初步成效,信息化打防控管体制不断完善,社会治安稳控能力和水平不断提高。加强流动人口管理。强化食品药品监督管理。狠抓重点行业和领域安全专项整治,安全生产持续稳定。建立军警民联防联控联管联建机制,加强边海防管理,严厉打击走私等违法犯罪活动。加强国防教育、国防动员体系和民兵预备役建设,扎实推进双拥创建工作,第五次荣获自治区“双拥模范城”。全市社会和谐稳定,民族团结,边疆安宁,人民安居乐业。
十一、政府建设力度加大,发展环境进一步优化
政府执行力不断强化。完成各级政府集中换届工作。编制实施“十二五”规划和各专项规划。进一步理顺市与城区城市规划建设管理、学校医院管理体制和工业园区责
9
权关系。行政审批更加高效,实际办结时间比承诺时间提速11.4个百分点。每月组织一次全市项目集中联合审批现场办公会,加快了项目推进速度。30%的乡镇整合“七站八所”,挂牌建立政务服务中心,市县乡村四级政务服务体系加快构建,政务服务、政务公开和政府信息公开示范点建设卓有成效。
理财水平明显提高。强化税收征管,优化财政支出结构,全市一般预算收入28.3亿元,超额完成年初预算任务,增长24.6%;一般预算支出61.2亿元,增长16.5%。市本级重点向教育、社会保障和就业、医疗卫生、城乡社区、农林水等民生社会事业倾斜,增长均超过60%。项目融资到位资金8.4亿元。对1108个项目进行投资评审,核减不合理资金4.99亿元;投资审计节减资金6100万元;政府采购节约资金1.01亿元,做到少花钱多办事。偿还政府性债务15.25亿元,追回债权资金1亿元,提高了政府信用度。
发展瓶颈进一步破解。积极化解生产要素制约。在用电淡季鼓励企业开足马力生产,在用电高峰积极争取用电指标,科学调度,有效缓解了用电紧张局面。做好建设用地报批工作,获得用地用海2542公顷,是过去五年总和的60%。秉承“文明征地、和谐搬迁”理念,完善征地搬迁补偿安置办法,提高补偿标准,加快安置区建设,征收土地2.6万亩。实施土地整理项目18个,新增耕地579.35公顷,保证全市两年的占补平衡。清理闲置土地8300多亩,集中力量处理好一系列历史遗留问题。
10
依法行政取得新进展。坚持科学民主决策,强化行政监督和问责。自觉接受市人大的法律监督和市政协的民主监督,广泛听取社会各界意见,办理人大代表建议64件、政协委员提案368件,答复率均为100%。落实廉政建设责任制,深入开展纠风专项治理,严厉查处违法违纪案件,努力营造风清气正的良好环境。
各位代表!
过去一年,在国内外环境复杂多变和面临诸多困难的情况下,我市经济社会发展取得这样的成就,确实来之不易。这是自治区党委、政府和市委正确领导的结果,是市人大、市政协有效监督、大力支持的结果,是中直、区直单位和驻军驻警支持帮助的结果,是各级各部门和全市人民团结拼搏、真抓实干的结果。在此,我谨代表市人民政府,向全市广大干部群众,向解放军指战员、武警官兵和公安民警,向各民主党派、工商联、无党派人士、人民团体,向所有关心、支持、参与我市现代化建设的各界人士和海内外朋友,表示衷心的感谢和崇高的敬意!
在充分肯定成绩的同时,我们也清醒地看到,全市经济社会发展中存在一些不容忽视的问题,主要是:钢铁基地项目尚未大规模建设,缺乏重大产业项目投产,经济增速放缓;电力、用地和节能减排等刚性约束越来越大;城市功能不完善,第三产业发展滞后;高层次高技能人才紧缺,普通劳动力不足的问题开始显现;个别部门和工作人员服务意识、创新意识不强,办事效率不高等。针对这些困难和问题,我们将采取有效措施认真加以解决。
11
2012年工作安排
根据市第五次党代会精神和市委的统一部署,今年市政府工作的总体要求是:以邓小平理论和“三个代表”重要思想为指导,深入贯彻落实科学发展观,加快转变经济发展方式,坚持以港立市、以开放兴市、以工贸强市、以文化旅游旺市,按照“两步走”的部署,以“定格局、干大事、掀高潮、全面上”为主基调,围绕迎接建市20周年“干成20件大事,大干20件大事”的目标任务,更加突出东兴试验区建设,更加突出打造千百亿元产业,更加突出海湾城市建设,更加突出现代服务业发展,更加突出保障和改善民生,更加突出社会管理创新,奋力跨越追赶,努力争取在广西速度领先、人均领先、质量领先,以优异成绩迎接党的十八大胜利召开!
今年我市经济社会发展的主要预期目标为:地区生产总值增长15%,财政收入增长18%,全部工业总产值增长32%,全社会固定资产投资增长20%,外贸进出口总额增长15%,实际利用外资增长15%,港口货物吞吐量增长10%左右,社会消费品零售总额增长15.5%,城镇居民人均可支配收入增长12%,农民人均纯收入增长13%,居民消费价格涨幅控制在5.5%以下;城镇登记失业率控制在4%以内;人口自然增长率控制在10.5‰以内;万元地区生产总值能耗和主要污染物排放量控制在自治区要求范围内。
|
[
"13%。"
] | 7,445
|
multifieldqa_zh
|
zh
| null |
eef916bafedc4d3103c387b476675b6d465f906b82af644c
|
湛江总面积多少平方公里?
|
湛江 - 中文百科
2.1 历史概述
2.2 变迁年表
4 地理概况
4.2 面积
4.4 山脉
4.6 土壤
4.8 海岸带
4.9 潮汐
4.10 物产
6.4 房地产业
6.5 金融业
7.1 公路、铁路
7.2 港口
7.3 公交、客运
8.1 特色文化
8.2 著名旅游景点
8.3 古迹
9 医疗
10.1 中学
10.2 中专、技校
11 饮食
12 媒体
13 湛江名人
14.1 国内
14.2 国外
15 荣誉称号
16 湛江的全国全省之最
湛江海湾大桥
湛江,简称“湛”,旧称“广州湾”(Kwangchouwan)、别称“港城”,是中国广东省下辖的地级市。位于中国大陆最南端,广东省西南部,东濒南海,南隔琼州海峡与大特区海南省相望,西临北部湾,地处广东、广西、海南三省区的交汇地带。
湛江是广东省西南部的港口城市,广东西部和北部湾地区的交通中心,并将成为全国性综合交通枢纽城市。湛江是粤西和北部湾经济圈的经济中心,大西南出海通道的物流中心。是1984年全国首批对外开放港口城市。在亚太经济圈中处于重要的地缘战略位置。
2009年4月28日,湛江成功申办2014年广东省第十四届省运会。湛江的体育事业以跳水跳水。
湛江还是中国海军南海舰队司令部所在地。2010年12月广东首届海洋经济博览会暨首届湛江海洋节承办城市。
【简称】: 湛
湛江市在广东省的位置图
【别称】: 港城
【省】:广东省 【行政区类型】:地级市 【行政区划代码】:440800 【下级行政区】:4个市辖区3个县级市2个县 【政府驻地】:赤坎区
【总面积】:1.32万平方公里 【气候类型】:亚热带海洋性季风气候 【总人口】:(2009) 699.43万人 【官方语言】: 普通话 【本地语言】: 粤语、雷州话
【GDP】:(2010) 1406亿元人民币 【邮政编码】: 524038 【电话区号】: +86 (0)759 【车牌号码】: 粤G
·历史概述
今湛江辖地远在5000-6000年前的新石器时代中晚期(约夏、商之间),已有人类居住,秦始皇统一中国时,今湛江辖地归属象郡,汉代,设徐闻县辖整个雷州半岛,并为合浦郡治。唐代,“徙闽民于合州”(即雷州半岛),南宋未年,元兵南进,闽、潮沿海大批居民从海路南迁,老市区赤坎开始成埠,元以后,沿海制盐业颇兴。明清两代,手工业有较大发展,尤以葛布著名。1898年起今市区范围为法国租借,时名“广州湾”。抗日战争爆发后,沿海港口相继沦陷,作为法国租借地的广州湾(今湛江市区)偏安一隅,对外贸易和经济发展繁盛一时。1943年,日军占领后广州湾日渐衰落。抗战胜利后广州湾回归,以原范围划设市治,定名“湛江市”
·变迁年表
1943年2月,日本侵略军武装占领广州湾,曾建立极为短暂的日伪政权。
1945年9月21日,广州湾由我国收回,以原范围划设市治,定名“湛江市”。
1946年2月15日成立湛江市政府,为省辖市,并隶属广东省第七区行政督察专员公署;
1948年3月改隶第八区行政督察专员公署;
1949年5月,改隶第十四区行政督察专员公署,公署设于湛江。
1949 年10月1日,中华人民共和国成立,中国人民解放军陆续解放湛江全境。
1949年12月初,中共南路地委、广东省南路专员公署在廉江成立,辖湛江市、北海市和钦县、防城、合浦、灵山、海康、遂溪、廉江、化县、吴川、梅茂、电白、茂名、信宜县;同年12月19日,湛江解放,仍为省辖市,南路公署迁湛江市赤坎。
1950年4月1日,湛江市人民政府成立;同年8月,南路专员公署改为高雷专员公署,辖徐闻、海康、遂溪、廉江、化县、茂名、信宜、电白、梅茂、吴川县,划出合浦、灵山、钦县、防城4县设合浦专区。
1951年4月,中共粤西区委成立,驻江门市,中共高雷地委划归中共粤西区委领导。
1952年11月,中共粤西区委和粤西行政公署由江门迁至湛江市赤坎,辖湛江市和台山、开平、恩平、阳江、阳春、茂名、信宜、电白、化县、吴川、廉江、遂溪、海康、徐闻、东海县,中共高雷地委和高雷专署同时撤销。
1956年2月,中共粤西区委改为中共湛江地委、粤西行政公署改为湛江专员公署,辖湛江市和徐闻、海康、雷东、遂溪、廉江、化县、吴川、电白、阳江、阳春、信宜、茂名县。
1958年10月,中共湛江地委和合浦地委、湛江专署和合浦专署合并,改称为中共湛江地委和湛江专员公署,辖湛江市、茂名市、北海市和合浦、浦北、灵山、钦县、防城、东兴各族自治县、钦北壮族自治县、徐闻、海康、遂溪、廉江、吴川、化县、茂名、信宜、电白、阳江、阳春县。
1965年6月,国务院决定将合浦、灵山、东兴各族自治县、钦州壮族自治县和北海镇从广东省湛江专区划出,设立钦州专区,归广西壮族自治区。
1983年9月,湛江地区建制撤销,湛江市和茂名市改为省辖市,实行市领导县新体制。原湛江地区所辖的吴川、徐闻、海康、遂溪、廉江县划入湛江市;电白、化州、高州、信宜县划入茂名市;阳江、阳春县划入江门市,后又划出成立阳江市。
现湛江市辖吴川、廉江、雷州3市,徐闻、遂溪2县,赤坎、霞山、坡头、麻章4区和湛江经济开发区、东海岛经济开发试验区。
湛江市现辖4个市辖区,3个县级市,2个县。
湛江市政图
市辖区:霞山区、赤坎区、坡头区、麻章区; 县级市:雷州市、廉江市、吴川市; 县:徐闻县、遂溪县。
赤坎区 是湛江市的中心城区,也是市委、市政府机关所在地,总面积79平方公里,人口21.8万人。
麻章区 位于湛江市西部,前身是湛江市郊区,1994年10月10日经国务院批准更名为麻章区,总面积460平方公里,人口25.91万人,辖3个镇和麻章经济开发试验区。
位于湛江市东北部,东接吴川市,西与霞山区、赤坎区和遂溪县隔海相望,南濒南海,北连廉江市。1984年6月经广东省人民政府批准由湛江市郊区分出作为县级建制的市辖区。面积562平方公里,人口37.89万人。区内驻有中国海洋石油南海西部公司总部。
位于湛江市区中部,陆地面积117平方公里,其中城区面积18平方公里,常住人口35.08万人。
湛江经济技术开发区
于1984年11月经国务院批准成立,是全国首批14个沿海开放城市经济技术开发区之一。2010年初,经批准与东海岛经济开发试验区整合,实现两区合一,面积由19.2平方公里扩大到469平方公里,人口由3.99万增至24万。其中主岛东海岛面积286平方公里,是我国第五大岛、广东第一大岛,岛东部的省级旅游度假区有连绵28公里的海滩,是仅次于澳大利亚黄金海岸的世界第二长海滩,被誉为“中国第一滩”。
地处雷州半岛南部,三面环海,位于中国大陆最南端;土地总面积1862.6平方公里,其中耕地107万亩,总人口69.54万人,14个乡镇,1个街道办,其中沿海乡镇11个。
位于雷州半岛中北部,东邻湛江市麻章区,北靠廉江市,南连雷州市,西临北部湾。土地总面积2005.4平方公里,辖15个镇,人口100.16万人。耕地面积106万亩,海岸线117.9公里,林业用地面积79.1万亩。
位于雷州半岛北端。建县始于唐武德五年(公元622年),称石城县,唐天宝元年(公元742年)改称廉江县。1993年撤县设市。面积2835平方公里,人口159.06万人。
是国务院1994年批准撤销海康县而设立的县级市,地处雷州半岛中部,东濒南海,西临北部湾,北接湛江,南通海南,素有“天南重地”之称。面积 3459平方公里,人口156.61万人。水稻常年种植面积达92万亩,被称为“广东第一粮仓”;经济作物以糖蔗为主,有中国“第二甜县”之称;桉树林面积106万亩,为全国最大的桉树林基地之一。雷州黄牛是全国十大良种牛之一。
位于广东省西南部,东毗茂名,西接湛江,南临南海,滨江临海,素有粤西商埠之称。隋皇年(589年)置吴川县,因境内有“吴水纳三川”而得名,至今已有1400多年历史。1994年撤县设市。总面积848.5平方公里,人口105.21万,是湛江通往珠三角的主要门户,珠三角沟通西南的重要通道。广湛高速公路、325国道贯穿全境,距湛江港、湛江民航机场、湛江火车站和茂名火车站、水东港仅20公里。
·位置
湛江位于我国大陆南端、广东省西南部,东经109°31′-110°55′、北纬20°12′-12°35′,包括整个雷州半岛及半岛北部一部分。东濒南海,南隔琼州海峡与海南省相望,西临北部湾,西北与广西壮族自治区的合浦县、博白县、陆川县毗邻,东北与本省茂名市属茂南区、化州市、电白县接壤,背靠大西南。市区位于雷州半岛东北部,东经110°24′,北纬21°12′。
·面积
全市总面积12471平方公里。其中,市区1460平方公里,吴川市848.5平方公里,徐闻县1862.6平方公里,雷州市3459平方公里,遂溪县2005.4平方公里,廉江市2835平方公里。
·地形
陆地主要由半岛和岛屿组成,地势北高南低,大部分是海拔100米以下的台地。北部廉江市为丘陵,以双峰嶂(382米)为最高点,其余海拔30~80米之间;中部遂溪县隆起螺岗岭(232米)高顶,其余为海拔20~40米的浅海沉积台地;南部雷州市、徐闻县隆起石峁岭(259米)、石板岭(245米)两个高顶,其余为海拔26~60米的台地、盆地;东部吴川市鉴江下游和沿海多为海拔-1.5~20米台地和滩涂;市区为滨海平原,台地和火山岛环境,中间海湾形成分叉形溺谷,为天然深水航道。全市总面积中,平原占66.0%,丘陵占30.6%,山区占3.4%。
·山脉
湛江较大的山主要分布在廉江市北部,其中双峰嶂(铜鼓嶂)海拔382米,为湛江市最高点;海拔300米以上的山还有仙人嶂、婆髻峰、高佬顶峰、蜘蛛峰、竹篙晒网峰等,均分布在廉江市内。
雷州半岛山脉,大多数由于喜马拉雅造山运动影响,地下玄武岩浆喷出地表形成,其中雷北火山群分布于螺岗岭、双髻岭、笔架岭、交椅岭、湖光岩等12处,雷南火山群分布于石峁岭、石板岭等30余处,擎雷山为雷州名山,古籍称为“雷州半岛之脊”。
分布于市区的山有龙水岭、交椅岭、克初岭、东坡岭、尖山岭、三岭山、笔架山等,均为小山岭,以位于坡头区与吴川市交界的尖山岭为最高点,海拔172米。
·水系
湛江境内流域面积100平方公里以上的干支流共40条,其中独流入海的22条。较大的江河有鉴江、九洲江、南渡河等,其中:鉴江源于广东省信宜县南开大山南麓,向南流经吴川市注入南海,吴川市境内长46.3公里,流域面积770平方公里,最窄处324米,最宽处达1100米,为本市最大的河流;九洲江源于广西壮族自治区陆川县,向西南流经廉江市注入北部湾,廉江市境内长89公里,流域面积2137平方公里;南渡河源于遂溪县坡仔,向南流经雷州市注入雷州湾,干流全长97公里,流域面积1444平方公里。
流经市区的河流有城月河、通明河、旧县河、南桥河、文保河、麻斜河等,均为小河流。地表水资源较缺,全市多年平均地表径流量75.77亿立方米,客水径流量88.81亿立方米,共164.58亿立方米,人均3777立方米,耕地亩均3141立方米。
地下水资源丰富,雷州半岛与海南岛北部同属雷琼自流水盆地,汇水量大,水质良好;以市区为主体的半岛东北部,有目前全国面积最大、热流体储量最大的低温地热田,储集大量温度在33~46℃之间的热矿水,绝大部分达到生活用水标准,并发现52处一项或多项元素达到我国饮用矿泉水标准的热矿水。
麻章区月岭泉、农场大泉,遂溪县牛鼻泉、司马塘大泉、东坡岭大泉,雷州市湖仔大泉、英岩石大泉,徐闻县军湖龙泉、附城稀饭锅大泉,廉江市竹寨温泉等,是市内名泉。
·土壤
湛江土壤类型齐全,既有热带土壤基本类型,也有滨海地带土壤分布,共有赤红壤、砖红壤、滨海沙土、滨海盐渍沼泽土、滨海盐土、潮沙泥土、沼泽土、火山灰土、菜园土、水稻土等10个土类,以红壤居多,湛江因此有“红土地”之称。其分布大体是北纬20°40′以南地区为砖红壤,占土地总面积一半以上,是本市最主要的土壤类型;北纬20°40′以北地区为赤红壤;沿海地区为海滨沙土、滨海盐渍沼泽土和滨海盐土;九洲江和鉴江沿岸两侧为潮沙泥土。湛江大面积覆盖火山灰,土层深厚,土地肥沃,为发展农林业提供了有利条件。
湛江地处北回归线以南的北热带低纬地区,属热带和亚热带季风气候,终年受海洋气候的调节,冬无严寒,夏无酷暑。
年平均气温为22.7~23.3℃,极端高温 38.8℃(市区38.1℃),极端低温-1.40℃(市区2.8℃);1月最冷,平均温度14.9~16.3℃(市5.5℃);7月最热,平均温度 28.4~28.9℃(市区28.9℃)。雨量比较充沛,年平均雨量1417~1802毫米。4~9月为雨季,10~3月为干季;8月雨量最多,12月最少。
风向,夏季盛行东南风,冬季盛行偏北风,全年最多为东风及东南风;平均风速3.0~3.5米每秒(市区为3.1米每秒)。
空气湿度较大,年平均相对湿度82%~84%(市区82%),月平均相对湿度以3~4月较大,为86%~90%,11~12月较小,为74%~79%。
日照时间长,各地历年平均日照时数为1817.7~2106小时(市区1915小时),年积累温度8309~8519℃,光热资源十分丰富,宜于大规模发展热带、亚热带作物种植。
主要气象灾害是:5~11月间,常有热带风暴、台风影响,以8~9月为最多,狂风暴雨,偶尔成灾;但台风可带来雨水,调节气候,缓解干旱,台风少的年份,往往因缺雨而干旱。多雷,几乎一年四季都可能有雷,尤以夏秋间雷暴较多,年平均雷暴日数,市区84.7~92.3天,各县(市)达102.4~108.2天。
·海岸带
全市各县(市、区)均面临海洋,海岸线长达1243.7公里,占广东省海岸线的46%,其中徐闻县372公里,遂溪县14.5公里,廉江市75公里,吴川市 48公里,雷州市406公里。港湾密布,全市有港湾101处,较大的有湛江港湾,海域面积1419平方公里;雷州湾,海域面积900平方公里。全市滩涂面积1486万亩,占全国的5%,占全省的48%。沿海有岛屿30多个(不含沙洲、礁石),其中有居民住的12个。较大的岛屿均分布在市区沿海。
最大的是东海岛,面积286平方公里,岸线长126公里,有水深26-40米的深水岸线6.5公里;还有南三岛,面积123.4平方公里,岸线93.89公里;硇洲岛,面积53平方公里,岸线43.99公里;东头山岛,面积4.08平方公里,岸线9.54公里;特呈岛,面积3.6平方公里,岸线7.44公里;调顺岛,面积3.5平方公里,已与陆地连成一片;此外,有徐闻的新寮岛,面积39平方公里,岸线35.5公里。沿海有经济鱼类520余种、虾类28种、贝类 547种。
盛产原盐,为全省主要产盐区。北部湾沿海大陆架有丰富的油气聚集,设在湛江的中国南海西部石油公司已从勘探进入开发。
·潮汐
除徐闻海安港为不正规日潮以外,其余港湾均属不正规半日潮,每一太阳日有两次高潮出现,潮差较大,达4~6米。湛江港大潮平均高潮位4.33米,最低潮位 0.65米,平均低潮位2.04米,平均潮差0.57米,最高潮位7.09米(1980年7月22日)。海安港最高潮位3.06米,平均高潮位1.77 米,平均低潮位0.55米,平均潮差0.82米,最低潮位0.09米。
·物产
农产品:水稻、甘蔗、橡胶、剑麻、香茅、咖啡、红江橙、菠萝、西瓜、香蕉、龙眼、荔枝、芒果、火龙果、大树菠萝。
矿产:金、银矿、金红石、钛铁矿、锆英砂、石灰石、高岭土、硅藻土、膨润土、花岗石、瓷土、石墨、天然气。
湛江港湾
至2007年底,湛江市市区常住人口144.65万人,其中,城镇人口93.97万人。
湛江人口中,绝大多数为汉族,少数民族只是散居于各地。据1990年第四次人口普查, 全市有44个民族,其中汉族5373544人,占99.5%;少数民族27021人,占0.5%。人口较多的少数民族有:壮族、瑶族、布依族、苗族、黎族、傣族、拉祜族等,还有外国人加入中国籍的46人,未识别民族的 68人。散居各地的少数民族居民,与汉族居民和睦相处,从未发生过民族纠纷一类的事件。
湛江是广东省内方言最为复杂的城市,主要有湛江白话、湛江闽语(雷州话)以及哎话。其中说雷州话的人数最多,集中在周边县城农村郊区;霞山赤坎两区以湛江白话为多,湛江白话还细分为:湛江市区白话,吴川白话,梅录白话、廉江白话、遂溪白话、龙头塘蓬白话等;雷州话也细分:雷城话、徐闻音、海康音、遂溪音、廉江音、郊区音,现在雷州话以雷城话为代表。湛江白话是粤语的一种;雷州话,属闽南语的一个支系;哎话,属于客家话的一个支系。哎话以廉江石岭话以及河唇话为代表。
1984年5月4日,湛江被列为中国首批(共14个)对外开放港口城市之一。同期(改革开放时期),定位于发展“两水一牧”(水产、水果、畜牧业),导致相比于其他开放城市,经济水平一直落后。2005-2010年,工业主导地位增强。第二产业在三次产业中增幅最高、增速最快。经济总量连上台阶,产业结构不断优化。大力实施“工业立市、港口兴市、生态建市”发展战略,着力推动深水良港—重化工业—现代物流—海湾城市“四位一体”协同发展,超预期完成了“十一五”规划的主要指标,经济综合实力显着提升。
现有1个国家级经济技术开发区——湛江经济技术开发区,已被广东省政府认定为“省级高新技术产业开发区”。另外还有5个省级经济开发试验区。
2007年,农业增长最快的是糖蔗生产,总产量1,006.12万吨,农村投资69.33亿元。
湛江夜景
2007年,全市工业生产总值1,121.34亿元,同比增长17.1%。工业企业714家,工业GDP超亿元的企业有132家。
2009年中科合资广东炼化一体化项目选择湛江市东海岛作为厂址,500万吨的广钢环保迁建湛江项目也将落户东海岛,这两大项目投资超过1000亿元,整个配套产业投资2000多亿元。
·商业
2007年,市社会消费品零售总额382.16亿元。
·房地产业
2007年,固定资产投资242.77亿元,开发投资33.94亿元,投资超亿元的主要房地产:雍景城第一期,金沙湾第五期,华盛新城,荣基广场,兴华广场,锦绣华景,碧绿花园,城市假日等大型楼盘。
·金融业
2007年,证券机构资产总额6.08亿元,累计证券交易额6,167亿元,银行业金融机构盈利4.44亿元。
·公路、铁路
公路207国道、325国道, 高速公路有茂湛高速公路、渝湛高速公路、湛徐高速公路
铁路黎湛铁路、粤海铁路、茂湛铁路。
湛江市区设有湛江火车南站和湛江火车西站。
·港口
湛江港东临南海,南望海南岛,西靠北部湾,北倚大西南。湛江港海岸线长241公里,是世界第一大港鹿特丹港的4倍,其中深水岸线97公里。
|
[
"12471平方公里。"
] | 7,709
|
multifieldqa_zh
|
zh
| null |
4d8bb8fce941b44e0c37bd84b4062d68ba6928e3d74c9839
|
九嶷山位于中国的哪个省份?
|
九嶷山
九嶷山,又名苍梧山。位于九嶷圣地、德孝之源,国家历史文化名城---宁远县城南,属南岭山脉之萌渚岭,纵横2000余里,南接罗浮山,北连衡岳。这里峰峦叠峙,深邃幽奇,千米以上高峰有90多处,多为砂页岩、花岗岩、变质岩组成。素以独特的风光,奇异的溶洞,古老的文物,动人的传说,驰名中外,令人神往。《史记·五帝本纪》: “舜南巡崩于苍梧之野,葬于江南九嶷。九嶷山得名于舜帝之南巡。境内有舜源、娥皇、女英、杞林、石城、石楼、朱明、箫韶、桂林九座峰峦,《水经注》云:“苍梧之野,峰秀数郡之间,罗岩九峰,各导一溪、岫壑负阻,异岭同势。游者疑焉,故曰:九(疑)嶷山。”
位置境域 九嶷山,又名苍梧山。位于中国湖南省南部永州市宁远县境内 [1] 。 与萌渚岭的关系:有的说包括九嶷山,可是地图上是“深水”(东河)把二者分开了。如果说包括,则为 “大萌渚岭”山脉了。 词条释义 名称由来 九嶷山 拼音:jiǔ yí shān “嶷”通“疑” 九嶷山得名于舜帝之南巡。因境内有舜源、娥皇、女英、杞林、石城、石楼、朱明、箫韶、桂林九座峰峦,且峰峰相似难以区别,故名。《史记·五帝本纪》:“舜南巡崩于苍梧之野,葬于江南九嶷。故老相传,舜尝登此。”相传古时舜南巡狩崩于山间,即葬于山前,二妃娥皇女英千里迢迢前来寻觅,溯潇水而上,沿大小紫荆河而下;由于九峰相仿,令人疑惑,终未得见。 秦始皇和汉武帝都曾于九嶷山望祀虞舜。 典故 《水经注》云:“苍梧之野,峰秀数郡之间,罗岩九峰,各导一溪、岫壑负阻,异岭同势。游者疑焉,故曰:九嶷山。” 同义词 苍梧山、九疑山 自然资源 九嶷山自古以来就是中国名山之一,素以丰富的文物古迹、独特的自然风光,奇异的溶洞和别具一格的民俗 风情著称于世,是国家4A景区、湖南省新“潇湘八景”之一,省级重点风景名胜区、国家级森林公园、国家级文物保护单位、国家级风景名胜区、湖南省爱国主义教育基地。辖区内已开发的景点主要有舜帝陵、紫霞岩、舜源峰、玉琯岩、古舜陵庙遗址、文庙、凤凰岩、桃花岩、永福寺等数十个。同时以其人文景观名播宇内。 九嶷山九峰耸立,山峰耸翠,巍峨壮丽,溶洞密布,绿水常流,自然风光十分秀丽。舜源峰居中,娥皇、女英、桂林、杞林、石城、石楼、朱明、潇韶八峰,拔地而起,如众星拱月,簇拥着舜源峰,紧紧依偎在两旁的娥皇峰与女英峰。 舜源峰下,有舜庙,红墙碧瓦掩映在绿树丛中,秦松汉柏高耸入云,香杉修竹茂密苍翠。碑碣林立,古迹甚多。最著名的景点有舜源峰、舜帝庙、三分石、宁远文庙以及紫霞岩、玉琯岩等。九嶷山是一个瑶族聚居区,瑶族的瑶歌、长鼓舞,以及瑶家姑娘出嫁“坐歌堂”的婚俗,都是风趣而极富情致的活动,可使人永志不忘。此外瑶家的银饰、刺绣、编织、挑花等,都是久负盛名的手工工艺品,具有独特的民族风格。 [2-3] 九嶷山,主峰畚箕窝,海拔1985米,在宁远县境内,距县城48公里。东起癞子山(海拔1834.6米),西至丰村大岭,横跨30公里,南北纵跨29公里。在四马桥镇有大风坳、牛銮心、西岭、大河坳等山,在洪塘营瑶族乡有 老虎坳、大风坳、野人冲、锅巴山、大盖坳、小盖坳、彭子厂岭、老山冲源、茶坳等山,在蚣坝镇有丰村大岭等山,组成道县东南山地区,是人稀地广之地,中山地貌类型。 [4] 人文景观名播宇内。千百年来,屈原、司马迁、蔡邕、李白、李商隐、何绍基等历代名人骚客登临九疑,为讴歌九疑山留下的大量诗文。秦汉以来,历代帝王或遥祭舜帝,或遣官代祭,留下了大是的圣迹仙踪和文物古迹,现留存古祭祀碑和古碑刻42块。一代伟人毛泽东满怀豪情地写下了“九疑山上白云飞,帝子乘风下翠微”的壮丽诗篇,党和国家领导人江泽民 [5] 欣然题写“九疑山舜帝陵”更为九疑山增添了无限的光彩。 [4] 自然风光如诗如画。九疑山群峰拔地而起,层峦叠翠,万千峰峦,无一不朝向舜源峰,所以自古就有“万里江山朝山九疑”之说。九疑山奇岩怪洞甚多,其中紫霞岩景点被明朝地理学家徐霞客列为“楚南十二名洞”之首。九疑山是湘江发源地之一,有大面积的原始次生林,树木葱茏、林海莽莽、繁花似锦、争奇斗艳、特别是石枞、香杉、斑竹被誉为“九疑三宝”,为此独尊,更具特色。众多的江河、流水、深潭点缀期间,高山和平湖融山水一体,山在水中生,水在山中流。林中珍禽异兽出没无常,莺歌燕舞,充满生机。空中云彩飘逸,红霞万朵,石峰直插云中,有静有动,其环境之幽静,风光之秀丽,绝无仅有。 [4] 民俗风情别具一格。依山而建的吊脚楼、古朴淳厚的瑶家民风,奇异艳丽的民族服饰,能歌善舞的瑶家男女,上刀梯、坐歌堂等民族文化活动、“背新娘”、“女婚男嫁”习俗,醇美溢香的“瓜箪酒”,形成迥异于其它旅游区 的独特旅游文化资源。 [4] 服务设施日趋完善。随着洛湛铁路、二广高速、厦蓉高速的建成通车和永州机场的通航,九疑山已具备新兴文化生态旅游目的地的区位优势。九疑山将迎来众多宾客,成为海内外炎黄子孙,特别是舜帝后裔寻根祭祖和旅游观光的圣地。 [4] 九疑山人文景观和自然景观交相辉映,庄严肃穆的舜帝陵,挺拔雄伟的九疑群峰,郁郁葱葱的林海,千奇百怪的溶洞皆各自成景。古往今来皆有文人墨客来此凭吊舜帝,呤咏如画美景。来九疑山旅游观光,既可感受舜帝孝感天地,德播人间的德孝文化,聆听娥皇女英的美好传说,又能观赏,到名胜古迹,更可从历朝历代的诗词中领略到九疑山深源的文化底蕴。 [4] 旅游景观 景观概况 九疑山自然风光如诗如画。九疑山群峰拔地而起,层峦叠翠,万千峰峦,无一不朝向舜源峰,所以自古就 有“万里江山朝九疑”之说。九疑山奇岩怪洞甚多,主要有紫霞岩、桃花岩、玉琯岩等,其中紫霞岩被明朝地理学家徐霞客列为“楚南十二名洞”之首。九疑山是湘江发源地之一,有大面积的原始次生林,树木葱茏、林海莽莽、繁花似锦、争奇斗艳,特别是石枞、香杉、斑竹被誉为“九疑三宝”,为此独尊,更具特色,众多的江河、流水、深潭点缀其间,高山和平湖融山水一体,山在水中生,水在山中流。林中珍禽异兽出没无常,莺歌燕舞,充满生机。空中云彩飘逸,红霞万朵,石峰直插云中,有静有动,其环境之幽静,风光之秀丽,绝无仅有。“灌溪仙境”、“潇水涵青”、“高峡平湖”就是其中的著名景点。 九嶷山为湖南省六大风景名胜区和十大旅游区之一,国家4A级旅游景区。旅游资源丰富,景区面积约530平方公里,分五大景区,景点150多处。 舜帝陵景区,主要景点有舜帝陵、舜源峰、紫霞岩。 玉琯岩景区,主要景点有天然石山盆景、玉琯岩摩岩石刻、永福寺、金蛙湖、半边山、凤凰岩。 三分石景区,主要景点有舜公石、畚箕窝原始次生林、泪竹园、小东江水库、住龙门度假区、婆婆石、望夫石、凉伞亭、枫木铺瑶寨等。 灌溪风光景区,主要景点有下灌状元楼、烈士墓、云龙牌坊、翰林牌楼、五臣山、明月山、读书岩、青山尾十里画廊、太平军古战场、象岩。 潇水涵青景区,主要景点有潇水十八湾、牛轧岭瑶家吊脚楼、水市水库、水市烈士陵园。 县城为人文景观集中区,有文庙、抗日将士阵亡纪念碑、泠南书院、东溪寺、逍遥岩、城头寨、贞节牌坊等 景点。县东有泠道古城遗址、骆家戏台、桃花岩。县北有石家洞湘军故里“荣禄第”、北宋文学家石曼卿祠“芙蓉别馆祠”、晚晴湘军将领石焕章墓“无字碑”、舂陵古城、明代大观堡堡主石玉生墓、国民党起义将领石树勋故居、柏家坪老街、平田古村等景点,县西有五里沟风光带。 县北古迹推介:湘军故里石家洞“荣禄第” “荣禄第”,是晚期湘军将领石焕章故居,始建于清代,位于湖南宁远石家洞新屋村,是光绪皇帝御赐的“荣禄第”宅第。石焕章为清政府镇压太平天国起义和贵州苗族起义,长达20余年,累官三品补用道,清光绪四年(1878),光绪皇帝诏授一品荣禄大夫,并御赐宅第。 [6] 荣禄第门前的池塘叫“谦福塘”相传是光绪皇帝取的名字,大门上的门梁上悬挂有光绪皇帝御赐“荣禄第”三个鎏 金大字的牌匾,门外摆放有一对石狮子。故居里面有六厢房和客厅以及附属产业,规模相当大,房子里面有很多石刻,连茅坑上的石块上都刻满字。石焕章率部先后攻下太平天国的首都南京城、攻破贵州苗寨,湘军大量抢掠钱财,致使他一度成为宁远首富,就连“荣禄第”房顶上面盖的瓦片都是用银子制作的,可见其十分富有。荣禄第历经民国匪乱、文革动荡多次洗礼,几经破坏。 [6] “荣禄第”是湖南永州地区少见的大夫第,亦是宁远县仅存的一所湘军将领故居,它是晚晴湘军历史的见证物,也是湘军起源地遗址。 [6] “荣禄第”主人: 石焕章于清咸丰年间组建“疑勇营”、“鸟勇营”等营,先后在宁远县招募湘军兵勇1800余人,转战10余省,从征万里,先后平定太平天国起义军和贵州苗族起义军。其旧部远赴山东剿捻、随左宗棠收复新疆、赴越抗法、参加 中日甲午战争抵御外侮,成为民族英雄和国家栋梁之才,致使“鸟勇营”闻名于湘中大地,威震湘南,从而成为“勤王之师”,石焕章亦是永州湘军文化主要代表人物。 [6] 石焕章广泛结交达官贵人和社会名流,他与书法家何绍基、两江总督刘坤一、南洋大臣沈葆桢、湖南巡抚陈宝箴、湖广总督官文、江西补用道王方晋等人比较相熟。石焕章于清同治年间所辑的33块“九疑山诗图石刻”,其中就有何绍基、陈宝箴、刘坤一等十余人的题刻,是宁远文物镇馆之宝,已被列为国家一级文物。 [6] 清同治末年至光绪年间,石焕章主持倡修宁远文庙,并亲自为宁远文庙选址城西。石焕章是宁远文庙重建选址人、倡修人和工程主要负责人,现宁远文庙已成为全国重点文物保护单位。 [6] 舜源峰 九嶷山主峰,海拔610米,居中间位置,娥皇、女英、桂林、杞林、石城、石楼、朱明、箫韶八峰,拔地而起,如众星拱月,簇拥着舜源。紧紧依偎在两旁的娥皇峰和女英峰,特别端庄秀丽,婀娜多姿。相传舜源峰因舜帝驾崩后葬于山脚下而得名,娥皇、女英二峰则相传是舜帝二妃的化身。当年二妃寻找舜帝未着,被大风阻于洞庭湖的君山,死后遂化作两座山峰,护立在舜峰的两旁。九嶷山九峰中,舜源峰最高,巍然耸立,登临峰顶,极目远眺,莽莽群山,绵延起伏,如千帆竞发,奔腾而来,使人有“万里江山朝九嶷”之感。 舜帝庙 位于舜源峰脚下,与娥皇峰对峙。汉代即于舜源峰上建庙祀奉; 现存舜庙始建于明代洪武四年( 1371 ),清代重修,正殿已圮,庙后亭内竖立“帝舜有虞氏之陵”石碑一通。山间大小溶洞遍布,洞内钟乳石形成的各种物状,绮丽瑰奇,美不胜收,其中最为著名的是舜源峰下的紫霞洞。该洞分内外两洞,外洞宽广明亮,可容千人;内洞幽深较小,景物迷人。据《云笈七签》卷二十七《洞天福地》所载,为道教“第二十三洞天”,名曰“朝真太虚洞天”,传说昔有道士居于洞内修炼。 舜帝庙原是一座红墙绿瓦建筑,坐北朝南,规模宏大,建筑雄伟,由照壁、午门、拜亭、正殿、寝殿、省牲亭及左、右朝房构成。围墙长约540米,占地约80000平方米。左右两房有二井,名龙眼井。庙前照壁上的“九嶷山”三个大字,为玉琯岩石刻的拓片,出于宋代道州刺史方信孺手笔,白底黑字,于三里远的凉伞坳即清晰可见。入午门,有左、右、中三个石阶上于拜亭。拜亭三楹,气势雄浑。历代皇朝派官祭舜陵,即在拜亭举行祭祀仪式。亭式有一石碑,高2.7米,宽1.8米,为明代万历年间所建立之“抚瑶颂碑”。拜亭左壁曾做有清代人李永绍所绘“九嶷山图”石刻一方,长0.8米,宽0.5米,刻九峰全景。正殿为舜庙之主体建筑,重檐斗拱甚为壮观。其结构与历代帝王宫殿相同。左右两侧为朝房和碑亭。右侧靠围墙处,大石拥立,树木清幽,石上刻有“正穴”二字。过正殿沿石级而上为寝殿。内奉舜陵石碑一块,高3米,宽2米,上刻隶书“帝舜有虞氏之陵”。舜庙四周,枫柏扶荫,显得庄严而肃穆。旁有香杉15株,大可连抱,质地坚韧,旃香如旃檀,与常杉有异,故名香杉。舜帝庙的大部建筑早年已毁,正在进行全面修复,但华夏子孙祭祀舜帝的活动,不论官方还是民间,从来没有停止,特别是每年清明节前后,前往拜祭的人络绎不绝。 三分石 三分石,又名三峰石,在宁远县城南百里处,它是九疑山的最高峰,海拔1822米。相传是舜的葬身之地,故又名舜峰。 山峰岩缝间,有清泉脉脉下泻,如瀑布垂练。峰顶常有浮云缭绕,平常很难见到它的真面目,只有秋高气爽、万里无云之时,才向人们展现其雄姿。三分石南面万山中,有荆竹丛生,竹尾下垂着地,如碧线带,随风飘拂沙沙作响,后人称之为斑竹扫墓。三分石对面山上,有万亩斑竹园,其内斑竹遍布。斑竹因有泪痕似的斑点而得名。相传当年二妃寻找舜帝来到三分石下,遇一老翁告知舜帝愤斩孽龙,负伤身亡,葬于峰下,悲痛万分,哭了七天七夜。她们的眼泪洒在竹上,留下了点点斑痕,是为斑竹。 三分石如三支玉笋,鼎足而立。峰间相距各5里。峰势险绝,直插云霄。古人有诗云:“一峰浮黛插云霄,石作三分结构牢,云外有人攀玉笋,山中何处觅仙桃。”《九疑山志》载:“三峰并峙如玉笋,如珊瑚,其上有仙桃石、棋盘石、步履石、马迹石,又有香炉石,有足有耳,形质天然。其间有冢,以铜为碑,字迹泯灭不可认,或疑为舜冢。” 三分石是如何来的呢?相传舜帝南巡之时,有一天登上此峰,考察山川形胜。中午时分,他和侍从们在峰头 野餐,不觉醉酒。酒壶遗忘在峰头上。有一只大鹏恰巧飞临此山,见有一壶酒,便俯冲下来,用锐利如钩的尖嘴一啄,当下石壶分成三块,化作三峰石。那剩下的玉液,化成了长流不息的泉水,这就是潇水之源。 如今三峰石上,果然清泉喷涌,垂崖倾注如白练悬空,若烟若雾,水流激石,惊浪雷奔。当中一脉,为潇水之源泉,俗称“父江”,西流至九疑山下。 永福寺 九嶷山永福寺,位于九嶷圣地、德孝之源,国家历史文化名城---宁远九嶷山古舜庙和玉琯岩的西北侧,系南 齐帝(479年)为护卫舜祠而建的皇家寺庙,原名报恩寺,宋太平兴国5年(980年)改现名,距今已有1500多年的历史,为九嶷山国家森林公园、人文公园旅游绽放光彩。 永福寺,以贯穿“尊重历史、注重当代,保存传统、力创新作,保护宗教、推进旅游,以人为本、天人合一”的设计理念,依山造势,以水显灵,顺应自然,旅教结合,以宋式为主,融合部分清式及现代生态园林风格,再造佛教圣地和观光胜景。 古永福寺依山而筑,砖木结构,寺舍井然,规模宏大,气势雄浑,是南齐帝为护卫舜陵敕建的皇家寺院。内有一进院的山门、前殿,二进院的法堂,三进院的彻堂,四进院的华严阁、齐去阁、御书楼、弥陀台、观音台和碧虚亭,以及两侧厢房等主要建筑,寺旁还有供僧人种田、居住的永福庄。该寺历经多次修缮和重建,香火不绝,鼎盛时期,僧众达三百余人。 紫霞岩 又名重华岩,为一宏大的石灰岩溶洞,洞口有一高数丈的岩石, 在日光的斜照下,变得紫气缥绕,故称紫霞岩。紫霞岩分外岩和内岩。外岩甚为宽敞明亮,下有石田,级级相承,水从石顶洗涮而下,流入石田之中。内岩从外岩右侧一洞口进入,岩内曲折黑暗,钟乳或垂或立,千姿百态,令人目不暇接。入内百余步,即闻潺潺流水之声,有莲花般的钟乳立于水中,此曰:“水打莲花”。再入内,依次还有“猴子把洞”、“无为洞”、“读书堂”、“仙人田”、“八音石”、“九曲黄河”等景观。“九曲黄河”景观最具特色,入内只见流水清冽,淙淙作响,却不知来自何处,流向何方。因其有九渡回环,故曰“九曲黄河”。 玉琯岩 位于舜源峰南2公里处。为一石山溶洞,洞外潇水支流有如一条玉带,绕山而过。洞宽约7米,高3至4米,溶洞不深,豁达明亮。洞口壁额有宋人李挺祖书“玉琯岩”。右壁刻有宋道州刺史方信孺所书“九嶷山”三个大字,字高1.8米,宽1.9米,笔力苍劲遒拔。旁刻有汉蔡邕的《九嶷山铭》,洞壁还有历代名人的题字和诗文。与紫霞岩联成一气,自成一体,为省级重点文物保护单位。 铭碑 位于九嶷山玉琯岩上。碑高0.53米,宽0.63米,铭文9行,字径约0.05米,跋语作5行,字较小,于铭事后。铭文为东汉蔡邕作。据《金石文录》云,碑文“取法汉隶,结构有体,在宋人中亦有可多得”。其铭文是:“岩岩九嶷,峻极于天,能角肤合,兴布建云。明风嘉雨,浸润下民,芒芒南土,实桢厥勋。建于虞舜,圣德光明,克谐顽傲,以孝蒸蒸。师锡帝世,尧而授徵,受终文祖,璇玑是承。大阶以平,人以有终,遂葬九嶷,解体而升,登此崖嵬,托灵神仙。”碑文为宋淳祐六年(1246)郡守李袭之所刻。 宁远文庙 全国重点文物保护单位。位于宁远县城。始建于北宋,现存建筑为清同治、光绪年间,宁远石家洞人石焕章选址所建,为湖南迄今保护最完好的一座文庙,也是全国除山东曲阜孔庙外最大的一座孔庙。
|
[
"九嶷山位于中国湖南省境内。"
] | 6,727
|
multifieldqa_zh
|
zh
| null |
e2a953330c796cf85a0e0c8070da1c96ef7e5be2f58a05ba
|
2007年金华市的失业率是多少?
|
各位代表:
现在,我代表金华市人民政府,向大会作工作报告,请予审议,并请市政协委员和其他列席人员提出意见。
一、2007年工作回顾
过去一年,在中共金华市委的领导下,全市人民坚持以邓小平理论和“三个代表”重要思想为指导,以科学发展观为统领,紧紧围绕“发展城市群、共建大金华”战略主线,团结拼搏,攻坚克难,创业创新,较好地完成了市五届人大三次会议确定的各项目标任务,经济社会保持了良好发展势头。
(一)经济综合实力跃上新台阶。全市实现生产总值1462亿元,比上年增长14.8%;财政总收入187.4亿元,增长24.4%,其中地方财政收入突破百亿大关,达101.97亿元,增长25.2%。工业强市战略取得明显成效,完成工业投资253亿元,实现规模以上工业总产值2236亿元,增长27.2%;实现利润99.2亿元,增长24.8%。产业结构有所优化,产业集群初具规模,小商品、五金、木雕产业入选中国百佳产业集群,汽摩配产业快速壮大。开放型经济步伐加快,外贸出口总额达到75.5亿美元,增长30%;实际利用外资5.1亿美元,到位内资79.2亿元。自主创新能力不断增强,建立了RoHS指令检测中心,启动了市汽摩配创新服务平台建设,组建了浦江水晶玻璃、义乌无缝服装等10家省级区域科技创新服务中心。新增国家级高新技术企业7家、省级13家,高新技术产业实现产值312亿元,增长14.7%。成功举办了第八届工科会。品牌建设扎实推进,成功注册金华火腿地理标志证明商标,荣获“中国汽车摩托车产业基地”称号,义乌获得“中国线带名城”和“中国商品包装印刷产业基地”称号,兰溪获得“中国织造名城”称号,“永康五金”入选首批浙江省区域名牌产品;新增中国名牌产品7只、中国驰名商标56只、国家免检产品19只。节能降耗工作取得进展,加快淘汰高能耗落后产能,全面完成水泥机立窑拆除工作,关停淘汰粘土砖瓦窑186座,万元生产总值综合能耗下降4.15%。工业用地节约集约利用长效机制初步建立,土地资源利用效率有所提高,处理闲置和低效利用土地1770亩。市场大市地位进一步巩固,专业市场持续繁荣发展,市场成交额达到1073亿元,义乌国际商贸城三期开工建设,浙中模具市场建成,金华农产品批发市场二期工程基本完工,江北商业步行街完成改造。资金保障力度加大,年末金融系统存款余额2077亿元,增长17%;贷款余额1658亿元,增长21.7%,金融生态环境进一步改善。金信信托停业整顿工作进展顺利,有效保护了债权人利益。东晶电子、浪莎控股、铁牛集团成功上市,全市从资本市场直接融资达到25亿元。物流产业发展加快,金华国际物流园区运行步入正轨,“中外运”物流项目落户金东开发区。浙中旅游品牌打造力度加大,全市接待旅游人数1900万人次,旅游收入176.7亿元,分别增长15.4%、23.5%。
(二)新农村建设开创新局面。一般预算"三农"投入44.75亿元,增长21.9%。农业产业化步伐加快,实现农业总产值126亿元,增长5.4%。新增市级以上农业龙头企业50家、农民专业合作社207家、省级无公害农产品基地91个、无公害农产品45只、绿色食品23只。成功举办了第六届华东农交会、第五届中国苗木交易会。农村来料加工业保持较快发展,全年加工费收入超过12亿元。乡村休闲旅游发展态势良好,农家乐经营户累计达到4190户。全面实施“五整治一提高”工程,深入推进农村环境整治和设施建设,累计完成村庄整治2463个,占全市行政村总数的51%和全省示范整治村总数的1/4,创建市级以上示范村290个(其中省级113个),完成“整镇整治”乡镇17个。农民饮水工程建设加快,新增农村饮水安全人口68.7万人,永康率先实现自来水村村通。土地开发整理扎实推进,完成土地整理34万亩,建成标准农田26.5万亩,复垦建设用地4800亩。水利基础设施建设加快,完成水库除险加固42座,九峰水库建设进展顺利,市本级荣获省第十三届水利“大禹杯”金杯奖。农村劳动力培训工作稳步开展,完成培训16.1万人,实现5.9万人转移就业。“千镇连锁超市、万村放心店”工程成效显著,实现全市乡镇全覆盖。深入实施“山海协作”和“欠发达乡镇奔小康”工程,全市80%以上欠发达乡镇农民人均收入超过全国平均水平。
(三)浙中城市群建设迈出新步伐。完成金华城市总体规划调整,继续推进浙中城市群规划编制,开展了县(市)域总体规划修编。重点工程建设稳步推进,台金高速公路金华段建成通车,诸永高速公路金华段建设进展顺利,东永高速公路通过项目评审,44省道上松线、62省道大科线改造完工,金义快速路、虹戴公路等城际快速通道开工建设。开通了动车组始发列车,金华与上海、杭州的“同城效应”加快形成。生态共保力度加大,加强了重点区域、行业、企业污染治理,东阳、永康、浦江三个省级重点(准重点)环境污染监管区全部“摘帽”,兰溪、武义、磐安污水处理厂投入试运行。全市主要污染物排放继续减少,化学需氧量、二氧化硫排放量分别削减4.66%、3.84%。城市管理力度加大,获得“省绿化模范城市”和“中国十佳宜居城市”、“中国十佳宜游城市”称号。义乌、武义、磐安成为首批省级生态县市。
(四)社会事业有了新进步。加大了对社会事业的投入,地方财政对教育投入增长23.0%、文化投入增长45.8%、卫生投入增长23.2%、社会保障和就业投入增长28.2%、城乡社区事务投入增长22.7%。完成了农村中小学“四项工程”和职业教育“六项行动”阶段性目标任务,磐安、金东、浦江通过省教育强县(区)评估,全市95.8%的乡镇已创建成为省、市级教育强乡(镇)。金华职业技术学院跻身国家示范性高职院校建设行列,上海财经大学浙江学院开工建设。经过多年的不懈努力,金华荣膺国家历史文化名城。通过了国家二类城市语言文字工作评估验收。知识产权工作扎实推进,被列入浙江省首批国家知识产权示范创建市。市档案中心启用,市博物馆主体工程结顶,农村文化建设“十项工程”进展顺利。推进“健康新农村”建设,新型农村合作医疗参合率达88.6%,城乡社区卫生标准化率75.3%。广泛开展“全民健身与奥运同行”系列活动,在第六届全国城市运动会和第七届全国残疾人运动会上取得佳绩。群众性精神文明建设活动蓬勃开展,孟祥斌事迹感动中国。军民共建活动深入开展,获得了“全国双拥模范城”殊荣。
(五)人民生活得到新改善。努力增加城乡居民收入,市区城镇居民人均可支配收入19855元,增长11.5%;全市农村居民人均纯收入6971元,增长13.6%。居民消费水平不断提高,社会消费品零售总额563亿元,增长16.8%。就业和社会保障工作得到加强,新增城镇就业6.8万人,城镇登记失业率2.9%;新增职工基本养老保险参保人数7.64万人、失业保险5.9万人、城镇职工基本医疗保险8.6万人、工伤保险30万人,新增被征地农民基本生活保障参保人数3万人。永康、武义城镇居民基本医疗保险试点进展顺利。对低收入群众的生活补贴力度加大,农村五保对象和城镇“三无”对象集中供养率分别达到97.5%、98.0%。市社会福利中心建成投入使用。重视城乡住房保障体系建设,改造农村低保家庭危旧房1187户,市区新建经济适用房7.38万平方米。加强人口计生工作,集中开展了出生人口性别比专项整治活动,人口自然增长率4.28‰。
(六)民主法治建设取得新成绩。自觉接受人大及其常委会的监督,积极支持政协履行职能,充分听取人民群众对政府工作的意见和建议。高度重视维护社会稳定,“法治金华”和“平安金华”建设不断深化,平安基层基础规范化建设经验在全省推广。切实加强社会治安综合治理,深入开展严打整治斗争,刑事案件发案数下降3.8%,人民群众安全感满意率达97.1%。安全生产工作扎实推进,安全生产事故起数、死亡人数和直接经济损失有所下降。认真开展产品质量和食品质量安全专项整治,人民群众消费安全感明显增强。法治政府建设力度加大,普法教育不断深入,行政执法责任制不断深化,规范行政处罚自由裁量权工作取得积极成效。应急管理体系不断完善,应对突发事件能力不断增强。政务公开进一步推进,公共企事业单位办事公开全面推行,荣获全国政务公开工作先进单位称号,被命名为全国政务公开示范点。加快推进集中统一办理行政许可事项工作,规范了招投标统一平台运作。“义乌扩权”改革试点进展顺利。“作风建设年”和“创业富民、创新强市”大讨论活动成效明显,发展环境进一步优化。政府自身建设得到加强,跻身中国城市十佳诚信政府。
今年1月中下旬,我市遭受了历史罕见的低温和雨雪冰冻灾害。在严峻考验面前,全市人民众志成城、奋起抗灾,各级领导以身作则、靠前指挥,各有关部门迅速行动、全力以赴,人民解放军、武警部队和公安干警冲锋在前、勇挑重担。特别在金华电网抢险修复工作中,我市电力部门广大职工与灾区人民一起踏冰卧雪,展开了一场史无前例、气贯山河的“抗冰雪保供电”大会战,“决战金华”取得了重大胜利。事实再一次证明,只要我们团结一心、勇往直前,就一定能战胜前进道路上各种艰难险阻,就一定能迎来风雪之后的灿烂光明。
各位代表!过去一年的工作成绩来之不易。这是中共金华市委坚强领导的结果,也是全市人民创业创新的结果。从一年来的工作实践中,我们深切地体会到,实干创业、加快发展,是政府工作的本质要求和中心任务;以人为本、改善民生,是政府工作的出发点和落脚点;改革创新、统筹兼顾,是推动科学发展、促进社会和谐的根本动力和必然要求;万众一心、和衷共济,是我们攻坚克难、勇创新业的重要法宝和力量源泉。在此,我谨代表市人民政府,向在各个领域辛勤劳动的全市人民,向对政府工作给予大力支持的人大代表、政协委员,向各民主党派、工商联、群众团体、无党派人士,向驻金部队、武警官兵、省部属驻金机构,向所有外来投资者和建设者,向所有关心和支持我市发展的社会各界朋友,表示衷心的感谢和崇高的敬意!
回顾一年来的工作,我们也清醒地看到,我市经济社会发展还面临不少困难和问题,政府工作也存在一些薄弱环节。全市经济社会总体上在全省还处于中等发展水平,综合实力、区域竞争力还不强;产业层次还比较低,产业升级、节能降耗、污染减排和环境保护的任务依然艰巨;要素瓶颈制约突出,保持合理的投资增长、优化投资结构、提高投资效益的难度不小;浙中城市群协调发展的体制机制还不完善,统筹区域发展的能力有待增强;社会事业发展相对滞后,公共财政体系还不健全;农民持续增收困难,缩小城乡居民收入差距、进一步改善民生的任务仍然繁重;政府依法履职能力需要进一步提高,社会管理、公共服务有待加强;一些部门和干部还存在服务意识不强、办事效率不高等问题,形式主义、官僚主义、奢侈浪费现象仍然存在,腐败现象时有发生。对此,我们一定高度重视,深入研究,采取有效措施,努力加以解决。
二、2008年工作目标和总体要求
2008年是全面贯彻落实党的十七大和省第十二次党代会作出的战略部署的第一年,也是实施“十一五”规划承上启下的一年。面对全球化深入发展、科技日新月异和国际产业加速转移的宏观背景,面对工业化、信息化、市场化、城市化和国际化加快推进的发展趋势,面对宏观调控深化、资源环境约束、体制机制障碍、社会矛盾凸显的现实挑战,面对转变发展方式、建设生态文明、改善民生问题的新的要求,我们必须振奋精神,抢抓机遇,始终做到坚定清醒有作为,坚持好字优先,推动科学发展。
根据市委五届八次全会作出的部署,2008年我市国民经济和社会发展的主要预期目标建议为:生产总值增长12%,地方财政收入增长12%;社会消费品零售总额增长15%;万元生产总值综合能耗下降4.77%,化学需氧量、二氧化硫排放量分别下降3%左右;农村居民人均纯收入增长8%,市区城镇居民人均可支配收入增长7%;新增城镇就业5万人,城镇登记失业率控制在4.3%以内;人口自然增长率控制在6.2‰以内。
2008年政府工作的总体要求是:高举中国特色社会主义伟大旗帜,坚持以邓小平理论和“三个代表”重要思想为指导,全面落实科学发展观,认真贯彻党的十七大、十七届二中全会、省第十二次党代会和市委五届八次全会精神,紧紧围绕“发展城市群、共建大金华”战略主线,走“创业富民、创新强市”之路,坚持工业强市,推动产业升级,统筹城乡发展,加快城市聚合,建设生态文明,着力改善民生,解放思想,抢抓机遇,狠抓落实,为全面建设惠及全市人民的小康社会打下坚实基础。
在具体工作中,着重把握好以下四条原则:
一要深化改革创新。把改革创新作为发展的根本动力,认真总结改革开放30周年成功经验,进一步解放思想,转变观念,开拓进取,全面深化改革,完善体制机制,不断巩固改革成果。大力弘扬创新精神,鼓励创新实践,调动一切积极因素,不断激发全社会的创造活力。
二要转变发展方式。把转变发展方式作为重大战略任务,以增强自主创新能力为核心,以节能减排为突破口,以建立健全有利于科学发展的体制机制为着力点,加快建立现代产业体系,努力实现速度质量效益相协调、消费投资出口相协调、人口资源环境相协调、改革发展稳定相协调。
三要注重改善民生。把改善民生作为发展的根本取向,坚持以人为本、执政为民,完善公共财政制度,优化公共资源配置,为群众提供更多更好的公共服务,促进基本公共服务均等化,做到发展经济有利于提高群众的收入水平,基本建设有利于提升群众的共享水平,公共财政支出有利于改善群众的生活水平。
四要促进社会和谐。把维护社会稳定作为第一责任,始终保持清醒的头脑,增强大局意识和责任意识,创新解决问题的办法,建立化解矛盾的新机制,最大限度地减少不和谐因素,在改革发展中确保社会和谐稳定,在和谐稳定中推动金华繁荣发展。
三、2008年工作重点
围绕政府工作的主要目标和总体要求,2008年要着重抓好以下五个方面工作:
(一)推动产业升级,增强区域经济综合竞争力
深刻把握我市发展的阶段性特征,积极转变发展方式,坚定不移地推进“工业强市”战略,坚持好字优先,好中求快,推进自主创新、结构调整和产业升级,不断提升区域经济的综合竞争力。
大力推进创新强工。创新强工是再造金华工业新优势的必由之路。培育创新型产业集群。认真实施“十一五”产业集群发展规划,整合资源,集聚要素,培育发展优势产业集群,改造提升传统产业。突出培育汽摩配产业,强化政策扶持,加大重点产品开发力度,推进尼奥普兰、众泰轿车、北汽福田等一批重大项目建设,力争“十一五”期末全市汽摩配及相关产业产值突破1000亿元,把金华建成国内重要的汽车、摩托车及零部件生产基地和出口基地。同时,各地要发挥自身优势和特色,对生物医药、电子信息等产业进行重点培育,不断提高主导产业和规模工业比重。实施“1135”工程,着力培育大企业大集团,力争全市亿元企业达到450家以上,规模以上工业总产值达到2700亿元以上、增长20%以上。实施中小企业成长计划,引导金融机构加大对中小企业信贷支持力度,扶持一批“专精特新”中小企业群,增强产业集群竞争力。提升园区开发水平。加强对入园项目的服务和跟踪督察,促使入园企业早开工、早竣工、早投产。加大基础设施配套力度,完成园区基础设施和企业固定资产投入180亿元以上。做好园区扩容前期工作,适当扩大工业用地比例。完善园区考核,推行工业企业“新三率”评价考核机制。抓好农村家庭工业集聚区规划建设试点,扶持培育初创企业。增强自主创新能力。落实推进工业创新的各项政策,实施新一轮技术创新工程,积极培育国家级企业技术中心,加快市汽摩配创新服务中心、省级区域科技创新服务中心建设,发挥好RoHS指令检测中心作用,做好中科院金华科技园实体化推进工作,争取新培育市级以上高新企业50家、高新技术研发中心20家,省、市级企业技术中心15家以上。实施一批重点技改和技术创新项目,安排市技术创新重点项目80项,落实省、市重点技改项目209个,确保完成工业投资280亿元,力争300亿元。设立创业投资引导资金,鼓励科技型企业开展自主创新,争取实现高新技术产业产值350亿元以上。精心组织第九届工科会,深化产学研合作,力争新达成科企合作协议100项以上。扎实推进“品牌金华”建设,深入实施技术标准战略,新增中国名牌产品3只、中国驰名商标10只、国家免检产品5只。加强知识产权保护,做好“国家知识产权示范城市”创建工作。大力推进企业上市。落实鼓励和扶持企业上市政策,加大对上市后备企业的培育和辅导,争取3家以上企业在境内外上市,从资本市场直接融资20亿元以上,培育上市后备企业30家以上。培养创新型企业家队伍。加强高层次、高技能人才队伍建设,落实企业家和技术人才培训计划。开展创新型企业家、领军人才评选,发挥企业家在创业创新中的重要作用。
加快现代服务业发展。把现代服务业作为新的经济增长点和结构调整的战略重点,围绕“三大中心”建设,鼓励和支持现代服务业加快发展。打造浙中国际性商贸中心。完善浙中专业市场体系,加快义乌国际商贸城三期市场建设,扶持金华农产品批发市场、浙中建材市场再上台阶,努力培育辐射全国的金华汽摩配专业市场。做精市区江北环人民广场商圈和江南宾虹路商业中心,着力培育一批“商业航母”。优化商业网点结构,完善城乡社区便民商业服务,积极发展连锁经营、物流配送等新型商业业态。打造区域性现代物流中心。培育壮大现代物流企业,做大做强第三方物流。依托义乌小商品城、永康科技五金城等市场和金华国际物流园区,大力发展产业基础型、专业市场型、都市配送型、枢纽转运型等现代物流业,努力建设浙江中西部的现代物流中心。打造浙江旅游副中心。理顺景区管理体制,强化重点景区建设。精心打造“双龙胜景、大仙圣地、浙中凉都”旅游名片,进一步打响义乌购物游、横店影视文化游、武义温泉游等特色旅游品牌,加快推进永康方岩捆绑参与“中国丹霞地貌”申报世界自然遗产工作,认真开展旅游强县、强镇、强村创建工作。大力发展金融业,不断优化金融环境。积极发展会展、电子商务、咨询、创意等现代服务业,不断提高服务业在国民经济中的比重。
|
[
"2.9%。"
] | 7,584
|
multifieldqa_zh
|
zh
| null |
ecab017b3641c8111921c51f510dea9932ed70bb0a083183
|
法院判决被告应支付的利息按照什么利率计算?
|
韩美琴与吴国安民间借贷纠纷一审民事判决书
原告韩美琴与被告吴国安民间借贷纠纷一案,本院于2016年5月30日立案后,依法适用简易程序,公开开庭进行了审理。原告韩美琴的委托诉讼代理人叶锡云、石惠强,被告吴国安的委托诉讼代理人徐建国到庭参加诉讼。本案现已审理终结。
原告韩美琴向本院提出诉讼请求:要求被告返还借款450 000元,并支付自2016年5月30日起至实际履行之日止按年利率7.2%计算的利息。事实和理由:2014年1月28日,被告以急需资金为由向原告借款500 000元,原告当天将500 000元汇至被告账户,被告当时承诺按月利率0.8%支付利息。2015年4月15日,被告称投资失败资金紧张,经协商原告同意被告尚需归还借款450 000元,并将还款期限延至2016年4月15日。双方重新签订了借款协议。然被告至今未履行还款义务。
被告吴国安辩称,首先,2009年10月27日至2011年10月27日期间,原告及其丈夫叶锡云曾多次委托被告的公司宁波金第舫投资咨询有限公司投资理财。2014年1月28日,原告丈夫叶锡云再次与宁波金第舫投资咨询有限公司签订委托投资理财合同,被告代表宁波金第舫投资咨询有限公司进行受理。当日,由原告以转账汇款方式交付500 000元。故该500 000元系委托投资理财款,而非借款。本案原、被告也非适格的原、被告,适格原、被告应为原告丈夫叶锡云与宁波金第舫投资咨询有限公司。其次,被告是在被胁迫的情况下出具2015年4月15日借款条的,该借款条无效,且借款条载明“今借”,原告并未实际提供借款,故原、被告双方也不存在借款事实。综上,被告请求驳回原告诉请。
当事人围绕诉讼请求依法提交了证据,本院组织当事人进行了证据交换和质证。对当事人无异议的证据,本院予以确认并在卷佐证。对有争议的证据,本院认定如下:
1.关于原告提交的委托投资合同复写件一份,本院认为,虽然庭审中被告对该证据的真实性提出异议,但庭后被告书面确认该证据的真实性,故本院对该证据的真实性予以认定。
2.关于被告提交的授权委托书一份,本院认为,被告系宁波金第舫投资咨询有限公司的法定代表人,在原、被告双方对被告是否系代表宁波金第舫投资咨询有限公司签订合同存在争议时,宁波金第舫投资咨询有限公司出具的该授权委托书缺乏证明力,故本院在本案中对该证据不予认定。
3.关于被告提交的委托投资合同三份,原告质证称被告均存在变造情况,2009年及2010年签订的合同已履行完毕,原告已将合同还给被告,被告自行加盖了宁波金第舫投资咨询有限公司的公章,2014年签订的合同是复写的,被告提交的该合同与原告提交的复写件不一致的地方均系被告事后自行添加。被告称三份合同均在宁波金第舫投资咨询有限公司签订,2009年及2010年签订的合同不存在修改情况,2014年原告要求按原签订合同内容进行投资,双方协商后确定月固定回报率由10‰调整为8‰,宁波金第舫投资咨询有限公司出纳将合同主要内容填写后由被告签字,再盖上公司公章后将复写件交给原告丈夫叶锡云,事后被告发现公司出纳填写内容少了几样,故其将缺少的内容添加进合同,添加的内容包括受托人名称或姓名中的“(宁波金第舫投资咨询有限公司总经理)”、投资方式“第(1)方式”中的“1”、费用和酬金“4‰比例”中的“4”、违约约定“2”上的“×”。本院对2014年签订的合同中原告无异议的部分予以认定,对被告确认的其事后添加的内容不予认定。关于2014年签订的合同中宁波金第舫投资咨询有限公司的公章,本院认为,该合同约定的受托人系被告而非宁波金第舫投资咨询有限公司,原告提交的合同复写件无该公章,而合同原件存于被告处,存在被告事后加盖宁波金第舫投资咨询有限公司公章的可能性,且被告确实存在事后添加其他内容的情况,故本院对该公章不予认定。关于2009年及2010年签订的合同,因原告对其真实性提出异议,本院对其关联性也难以认定,故本院在本案中对该二份合同不予认定。
4.关于被告提交的清单二份,本院认为,该组证据系宁波金第舫投资咨询有限公司自行制作,且原告对其真实性提出异议,故本院对该组证据不予认定。
5.关于被告提交的借款条一份,原告质证称其中的“22.30分”系被告事后自行添加,对其他内容没有异议,被告亦确认其中的“22.30分”是其事后添加,故本院对该“22.30分”不予认定,对该证据中的其他内容予以认定。
根据当事人陈述和经审查确认的证据,本院认定事实如下:
原告韩美琴与叶锡云系夫妻关系。2014年1月28日,叶锡云与被告吴国安签订委托投资合同一份,约定委托人为叶锡云,身份证号为“(韩美琴)身份证号:330211195904154029”,受托人为被告吴国安,委托人委托受托人依法受理投资标的货币资金500 000元,委托人应于2014年1月28日前将以上投资资金交付给受托人,交付方式为银行转账,受托期限自2014年1月28日至2015年1月28日,委托人以固定回报8‰的利润进行分红。当日,原告将500 000元转账至被告银行账户。2014年4月30日、7月30日,被告均转账12 000元至原告银行账户。2015年4月15日,被告向原告出具借款条一份,载明“今借韩美琴人民币肆拾伍万元正。约定无利息,借款期限壹年,日期兹2015年4月15日至2016年4月15日。”
关于委托投资合同的受托方,本院认为,合同约定受托人为被告,受托方签名也为被告,500 000元款项亦打入被告个人银行账户,被告主张受托方为宁波金第舫投资咨询有限公司,但未提供充分证据证实其主张,故本院不予采纳,本院认定受托方为被告。
关于2015年4月15日借款条与委托投资合同的关联性,本院认为,被告辩称其被迫出具该借款条,但未提供任何证据证实其主张,且原告提出异议,故本院对该答辩意见不予采纳。根据委托投资合同与借款条的内容,原告所称双方协商后原告同意被告尚需归还借款450 000元,并将还款期限延至2016年4月15日的事实存在高度盖然性,故本院对此予以认定。
本院认为,债务应当清偿。虽然委托投资合同系叶锡云签订,但500 000元系原告转账,被告也是向原告出具借款条,且叶锡云与原告系夫妻,庭审中叶锡云亦表示同意原告主张该债权,其不会再另行主张,故原告主张被告返还借款450 000元,合法有据,本院依法予以支持。被告未按约返还借款,原告主张自2016年5月30日起的利息,合法有据,本院予以支持。因借款条约定借期内无利息,且未约定逾期利率,故本院认定被告应按年利率6%支付原告逾期利息。原告主张按年利率7.2%支付利息,没有事实和法律依据,本院不予支持。
综上所述,依照《中华人民共和国民法通则》第一百零八条,《中华人民共和国合同法》第二百零六条、第二百零七条,《最高人民法院关于审理民间借贷案件适用法律若干问题的规定》第二十九条,《最高人民法院关于适用〈中华人民共和国民事诉讼法〉的解释》第九十条、第一百零八条规定,判决如下:
一、被告吴国安返还原告韩美琴借款450 000元,并支付自2016年5月30日起至实际履行之日止按年利率6%计算的逾期利息,于本判决生效之日起十日内履行完毕;
二、驳回原告韩美琴的其他诉讼请求。
如果未按本判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条规定,加倍支付迟延履行期间的债务利息。
案件受理费8 163元,减半收取计4 081.50元,财产保全申请费2 770元,合计6 851.50元,由原告韩美琴负担19元(已预交),被告吴国安负担6 832.50元,于本判决生效之日起七日内交纳本院。
如不服本判决,可以在判决书送达之日起十五日内,向本院递交上诉状,并按对方当事人的人数或者代表人的人数提出副本,上诉于浙江省宁波市中级人民法院。
|
[
"按年利率6%支付逾期利息。"
] | 3,251
|
multifieldqa_zh
|
zh
| null |
b6b1bd25aa726f9936769c62f3546f7486243810c48f13c7
|
徽州在哪一年被降为徽县?
|
陕西承宣布政使司
陕西承宣布政使司简称陕西布政司,明朝行政区划,是明朝在今陕西省地区的一级行政区名。布政使司衙门驻西安府。
历史记载 元代诗人评价陕西行都指挥使司战略地位(既陕西行省奉元路)《大德长安(安西路)志》卷l:“厥壤肥饶,四面险固,被山带河。外有洪河之险,西有汉中、巴、蜀,北有代马之利,所谓天府、陆海之地也。”⑨李庭《寓庵集》卷5《创建灞水石桥记》:“以形势雄天下,其来尚矣!左达晋、卫,右控陇、蜀,冠盖鳞萃,商贾辐辏,实西秦之都会也。”@姚燧《牧庵集》卷6《遐观堂记》:“西北通咸阳,王公之开府于此。与西、南、北三陲之使,冠盖之去来,樽俎之候饯者所出,行旅之伙不列也。”与甘肃行省相比,陕西行都指挥使司的北界经历了大幅度的涨缩。洪武年间明军多次扫荡居延海周围,冯胜、沐英、宋展曾先后率兵攻下亦集乃,但都随即撤出,没有长驻军队守备。居延海一带水草丰美,又有弱水及其支流张掖河同河西走廊相接,是蒙古人南下的主要途径,洪武二十六年之后,明朝在离亦集乃不远的地方设置了威远守御千户所,在肃州与居延海中间设立了威虏卫、白城子守御千户所。这一卫二所成为明军出征蒙古的据点。威远所成为洪武年间行都司控制区的最北界。所以嘉靖《陕西通志》载行都司疆域“东一千一百七十五里,至于临挑府之兰州界;南一千五百七十五里,至于西宁卫之黄河界;西五百七十里,至于肃州卫之嘉峪山;北一千五百里,至亦集乃地”①。 [1] 历史沿革 陕西布政使司:元属陕西行中书省、甘肃行中书省、宣政院辖地。洪武二年(1369)奉元路改置西安府,同年置陕西行中书省,治西安府,辖西安府、凤翔府、巩昌府;同年延安路改置延安府来属;庆阳府、临洮府来属;三年(1370)平凉府来属;同年兴元路改置汉中府来属;六年(1373)置河州府;九年(1376)陕西行省改置陕西承宣布政使司;十二年(1379)河州府废;弘治三年(1490)置灵州直隶州来属;万历二十三年(1595)兴安州升兴安直隶州。 行政区划 西安府 西安府:元为奉元路。洪武二年(1379)改置西安府,同年属行省。崇祯十六年(永昌元年,1643)李自成定为西京。长安县:倚郭[城西偏]。咸宁县:倚郭[城东偏]。咸阳县:洪武二年(1369)自渭河北徙治渭河南。泾阳县:兴平县:临潼县:渭南县:元属华州。嘉靖三十八年(1559)直属西安府。蓝田县:鄠 县:盩厔县:西南有十八盘巡司驻骆谷谷中;南有柴家关巡司,正德十六年设。高陵县:富平县:元属耀州。万历三十九年(1611)直属西安府。东北有美原巡司,后废。三原县:元属耀州。弘治三年(1490)直属西安府。醴泉县:元属乾州。嘉靖三十八年(1559)直属西安府。华 州:元[无倚郭]。华阴县:蒲城县:商 州:元[无倚郭]。洪武七年(1374)降为商县,成化十三年(1477)复升为商州。东南有武关巡司,西有秦岭巡司。商南县:成化十三年(1477)析商县于云层驿置商南县,来属商州;寻徙治沭河西。东偏南有富水堡巡司。雒南县:元洛南县。洪武七年(1374)改属华州,成化十三年(1477)复改属商州;天启初年更名雒南县。东南有三要巡司,东北有石家坡巡司。山阳县:成化十二年末(1477)析商县于丰阳巡司置山阳县,来属西安府;十三年(1477)改属商州。原丰阳巡司迁县东南漫川里,仍名丰阳巡司;东偏南有竹林关巡司。镇安县:景泰三年(1452)析咸宁县于野猪坪置镇安县,来属西安府;天顺七年(1463)徙治谢家湾,成化十三年(1477)改属商州。北有旧县巡司驻乾佑关,天顺七年之后设;西有五郎坝巡司,正德十六年设。同 州:元[无倚郭]。朝邑县:洪武九年(1376)析山西蒲州蒲津关(临晋关、大庆关)来属。东偏北有蒲津关巡司。合阳县:韩城县:澄城县:白水县:洪武初年自县南故城徙今治。西北有马莲滩巡司。耀 州:元[无倚郭]。同官县:北偏西有金锁关巡司驻神水峡中。乾 州:元[无倚郭]。武功县:永寿县:县境有土副巡司。邠 州:元为直隶州。洪武二年(1369)降为散州,改属西安府,并省倚郭新平县入州。淳化县:三水县:元省入淳化县。成化十三年(1477)复置三水县,来属邠州。东偏南有石门巡司。长武县:元宜禄县省入新平县。洪武二年(1369)其地为邠州宜禄镇,万历三十一年(1583)置长武县,来属邠州。宜禄巡司驻宜禄镇,弘治三年迁县东偏南冉杏,仍名宜禄巡司,万历十一年迁县西北为窑店巡司。 凤翔府 凤翔府:元为直隶府。洪武二年(1369)属行省。凤翔县:倚郭。岐山县:宝鸡县:西南有益门镇二里散关巡司,东南有虢川巡司。扶风县:郿 县:元属奉元路。洪武二年(1369)改属凤翔府。麟游县:西偏北有石窑关巡司。汧阳县:元属陇州直隶州。嘉靖二十七年(1548)自县西徙今治,三十八年(1559)直属凤翔府。陇 州:元为直隶州,属巩昌总帅府。洪武二年(1369)降为散州,改属凤翔府,并省倚郭汧源县入州。西北有故关(陇关、大震关)大寨巡司,南偏东有陇安巡司,南偏西有香泉巡司。 汉中府 汉中府:元为兴元路。洪武三年(1370)改置兴元府,属行省,同年更名汉中府。南郑县:倚郭。南有青石关巡司。褒城县:洪武十年(1377)省入南郑县,后复置褒城县,仍属汉中府。北有鸡头关巡司。城固县:洋 县:元为洋州[无倚郭]。洪武三年(1370)降为洋县,仍属汉中府;十年(1377)省入西乡县,后复置洋县,仍属汉中府。西乡县:南偏东有盐场关,西南有大巴山巡司,东北有子午镇巡司。凤 县:元为凤州[无倚郭]。洪武七年(1374)降为凤县,仍属汉中府。北偏东有清风阁巡司;东南有留坝巡司,后迁县东南废丘关,再迁县东南柴关,仍名留坝巡司。沔 县:元为沔州属广元路。洪武三年(1370)改属汉中府,并省倚郭铎水县入州;七年(1374)降为沔县,仍属汉中府;十年(1377)省入略阳县,后复置沔县,仍属汉中府;成化二十二年(1486)改属宁羌州,嘉靖三十八年(1559)复直属汉中府。大安县:元属广元路沔州。洪武三年(1370)省入沔州。宁羌州:成化二十二年(1486)析沔县于宁羌卫置宁羌州,来属汉中府。西北有阳平关巡司。略阳县:元属广元路沔州。洪武三年(1370)改属汉中府,成化二十二年(1486)改属宁羌州。北有九股树巡司,西北有罝口巡司;又北偏西有白水镇巡司,后废。 延安府 延安府:元为延安路。洪武二年(1369)改置延安府,属行省。崇祯十六年(永昌元年,1643)李自成更名天保府。肤施县:倚郭。安塞县:西南有敷政巡司。甘泉县:安定县:保安县:西北有顺宁巡司。宜川县:延川县:延长县:青涧县:元属绥德州。嘉靖四十一年(1562)直属延安府。崇祯十六年(永昌元年,1643)李自成更名天保县。鄜 州:元[无倚郭]。西有直罗巡司。洛川县:南偏东有鄜城巡司。中部县:宜君县:绥德州:元[无倚郭]。洪武十年(1377)废,后复置绥德州,仍属延安府。东偏南有官菜园渡口巡司。米脂县:西北有碎金镇巡司,西南有克戎寨巡司。葭 州:元[无倚郭]。洪武七年(1374)降为葭县,改属绥德州;十三年(1380)复升为葭州,复改属延安府。吴堡县:洪武七年(1374)改属绥德州,寻省,十三年(1380)复置吴堡县,仍改属葭州。神木县:洪武二年(1374)废,十三年(1380)复置神木县,仍属葭州;正统五年(1440)自东南徙治杨家城,成化年间复徙旧治。府谷县:洪武二年(1374)废,十三年(1380)复置府谷县,仍属葭州。成化七年(1471)并属榆林卫节制。 庆阳府 庆阳府:元为直隶府,属巩昌总帅府。洪武二年(1369)属行省。安化县:元省入庆阳府。洪武二年(1369)复置安化县,仍为倚郭。北有槐安、定边巡司;又西南有驿马关巡司,后废;又有灵州、大盐池巡司,后俱废。合水县:东北有华池巡司。环 县:元为环州直隶州[无倚郭],属巩昌总帅府。洪武二年(1369)降为环县,改属庆阳府。真宁县:元属宁州直隶州。万历二十九年(1601)直属庆阳府。东有雕山岭巡司。宁 州:元为直隶州[无倚郭],属巩昌总帅府。洪武二年(1369)降为散州,改属庆阳府。东偏北有襄乐巡司。 平凉府 平凉府:元为直隶府,属巩昌总帅府。洪武三年(1370)属行省。平凉县:倚郭。崇信县:华亭县:西北有瓦亭关巡司驻东瓦亭,南偏东有三乡镇巡司,北有马铺岭巡司。镇原县:元为镇原直隶州[无倚郭],属巩昌总帅府。洪武三年(1370)降为镇原县,改属平凉府。西有安平寨巡司。隆德县:元属静宁直隶州。嘉靖三十八年(1559)直属平凉府。泾 州:元为直隶州。洪武三年(1370)降为散州,改属平凉府,自泾水北徙治皇甫店,并省倚郭泾川县入州。东有金家凹巡司。灵台县:静宁州:元为直隶州[无倚郭],属巩昌总帅府。洪武三年(1370)降为散州,改属平凉府。庄浪县:元为直隶州[无倚郭]。洪武三年(1370)降为散州,改属凤翔府;八年(1375)降为庄浪县,改属静宁州。固原州:元为开成县,为开成直隶州倚郭。洪武二年(1370)废开成州,县改属平凉府;成化三年(1467)县徙治固原所城,弘治十五年(1502)升为固原州。广安州:元属开成直隶州。洪武二年(1369)省入开成县。 巩昌府 巩昌府:元为直隶府,属巩昌总帅府。洪武二年(1369)属行省。陇西县:倚郭。安定县:元为安定直隶州[无倚郭],属巩昌总帅府。洪武十年(1377)降为安定县,改属巩昌府。西北有巉口巡司。会宁县:元为会宁直隶州[无倚郭],属巩是总帅府。洪武十年(1377)降为会宁县,改属巩昌府。东偏南有青家巡司。通渭县:漳 县:元为鄣县。洪武元年(1368)更名漳县,正统年间自县西南故城徙今治。宁远县:伏羌县:西和县:元为西和直隶州[无倚郭],属巩昌总帅府。洪武十年(1377)降为西和县,改属巩昌府;洪武年间自县西南白石镇徙今治。成 县:元为成州直隶州[无倚郭],属巩昌总帅府。洪武十年(1377)降为成县,改属巩昌府。北有黄渚关巡司。秦 州:元为直隶州,属总昌总帅府。洪武二年(1369)降为散州,改属巩昌府,并省倚郭成纪县入州。东南有高桥巡司。秦安县:东北有陇城关巡司。清水县:东偏北有盘岭巡司驻陇山。礼 县:成化九年末(1474)于礼店千户所置礼县,来属秦州。西南有漩水镇巡司,南有板桥山巡司。阶 州:元为直隶州[无倚郭],属巩昌总帅府。洪武四年(1371)降为阶县,改属巩昌府;五年(1372)自县东南坻龙冈上徙今治,十年(1377)复升为阶州。东有七防关巡司。文 县:元文州属吐蕃宣慰司。洪武四年(1371)降为文县,改属巩昌府;十年(1377)改属阶州,二十三年(1390)省入阶州,成化九年末(1474)复置文县,仍属阶州。徽 州:元为直隶州[无倚郭],属巩昌总帅府。洪武十年(1377)降为徽县,改属巩昌府;寻复升为徽州。东南有虞关巡司。两当县:洪武十年(1377)省入徽县,寻复置两当县,仍属徽州。 临洮府 临洮府:元为直隶府,属巩昌总帅府。洪武三年(1370)属行省。狄道县:倚郭。北有摩云岭巡司。渭原县:西有分水岭关巡司。兰 州:元为直隶州[无倚郭],属巩昌总帅府。洪武二年(1369)降为兰县,改属临洮府;成化十三年(1477)复升为兰州。北有河桥巡司。金 县:元为直隶州[无倚郭],属巩昌总帅府。洪武二年(1369)降为金县,改属临洮府,洪武年间自县南故城徙今治;成化十三年(1477)改属兰州。河 州:元为河州路[无倚郭],属吐蕃宣慰司。洪武四年(1371)废,六年(1373)置河州府,属行省;十二年(1379)复废,成化九年末(1474)置河州,改属临洮府。东偏南有定羌巡司,元定羌县。定羌县:洪武三年(1370)省入河州路,设定羌巡司。安乡县:洪武三年(1370)省入河州路,六年(1373)复置安乡县,十二年(1379)废。宁河县:洪武三年(1370)省入河州路,六年(1373)复置宁河县,十二年(1379)废为和政驿。 灵州 灵 州:元[无倚郭]属宁夏路。洪武三年(1370)废,弘治三年(1490)于灵州所城复置灵州直隶州,属布政司。 兴安州 兴安州:元金州[无倚郭]属兴元路。明自汉水北徙治汉水南;万历十一年(1583)徙治故城南二里,同年更名兴安州,二十三年(1395)升为直隶州,属布政司。东北有乾祐关巡司,后废。平利县:元省入金州。洪武三年(1370)复置平利县,来属四川大宁州,五年(1372)复改属金州;十年(1377)复省,后复置平利县,仍属金州。东南有镇坪巡司。石泉县:元省入金州。洪武三年(1370)复置石泉县,来属四川大宁州,五年(1372)复改属金州;嘉靖三十八年(1559)直属汉中府,万历十一年(1583)复属金州。东南有迟河口巡司,后迁县西北饶风铺为饶风岭巡司。洵阳县:元省入金州。洪武三年(1370)复置洵阳县,来属四川大宁州,五年(1372)复改属金州。东北有闾关巡司,西北有三岔巡司。汉阴县:元省入金州。洪武三年(1370)复置汉阴县,仍属金州,十年(1377)省入石泉县,后复置汉阴县,仍属金州;嘉靖三十八年(1559)直属汉中府,万历十一年(1583)复属金州。白河县:成化十二年末(1477)析洵阳县于白河堡置白河县,来属湖广郧阳府;十三年(1477)改属金州。紫阳县:正德七年末(1513)析金州于紫阳堡置紫阳县,来属金州;嘉靖三十五年(1556)自紫阳滩左徙治紫阳滩右。 军事卫所 陕西都司陕西都司:洪武三年末(1371)置西安都卫,治西安府,八年(1375)改置陕西都指挥使司。西安前卫:倚郭。洪武五年(1372)置西安前卫于西安府。西安左卫:倚郭。洪武六年(1373)置华山卫于西安府,二十六年(1393)更名西安左卫。西安后卫:倚郭。洪武六年(1373)置西安后卫于西安府。汉中卫:洪武四年末(1372)置汉中守御千户所于汉中府,十三年(1380)升为汉中卫。沔县千户所:洪武三十年(1397)置沔县守御千户所于沔县。宁羌卫:洪武三十年(1397)置宁羌卫于沔县大安地。绥德卫:洪武元年(1368)置绥德卫于绥德州。延安卫:洪武二年(1369)置延安卫于延安府。安定千户所:洪武二年(1369)置安定守御千户所于延安府安定县。塞门千户所:洪武十二年(1379)置塞门守御千户所于安塞县北。保安千户所:洪武十二年(1379)置保安守御千户所于保安县。平凉卫:洪武二年(1369)置平凉卫于平凉府。庆阳卫:洪武四年(1371)置庆阳卫于庆阳府。临洮卫:洪武二年(1369)置临洮卫于临洮府。兰州卫:洪武三年(1370)置兰州卫于兰县。巩昌卫:洪武三年(1370)置巩昌卫于巩昌府。秦州卫:洪武四年(1371)置秦州守御千户所于秦州,十五年(1382)升为秦州卫。礼店前千户所:元礼店文州军民元帅府,属吐蕃宣慰司。洪武四年(1371)置礼店守御前千户所,并自所东故城徙今治,十一年(1378)改属岷州卫,十五年(1382)改属秦州卫。河州卫:洪武四年(1371)废河州路,并置河州卫于故河州府;七年(1374)改属陕西行都卫,九年末(1377)复改属陕西都司,十年(1377)分置河州左、河州右二卫;十二年(1379)河州左卫徙治洮州守御千户所,河州右卫改置河州军民卫,成化九年末(1474)复改置河州卫。归德千户所:元为贵德直隶州[无倚郭]。洪武八年(1375)废。并置归德守御千户所。洮州军民卫:元为洮州直隶州,属吐蕃宣慰司。洪武四年(1371)废,并废倚郭可当县。并置洮州守御军民千户所,属河州卫;十二年(1379)徙河州左卫来治,合并改置洮州军民卫于洮州东笼山南川度地。岷州军民卫:元岷州直隶州[无倚郭],属吐蕃宣慰司。洪武四年(1371)废,嘉靖二十四年(1545)复置岷州,四十年(1561)复废。洪武四年(1371)置岷州守御千户所,属河州卫;十一年(1378)升置岷州卫,十五年(1382)改置岷州军民卫,嘉靖二十四年(1545)复改置岷州卫,四十年(1561)复改置岷州军民卫。西固城军民千户所:洪武七年(1374)置西固城守御千户所于西固城,属巩昌府;十五年(1582)更名西固城守御军民千户所,改属岷州卫军民卫。铁城千户所:元为铁州直隶州[无倚郭],属吐蕃宣慰司。洪武四年(1371)废。并置铁城守御千户所,属河州卫;后废。宁夏卫:元为宁夏路。洪武三年(1370)改置宁夏府,五年(1372)废。洪武二十六年(1393)置宁夏卫,二十八年(1395)更名宁夏右护卫(属??王府),永乐元年(1403)复更名宁夏卫。灵州千户所:洪武十六年(1383)置灵州守御千户所于河口,宣德三年(1428)徙治故灵州城东。兴武营千户所:正德元年(1506)置兴武营守御千户所于兴武营。平虏千户所:嘉靖三十年(1551)置平虏守御千户所于平虏城。韦州千户所:弘治十年(1497)置韦州守御千户所于故韦州。宁夏中卫:元为应理州[无倚郭]属宁夏路。洪武三年(1370)废。永乐元年(1403)置宁夏中卫。鸣沙州:元[无倚郭]属宁夏路。洪武初年废。宁夏前卫:洪武十七年(1384)置宁夏前卫于宁夏城。宁夏后卫:成化十五年(1479)置花马池守御千户所于花马池,正德元年(1506)升置宁夏后卫。宁夏中屯卫:洪武二十五年(1392)置宁夏中屯卫于宁夏城,后废;明初置和州卫(在南直隶),直属中军都督府,洪武三十五年(1402)更名宁夏中屯卫,徙治宁夏卫城,改属都司。宁夏左屯卫:洪武二十五年(1392)置宁夏左屯卫于宁夏城,后废,洪武三十五年(1402)复置宁夏左屯卫。宁夏右屯卫:洪武二十五年(1392)置宁夏右屯卫于宁夏城,后废,洪武三十五年(1402)复置宁夏右屯卫。靖虏卫:明初置迭烈逊巡司,正统二年(1437)改置靖虏卫于故会州。固原卫:景泰三年(1452)置固原千户所于故原州城,成化五年(1469)升置固原卫。西安千户所:成化五年(1469)置西安守御千户所于开成县西北故西安州。镇戎千户所:成化十二年(1476)置镇戎守御千户所于开成县北偏西葫芦峡城。平虏千户所:弘治十八年(1505)置平虏守御千户所于固原州北偏东豫望城。榆林卫:成化七年(1471)置榆林卫于榆林川,嘉靖九年(1530)析宁夏卫盐池来属。西安中护卫:洪武六年(1373)置秦川卫于西安府,二十六年(1393)更名西安右卫,后更名西安中护卫(属王府)。西安右护卫:明初置泰山卫(属山东都司),后更名西安左护卫(属王府)。宁夏中护卫:宁夏群牧所:甘州中护卫:洪武二十五年(1392)置甘州中护卫于甘州卫城,建文元年(1399)徙治兰州。甘州群牧所:安东中护卫:洪熙元年(1425)置安东中护卫于平凉府(属??王府)。安东群牧所:秦府仪卫司:庆府仪卫司:肃府仪卫司:韩府仪卫司:西安右护卫:明初置西安右护卫(属王府),后更名不详。西安左护卫:明初置西安左护卫(属王府),后更名神武右卫,为在京卫。西安中护卫:明初置西安中护卫(属王府),后更名神武前卫,为在京卫。西安右护卫:明初置华山卫,后更名西安右护卫(属王府),又更名神武右卫,为在京卫。凤翔千户所:洪武二年(1369)置凤翔卫于凤翔府,四年(1371)降为凤翔守御千户所。兴安千户所:洪武年间置金州守御千户所于金州,万历十年(1582)更名兴安守御千户所。阶州千户所:洪武四年末(1472)置阶州守御千户所于阶州,属秦州卫;嘉靖二十二年(1543)直属都司。文县千户所:洪武四年(1371)置文州番汉千户所于文县东,二十三年(1390)更名文县守御军民千户所,成化九年(1473)更名文县守御千户所。环县千户所:洪武四年(1471)置环县守御千户所于环县。安边千户所:嘉靖元年(1522)置安边守御千户所于环县西北//弘治年间。靖边千户所:隆庆元年(1567)置靖边守御千户所于保安县西北靖边营。镇羌千户所:正德三年(1508)置镇羌守御千户所于神木县。积石州千户所:元为积石直隶州[无倚郭],属吐蕃宣慰司。洪武四年(1371)废。并置积石州守御千户所。威虏卫,“在肃州东北,洪武中置,永乐三年三月省”。卫属行都司,治所在“肃州城北一百二十里”,在今甘肃金塔县北的威虏大庙。白城子守御千户所,所置于洪武二十九年九月,《太祖实录》这一月载“‘又言白城子去肃州百有余里,北通和林亦集乃,路当冲要,今令肃州卫遣军沙山侦守,去城四十余里,尚遇烽警碎难策应,如置千户所,分拨精壮骑卒就彼电守,庶得备御。’诏并从其言,仍命右军都督府遣军戍白城子”。威远守御千户所,乾隆《重修肃州新志》载“威远城,在州东北。《新唐书》:肃州有酒泉、威远二守捉城。《肃镇志》:威远城在(肃州卫)卫东北三百八十里,城筑于唐,宋、元因之,明初立为所。后因失误秋表,·该部查究,风闻诛徙,人民惧,俱逃人西域。今有旗杆山.即当时招抚叛民,立旗七杆,军民竟人回夷远地,今尚有三杆峙立焉。又《西域记》云:威远汉人,今在鲁迷地方,穿衣戴帽与夷不同。衣制中国,穿则襟治于背后,网巾同汉人,戴则悬圈于额前。养食犬、泵,与夷不同俗”。 [2] 中军都督府属陕西在外卫所潼关卫:洪武七年(1374)置潼关守御千户所于潼关千户所于华阴县东潼关,九年(1376)升置潼关卫,属河南都司;永乐六年(1408)直属中军都督府。蒲州千户所(在山西):洪武二年(1369)置蒲州守御千户所于蒲州,直属山西都司;后改属潼关卫。陕西行都司陕西行都司:元属甘肃行中书省。洪武七年(1374)置陕西行都卫,治河州卫,辖河州、乌思藏、朵甘三卫,八年(1375)改置陕西行都指挥使司,九年末(1377)废;十二年(1379)复置陕西行都指挥使司于庄浪卫,二十六年(1393)徙治甘州卫。甘州后卫:倚郭。元为甘州路[无倚郭]。洪武初年废。明初置甘肃卫,洪武二十八年(1395)更名甘州后卫。甘州左卫:洪武二十三年末(1391)置甘州左卫于甘州卫城,二十七年(1394)废,二十八年(1395)复置甘州左卫。甘州右卫:倚郭。洪武二十五年(1392)置甘州右卫于甘州卫城。甘州中卫:倚郭。洪武二十五年(1392)置甘州中卫于甘州卫城。甘州前卫:倚郭。洪武二十八年(1395)置甘州前卫于甘州卫城。肃州卫:元为肃州路[无倚郭]。洪武初年废。洪武二十七年(1394)置肃州卫。威虏卫:洪武十八年(1385)置威虏卫于王子庄东十里。永乐三年(1405)废。永昌卫:元为永昌路[无倚郭]。洪武初年废。洪武十五年(1382)置永昌卫,属陕西都司,后改属陕西行都司。山丹卫:元为山丹直隶州[无倚郭]。洪武初年废。洪武二十三年(1390)置山丹卫,属陕西都司,后改属陕西行都司。凉州卫:元为西凉州[无倚郭]属永昌路。洪武初年废。洪武九年(1376)置凉州卫,属陕西都司,后改属陕西行都司。凉州土卫:洪武七年(1374)置凉州土卫。镇番卫:洪武年间置临河卫于小河滩城,三十年(1397)更名镇番卫,建文年间废,永乐元年(1403)复置镇番卫。庄浪卫:洪武五年(1372)置庄浪卫于永昌地,属陕西都司,十二年(1379)改属陕西行都司;建文年间降为庄浪守御千户户所,洪武三十五年(1402)复升为庄浪卫。西宁卫:元为西宁直隶州[无倚郭]。洪武初年废。洪武六年(1373)置西宁卫,属陕西都司;宣德七年(1432)改置西宁军民卫,后改属陕西行都司。沙州卫:元为沙州路[无倚郭]。洪武初年废。永乐元年(1403)置沙州卫,正统年间废。瓜 州:元为瓜州[无倚郭]属沙州路。洪武初年废。碾伯千户所:洪武十一年(1378)置庄浪分卫于碾北地,同年改置碾北卫;后废,并徙西宁卫右千户所自西宁城来治,更名碾北守御千户所,直属陕西行都司;成化年间更名碾伯守御千户所。古浪千户所:正统三年(1428)析庄浪卫置古浪守御千户所于古浪河西。镇夷千户所:洪武三十年(1397)析甘州卫置镇夷守御千户所于张掖河北,建文二年(1400)废,永乐元年(1403)复置镇夷守御千户所,天顺八年(1464)自所西北徙治张掖河南。高台千户所:景泰七年(1456)析甘州卫置高台守御千户所于高台站。 部分地名考 镇安县旧县巡司:今柞水县;镇安县五郎坝巡司:今宁陕县关口镇老城村;凤县留坝巡司(留坝):今留坝县;米脂县克戎寨巡司:今米脂县;河州定羌巡司:今广河县;平利县镇坪巡司:今镇坪县;宁夏后卫;今盐池县;兴武所:今盐池且高沙窝乡二步坑村兴武营古城;宁夏平虏所:今平罗县;韦州所:今同心县韦州镇;西安所:今海原县西安乡西安州古城;镇戎所:今海原县李旺乡北境;固原平虏所:今同心县豫旺镇;安边所:今环县西北60公里;靖边所:今靖边县新城乡;积石州所:今循化县积石镇;威虏卫:今金塔县古城乡;镇夷千户所:今高台县罗城乡天城村。
|
[
"1377年。"
] | 10,138
|
multifieldqa_zh
|
zh
| null |
0ff6f47407e376cd3868364ae0b260e70bd41e1b6d416de8
|
2012年规划建设了多少个农业产业园区?
|
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和其他列席会议的同志提出意见。
一、2012年政府工作回顾
2012年是撤地设市后的第一年,也是我市经济社会发展取得显著成效的一年。在省委、省政府和市委的坚强领导下,在市人大和市政协的监督、支持下,市人民政府紧扣主基调、主战略,抢抓国发2号文件和武陵山片区扶贫攻坚规划的历史性机遇,努力克服国内经济下行等不利因素影响,加快“三化”同步,推进“一业”振兴,全面完成了市一届人大一次会议确定的各项目标,开创了发展提速、转型加快、结构向优、活力增强、民生改善的新局面。
2012年,是发展速度明显加快、经济保持高位运行的一年。预计,全年地方生产总值447亿元,增长17%,实现了人均GDP破万元。全社会固定资产投资700亿元,增长65.1%;财政总收入63.73亿元,增长25.89%;公共财政收入36.57亿元,增长28.73%;社会消费品零售总额106.2亿元,增长18%;城镇居民人均可支配收入16338元,增长18%;农民人均纯收入4802元,增长20%。固定资产投资增速全省第二,城镇居民人均可支配收入增速全省第一,旅游总收入增速全省第三,税收收入增速全省第四,农民人均纯收入增速全省第六。
2012年,是基础设施大为改善、发展条件不断夯实的一年。交通运输建设突飞猛进。长昆铁路加快建设,铜玉城际铁路实质性开工前期准备有序推进;铜大高速建成通车,新增高速公路56公里,结束了铜仁中心城区与外界无高速公路连接的历史;杭瑞高速铜仁段、思剑高速加快建设,铜仁至松桃、沿河至德江、江口至石阡高速实质性开工,铜仁至怀化、铜仁环城高速前期工作基本完成,在建高速公路里程513.1公里;实施国省干道改造60公里,完成通村油路建设1426公里,通村油路率从上年的22.5%提高到31%;铜仁凤凰机场改扩建工程实质性开工,铜仁至贵阳航班加密至每天往返8个班次,至广州航线复航实现周往返4个班次;乌江航道整治工程和通航设施建设加快推进。水利建设“三位一体”规划深入实施。松桃道塘、石阡花山水库已下闸蓄水,德江长丰水库建设加快,江口鱼粮、玉屏白岩河、印江栗子园、松桃盐井、思南过水湾5座中型水库开工建设,实施71座水库除险加固工程,万山小云南、大兴水利枢纽工程等8座中型水库和松桃陆家坝、玉屏青山冲等5座小(1)型水库项目前期工作有序开展。全年新增解决农村饮水安全34万人,新增、改善、恢复灌溉面积14万亩,增加烟水配套灌溉面积5.45万亩,农村人均有效灌溉面积达到0.62亩;完成石漠化治理面积138.96平方公里,森林覆盖率达到52.98%,提高1.51个百分点。电力、通信等基础设施建设加快推进。沙沱电站准备下闸蓄水,铜松500千伏输电线路工程等6个项目开工建设,电力保障能力进一步加强;全市移动电话拥有率达42%,移动通信基站达3900个,互联网用户达14万户。
2012年,是发展质量不断提升、经济结构更加优化的一年。预计三次产业结构由上年的28.93:27.93:43.14调整为26.80:29.50:43.70,实现由农业经济向工业经济实质性转型,经济增长的协调性不断增强,质量进一步提高。工业经济平稳较快增长。启动建设黔东工业聚集区,推动工业经济集群发展。全市12个工业园区开工建设基础设施项目119个,完成投资83.9亿元,基本实现“五通一平”,建成标准厂房120万平方米,园区基础设施建设取得阶段性突破;大兴工业园区被认定为省级高新技术产业园区,大龙开发区被省确定为“511”产业示范园区,碧江区、印江县、沿河县工业园区被认定为省级经济开发区。开工、续建工业项目507个,建成投产204个,创年度投产工业项目历史最好水平,全市规模工业企业从上年的236家增加到368家,完成规模以上工业增加值70亿元,增长21%。在工业经济总量快速扩张的同时,轻重工业比例从上年的19.8:80.2调整为28.2:71.8,工业结构持续调优、效益继续向好;民营经济所占比重由上年的45%提高到48%,县域经济比重由上年的70%提高到75%,经济活力更加增强。现代农业稳步推进。以实施“三个万元”工程为抓手,以现代农业产业园区建设为载体,加快发展茶叶、蔬果、核桃、中药材、油茶五大主导产业,全市粮经比从上年的47:53调整为43:57,茶园面积达103.5万亩,居全省第二。规划建设畜牧产业示范区8个、生态环保型网箱养殖示范园区3个、特种野猪养殖场176个、竹鼠养殖场233个、大鲵人工养殖场31个,肉类总产量25.4万吨,增长12.79%。规划建设农业产业园区28个,松桃县、江口县扶贫产业示范园区被列为省级试点;新增县级以上龙头企业134家、农民专业合作社535家,农产品加工转化率提高到34.3%;组建茶叶行业协会,启动茶叶品牌整合工作。完成烟叶收购70.49万担。预计农林牧渔业总产值197亿元,增长9.8%。以文化旅游产业为核心的服务业快速增长。启动环梵净山“金三角”文化旅游创新区建设,成功举办市第一届旅发大会、贵州梵净山文化旅游节、中华龙舟大赛等节会赛事,在央视、凤凰卫视等高端媒体开展了铜仁形象宣传,梵净山、大明边城、石阡温泉群创建为国家4A级景区,万山汞矿遗址列入中国申报世界文化遗产预备名录,预计全年旅游收入158.8亿元,增长75.5%。现代物流、会展、商贸等服务业加快发展,公路旅客周转量和货物周转量分别增长67.9%和52.8%,预计服务业增加值195亿元,增长20%。
|
[
"28个。"
] | 2,321
|
multifieldqa_zh
|
zh
| null |
a9bc05b2bdf91f05ff940f3aa6daf6223c04dee6b50a81d9
|
Osmo Mobile 6支持哪些拍摄模式?
|
'用户手册 v1.0 2022.09
快速搜索关键词 PDF 电子文档可以使用查找功能搜索关键词。例如在 Adobe Reader 中,Windows 用户使 用快捷键 Ctrl+F,Mac 用户使用 Command+F 即可搜索关键词。点击目录转跳 用户可以通过目录了解文档的内容结构,点击标题即可跳转到相应页面。打印文档 本文档支持高质量打印。 阅读提示 符号说明 重要注意事项 操作、使用提示 使用建议 DJITM OSMOTM 为用户提供了教学视频和以下文档资料: 1. 《安全概要》 2. 《快速入门指南》 3. 《用户手册》 DJI Mimo App https://s.dji.com/guide38 建议用户首先扫描二维码或在 DJI 官网 www.dji.com/osmo-mobile-6/video,DJI Mimo App内观看教学视频,再阅读《安全概要》和《快速入门指南》了解使用过程。获取详细产品信息 请阅读《用户手册》。 下载 DJI Mimo App 使用本产品过程中,需要下载安装 DJI Mimo App。请在手机软件商店搜索“DJI Mimo”或使 用手机扫描以上二维码安装。 DJI Mimo App 要求使用 iOS 12.0 及以上系统或 Android 8.0 及以上系统。 2© 2022 大疆创新 版权所有
目录 阅读提示符号说明使用建议下载 DJI Mimo App产品概述认识 Osmo Mobile 6首次使用充 电安装手机使用机身功能工作模式DJI Mimo App连接 DJI Mimo相机界面固件升级如何升级收纳规格参数2 2 2 2 4 4 5 5 5 8 8 11 12 13 13 17 17 17 18 © 2022 大疆创新 版权所有3
产品概述 Osmo Mobile 6 是适配手机的高精度三轴云台,集成了 DJI 先进的云台增稳技术,使手机可拍 摄稳定流畅的运动画面。Osmo Mobile 6 机身为折叠设计,方便收纳和携带,云台展开即可自 动开机;通过磁吸方式快捷连接手机,内置延长杆方便自拍,支持手机横、竖屏使用,具有完 善的功能设计和简易的操作性。云台可工作在多种模式,完备的机身按键使单手即可完成不同 拍摄需求。通过蓝牙与 DJI Mimo App 连接,Osmo Mobile 6 可控制手机相机,利用 Mimo 可 使用智能跟随 5.0、动态变焦、手势控制、全景拍摄等更丰富功能,Story 模式、延时摄影、拍 摄指导还可提供简单易用的拍摄模板。认识 Osmo Mobile 6 11 10 9 8 12 13 14 15 1 2 3 4 5 6 7 1. 磁吸手机夹 3 2. 磁吸对位开关 3. 平移轴电机 4. 状态显示面板 5. 侧面拨轮 6. 摇杆 9. 拍摄按键 10. 电源 /M 按键 11. 俯仰轴电机 12. 横滚轴电机 13. M3×0.5 螺纹孔 14. 充电接口(USB-C) 7. 1/4"-20 UNC 螺纹孔 15. 扳机 8. 切换按键 Osmo Mobile 6 支持 DJI OM 补光手机夹及 DJI Mic 等配件。请在 DJI 官方商城单独购买。 4© 2022 大疆创新 版权所有
首次使用 充 电 通过手柄上的充电接口(USB-C)给 Osmo Mobile 6 充电。充满电后,状态显示面板中的电量 指示灯熄灭。 充电时间:约 1 小时 24 分钟(25℃环境温度下使用 10 W 充电器时测得) 最长工作时间:约 6 小时 24 分钟(为 Osmo Mobile 6 达到理想平衡状态时测得,仅供参考) 安装手机 1. 请按照以下步骤展开云台,云台展开后将自动开机。 1 2 © 2022 大疆创新 版权所有5
2. 将手机套入磁吸手机夹,使手机夹位于手机中间。磁吸手机夹可向两边拉伸,注意位于手机 夹侧边的相机标识与手机相机应一致朝上。 3. 将磁吸手机夹与云台上的标记对齐,随后将手机夹连同手机吸附于云台上。状态显示面板中 的云台模式指示灯亮起后,即可为手机增稳。 磁吸手机夹使用提示 确保磁吸手机夹方向正确(如图所示)。为使云台达到最佳工作性能,尽量保证手机夹水平并 处于手机的中间位置,确保手机夹两侧拉伸距离相等,与手机之间最大程度贴合,并保持两侧 间隙一致。 手机防滑垫可增强手机与手机夹之间的摩擦力,使之更贴合。如有需要请按图示粘贴防滑垫, 粘贴后请手动用力按压 10s 以上以保证粘贴效果。 若手机磁吸对位不准,状态显示面板中的系统状态指示灯将为红灯呼吸,此时请调整手机磁 吸位置,确保吸附到位。 6© 2022 大疆创新 版权所有 Osmo Mobile 6用户手册
4. Osmo Mobile 6 内置延长杆,最长可拉伸至 215 mm,支持手动调节角度。角度调节范围 为 0°-90°。 2 1 © 2022 大疆创新 版权所有7 Osmo Mobile 6用户手册
使用 机身功能 状态显示面板 显示系统状态指示灯、电池电量及云台模式。系统状态指示灯描述 闪灯方式 红灯呼吸 黄灯常亮 绿灯常亮 呼吸灯(黄绿) 红绿灯交替闪烁 红灯常亮电量指示灯描述 闪灯方式 红灯快闪 红灯常亮 黄灯常亮 绿灯常亮 云台模式 描述 磁吸位置未对准 蓝牙未连接 蓝牙已连接 待机 正在升级或升级失败 云台异常 电量 ≤5% 6%-19% 20%-60% >60%云台跟随:表示平移轴和俯仰轴均跟随手柄动作,横滚轴不跟随。适合拍摄升降和斜向运镜 的画面。俯仰锁定:表示仅平移轴跟随手柄动作。适合拍摄平移方向和环绕方向运动的画面。FPV:表示平移、俯仰和横滚轴均跟随手柄动作。适用于拍摄第一人称视角画面。旋转拍摄:表示平移、俯仰和横滚轴均跟随手柄动作,并且可以通过摇杆控制云台横滚轴旋 转。适用于推拉运镜和俯拍镜头。 M 键 关机时 云台折叠状态下,单击或长按:查看电量 云台展开状态下,单击:开机 开机时 单击:切换云台模式 三击:进入待机模式(任意按键操作唤醒) 长按:关机;长按约 20s 可强制关机 8© 2022 大疆创新 版权所有
侧面拨轮 单击:切换变焦 / 对焦模式 转动:控制变焦 / 对焦 摇杆 默认控制云台上下 / 左右运动。可在 Mimo 设置摇杆控制方向;在 Mimo 快捷菜单页面中,可控制快捷菜单切换 拍摄按键 单击:拍摄 / 暂停 长按:连拍(拍照模式下) 切换按键 单击:切换前后摄像头 双击:切换横竖拍 三击:切换拍照 / 录像,可在 Mimo 设置控制快捷菜单切换 扳机 单击:开启 / 停止智能跟随(需配合 Mimo 使用) 双击:云台回中;智能跟随模式下,目标画面回中 单击 + 按住不放:云台跟随速度调整为快挡,松开退出 按住不放:进入锁定模式,松开退出 充电接口(USB-C) 通过此接口为 Osmo Mobile 6 充电。 1/4"-20 UNC 螺纹孔 底部 1/4"-20 UNC 螺纹孔适配三脚架。 © 2022 大疆创新 版权所有9 Osmo Mobile 6用户手册
M3×0.5 螺纹孔 用于安装第三方配重块。如果需要使用手机镜头或麦克风等配件,请 配合配重块使用,并确保总重量在 290 g 以内。 组合按键 扳机 + 拍摄按键 + 切换按键同时按下超过 1s:重置蓝牙名称,可重新配对连接。 Osmo Mobile 6 待机 3 分钟无操作将自动关机。 10© 2022 大疆创新 版权所有 Osmo Mobile 6用户手册
工作模式 工作模式在手机为横、竖拍状态下均适用。 标准模式 悬挂模式 Osmo Mobile 6 默认工作在标准模式。双击 扳机,云台将回中指向前方并与地面平行。 将 Osmo Mobile 6 倒置 180°,即进入悬挂 模式。双击扳机,相机镜头将指向前方,同 时与地面平行。 侧握模式 低机位模式 将 Osmo Mobile 6 从标准模式向左或向右倾 斜 90°即为侧握模式。双击扳机可将相机镜 头调整至前方。 拉伸内置延长杆,通过手动调节延长杆角度 至低机位模式。低机位模式适合在低角度场 景拍摄。 © 2022 大疆创新 版权所有11 Osmo Mobile 6用户手册
DJI Mimo App Osmo Mobile 6 配合 DJI Mimo App 使用,可在设备上实时显示高清拍摄画面,进行相机以及 云台设置,使用拍摄指导、Story 模式、延时摄影、智能跟随 5.0、全景拍摄等创新功能。设备:点击设备按提示连接 Osmo Mobile 6,连接成功后自动跳转至相机界面。 学堂 :进入学堂查看教学视频、说明书等。扫描机身二维码可直接进入学堂。一键剪辑:提供多种编辑模板,以编辑已拍摄素材。首页:点击返回首页。相册:可管理手机本地及 DJI 设备素材。编辑:点击可导入、编辑已拍摄素材。 我的:显示 DJI 账号信息及作品列表,点击设置图标进入相关设置。 12© 2022 大疆创新 版权所有
连接 DJI Mimo 1. 开启 Osmo Mobile 6。 2. 开启手机蓝牙功能。运行 DJI Mimo,选择连接前缀名为 OM6 的设备。 3. 首次连接 DJI Mimo,需要授权提供相关信息,此过程需要连接互联网。授权后即可将设备 激活,随后即进入相机拍摄界面。 在 手 机 设 置 中 连 接 蓝 牙 与 Osmo Mobile 6 后, 不 需 连 接 DJI Mimo 也 可 以 通 过 OsmoMobile 6 控制手机相机(具体支持功能请在 DJI 官网查看手机支持列表 www.dji.com/osmo- mobile-6)。 相机界面 1 2 3 4 5 6 7 8 9 18 17 10 11 12 13 16 15 14 1. 主页: 点击返回首页。 2. 拍摄指导: 拍摄指导功能根据不同场景,提供不同拍摄手法模板,并支持一键视频剪辑。 3. 智能跟随瞄准框: 智能跟随 5.0 开启后,Osmo Mobile 6 可自动跟随选中目标移动,使目标始终保持在 拍摄画面特定区域(默认是画面中央位置,也可手动调节构图)。启动智能跟随 5.0 有三种 方式: © 2022 大疆创新 版权所有13 Osmo Mobile 6用户手册
a. 在 DJI Mimo App 拍摄画面用手指在屏幕上画框,屏幕出现绿色瞄准框表示目标已选中, 随即开始跟随,点击瞄准框右上角 图标即停止跟随。 b. 在 DJI Mimo App 打开手势控制开关 OFF,并选择“跟随 + 拍摄”,可通过以下手势触发 智能跟随 5.0:用户面向摄像头,做出“剪刀手”或“手掌”手势并停留 1-2 秒,摄像头 会匹配和触发手型距离最近的人物进行跟随。手势跟随的有效识别距离为 0.5-4 米。此 功能可能会增加手机功耗,导致手机发热。智能跟随拍摄视频过程中,使用“剪刀手” 或“手掌”手势可停止拍摄。 c. 单击扳机启动智能跟随。默认跟随画面中心的目标。在智能跟随 5.0 过程中,推动摇杆可以调整构图。 4. 云台电量: 显示云台当前电量。 5. 手机电量: 显示手机当前电量。 6. 闪光灯: 显示当前闪光灯状态。 7. 云台模式: 显示当前云台模式。 8. 对焦 / 变焦显示: 显示当前侧面拨轮为对焦(MF)或变焦(ZM)功能。 9. 切换前后摄像头: 点击图标切换手机前后摄像头。当切换至前置摄像头时,将自动进入自拍跟随,并默 认开启美颜功能(4K 或 60fps 不支持美颜)。 10. 拍摄模式滑动选择不同的拍摄模式。运动延时:运动延时支持手机在移动状态下拍摄延时影片,点击拍摄按键即可。拍摄完毕后 可在回放中查看延时影片。延时摄影:分为静态延时和轨迹延时。使用静态延时,点击屏幕正上方设置间隔与时长后, 点击拍摄按键即可。轨迹延时提供从左到右、从右到左简易轨迹和自定义三种方式。简易轨 14© 2022 大疆创新 版权所有 Osmo Mobile 6用户手册
迹只需设置拍摄时长及间隔即可点击拍摄,自定义轨迹除设置间隔与时长外,还可选取最多 4 个云台位置点,使手机在选中的位置点按先后顺序拍摄。动态变焦:提供背景靠近与背景远离两种拍摄方式,确定后在屏幕框选目标,点击拍摄按键。 拍摄过程中按选定的方式远离或靠近目标。慢动作:提供 4 倍及 8 倍慢动作视频拍摄(不同型号手机支持情况不同)。视频:普通视频拍摄。照片:单拍或倒计时拍摄;长按连拍。全景拍摄:提供 3×3 全景(超广角)、240°和分身全景三种模式,分别自动拍摄 9 张、7 张和 3 张照片并合成。 Story 模式:用户根据提示拍摄相关片段,拍摄完毕后将自动生成不同风格的视频。 11. 拍摄按键: 点击开始或停止拍摄。 12. 手势控制开关 OFF : 点击展开手势控制设置,可打开或关闭手势开启智能跟随功能。 13. 回放: 点击进入回放页面。 14. 对焦距离 15. 变焦: 单击侧面拨轮切换到对焦模式后可显示当前对焦距离。: 显示当前变焦倍率。指尖在屏幕上作放大、缩小手势或滑动变焦条可实现变焦。 16. 拍摄参数 1/100 80 0: 显示当前快门速度、ISO 值与 EV 值(部分机型支持显示)。 17. 设置 : 相机设置不同拍摄模式可设置选项有所区别,其中所有模式下的闪光灯、白平衡以及网格设置仅针对 后置摄像头;iOS 系统可在拍照和录像模式下使用自拍镜像功能,安卓系统仅在拍照模式下 支持自拍镜像功能。: 云台设置云台模式:可选择云台跟随、俯仰锁定、FPV 或旋转拍摄。跟随速度:表示云台跟随的响应速度,提供快、中、慢三种选择。云台自动校准:自动校准可以解决由环境或人为误操作造成的云台水平歪斜或飘移问题。请 使用三脚架放置云台于水平面上,校准过程中请勿触碰云台。云台水平微调:水平微调前,请先调整手机夹位置,确保手机夹水平,以保证拍摄水平。拨轮模式:可选择侧面拨轮功能为变焦、手动对焦或关闭。三击切换按键:可设置三击切换按键时的功能为拍照 / 录像或进入快捷菜单。摇杆速度:表示推动摇杆时的最大速度,提供快、中、慢三种选择。摇杆控制方向:自由表示摇杆同时支持水平和竖直控制云台方向。水平 / 竖直表示摇杆仅支 持在水平或竖直方向控制云台,不能同时响应两个方向的控制命令。 © 2022 大疆创新 版权所有15 Osmo Mobile 6用户手册
摇杆反向:可设置摇杆控制方向与云台转动方向的对应关系,提供水平反向、垂直反向、全 部反向和关闭四种选择。水平反向开启后,左、右推动摇杆时,云台平移轴动作与原控制方 向相反。垂直反向开启后,上、下推动摇杆时,云台俯仰轴动作与原控制方向相反。拨轮反向:可设置拨轮转动方向与功能的对应关系,提供对焦反向、变焦反向、全部反向和 关闭四种选择。云台声音:可打开或关闭云台提示音。: 通用设置可管理当前连接设备,查看设备名称(可自行修改)、版本信息、设备序列号等。 18. 拍摄参数设置根据不同拍摄模式可设置不同拍摄参数,点击相应图标可展开参数设置界面。 • 以下场景不支持手势控制和智能跟随 5.0:a. 云台模式为 FPV 或旋转拍摄;b. 相机变焦倍率超过 3 倍。 • 以下场景不支持自拍跟随:a. 云台模式为旋转拍摄;b. 已打开手势控制;c. 前置摄像头变焦倍率超过 3 倍。 • 相机设置及支持功能因手机型号有所区别,请参考手机支持列表 (www.dji.com/osmo- mobile-6) 了解详情。 16© 2022 大疆创新 版权所有 Osmo Mobile 6用户手册
固件升级 Osmo Mobile 6 可通过 DJI Mimo App 升级。升级过程大概需要 3 分钟。 如何升级 升级前请检查 Osmo Mobile 6 电量,确保电量指示灯为黄色或绿色。连接 Osmo Mobile 6 与 DJI Mimo 后,若 App 提示可升级新固件,请点击操作。 升级过程中不可退出 DJI Mimo 界面或转入后台操作,并请留意 App 提示信息。升级过程中系 统状态指示灯红绿交替闪烁。升级成功后,系统状态指示灯变为绿灯常亮。 若升级失败,请重启 DJI Mimo,并连接设备蓝牙后重新升级。 收纳 Osmo Mobile 6 机身为折叠设计,折叠后方便收纳和运输。 务必在关机或待机以及延长杆完全收缩的状态下折叠云台。旋转平移轴和俯仰轴,调整至如图 状态,然后往下折叠云台,注意轴臂上的凸起部分应扣入机身。最后旋转平移轴锁定。 1 2 © 2022 大疆创新 版权所有17
展开:276×111.5×99 mm (长 × 宽 × 高)折叠:189×84.5×44 mm (长 × 宽 × 高) 云台:约 309 g磁吸手机夹:约 31 g 215 mm 170-290 g 6.9-10 mm 67-84 mm Li-Po 2S LiCoO2 1000 mAh 7.74 Wh 6-8.8 V 5℃ 至 40℃ 0℃ 至 40℃ 约 6 小时 24 分钟(调平衡工况下的测试参考值) 约 1 小时 24 分钟(使用 10 W 充电器测得) USB-C 不支持 1/4"-20 UNC 螺纹孔 1.1 W 横滚:-100° 至 175°平移:-95° 至 95°俯仰:-25° 至 40° 平移:-161.64° 至 173.79°横滚:-120.30° 至 211.97°俯仰:-101.64° 至 78.55° 120° /s 蓝牙 5.1 DJI Mimo 长度:138 mm直径:32 mm 约 72 g 规格参数 通用 尺寸 重量 延长杆最大拉伸长度 适用手机重量 适用手机厚度 适用手机宽度 电池 类型 化学体系 容量 能量 电压 充电环境温度 使用环境温度 工作时间 充电时间 云台充电接口 对外供电接口 底部接口 云台 功耗 控制转动角度 结构转动范围 最大控制转速 无线模式 型号 其他 App 三脚架 尺寸 重量 18© 2022 大疆创新 版权所有
在线技术支持 微信扫一扫 获取技术支持 https://www.dji.com/osmo-mobile-6/downloads 如果您对说明书有任何疑问或建议,请通过以下电子邮箱联系我们: DocSupport@dji.com。 Copyright © 2022 大疆创新 版权所有
'
|
[
"包括运动延时、延时摄影、动态变焦、慢动作、视频、照片、全景拍摄和Story模式。"
] | 7,672
|
multifieldqa_zh
|
zh
| null |
29665452f5ceb1467ef13ef3e330148d6e27996b071f9edc
|
本案法院判决原告胜诉还是被告胜诉?
|
4541丁德和与江苏海源机械有限公司、盐城市南星纺织新材料有限公司等民间借贷纠纷一审民事判决书
原告丁德和与被告江苏海源机械有限公司(以下简称海源公司)、盐城市南星纺织新材料有限公司(以下简称南星纺织公司)、江苏南星科技实业有限公司(以下简称南星实业公司)民间借贷纠纷一案,本院于2019年8月22日受理后,依法适用普通程序,于2019年10月11日公开开庭进行了审理。原告丁德和、被告海源公司、南星纺织公司、南星实业公司的共同委托诉讼代理人杨红梅均到庭参加诉讼。本案现已审理终结。
原告丁德和向本院提出诉讼请求:1、判令三被告立即归还借款本金75万元,并承担自逾期还款之日起至履行完毕之日止按年利率15%计算的利息;2.本案诉讼费用由三被告承担。事实和理由:原告丁德和与被告海源公司的实际控制人王兆海系朋友关系。2013年5月17日,被告海源公司因经营需要向原告丁德和借款75万元,双方约定借款期限为一年,借款年利率为15%,每三个月支付一次利息。被告南星纺织公司、南星实业公司自愿为该笔借款提供担保。原告丁德和于当日通过转账方式履行了出借义务,但被告海源公司仅归还了10万元,其余款项一直未归还,被告南星纺织公司、南星实业公司也未履行代为清偿义务,原告丁德和多次催要未果,遂诉至法院。
被告海源公司辩称,已经归还的10万元应当予以冲抵。
被告南星纺织公司、南星实业公司共同辩称,本案借款还款期限为一年,现担保时效已过,但两被告愿意继续为该笔借款提供连带责任担保。
根据当事人陈述和经审查确认的证据,本院认定事实如下:
2013年5月17日,被告海源公司因企业经营需要向原告丁德和借款75万元,原告丁德和于当日通过滨海农商银行向被告海源公司指定的王兆海建行卡汇款20万元,并从中国农业银行卡62×××17取现金40万元,连同之前放在家中的现金15万元一并交付给被告海源公司指定的王兆海和蔡海霞。被告海源公司于当日向原告丁德和出具了借条,确认借款期限一年,借款年利率15%,利息每三月一付。被告南星纺织公司、南星实业公司自愿为该笔借款提供担保,承诺若被告海源公司到期未归还借款本息,由担保单位无条件承担清偿和还款责任,并在该借条上加盖了公章。王兆海作为被告海源公司的经办人也在该借条上签字予以确认。借款后,被告海源公司于2013年年底前后归还了5万元利息、5万元本金,其余借款本息一直未还,被告南星纺织公司、南星实业公司作为担保人也未履行代为清偿责任,原告丁德和多次催要未果,遂诉至本院。
另,被告南星纺织公司、南星实业公司于庭审后向本院提交了落款时间为2019年10月10日的《情况说明》,承诺继续为上述借款本息提供连带责任保证。
上述事实,有借条、取款记录、转账记录、《情况说明》、庭审笔录及当事人陈述等证据在案佐证。
本院认为,合法的借贷关系受法律保护。本案中,被告海源公司向原告丁德和借款,原告丁德和以转账和现金方式交付了借款本金75万元,被告海源公司出具了借条,双方的借贷关系成立,借款合同自原告丁德和向被告海源公司提供借款本金时生效。原、被告双方在借条中约定了还款期限和借款利息,被告海源公司应按期足额归还借款本息,现被告海源公司经原告丁德和催要后,未能及时足额归还借款,构成违约,应继续承担还本付息的法律责任。被告海源公司已经归还了5万元借款本金和5万元借款期间届满前的利息(借款期限届满前的应付利息超过被告海源公司已归还的5万元),还应归还70万元借款本金和借款期限届满前的剩余利息、及借款逾期后的利息,现原告丁德和仅主张自逾期之日起的利息,是当事人对自己诉权的处分行为,本院予以支持。原告丁德和主张按年利率15%计息,亦符合法律规定和双方的约定,本院依法予以支持。本案担保期限已过,但被告南星纺织公司、南星科技公司仍自愿继续为该笔借款提供连带责任保证,故在被告海源公司不能归还借款本息时,被告南星纺织公司、南星科技公司仍应积极承担保证责任,履行代为清偿义务。
综上,依照《中华人民共和国合同法》第四十四条、第一百零七条、第一百九十六条、第二百条、第二百零六条、第二百零七条、第二百一十条、《中华人民共和国担保法》第六条、第十八条、第二十六条、《最高人民法院关于审理民间借贷案件适用法律若干问题的规定》第二条之规定,判决如下:
一、被告江苏海源机械有限公司于本判决生效之日起十日内向原告丁德和返还借款本金70万元,并承担自2014年5月18日起至履行完毕之日止按年利率15%计算的利息;
二、被告盐城市南星纺织新材料有限公司、江苏南星科技实业有限公司对上述款项承担连带清偿责任。
以上款项可交至本院执行标的款帐户(开户行:中国银行滨海支行营业部;开户名称:滨海县人民法院标的款;开户帐号:62×××87)。
如果未按判决指定的期间履行上述给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条的规定,加倍支付迟延履行期间的债务利息。
案件受理费14025元,由原告丁德和负担935元,被告江苏海源机械有限公司、盐城市南星纺织新材料有限公司、江苏南星科技实业有限公司负担13090元。
如不服本判决,可在判决书送达之日起十五日内,向本院递交上诉状,并按对方当事人的人数提出副本,上诉于江苏省盐城市中级人民法院。
|
[
"原告胜诉。"
] | 2,189
|
multifieldqa_zh
|
zh
| null |
94998e3b1e2c834bfd79394a8f27d6def6282ad42cdaef06
|
产品应放置在什么样的环境中?
|
'产品安全手册 1 MFC-J2320/J2720 日本名古屋市瑞穗区苗代町 15 番 1 号 邮编:467-8561 兄弟工业株式会社 尝试操作本产品或执行任何维修前,请仔细阅读这本小册子。未能遵循这些说 明可能会增加发生火灾、触电、烧伤或窒息的危险。对于因用户未遵循本手册 中的说明而导致的任何损坏, Brother 概不承担任何责任。 如何使用本手册: 1 使用产品前,请先通读整本手册。请妥善保管好本手册,以便日后查阅。 2 请认真遵循本手册中的说明,并始终确保遵循产品上标注的所有警告事项与说 明进行操作。 3 如果阅读本手册后对产品使用方法仍有疑虑,请联系 Brother 呼叫中心。 4 为确保您能理解所有说明,请仔细阅读本手册中使用的符号和惯例。 版本 A SCHN 1 1
本说明书中使用的符号和惯例 本说明书中使用的符号和惯例如下。 请遵循产品上标注的所有警告事项与说明进行操作。 1 粗体 粗体字表示计算机屏幕上 的按钮。 斜体 斜体字强调应当注意的要 点或提示您参考相关主题。 [xxxxx] 括号内的文字表示产品液 晶显示屏上显示的信息。 提示 本手册中的所有插图均基于MFC-J2720。 警告 警告图标表示可能导致死亡或重伤 的潜在危险情况。 注意 注意图标表示可能导致轻微或中度 伤害的潜在危险情况。 重要事项 重要事项图标表示可能导致财产损 失或产品功能丧失的潜在危险。 提示 提示图标指明操作环境、安装条件 或特殊使用条件。 禁止图标:表示禁止执行的操 作。 此图标表示禁止使用易燃喷雾 剂。 此图标表示禁止使用酒精等有 机溶剂和液体。 触电危险图标:警告您避免可 能发生的触电伤害。 火灾隐患图标:提醒您可能会 引发火灾。 2
编辑及出版说明 1 本产品手册的编辑出版旨在提供截至出版时最新的产品安全信息。手册中包含的 信息如有更改,恕不另行通知。 如需获取电子版说明书,请访问我们的服务支持网站:http://www.95105369.com。 请使用 Brother 原装墨盒 Brother 多功能一体机使用特定墨水工作,建议使用原装 Brother 墨盒以便取得最 佳效果。如果使用其他品牌墨水或墨盒, Brother 将不保证取得最佳效果。不推 荐使用 Brother 原装墨盒以外的其他墨盒,也不推荐使用其他来源的墨水来填充Brother 墨盒。如果由于使用与本产品不兼容或非 Brother 原装墨盒而对打印头或 其他部件造成损坏,都不在保修范围之内。 选择产品的安放位置 1 3
警告 安放环境的温度应保持在 10°C 至 35°C 之间,湿度应保持在 20% 至 80% 之间( 无凝露 )。 切勿将本产品暴露于阳光直射、温度过高、有明火、有腐蚀性气体、潮湿或多 尘的环境中。 否则,可能会造成触电、短路或火灾,也可能会损坏产品或造成产品无法运行。 切勿将本产品放置在化学品附近或化学品可能会泄漏的地方。 如果本产品接触到化学品,可能会造成火灾或触电。 特别是有机溶剂或液体,例如苯、油漆稀释剂、去光水或除臭剂,可能会导致 塑料外壳和 / 或电缆融化或溶解,从而造成火灾或触电。它们或其它化学品也 可能导致产品发生故障或褪色。 注意 请将本产品放置在桌子等平坦、水平、牢固且不易受到摇晃和震动的表面上。 安放位置必须靠近电话插座和标准接地电源插座。 切勿在本产品上放置重物。切勿将本产品放置在不稳固的推车、台子或桌子上, 特别是产品附近有儿童时更是如此。本产品较重,可能会摔落,从而导致您或他 人受伤或产品严重损坏。对于带扫描功能的产品,如果平板扫描器破裂,会增加 受伤的风险。 请勿将本产品放置在人员往来频繁的地方。如果不得不放置在人员往来频繁的 地方,请确保本产品处于不会被意外撞倒的安全位置,否则可能会导致您或他 人受伤或产品严重损坏。 4
重要事项 • 切勿在本产品上放置任何物品,否则可能会增加产品因过热而出现故障的风险。 • 切勿在本产品前放置任何可能会阻碍接收传真或打印页面的物品。切勿在接收 传真或打印页面的输出通道上放置任何物品。 • 切勿将本产品放置在扬声器、非 Brother 无绳电话的主机等干扰源附近,否则 可能会影响本产品的电子元件正常运行。 • 切勿将本产品放置在倾斜或不平整的表面上。安装墨盒后切勿倾斜产品,否则 可能会导致墨水溢出,从而造成产品内部损坏。 5
一般注意事项 警告 1 塑料袋用于包装产品,不是玩具。请将这些塑料袋存放于儿童不易触及的地方 并将其正确处理掉,以防窒息危险。 切勿在任何医疗电气设备附近使用本产品。本产品发出的无线电波可能会影响 医疗电气设备,导致医疗电气设备出现故障,进而可能造成医疗事故。 对于装有心脏起搏器的用户 本产品会产生弱磁场。如果靠近本产品时发现心脏起搏器出现异常情况,请立 即远离产品并就医。 禁止使用易燃物品、任何类型的喷雾剂或有机溶剂 / 含酒精或氨的液体清洁产 品的内部或外部,否则可能会造成火灾或触电。请使用柔软的无绒干抹布清洁 产品。关于如何清洁产品,请参见高级说明书。 注意 请等到纸张从产品中输出后再将其取出,否则辊轮可能会夹伤您的手指。 请勿将手或其它异物伸入墨盒插槽,否则可能会造成人身伤害。 如果拉伸纸盒以备使用 A3、Legal 或 Ledger 等较大尺寸的纸张,请妥善放置本 产品,确保纸盒不会伸出桌子边缘外,以避免有人撞到纸盒,导致产品摔落或 人身伤害。 6
为了防止受伤,请注意不要将手指置于下图所示区域。 (MFC-J2320) 7
将纸盒尺寸从 A3、Legal 或 Ledger 调整到原始尺寸时,请小心不要将手指夹入 纸盒底部的缝隙或沟槽中。 切勿触摸图中所示的阴影部分,否则产品边缘可能会划伤您的手指。 请勿在下图所示的阴影部分上施加任何重力或压力,否则可能会导致自动进稿 器原稿托板 (1) 突然打开。 1 8
切勿握住扫描器盖板、卡纸清除盖、手动进纸槽盖、MP 纸盒或操作面板来移动 产品,否则产品可能会从您的手中滑落。 搬运产品时,请双手握住产品两侧的凹槽把手。 9
搬运产品时,如果已拉伸纸盒以备使用 A3、 Legal 或 Ledger 等较大尺寸的纸 张,请取出纸盒,否则纸张的重量可能会导致纸盒掉落并导致您受伤。 如果墨水沾到皮肤上或者误入眼中或口中,请立即采取以下步骤: • 如果墨水沾到皮肤上,请立即用水和肥皂清洗。 • 如果墨水误入眼中,请立即用清水冲洗。如果置之不理,可能会造成红眼或 轻微发炎。如发现任何异常,请立即就医。 • 如果墨水误入口中,请立即吐出来并就医。 • 更换墨盒时,请注意不要让墨水误入眼中。 • 请将墨盒置于儿童不易触及的地方。 • 严禁吞食墨水。 • 切勿摇晃墨盒,否则可能会有墨水渗漏。 • 切勿拆解墨盒,否则墨水可能会误入眼中或沾到皮肤上。 切勿用手抚摸打印纸张边缘, 否则纸张的锋利边缘可能会造成您受伤。 重要事项 • 断电将会导致产品内存中的信息丢失。 • 切勿将本产品连接到与大功率家电或耗电量巨大的其它设备共用同一电路的电 源插座上。否则,本产品与其它产品同时运行时,可能会产生超额电压,从而 造成断路器跳闸或保险丝熔断。 • Brother 建议您仅使用 Brother 原装墨盒。 使用非 Brother 原装墨盒可能会造成打印头损坏,也可能会导致颜色或打印质 量不稳定。 10
安全连接产品 警告 1 产品内有高压电极。接触产品内部部件前,包括进行清洁等日常维护前,请确 保您已从电源插座上拔下产品电源线,并确保已从产品上拔下所有电话线(RJ-11) 或以太网电缆。 切勿用湿手插拔插头。 始终确保产品插头完全插入电源插座中。 切勿让插头、电源插座或本产品上积满灰尘。 切勿尝试自行维修本产品。打开或拆除盖板可能会造成触电或其他危险,而由此 造成的损坏不在保修范围内。如果需要任何维修,请联系 Brother 特约维修站。 11
切勿让插头或电源插座接触到任何液体。 如果有水、其他液体或金属物体进入到本产品内部,请立即从电源插座上拔下 产品电源插头,然后联系 Brother 特约维修站。 本产品必须连接到符合标签上所标明的额定电压范围内的接地交流电源上。切 勿将本产品连接到直流电源或变压器上,如果无法确定您使用的是哪种电源, 请联系专业电工。 电源线安全性: • 切勿在电源线上放置任何物品。 • 切勿将本产品放置在电源线会被踩踏的地方。 • 切勿将本产品放置在电源线会被拉伸或拉紧的地方。 • 否则,可能会导致电源线损坏或磨损。 本产品配备一个三芯接地型插头。该插头仅适用于接地型电源插座。这一特性 有助于保证安全。如果您无法将产品电源插头插入电源插座中,请联系专业电 工为您更换插座。切勿将随机附带的接地型插头插入非指定插座中,否则可能 会导致触电伤害。 12
安装或改装电话线时请多加注意。 除非电话线已从墙上插座上拔下,否则切勿触碰未经绝缘的电话线或接线端。 切勿在雷雨天气安装电话线。严禁将墙上电话插座安装在潮湿的地方。 如果电源线已经损坏或磨损,切勿使用本产品或处理电源线。拔下产品电源插 头时,切勿碰触到损坏或磨损部分。 拔下产品电源插头时,切勿握住交流电源线中间部位。切勿在电源线上放置任 何物品。切勿将本产品放置在电源线会被踩踏的地方。否则可能会造成触电或 火灾。 Brother 强烈建议您不要使用任何类型的电源拖线板。 13
维修产品 警告 1 如果本产品摔落或者机壳损坏,则可能会造成触电伤害。此时,请从电源插座 上拔下产品的电源插头,并联系 Brother 特约维修站。 如果产品异常发烫、冒烟、释放出一些强烈刺鼻的气味或者您不小心将任何液 体泼洒到本产品上,请立即从电源插座上拨下产品电源插头,并致电 Brother 特 约维修站。 重要事项 遵循使用说明书进行操作时,如果本产品无法正常使用,只可以按照使用说明 书中述及的操作方法进行调整。操作不当可能会造成产品损坏,并增加专业维 修人员的工作量。 14
重要安全说明 1 1 请仔细阅读本说明书中所有的说明。 2 请妥善保管好本说明书,以便日后查阅。 3 请遵循产品上标注的所有警告事项与说明进行操作。 4 清洁产品外部和平板扫描器前,请先从墙上插座中拔出本产品的电源插头。请 勿使用液体或喷雾清洁剂清洁本产品。请使用湿抹布擦拭本产品。 5 请勿将本产品放置在水源附近。 6 请勿将本产品放置在不稳固的推车、台子或桌子上。否则,本产品可能会摔落 而导致严重损坏。 7 机壳内及产品背面或底部的沟槽和开口用于通风;为确保产品正常使用并防止 过热,请勿堵塞或遮盖上述通风口。请勿将本产品放置在床、沙发、地毯或其 他类似表面上,以免堵塞通风口。请勿将本产品放置在散热器或加热器附近或 上方。除非通风状况良好,否则本产品不能进行嵌入式安装。 8 本产品必须连接到符合标签上所标明的额定电压范围内的接地交流电源上。请 勿将本产品连接到直流电源上。如果无法确定,请联系专业电工。 9 本产品配备一个三芯接地型插头。该插头仅适用于接地型电源插座。这一特性 有助于保证安全。如果您无法将产品电源插头插入电源插座中,请联系专业电 工为您更换插座。请勿损坏接地型插头的保护部件。 10请勿在电源线和本产品上放置任何物品。请勿踩踏电源线。 11本产品与电源拖线板配套使用时,请确保与电源拖线板连接的所有产品的额定 电流总值不超过电源拖线板的额定电流值。 12请勿在本产品前放置任何可能会阻碍打印输出的物品。请勿在接收传真的输出 通道上放置任何物品。 13打印期间请勿触摸文档。 14切勿将任何物品塞入本产品机壳的沟槽内,否则可能会触及危险高压部位或使 部件短路,从而造成火灾或触电。切勿在本产品上泼洒任何液体。 15请勿尝试自行维修本产品。打开或拆除盖板可能会造成触电和 / 或其他危险, 而由此造成的损坏不在保修范围内。如果需要任何维修,请联系 Brother 授权 维修站并由其维修人员处理所有维修事宜。本产品随机附带一份特约维修站列 表以供您参考,或请直接联系 Brother 呼叫中心。 16发生以下情况时,请从墙上电源插座中拔出本产品的电源插头,并联系Brother 授权维修站人员处理维修事宜: \uf06e 电源线损坏或磨损。 \uf06e 有液体漏入本产品。 \uf06e 本产品遭雨淋或被水浸泡。 15
\uf06e 遵循使用说明书进行操作时,如果本产品无法正常使用,只可以按照使用说 明书中述及的操作方法进行调整。操作不当可能会造成产品损坏,并增加专 业维修人员的工作量。 \uf06e 本产品摔落或机壳已损坏。 \uf06e 如果产品性能发生明显变化,则表示需要维修。 产品保修和责任 1 本手册中的任何内容均不影响现有的产品保修条款,也不会追加任何产品保修条 款。未能遵循本手册中的安全说明可能会导致产品的保修条款失效。 警告 切勿让本产品接触到水。不要在浴缸、水槽和游泳池等静水以及冰箱等含水的 电器周围或潮湿的地下室中使用本产品。 切勿在雷雨天气使用本产品,否则可能由于闪电而导致电击的危险。 切勿将本产品放置在气体泄漏区域。 本产品必须使用随机附带的电源线。 注意 本产品必须安装在靠近电源插座的地方。遇到紧急情况时,必须立即从电源插 座上拔下产品电源插头以彻底切断电源。 16
认可信息 本设备设计应用于两芯模拟 PSTN 线路。 Brother 公司声明,如果在原购买国以外的国家使用本产品,本产品可能无法正 常使用。同时,如果在其他国家的公共通信线路上使用本产品, Brother 公司将 不予以任何保证。 局域网连接 重要事项 在不超过额定电压的情况下将本产品连接到局域网。 无线电干扰 本产品符合 EN55022 (CISPR Publication 22)/B 类标准。将产品连接到计算机 时,请确保您使用的 USB 接口电缆的长度不超过 2 米。 1 1 1 17
有关本设备的无线电功能的注意事项 1 1 确保在有效无线通信范围内使用本产品,如下所示: \uf06e 使用频率:2.4 - 2.4835 GHz \uf06e 等效全向辐射功率 (EIRP):≤ 100 mW \uf06e 最大功率谱密度:≤ 10 dBm / MHz (EIRP) \uf06e 载频容限:20 ppm \uf06e 带外发射功率 ( 在 2.4 - 2.4835 GHz 频段以外 ): ≤ -80 dBm / Hz (EIRP) \uf06e 杂散发射 ( 辐射 ) 功率 ( 对应载波 ±2.5 倍信道带宽以外 ): ≤ -36 dBm / 100 kHz (30 - 1000 MHz) ≤ -33 dBm / 100 kHz (2.4 - 2.4835 GHz) ≤ -40 dBm / 1 MHz (3.4 - 3.53 GHz) ≤ -40 dBm / 1 MHz (5.725 - 5.85 GHz) ≤ -30 dBm / 1 MHz ( 其它 1 - 12.75 GHz) 2 不得擅自更改发射频率、加大发射功率 ( 包括额外加装射频功率放大器 ),不 得擅自外接天线或改用其它发射天线。 3 使用时不得对各种合法的无线电通信业务产生有害干扰;一旦发现有干扰现象 时,应立即停止使用,并采取措施消除干扰后方可继续使用。 4 使用微功率无线电设备,必须忍受各种无线电业务的干扰或工业、科学及医疗 应用设备的辐射干扰。 5 不得在飞机和机场附近使用。 18
产品中有害物质的名称及含量 商标 1 brother 是兄弟工业株式会社的商标或注册商标。 Microsoft、 Windows、 Windows NT、 Windows Vista、 Windows Server、 SharePoint、 Internet Explorer、 Outlook、 PowerPoint 和 Windows Phone 是微 软公司在美国或其他国家的注册商标或商标。 Apple、Macintosh、Mac OS、Safari、iPad、iPhone、iPod touch 和 OS X 是苹 果公司在美国和其他国家的注册商标。 AirPrint 是苹果公司的商标。 Nuance 和 PaperPort 是 Nuance Communications 公司或其成员机构在美国或其 他国家的商标或注册商标。 Memory Stick PRO Duo、Memory Stick Duo、MagicGate、Memory Stick Micro和 M2 是索尼公司的商标。 SDHC 标识是 SD-3C 公司的商标。 AOSS 是 Buffalo 公司的商标。 Wi-Fi、 Wi-Fi Alliance 和 Wi-Fi Protected Access 是 Wi-Fi Alliance 的注册商标。 WPA、 WPA2、 Wi-Fi Protected Setup、 Wi-Fi Protected Setup 标识和 Wi-FiDirect 是 Wi-Fi Alliance 的商标。 Flickr 是雅虎公司的注册商标。 Android、 Google Cloud Print、 Google Drive、 Picasa Web Albums 和 GooglePlay 是 Google 公司的商标。使用这些商标之前,须先获得 Google 公司的许可。 Mozilla 和 Firefox 是 Mozilla Foundation 公司的注册商标。 UNIX 是 Open 集团在美国和其他国家的注册商标。 Linux 是 Linus Torvalds 在美国和其他国家的注册商标。 Bluetooth ( 蓝牙 ) 文字商标是 Bluetooth SIG 公司的注册商标,兄弟工业株式会社 已获得许可使用上述商标。 Intel 是 Intel 集团在美国或其他国家的商标。 EVERNOTE 是 Evernote 公司的商标,经授权方可使用。 本说明书中提及的软件名称都有一份软件许可协议,此协议指明了其相应的所有者。 Brother 产品、相关文档和任何其他资料中出现的任何公司的任何品牌名称和产 品名称都是其相应公司的商标或注册商标。 20
开放源代码许可备注 本产品包含开放源代码软件。 1 若要查看开放源代码许可备注,请转到 Brother Solutions Center (Brother 解决方案 中心 ) 网站 (http://support.brother.com) 上您产品型号主页中的说明书下载选项。 版权与许可 ©2015 Brother Industries, Ltd。版权所有。 本产品包含由以下厂家开发的软件: ©1983-1998 太平洋软件有限公司。版权所有。 ©2008 Devicescape 软件有限公司。版权所有。 本产品包含由 ZUKEN ELMIC 公司研发的 "KASAGO TCP/IP" 软件。 其他信息 FlashFX® 是 Datalight 公司的注册商标。 FlashFX® 版权所有 1998-2010 Datalight 公司 美国专利局 5,860,082/6,260,156 FlashFX® Pro™ 是 Datalight 公司的商标。 Reliance™ 是 Datalight 公司的商标。 Datalight® 是 Datalight 公司的注册商标。 版权所有 1989-2010 Datalight 公司。保留所有权利。 1 1 21
关于复印的法律限制 1 蓄意造假而复制某些条款或文件是违法行为。以下为不能复制的文件类型。如果 对任何项目或文档有疑问,我们建议您咨询法律顾问或相关法律部门: \uf06e 货币 \uf06e 债券或其他债务证明 \uf06e 存折 \uf06e 义务服兵役文件或草拟文件 \uf06e 护照 \uf06e 邮票 ( 作废的或未作废的 ) \uf06e 移民文件 \uf06e 福利文件 \uf06e 政府机构签发的支票或汇票 \uf06e 身份证明徽章或勋章 此外,某些国家法律规定,机动车驾驶证和所有权证明不可用于复印。 不可复制受版权保护的作品,但是一些受版权保护的作品可以被部分复制以进行 “ 合理使用 ”。多份复制将被视为不正当使用。艺术作品等同于受版权保护的作品。 22
www.brotherearth.com
'
|
[
"温度10°C至35°C,湿度20%至80%。"
] | 8,505
|
multifieldqa_zh
|
zh
| null |
fbb98ceda2b927fba0dd0c1495f3d69378198cf4dd79acdd
|
这是哪个市的政府工作报告?
|
各位代表:
现在,我代表市人民政府向大会作政府工作报告,请予审议,并请市政协各位委员和列席的同志提出意见。
一、2018年工作回顾
2018年,在自治区党委、政府和市委的坚强领导下,在市人大、市政协的监督支持下,我们紧紧依靠全市各族人民,全面贯彻党的十九大精神,以习近平新时代中国特色社会主义思想为指导,坚持稳中求进工作总基调,贯彻新发展理念,以深化供给侧结构性改革为主线,持续打好三大攻坚战,以“四大活动”为牵引,以“三个年活动”为抓手,统筹稳增长、促改革、调结构、惠民生、防风险,全市经济社会发展取得新成绩,较好地完成市六届人大四次会议确定的年度主要任务。
经济运行呈现新态势。GDP增长7.4%,其中第一产业增加值增长6%,第二产业增加值增长7.2%,第三产业增加值增长8.2%。规上工业增加值增长8.5%,规模以上万元工业增加值能耗同比下降2.7%。社会消费品零售总额增长8.8%,居民消费价格指数涨幅3.4%。财政收入增长11.1%,排全区第四;全口径税收收入增长20.8%,排全区第二;非税占比25.8%,排全区第一,经济运行质量效益持续提升。
转型升级获得新成效。三次产业结构优化,第三产业增加值占比提高5.6个百分点,旅游消费贡献率61.4%,排名全区第一,“互联网+”等新业态蓬勃发展,电商零售销售额增长29.9%。盛隆等一批企业技改成效显著,大海粮油等4家企业成为国家级两化融合管理体系贯标试点企业。农业产业结构加快调整,农林牧渔业总产值增长6.3%。
重大项目取得新突破。推进自治区统筹项目和市“六个一百”项目建设,分别完成投资204.7亿元和265.6亿元。柳钢防城港钢铁基地、生态铝基地实现实质性开工,核电华龙一号3号机组穹顶顺利吊装。中海油LNG项目竣工试产。防东铁路正式进场施工。G219峒中至东兴公路获得交通部重大项目专项资金支持。南宁经上思至防城港、上思至峒中、东兴至凭祥、沿海高速钦州至防城港段等公路纳入广西高速公路网规划。
工业企业效益实现新提升。规上工业企业利润总额增长12.6%。精炼铜、精制食用植物油、钢材等工业产品实现两位数增长。盛隆上榜中国企业500强、名列广西民企榜首,金川等5家企业入围广西企业100强,红沙核电获自治区主席质量奖,澳加粮油、中电获评广西首批智能工厂示范企业,华润水泥(上思)获评广西首批绿色制造示范工厂,经开区工业投资总量在全区114个园区中排名第一。
城市品牌建设彰显新魅力。防城港边境旅游试验区获批设立,跨境自驾游常态开通,东兴口岸年通关人次突破1200万,居我国边境陆路口岸之首。公共文化服务示范区终期评审排西部第三。生态环境质量保持广西前列,空气质量优良天数比率95.3%。成功举办中国—东盟国际马拉松、北部湾首届开海节、北部湾全国桥牌赛等重大文体活动,城市知名度美誉度大幅提升。
民生福祉取得新进步。城镇居民和农村居民人均可支配收入分别增长7%、9.3%,排全区前列。城镇登记失业率1.28%,为全区最低。成为全国首批社保标准化建设先行城市。海湾新区10所学校全部开工建设。多项卫生计生服务指标排全区第一。全年4859人脱贫,16个贫困村脱贫摘帽。
各位代表!2018年我市先后举行庆祝自治区成立60周年座谈会、建市25周年暨建港50周年主题情景报告会等一系列活动。孙春兰副总理率中央代表团二分团到我市慰问,对我市取得的成就给予高度评价,极大地鼓舞了全市广大干部群众。建市25年来,在党中央和自治区的坚强领导下,全市上下众志成城,奋发图强,港城大地发生翻天覆地的变化,从昔日小渔村华丽转身为一个美丽生态海湾城市、现代化新兴港口工业城市,从原来的开放末梢走向沿海沿边开放前沿,从温饱不足走向小康和富裕,全市各族人民无不感到自豪与骄傲,对防城港的美好未来满怀激情、充满信心!
过去一年,我们主要做了以下工作:
(一)着力筑牢基础稳增长。贯彻中央“六稳”部署,扎实推进经济运行平稳较快增长。抓好重大项目稳定有效投资。以“项目提速年”为抓手,以“六个一百”项目为重点,开展产业大招商活动,全年招商到位资金639亿元,同比增长11.4%,引进50亿元以上项目总投资额排全区第二。举行10次项目集中开竣工活动,197个项目实现开竣工,计划总投资783.8亿元。钢铁基地、生态铝基地、核电二期顺利推进。建成渔澫港区501#泊位等一批港口码头项目。钦防高速改扩建、企茅一级路、第五作业区进港航道等一批交通项目加快建设。防城港支线机场等一批重大项目前期工作稳步推进。力促工业经济企稳向好。以“产业提升年”为抓手,加快打造广西冶金产业二次创业核心区,推动盛隆冶金等企业通过技改做大做强。新增15家工业企业上规入统。改革城镇供水投融资模式,推进增量配备电网建设,工业用水、用电价格有效降低,冷链集装箱铁路运价下调43%,累计帮助实体经济企业降低成本达30亿元。规上工业企业主营业务利润率5.5%,改变以往产值与增加值相背离的状况,实现同步增长。积极支持民营经济发展。落实国家和自治区支持民营经济发展政策,全年新引进民间投资项目117个,总投资386.6亿元,同比增长45.1%。推动政府性融资担保公司有效运营,扩大民营和小微企业融资业务。开展政银企对接,设立信贷引导资金,累计发放“惠企贷”5.53亿元。发展产业投资基金,总规模达26亿元。加大财政金融支持力度。停征、取消3项行政事业性收费,全年减轻企业负担超1亿元。出台政府投资引导基金管理暂行办法,促进财政资金以投代补服务实体经济。完善转贷资金运作机制,有效纾解企业融资难融资贵融资慢问题。
(二)着力培育壮大新动能。坚持从传统产业挖掘新动能,从转型升级中嫁接新动能,从新产业、新技术、新业态中培育新动能。推动工业高质量发展。树立“工业树”理念,全力打造“产业林”,培育钢、铜、铝冶炼等产业,推动企业产品差异化发展。做强核电、火电等能源产业,做大粮食、油料精深加工食品制造业,打造铜基新材料产业基地。发展现代服务业。加快边境旅游试验区规划建设,完善边境旅游基础设施,创新中越跨境旅游“六联合”模式。东兴跨境电子商务发展指数进入全国县域20强,位居西部第一。加快发展冷链经济,率先在国内实现东盟海产品冷链公铁海联运,防城港车站累计发送冷链产品3.2万吨,同比增长24%。稳步推进保税物流中心(B型)建设。夯实科技创新基础。高新区云朗科技园一期投入运营,沙潭江生态科技园启动区加快建设。科研投入占GDP比重排全区第三位。高新技术企业数量达26家,增长18%,创历年新高。新增院士工作站2家,建成自治区级农业科技园区和科技企业孵化器各3家。每万人发明专利拥有量4.06件,增长10.3%。盛隆公司参与制定《热轧带肋钢筋》国家标准获批实施。推动数字防城港建设,大数据产业加快发展。
(三)着力推进全方位开放。主动融入西部陆海新通道建设。落实自治区
“南向、北联、东融、西合”部署,开展开放合作北联行动,先后与自贡、攀枝花、宜宾、泸州等缔结友好城市,成功举办成都南向通道投资项目推介会。顺利入选港口型、边境口岸型国家物流枢纽布局承载城市。夯实基础促进开放。建成中越峒中—横模口岸桥等一批口岸设施,扎实做好北仑河二桥、云约江作业区泊位开放筹备。成功入选广西境外旅客购物离境退税政策首批试点城市,与泰国黎逸市结为国际友城。扩大对外贸易,全年港口货物吞吐量增长0.9%,集装箱31万标箱,增长16%,外贸进出口总额完成721亿元,排名全区第三。
(四)着力深化重点领域改革。深化管理体制改革。推进国资国企整合重组、市管开发区管理体制和城市管理工作机制改革,企沙镇获批广西首批经济发达镇行政体制改革试点。出台政府性工程变更办法,改革财评制度。持续抓好“放管服”改革。深化“一事通办”改革,“最多跑一次”事项占全部事项的99.6%。推行“四个一”行政审批新机制,实现
“354560”改革目标。开展“减证便民”专项行动,最大限度利企便民。全面公布权力清单和责任清单,在国内率先实施34证合一,启动全国首个设区市“证照分离”改革试点。统筹做好其他改革。健全土地资源盘活及统征统迁制度,推行“净地出让+资金共管+阳光招拍挂”模式,全年盘活800多公顷存量土地。沿边金融改革创造3个全国第一、多个全区第一。东兴试验区入围“改革开放40年地方改革创新案例”名单。
(五)着力推进城乡统筹发展。加快城市规划建设。率先在全区启动国土空间规划,编制新一轮珍珠湾片区概念性规划、河西片区控规等一批规划,严把规划控制关,坚守城市天际线。打通江山大道等一批断头路,建成海湾绿道35公里,完成一批城市主干道白改黑。加快园博园、伏波大道等项目建设,防城江东岸片区初具规模,城南片区与中心片区融为一体,高新区与海湾新区连成一片,港产城融合发展新格局加快形成。商品房销售面积同比增长60.5%,人气商气日益兴旺。扎实推进乡村振兴战略。围绕
“六大工程”“两大行动”部署,重点推进东兴桂产业、上思皇袍山森林生态文化旅游等一批核心示范区建设,建成国家级产业园1个、自治区级示范区5个、县级示范区9个、乡级示范园45个。新增7个农产品“广西名牌”。规划建设企沙、白龙双墩、东兴天鹅湾三大渔港经济区,京岛海洋渔业、港口红树林海洋渔业两个核心示范区分别获自治区四星、三星认定。40个自然村屯获评广西“绿色村屯”,53个行政村获评自治区级生态村。农村人居环境整治三年行动取得阶段性成效。京族哈节入选首届“中国农民丰收节”,京族海洋特色小镇、金花茶特色小镇列入广西首批特色小镇培育名单。
(六)着力打好三大攻坚战。打好扶贫攻坚战。投入财政专项扶贫资金3.14亿元,特色产业扶贫覆盖率达80%以上,易地扶贫搬迁进度加快,预脱贫的16个贫困村和51个脱贫村的集体收入均达到3万元以上。打赢污染防治攻坚战。抓好中央环保督察“回头看”反馈问题整改。大气、水、土壤攻坚取得明显成效,空气优良率连续四年全区第一,集中式饮用水源地水质达标率100%,农用地土壤详查采样工作基本完成。切实防范化解金融风险。认真履行属地金融风险处置监管责任,做到早预警、早处置,堵住风险源头。打击非法集资、金融犯罪、网络传销等活动。积极化解政府债务,筹措偿债资金33.8亿元,累计置换存量债务105.9亿元,每年减少利息3亿元,政府债务率大幅下降。
(七)着力发展民生社会事业。舍得拿出最好的资源保障改善民生,舍得拿出最好的地给老百姓安置,舍得拿出最多的钱为民办实事。全年民生重点领域支出100.8亿元,占一般公共预算支出近八成。加强精神文明建设。抓好市本级创建自治区文明城市以及东兴市创建全国文明城市工作。港口区山新村等2个村被评为全国文明村镇,市检察院等4家单位被评为全国文明单位,实现了市(县)直单位争创全国文明单位零突破。打造首批市级社会主义核心价值观示范点45个。发展文体事业。国家公共文化服务体系示范区通过终期验收,“国门文化大院”“文缘号海上图书流动船”等创建活动被中宣部、文旅部列为全国示范推广项目。成功举办海上龙舟节、中国—东盟城市网球赛、国际海钓赛等文体活动。补齐教育卫生事业短板。投入约9.7亿元建设海湾新区10所学校。四个县(市、区)均通过义务教育均衡发展国家级评估认定。高考成绩取得历史性突破,600分以上考生增长213%。北部湾高中在全国公开引进名校长,学校管理进一步强化。开展国家第四批城市公立医院改革,公立医疗机构参与医联体、医共体、专科联盟建设率100%。推进市第一人民医院迁建、市妇幼保健院迁建等一批卫生攻坚项目建设。上思县获评全区计划生育优质服务先进单位。做好社会保障工作。基本医保、基本养老保险参保完成率分别排名全区第一、第二名。城市、农村低保保障标准分别增长21.6%、19.4%。边民补助提标扩面,补助标准从每人每月130元提高到167元,惠及边民16.5万人。全力办好民生实事。全年为民办十件实事项目计划总投资24亿元,人大代表票决的2018年民生实事项目基本完成,妥善解决多年未落实的海珍路小商品市场安全隐患整治、港口区“98户”群众宅基地安置等一批社会关注的民生问题,取得良好社会效果,赢得了广大人民群众的高度赞扬。
一年来,我们坚持以全面从严治党统领政府各项工作,加强党风廉政建设,抓好巡视发现问题整改。加强制度建设,结合“大学习、大调研、大策划、大落实”活动,推行“学懂用”、项目“1+6”、绩效“1+4”等制度,推动各项工作提速提质提效。坚持依法行政,落实法律顾问制度,改进行政复议、行政应诉工作。健全重大行政决策机制,加强审计监督和行政监察,推动决策、执行、管理、服务和结果公开。依法接受人大及其常委会的监督,自觉接受人民政协的民主监督,人大代表建议和政协提案办结率100%。
国防动员、人民防空和边海防、民兵预备役、双拥、救灾减灾、安全生产、应急管理等工作成效显著。“扫黑除恶”专项斗争、反走私、禁毒等社会治理扎实推进,人民群众安全感不断提升。加强民族宗教事务管理,外事侨务、海关、边检、消防救援、海事、市场管理、信访、档案保密、统计、供销、粮食、通信、地震、水库移民、农机、社会科学、地方志、工会、共青团、妇女儿童、老龄、残疾人、红十字、机关事务等工作都取得新进展。全市边疆稳定,民族团结,人民安居乐业!
各位代表!过去一年,我们求真务实,勇于创新,解决了不少难题,办成了许多好事实事,防城港发展迎来了新的机遇,焕发了新的生机。奋斗饱含艰辛,成绩来之不易。这是自治区党委、政府和市委正确领导的结果,是市人大、市政协监督支持的结果,是全市人民团结奋斗的结果。在此,我代表市人民政府,向全市各族人民,向人大代表、政协委员,向我市驻军、武警官兵、消防救援指战员和中直、区直单位,向各民主党派、工商联、无党派人士、人民团体,向关心支持防城港发展建设的港澳台同胞、海外侨胞及海内外朋友们,表示崇高的敬意和衷心的感谢!
在肯定成绩的同时,也要清醒看到发展中存在的困难和问题:经济总量小,产业支撑能力不足,新旧动能转换较慢,投资和消费增长放缓;实体经济面临困难较多,民营经济发展活力不足;县域经济比较薄弱,扶贫、教育、卫生、城建等方面短板还较突出;营商环境亟待优化,政府工作仍需改进等。我们要迎难而上,勇于担当,用新理念新方法认真加以克服解决。
二、2019年经济社会发展总体要求和主要目标
今年是新中国成立70周年,是全面建成小康社会关键之年。党中央、自治区党委政府和市委提出了一系列的新部署新要求,我们要结合实际,创造性地贯彻落实好。今年政府工作的总体要求是:以习近平新时代中国特色社会主义思想为指导,深入贯彻落实党的十九大和十九届二中、三中全会精神,统筹推进“五位一体”总体布局和协调推进“四个全面”战略布局,深入落实“三大定位”新使命和“五个扎实”新要求,坚持稳中求进工作总基调,坚持新发展理念,坚持以供给侧结构性改革为主线,坚持市场化改革、扩大高水平开放,统筹推进稳增长、促改革、调结构、惠民生、防风险工作,进一步稳就业、稳金融、稳外贸、稳外资、稳投资、稳预期,着力推动产业高质量发展,着力扩大市场需求,着力促进县域协调发展,着力抓好脱贫攻坚和民生建设,以海强市,以边旺市,以山富市,加快构建海边山现代化经济体系,为全面建成小康社会收官打下决定性基础,以优异成绩迎接中华人民共和国70周年华诞。
今年经济社会发展主要预期目标是:地区生产总值增长7.5%左右,财政收入增长6%,规模以上工业增加值增长8.5%,固定资产投资增长10%,社会消费品零售总额增长10%,外贸进出口总额增长5%,城镇居民人均可支配收入增长7%,农村居民人均可支配收入增长9%,城镇登记失业率控制在4%以内,居民消费价格涨幅控制在3%左右,节能减排降碳控制在自治区下达目标内。
提出上述目标,体现了中央、自治区决策部署和我市实际有机结合的要求,努力走出具有我市特色的发展路子;体现了稳中求进的要求,努力保持经济运行在合理区间;体现了推进高质量发展的要求,努力转变发展方式、优化经济结构和转换增长动力;体现了以人民为中心的要求,努力让人民过上更加美好生活。完成今年目标任务,我们拥有良好基础和支撑条件:在工业上,我们有一批重大项目支撑。盛隆技改、杭氧空分装置和益海嘉里发酵豆粕等项目年内投产,柳钢冷轧项目等一批减产企业复产、增产。预计全年规上工业增加值增长8.5%左右,第二产业增长8%左右。在服务业上,我们有许多新的增长点。边境旅游试验区加快建设,马拉松、开海节等文旅品牌影响力不断扩大,冷链经济迅速发展,交通客货运周转量、批发零售和住宿餐饮等指标呈增长态势,预计服务业增加值增长8%左右。在农业上,我们有一批发展势头良好的特色产业。农林牧渔业大有潜力可挖。粮食生产稳定,海产品、水果、肉类等农产品产量持续增长。预计今年全市农林牧渔业总产值增长5%、第一产业增长4.8%以上。在投资上,我们将迎来新的投资高峰期。近年来上马了一批重大项目,集中开工了一批补短板项目,有相当部分结转今年建设。钢铁、中铝、盛隆技改、防东铁路将大幅拉动有效投资,预计全年固投增长10%左右。
当前经济形势与政策环境对我市总体有利,我们要坚定信心,真抓实干,着重从以下方面努力:必须认真贯彻落实上级部署。按照“三大定位”“五个扎实”和“建设壮美广西”的新要求,结合市情和阶段特征,对标找差、对表落实,精心谋划好各项工作,推动习总书记重要指示精神和中央、自治区各项决策部署在我市落地见效。必须深入挖掘海边山优势。聚集发展要素资源,在构建海边山现代化经济体系上持续探索、创造新的优势,以更大作为开创我市经济社会发展新局面。必须大力培育经济发展新动能。抓住国家积极财政政策加力提效、稳健货币政策松紧适度的机遇,加紧在投资、消费、县域经济等方面培育新增长点。在产业升级、基础建设和乡村振兴等领域谋划实施一批工程项目,促进新动能茁壮成长。必须加快补齐民生短板。按照全面建成小康社会要求,围绕城乡教育、卫生、扶贫、交通、饮水、基础设施配套等短板弱项,抓住工作关键,重点突破,务求实效。
三、2019年主要工作安排
今年经济社会发展任务艰巨繁重,我们要突出重点,扎实做好以下工作:
(一)增强创新支撑能力,推动工业高质量发展
推进工业转型升级。按“强龙头、补链条、聚集群”思路,不断突破制约产业结构优化升级的关键环节。抓好重大产业项目。重点推进钢铁基地、生态铝基地、铜基新材料产业基地建设,续建核电二期、澳加粮油、大海粮油技改等项目。加快推进盛隆技改、科元ABS装置等项目竣工投产,启动金川铜冶炼二期和冶金上下游配套等项目,开工经开区集中供热、中储能电解液及储能新材料产业园等项目。争取国家核准核电三期项目。优化传统工业产业。对接自治区冶金二次创业“一核三带九基地”布局,加快对钢铁、有色、能源、粮油等传统产业进行技术改造,提升产业链水平。推进信息化和工业化深度融合,争做广西新型工业化发展引领者。促进产业园区提档升级。推进园区产业加快集聚,经开区要重点发展钢铁、有色、能源、新材料、先进制造等产业,高新区要加快发展信息技术、生物医药、新材料、先进制造等新兴产业,培育壮大现代服务业。探索实施“一区多园”“大园带小园”等模式,开展园区产业链合作。规划防城港制造城建设。聚焦智能制造、建筑工程装备、电子信息、新能源汽车等领域,在经开区、高新区等区域谋划建设防城港制造城,力争明年入围自治区制造城建设项目。
筑牢科技创新支撑。实施科技创新支撑产业高质量发展行动,促进科技与产业融合发展。强化企业创新主体地位。加快培育高新技术企业,支持中储能暖泉、小藻科技等一批科技型中小企业加快发展。依托龙头企业建立产业研究院,促进科技成果在一线转化。深化“产学研”合作,推进盛隆冶金与研究所合作研发石墨烯基耐腐蚀钢材产业化发展,增强企业自主创新能力。夯实科技创新平台。加快云朗科技园、沙潭江生态科技产业园等园中园建设。利用IT小镇门户等载体,引进一批高成长科技型企业。建好工程技术研究中心、院士专家工作站、产业技术创新战略联盟等创新平台,支持企业开展新型学徒制试点。发展数字经济。聚焦中国—东盟数据大通道、西南多式联运物流大数据、跨境电商等重点领域,推进产业数字化,建设一批智能化工厂,培育一批“四新”企业。积极抢占5G时代先机,助力数字防城港发展。
发展壮大民营经济。深入实施非公有制强优企业培育计划,鼓励“个转企”“小升规”,有效增加“四上”企业数量。完善联系服务非公企业工作制度,密切政商关系,维护民营企业合法权益。积极作为,靠前服务,全力为民营企业解决准入门槛高、融资难、经营成本高、发展活力不足、历史遗留问题多等问题,让港城大地成为民企投资置业新热土!
(二)增加重大项目有效投资,夯实经济发展基础
抓好重大基础设施项目。公路方面,争取开工南宁经上思至防城港高速公路、G219峒中至东兴公路等项目;续建企茅一级路、沙企一级路改扩建等项目,推进国门大道项目建设;确保钦防高速改扩建项目竣工通车。铁路方面,加快建设防东铁路、钢铁基地铁路专用线;争取开工南防铁路复线工程;抓好茅岭至皇城坳、潭油作业区等铁路支线项目前期工作。港航方面,续建渔澫港区513—516号泊位等项目,开工401号、赤沙作业区1、2号三个20万吨级泊位和潭油航道一期等项目,抓好30万吨级矿石码头及配套航道等项目前期工作。口岸方面,加快建设北仑河二桥、峒中等口岸基础设施,确保口岸扩大开放顺利通过国家验收。推动华立集团大型边境综合产业项目落地建设。能源方面,续建防城南山风电场工程等项目,开工中电防城港电厂余热综合利用、门崖岭风电场工程等项目,推动高新区增量配电网建设。民航方面,推进防城港支线机场、通用机场项目规划建设。
抓好城市建设项目。加快编制市域国土空间规划,为新一轮城市建设打下良好基础。高水平建设海湾新区,抓好大平坡路等一批城市路网建设,基本完成主干道白改黑工程。尽快开工市民中心、城市第二水源地供水管网等项目。加大市政消火栓建设力度,完善城市消防设施。推进城南片区建设,建成“堤路园”,确保广西园林园艺博览会如期举行。改造防城老城区,有效疏解拥堵和低品位开发问题。完善渔澫片区,持续提升城市功能品质。加快经开区、高新区、江山旅游区与主城区一体化建设,推动港产城深度融合发展。建设绿色阳台、园林、公园等一批城市景观,打通西湾环海绿道,提高环海环岛景观亮化水平。以公园城市理念,重塑城市肌理,打造壮美新港城!
抓好重大社会事业项目。统筹整合相关渠道资金,加大社会民生补短板力度。教育方面,续建海湾新区10所新建学校、理工职业学校二期等项目,开工实验高中改扩建、防城中学学生宿舍楼、特殊教育学校康复楼等项目。医疗卫生方面,加快推进市第一人民医院迁建、港口分院升级改造、市妇幼保健院业务用房等建设项目,创建市三级甲等综合医院。文体方面,推进市体育中心等一批项目的前期工作,加快建设东兴文化馆、图书馆等项目。
完善项目工作机制。优化“1+6”项目工作制度,健全厅级领导联系重大项目制度,继续抓好项目集中开竣工,营造谋项目、引项目、抓项目、成项目良好氛围。改革项目资金支持方式,集中资金优先保障重大项目。强化首问负责制、限时办结制、服务承诺制等制度管理,推行“一线工作法”,解决好项目建设“最先一公里”和“最后一公里”的问题。
(三)推进乡村振兴战略,开创农业农村发展新局面
深入实施乡村振兴工程。抓好“六大工程”和“两大行动”,发展现代特色农业,推进“一村一品”建设。坚持绿色发展,保护农村生态环境。建好“新时代讲习所”,发展海边山乡村特色文化。加强农村基础设施建设,增加乡村公共服务供给。深入推进农村人居环境整治三年行动计划,提升农村人居环境质量。健全农村社会保障体系,夯实脱贫致富支撑。完善农村基本经营制度,提升小农户组织化程度。打造境外农作物原料生产基地等开放合作平台,构建边境特色乡村振兴示范带。培养更多有一技之长的乡土人才,造就一批懂经营、善管理的致富能手。
发展现代特色农业。深入开展“10+3”行动,抓好19万亩粮食生产功能区、45万亩糖料蔗生产保护区划定。推动特色农业示范区增点扩面,建成自治区级核心示范区2个,县乡村三级示范区(园)118个。加快玉桂八角、油茶、沃柑、肉牛等产品产业化发展,推动金花茶产业振兴。发展休闲农业,推进京岛海洋特色小镇建设,打造沿海沿边线、南山生态线等乡村旅游线路。强化农业科技推广,抓好农业物联网试验示范。
发展海洋渔业。加快建设企沙、白龙双墩、东兴天鹅湾三大渔港经济区。搞好珍珠湾海洋牧场建设,建成陆基工厂化循环水养殖基地5万平方米、深海抗风浪网箱养殖水体20万立方米。支持集约化海水健康养殖,发展生态渔业和设施渔业,拓展远洋渔业,抓好水产品精深加工。
发展农产品加工业。推进江平海洋产业园、冲榄工业园和企沙渔港经济区等园区水产加工业建设,规划建设防城互市贸易商品落地加工园区。支持主产区依托县域形成农产品加工产业集群,推动就近加工增值、全产业链发展。构建冷链经济体系,加快桂海国际农产品冷链物流中心、广西物资集团冷链产业园等项目建设,建成一批示范性冷库、交易中心、加工基地和电商产业园。
推动糖业发展壮大。推动糖料蔗规模化生产,年内完成1万亩糖料蔗“双高”基地建设任务。拓展甘蔗综合利用新领域,推进蔗渣生物质发电,提高朗姆酒、木糖醇等高附加值产品生产水平,抓好蔗叶、滤泥等综合利用,促进牛羊养殖和环保生态肥料生产。推动上思农垦朗姆风情甘蔗循环经济核心示范区建设,争取创建自治区五星级示范区,加快打造朗姆小镇。
|
[
"防城港市。"
] | 10,709
|
multifieldqa_zh
|
zh
| null |
152f5c9a5fef5b8d94abfa7b636ed176e93e4f65fdc101f4
|
"10"在格网大小中代表什么意思?
|
'ICS 07.040CCS A 75备案号:中 华 人 民 共 和 国 测 绘 行 业 标 准CH / CH/Z XXXXX—202X全球地理信息资源数字表面模型生产技术规范Specifications for global digital surface model production(报批稿)202X-XX-XX 发布202X-XX-XX 实施中 华 人 民 共 和 国 自 然 资 源 部 发 布
CH/T XXXXX-202X目 次前言 ................................................................................ II1 范围 ............................................................................... 12 规范性引用文件 ..................................................................... 13 术语和定义 ......................................................................... 14 总则 ............................................................................... 14.1 成果构成 ........................................................................ 14.2 成果规格 ........................................................................ 14.3 生产技术方法 .................................................................... 35 作业流程 ........................................................................... 46 准备工作 ........................................................................... 46.1 资料收集 ........................................................................ 46.2 资料分析 ........................................................................ 57 技术设计 ........................................................................... 58 区域网平差 ......................................................................... 58.1 卫星影像预处理 .................................................................. 58.2 构建区域网 ...................................................................... 58.3 主要技术要求 .................................................................... 59 数字表面模型生成 ................................................................... 69.1 立体匹配 ........................................................................ 69.2 DSM 编辑 ........................................................................ 69.3 接边处理 ........................................................................ 79.4 数据拼接与裁切 .................................................................. 79.5 相关文件制作 .................................................................... 710 质量控制 .......................................................................... 710.1 基本要求 ...................................................................... 710.2 过程质量控制 .................................................................. 810.3 检查验收 ...................................................................... 811 成果整理与提交 .................................................................... 911.1 成果整理 ....................................................................... 911.2 成果包装 ....................................................................... 9附录 A(资料性)数字表面模型元数据示例 ............................................... 10I
CH/T XXXXX-202X前 言本文件按照 GB/T 1.1—2020《标准化工作导则 第 1 部分:标准化文件的结构和起草规则》的规 定起草。本文件由中华人民共和国自然资源部提出并归口。本文件起草单位:国家基础地理信息中心、陕西测绘地理信息局、黑龙江测绘地理信息局、四川测 绘地理信息局、海南测绘地理信息局、自然资源部重庆测绘院、中国测绘科学研究院、自然资源部国土 卫星遥感应用中心、国家测绘产品质量检验测试中心、北京建筑大学、武汉大学。本文件主要起草人:陈利军、张宏伟、郑义、周琦、张俊辉、杜晓、曲平、雷宇宙、王莉莉、蒋捷、 林尤武、何静、蒋涛、欧阳斯达、赵颖、杨博、林尚纬。II
CH/T XXXXX-202XIII
CH/T XXXXX-202X全球地理信息资源 数字表面模型生产技术规范1 范围本文件规定了采用光学立体卫星影像生产的数字表面模型的作业方法和技术要求。本文件适用于采用光学立体卫星影像进行全球地理信息资源数字表面模型生产的技术准备、影像预 处理、数据生产、质量控制及成果提交,其他同类数据产品的生产可参照使用。2 规范性引用文件下列文件中的内容通过文中的规范性引用而构成本文件必不可少的条款。其中,注日期的引用文件, 仅该日期对应的版本适用于本文件;不注日期的引用文件,其最新版本(包括所有的修改单)适用于本 文件。GB/T 13989 国家基本比例尺地形图分幅和编号GB/T 18316 数字测绘成果质量检查与验收GB/T 23236 数字航空摄影测量 空中三角测量规范CH/T 1001 测绘技术总结编写规定CH/T 1004 测绘技术设计规定CH/T 9023 基础地理信息数字成果 1:25 000 1:50 000 1:100 000 数字表面模型3 术语和定义下列术语和定义适用于本文件。3.1数字表面模型 digital surface model;DSM以一系列点云或格网点的三维坐标表达地表(含人工建筑物、植被等)起伏形态的数据集。[来源:CH/T 9023--2014,3.1]4 总则4.1 成果构成数字表面模型成果由数字表面模型、元数据及相关文件构成。相关文件指需要随数字表面模型同时 提供的其他附件及说明信息等。4.2 成果规格4.2.1 数学基础坐标系采用 2000 国家大地坐标系。确有必要时,可采用依法批准的其他坐标系。在南纬 88°-北纬 88°之间的区域,地图投影方式采用通用横轴墨卡托投影(UTM),按 6°分带 方式进行投影,坐标单位为 m。在南北纬 88°-90°之间的区域,地图投影方式采用极地方位投影,投 影面切于地球南北极点。确有必要时,可采用依法批准的其他投影方式或经纬度坐标。1
CH/T XXXXX-202X高程基准采用 1985 国家高程基准。确有必要时,可采用依法批准的其他高程基准。4.2.2 存储单元数字表面模型产品在南纬 88°-北纬 88°之间区域内以 1:50 000 分幅存储,分幅规则应按照 GB/T13989 的要求。南北纬 88°-90°之间区域各存储为一个单元。4.2.3 表达形式数字表面模型产品表达为矩形格网,格网大小为整数,单位为 m,其在南北、东西方向的格网大小 应保持一致。全球数字表面模型产品宜采用 5m 和 10m 格网大小。4.2.4 高程精度数字表面模型产品相对于高精度检查点的高程中误差应符合表 1 的规定。表 1 数字表面模型数据相对于高精度检查点的精度要求地形类别地面坡度 S(°)高差 H(m)高程中误差(m)5m 格网10m 格网平地丘陵地山地高山地S<22≤S<66≤S<25S≥25H<8080≤H<300300≤H<600H≥60055810661013格网点的高程限差不应超过高程中误差的 2 倍。内插点的高程精度按照格网点高程精度的 1.2 倍计。沙漠、冰雪、森林、阴影等影像弱纹理区域;建筑物遮挡、反射率较低等困难区域;高山地、陡崖、 山谷等地形变化剧烈的区域,数字表面模型的高程中误差可放宽至表 1 中规定的 1.5 倍。数字表面模型数据接边处同名点的高程值应保持一致。换带接边图幅,接边限差按照内插点高程精 度的 2 倍执行。4.2.5 高程赋值图幅范围内高程赋值均为有效表示值。对于缺少影像资料等导致空缺的区域,即高程无值区,高程值赋为-9999。对于海域,高程值赋为-8888。4.2.6 数据裁切范围数字表面模型数据的裁切范围按标准 1:50 000 分幅内图廓四个角点坐标的最小外接矩形向外扩展 50 个格网大小。其角点坐标计算公式如下:式中:X1,Y1,X2,Y2,X3,Y3,X4,Y4为 1:50 000 分幅内图廓四个角点坐标(+X指北,+Y指东), 坐标单位为 m;d为格网大小,int 将数字向下取整为最接近的整数,max 返回参数列表中的最大值,min 返回参数列表中的最小值。4.2.7 文件命名 文件命名包括分幅文件和极地区文件的命名:a) 分幅文件命名分幅文件名由 22 位字符组成,其中主文件名 18 位,分隔符 1 位,扩展名 3 位。其结构见图 1。2\uf028\uf029\uf05b\uf05ddddXXXXX\uf0b4\uf02d\uf0b4\uf03d50/minint4,3,2,1min\uf028\uf029\uf05b\uf05ddddYYYYY\uf0b4\uf02d\uf0b4\uf03d50/minint4,3,2,1min\uf028\uf029\uf05b\uf05d\uf05b\uf05ddddXXXXX\uf0b4\uf02b\uf0b4\uf02b\uf03d501/maxint4,3,2,1max\uf028\uf029\uf05b\uf05d\uf05b\uf05ddddYYYYY\uf0b4\uf02b\uf0b4\uf02b\uf03d501/maxint4,3,2,1max
CH/T XXXXX-202X图 1 分幅文件命名结构图分幅文件命名结构说明如下:南北半球标识符:1 位字符,北半球为“N”,南半球为“S”。标准图号:12 位字符,按照 GB/T 13989 的要求,分幅行列编号统一按照横行从上到下(亦称从 北到南)、纵列从左到右(亦称从西到东)按顺序分别用 4 位阿拉伯数字(数字码)表示;不足 4 位者 前面补零;取行号在前、列号在后的排列形式标记。产品标识符:3 位字符,数字表面模型数据为“DSM”。格网大小:2 位字符,“10”表示 10m 格网,“05”表示 5m 格网。分隔符:1 位字符,采用“.”符号。扩展名:3 位字符,表示数据文件和元数据文件扩展名。命名示例:ND38E00150001DSM10.imgb) 极地区文件命名极地区文件名由 9 位字符组成,其中主文件名 5 位,分隔符 1 位,扩展名 3 位。其结构见图 2。图 2 极地区文件命名结构图极地区文件命名结构说明如下:南北半球标识符:1 位字符,北半球为“N”,南半球为“S”。标准图号:1 位字符,南北半球均为“W”。产品标识符:3 位字符,数字表面模型数据为“DSM”。分隔符:1 位字符,采用“.”符号。扩展名:3 位字符,表示数据文件和元数据文件扩展名。命名示例:NWDSM.img。4.2.8 元数据数字表面模型元数据文件样本参见附录 A。4.2.9 辅助数据辅助数据由 DSM 成果数据的空洞范围矢量边界、分幅结合表等信息组成。4.3 生产技术方法3X X XX X XXXX XXXX XXX XX . XXX南北半球标识符“N”或“S”1:100万地形图图幅行号(字符码)1:100万地形图图幅列号(数字码)比例尺代码图幅行号(数字码)图幅列号(数字码)格网大小产品标识符分隔符扩展名X X XXX . XXX南北半球标识符“N”或“S”标准图号“W”分隔符扩展名DSM产品标识符
CH/T XXXXX-202X本文件的数字表面模型的生产采用光学立体卫星影像测量方法。根据项目要求以及作业区具体情况,拟定技术路线、技术方法和质量控制措施,编写项目设计书。 项目设计书的编写要求及内容按照 CH/T 1004 的规定执行。在满足成图精度前提下,可采用本标准未列入的新技术和新方法,但应经过实验验证并提供实验报 告,在技术设计中做出明确规定。5 作业流程收集具备立体测图能力的卫星影像数据和相关资料,开展影像预处理和区域网平差,通过立体匹配 生成 DSM 点云或格网数据,对提取过程中产生的伪地形进行编辑处理(如飞点/跳点剔除、空洞插值填 充、噪声平滑滤波、非正常/非自然降高区域抬升),对水域进行置平处理,然后经图幅接边、拼接裁 切、制作元数据、质量检查,最后输出 DSM 分幅成果。生产作业流程见图 3。图 3 基于立体卫星影像的 DSM 生产作业流程6 准备工作6.1 资料收集6.1.1 卫星影像资料满足生产数字表面模型的卫星影像数据主要包括具有立体测图能力的光学卫星影像数据。选择影像 的要求如下:a) 影像星下点的分辨率应优于 5m;b) 测区内影像连续分布,能够构建连续覆盖的区域网;c) 同一分区内优先选择同轨或相近时相的影像,异轨之间的重叠度不小于 15%;d) 不同分区之间至少有半景的影像重叠;e) 卫星影像成像质量清晰,重要地物特征不得被云、云影、雪、阴影遮挡,光学影像的云、雪覆 盖应在 20%以下;f) 优先选择成像时间新的影像,以保证成果的现势性。6.1.2 控制资料4准备工作技术设计卫星影像预处理区域网平差DSM数据生成相关文件制作成果整理与提交
CH/T XXXXX-202X成果生产需要收集以下可选的控制资料:a)已有的外业像控点;b)相关比例尺正射影像和地形图;c)其他满足精度要求的控制点资料。6.1.3 其他资料基础地理信息数据,主要包括测区相关比例尺的数字正射影像、数字线划图、数字表面模型、数字 高程模型及相关成果。6.2 资料分析对所收集的资料进行整理和分析:a) 根据测区测图用卫星影像的分布情况,构建连续覆盖的区域网,检查中发现漏洞区域应采取补 漏措施;b) 检查测区测图用卫星影像数据是否存在高程异常,检查中发现的问题应采取适当措施进行处 理;c) 检查测图用卫星影像清晰度、反差、噪声、斑点和坏线、云覆盖面积等质量问题,检查中发现 的问题应采取适当措施进行处理;d) 查明控制资料的来源、作业依据、成果精度、成图质量等,以确定其使用价值和使用方法;e) 查看测区及周边的各类参考资料是否有可用信息等。7 技术设计技术设计主要要求如下:a) 技术设计时应根据项目总体要求、资料分析结果等编写设计书;b) 技术设计应满足本标准规定的各项技术要求,特殊情况不能达到时,应明确说明原因及处理措 施,并通过项目委托单位的审核批准;c) 技术设计的编写要求及主要内容应符合 CH/T 1004 的规定。8 区域网平差8.1 卫星影像预处理对原始光学影像进行灰度调整,并对影像中被阴影、薄云覆盖的区域进行信息增强处理,使影像整 体灰度适中、色调基本一致、纹理清晰、层次丰富,阴影、云影处的地物影像细部特征明显,像对同名 点影像灰度相近,像对能产生较清晰的立体视觉效果。8.2 构建区域网主要包括以下内容:a) 建立或选择坐标系统、高程基准;b) 采用严密几何模型或者有理函数模型对卫星影像资料进行摄影测量处理,输入影像及相应摄 影参数和定位参数,建立立体模型并生成完整的金字塔影像;c) 建立空中三角测量工程文件,选择合适的区域网平差方法。8.3 主要技术要求8.3.1 相对定向相对定向一般要求如下:a) 相对定向点应均匀分布在模型中,特别是相对定向标准点位应保证一定数量的同名点。对于 困难地区,如水域周边、山区、缺少层次的阴影等地区,应有点位分布。若局部自动匹配模型 5
CH/T XXXXX-202X失真,则应手工均匀加入一些匹配点;b) 相对定向点中误差不大于 0.35 个像素,限差为 1.5 个像素,误差在 1-1.5 个像素之间的粗差 点比例不得超过 5%;c) 根据需要选定、量测检查点,检查点数量和编号规则在技术设计书中确定。8.3.2 绝对定向用于 DSM 生产的区域网平差成果计算完成后(绝对定向后),基本定向点残差、检查点误差、区域 网间公共点较差的限差应符合 GB/T 23236 的要求。缺少控制地区或特殊困难地区(两极区域、大面积 沙漠、戈壁、沼泽、森林等)的平面限差可放宽至 1.5 倍,平丘地高程限差可放宽至 2 倍,山地和高山 地高程限差可放宽至 1.5 倍。8.3.3 观测和计算观测和计算步骤如下:a) 判读量测影像控制点;b) 量测连接点,完成相对定向和模型间连接;c) 进行区域网平差概算;d) 结合立体模型检查情况分析平差结果,剔除含系统误差或粗差的控制点;e) 完成区域网平差计算,输出成果。9 数字表面模型生成9.1 立体匹配9.1.1 点云数据生成通过光学卫星影像立体像对构建立体模型进行点云匹配。具体要求如下:a) 当有多景影像重叠时,采用前视、下视、后视影像进行立体匹配,两视情况下优先选取下视 影像进行匹配,保证立体匹配后 DSM 细节丰富的影像;b) 立体匹配效果不理想的区域,可采取多种方式和手段,选取最优的匹配结果;c) 在地形高差特别大的山区和高山区,若出现山头消失、山谷达不到底的情况,可以利用已有 的 DSM 参考资料作为初始值,提高山头、山谷等地形急剧变化区域的匹配效果。9.1.2 格网数据生产格网 DSM 数据生成可采用以下两种方式:a) 可将经过编辑、接边、镶嵌与裁切的 DSM 点云数据栅格化生成图幅化格网 DSM 数据;b) 可将 DSM 点云数据直接栅格化生成 DSM 格网数据,并按照 4.2 中的有关要求进行格网编辑、 接边、镶嵌与裁切、投影转换形成图幅化格网的 DSM 数据。9.2 DSM 编辑9.2.1 飞点/跳点剔除若单元格网高程明显高于或低于(高程相差 20m 及以上)周围相邻的 8 个格网,采用平滑滤波方法 自动滤除。9.2.2 空洞填充对于小面积(≤10 个格网)的空洞区域,可采用局部内插、拟合、平滑等编辑进行直接处理;对 于大面积(>10 个格网)的空洞区域,可采用同等或优于本产品质量的相关数据进行修补,并对接边处 进行平滑过渡,记录替换区域的矢量范围。9.2.3 噪声滤除一般在阴影、森林、沙漠等区域存在噪声问题,可采用平滑滤波方法滤除噪声。9.2.4 水域编辑水域需要根据周围地形进行置平处理和平滑过渡等编辑,保证无明显地形异常。水域的编辑要求如 6
CH/T XXXXX-202X下:a) 对于主要静止水域(面积≥10000m2),需要置平处理,其高程值取影像数据获取时的瞬时水 位高;对于特别密集的水域,面积指标可放宽 2-5 倍;b) 对于主要流动水域(宽度≥80m),水面依据实际使用影像保持自上而下平缓过渡,并且与周 边地势过渡自然、合理;c) 对于范围大、跨度长、上下游高程相差较大或跨越多景卫星影像且时相水位高程差异较大的 大型水库和湖泊,水面高程可不采用同一高程值,需依据岸边地形平缓过渡;d) 对于大面积连片或多个毗邻的小型坑塘区域、水系形状较复杂的辫状和洪泛河流区域(宽度 ≥80m 主河道除外)无需置平,可按实际地形地貌进行平滑处理;e) 水域范围以影像为准,季节性的干枯湖泊和河流不要求置平;f) 对于湿地中的水生植物可作为水域进行置平处理;g) 海域边界依据影像瞬时水位提取。9.2.5 其他伪地物编辑 其他伪地物的编辑要求如下:a) 对于非正常/非自然降高区域,如海岸线附近高程小于 0 的非正常区域(自然高程小于 0 除外), 应进行高程抬升处理,编辑后的区域应与海岸线地形特征保持一致;b) 山脊或沟谷等区域应符合实际地貌特征;山体阴影区域的高程值及其表现出来的纹理特征应 符合实际的地形地貌特征;c) 机场跑道高程值应保持一致;d) 特殊地物(指由于技术限制等原因,不能完全获取表面模型的地物,如散热塔、宝塔、索道、 铁丝网、电线塔、风车、路灯、电杆等)不做特殊处理,精度不做要求;e) 非地面附着物(如车辆、船舶、飞机等)不包含在 DSM 成果中,应人工删除。9.3 接边处理DSM接边处理要求如下:a) 立体模型接边重叠带内同名格网点的高程差不大于 2 倍高程中误差,在相邻图幅地形类别不 同时,接边误差按低精度执行;超过高程限差的同名格网点,需根据立体模型修改,保证数据 接边合理、过渡平滑自然;b) DSM 数据接边后应连续、不错位,相邻图幅重叠范围内同一格网点的高程值应一致;c) 换带接边图幅的接边限差参照 4.2.4 节中要求。9.4 数据拼接与裁切数据拼接与裁切的要求如下:a) 在 DSM 接边较差符合规定要求的基础上进行 DSM 数据拼接,对参与接边的各同名点高程取中 数作为格网点高程。数据拼接处要保持地物、地形过渡自然,无明显拼接痕迹;b) 根据 4.2 节中格网大小的要求和数据裁切范围要求进行分幅裁切。9.5 相关文件制作在 DSM 数据制作过程中,应按要求进行以下相关文件的制作:a) 元数据采集,采集内容见附录A。每个图幅的元数据保存为一个文件;b) 辅助数据制作,采用相关软件制作数据空洞矢量范围和分幅结合表,要求能准确反映数据空 洞及成果提交的数量和范围,属性字段中应有“图号”等信息说明;c) 按 CH/T 1001 的规定编写技术总结。10 质量控制10.1 基本要求7
CH/T XXXXX-202X质量控制的基本要求如下:a) 技术设计应符合本标准的相关技术要求;b) 每完成一道工序应及时自检;c) 在完成自查的基础上分工序、有重点地进行互检,也可分工作阶段进行;d) 成果的质量应依次通过测绘单位作业部门的过程检查、测绘单位质量管理部门的最终检查和 生产委托方的验收。各级检查工作应独立进行,不应省略或代替;e) 数字表面模型的高程精度可利用区域网平差成果中的备查点进行检测,或者利用立体采集高 程点进行检测,也可利用已有控制成果进行质量检查。10.2 过程质量控制10.2.1 准备工作准备工作质量控制的主要内容为:a) 收集的资料是否齐全、准确、权威;b) 资料分析和整合是否全面、准确、符合技术要求;c) 技术设计是否科学、合理、适用。10.2.2 影像预处理影像预处理质量控制的主要内容为:a) 影像像素是否增加或减少;b) 阴影、云影处的地物影像细部特征是否明显,立体视觉效果是否清晰;c) 立体像对同名点影像灰度是否相近,特征边缘灰度变化是否自然、协调;d) 影像整体灰度是否适中,色调是否基本一致,纹理是否清晰,层次是否丰富。10.2.3 区域网平差区域网平差质量控制的主要内容为:a) 各类影像参数使用和输入是否准确;b) 立体模型质量检查是否符合技术要求;c) 控制点和连接点点位略图标注是否准确、完整;d) 立体模型上下视差、中误差、最大误差、误差分布等是否符合技术要求;e) 数据文件的完整性及数据内容、格式是否符合技术要求。10.2.4 数字表面模型生产数字表面模型生产质量控制的主要内容为:a) DSM 接边、镶嵌和裁切是否符合要求;b) 检查高程是否异常;c) 各类参数(坐标系统、投影参数、格网大小、起始点坐标等)是否符合要求;d) 检查高程中误差是否符合技术要求;e) 格网高程值是否存在粗差,同名格网点高程值是否符合技术要求;f) 元数据及相关文件资料内容是否正确和完整。10.3 检查验收10.3.1 主要内容数字表面模型成果检查验收与质量评定应符合 4.2 节和 GB/T 18316 的要求。检查验收的主要内容 如下:a) 检查成果的高程基准、坐标系统及地图投影是否符合规定要求;b) 恢复立体模型,叠加 DSM 成果,检查匹配结果是否存在明显异常区域,检查大面积静止水域 高程是否合理等;c) 检查文件存储及组织、文件格式及命名是否符合技术规定要求;检查数据文件是否正常读出, 是否存在缺失或多余;d) 检查 DSM 起始坐标点、格网大小或裁切范围的正确性及权威性;8
CH/T XXXXX-202Xe) 恢复立体模型,人工目视检查漏洞区域的成因是否合理,检查 DEM 补漏 DSM 时,接边处较差、 过渡是否合理;f) 检查数据文件的命名和数据格式,以及文档资料。10.3.2 数据质量检测的方法和要求数据质量检测的方法和要求如下:a) 已有高精度高程资料检测:利用测区内已有的高精度高程资料与相应的 DSM 数据进行比较, 计算其高程中误差,检查 DSM 精度是否达到规定要求;b) 立体模型检测:在立体模型上采集不少于 9 个检测点,利用该检测点对 DSM 数据计算其高程 中误差;c) 地表形态检查:对 DSM 数据利用分色图(晕渲)、等高线等方法检查地表整体形态,排除粗 差;d) 逻辑关系检查:通过设计模型算法和编制计算机程序,利用高程数据逻辑关系和规律,自动 检查和发现数据中存在的错误。11 成果整理与提交11.1 成果整理对数字表面模型成果及有关文档资料进行整理,按以下内容逐项登记,形成成果清单,检查无误后 正式提交,成果提交的目录和文件组织由技术设计书规定。成果整理要求如下:a) 数据文件。包括 DSM 数据和 DSM 元数据;b) 文档资料。包括以下内容:1) 成果清单;2) 分幅结合表;3) 技术设计书;4) 技术总结;5) 检查报告与验收报告;6) 其他相关资料。11.2 成果包装数字表面模型成果一般以光盘为存储介质,也可使用磁盘或磁带等。外包装上应包括成果标记、生 产单位、分发单位等内容。9
CH/T XXXXX-202X附 录 A(资料性)数字表面模型元数据示例数字表面模型元数据示例见表 A.1。表 A.1 数字表面模型元数据示例数据名称10米格网数字表面模型数据版权单位名自然资源部数据生产单位名陕西测绘地理信息局数据出版单位名自然资源部数据生产时间201605图号NI50E00020008数据量大小(MB)数据格式格网单元尺寸(m)格网行数格网列数高程记录的小数点位数50.11img10或5无无2无效格网值-9999起始格网单元左上角点 X 坐标(m) 1234567.00起始格网单元左上角点 Y 坐标(m) 123456.00椭球长半径(m)6378137.0000椭球扁率1/298.257222101所采用大地基准2000国家大地坐标系地图投影中央经线10UTM111
表 A.1 数字表面模型元数据示例(续) CH/T XXXXX-202X分带方式投影带号平面坐标单位6度带49m高程系统名1985国家高程基准主要卫星影像数据源类型资源三号立体影像卫星影像分辨率(m)2.1卫星影像接收时间高程内插方法20150321双线性西边接边情况已接/未接/自由边北边接边情况已接/未接/自由边东边接边情况已接/未接/自由边南边接边情况已接/未接/自由边高程中误差(m)填写区域网平差的检查点高程中误差数据质量检验评价单位自然资源部陕西测绘产品质量监督检验站数据质量评检日期20160531数据质量总评价合格/不合格备注无'
|
[
"10m格网。"
] | 12,363
|
multifieldqa_zh
|
zh
| null |
18a34cee09c942c9b68e04f91bce2c3c35f6c1398a93592e
|
泗阳县的著名特产有哪些?
|
泗阳县
泗阳县,古称淮阳、桃源,江苏省宿迁市辖县,位于江苏省北部、宿迁市东部,属长江三角洲地区,是淮海经济圈、长三角经济圈、沿运河城镇轴交叉辐射区。截至2018年末,泗阳县户籍人口106.79万,总面积1418平方千米 。截至2020年7月,泗阳县辖3个街道、9个镇、1个乡和2个乡镇级园区,县政府驻众兴街道。 [2-3] 泗阳县有5000年的文明史和2200多年的建县史。泗阳县处于南北交汇地带,南方吴越文化、北方齐鲁文化和本地楚汉文化的交汇融合区 。泗阳建制始于周而定于秦,汉元鼎元年(前116年)置泗阳县,先后称魏阳、宿豫、桃源,民国三年(1914年)为避重名,由桃源县复称泗阳县。1996年前,先后由淮阴地区、淮阴市所辖,1996年7月,划入新设立的设区市宿迁 。泗阳县中国唯一的“杨树之乡” ,先后摘下了国家园林县城 、全国粮食生产先进单位 等称号。泗阳县的主要旅游景点有中国杨树博物馆和妈祖文化园等;主要的特产有泗阳膘鸡、八集小花生等;主要的历史文化有云渡桃雕、玩花船等 ;著名人物主要有刘世勋、张相文等 。泗阳县境内徐盐高速铁路、343国道、245省道、325省道穿境而过,中运河、古黄河在此汇聚。2018年,泗阳县实现地区生产总值479.22亿元,增长6.9%;一般公共预算收入25.5亿元,税收占比80.4%;工业开票销售、工业增值税分别增长24.98%、13.6% 。
建置沿革 泗阳有5000多年的文明史,2200多年的建县史。境内已发现龙山文化,青莲岗文化和汉代遗址多处。泗阳为古泗水王国都城所在地。夏商分九州,泗阳地属徐州,建有厹犹国。西周属青州。春秋地属吴,吴亡属越,战国属楚。秦置郯郡凌县和郯郡下相县(陵县置凌城,故治在今泗阳众兴镇)。秦汉之际,泗阳属东阳郡凌县。西汉开国属东海郡凌县和厹犹县 [10] (县治在郑楼镇,2004年划入宿城区)。汉高帝五年(前198年),徙齐王韩信为楚王,凌县和厹犹县也因“韩信封楚”而地属之。元鼎元年(前116年),析凌县东南境,泗水下游北侧地置泗阳县(治所在今泗阳新袁镇),属东海郡。元鼎四年(前113年)以东海郡三万户置泗水国,辖凌、于、泗阳三县,国都凌。曹魏时期,改泗阳为魏阳。西晋置凌县,属广陵郡。东晋立淮阳郡(今淮安、泗阳、宿迁等县市地),治角城县(今泗阳东南境)。东晋义熙元年(405年),置宿预县(治所厹犹之古城),属淮阳郡。隋置泗州宿豫郡宿豫县,后属泗州临淮郡。北宋初属武宁军,后属淮阳军。南宋建炎元年(1127年),建吴城县(今泗阳东南境)。金兴定三年(1219年),建淮滨县,治桃源镇(今泗阳城厢街道),属泗州。元改称桃源县,属淮安府。明延用桃源县,属淮安府,直属中书省。清顺治二年(1645年),改南直隶为江南省,泗阳属江南省淮安府。清康熙六年(1667年)改属江苏省,为淮安府桃源县。民国三年(1914年),因与国民党元老宋教仁故乡湖南省桃源县名相重,复改称泗阳县,属江苏省淮扬道。国民政府成立,废道,直辖于江苏省政府。民国二十年(1931年),江苏划分13个行政督察区,泗阳属11区。后划为9区,泗阳属于第七区淮阴区。民国二十八年(1939年),日军攻陷泗阳,县城被毁。民国二十九年(1940年),泗阳县抗日民主政权建立。为适应战争形势,泗阳与邻县部分地区分设泗沭、淮泗、泗阳、运河特区4个县级民主政权。民国三十三年(1944年),撤运河特区,民国三十七年裁淮泗入泗阳,民国三十八年五月泗沭与泗阳合并,基本恢复原泗阳建置,县政府设于众兴镇,隶属淮阴专区(今淮安市)。1983年,实行市管县体制,泗阳县属淮阴市。1996年,设立地级宿迁市,泗阳县由淮阴市划至宿迁市。 [3] 行政区划 区划沿革 1999年底,泗阳县辖7个镇、21个乡,4个场圃。2000年2月,撤销临河乡、城厢乡、李口乡,以其原辖区域设立临河镇、城厢镇、李口镇。同年5月,桃源乡、史集乡撤销并入众兴镇,葛集乡撤销并入来安乡,魏圩乡撤销并入王集镇,黄圩乡撤销并入裴圩镇,屠园乡前行、冯桥、解放、沙圩、西俞、二庄、周石七个村归洋河镇管辖,林柴场并入中扬镇,果树实验场并入爱园镇。同年7月,撤销中扬乡、穿城乡、高渡乡、郑楼乡、张家圩乡、卢集乡6个乡撤乡建镇。2004年3月,洋河镇、郑楼镇、中扬镇、仓集镇、屠园乡5个乡镇析至宿迁市宿城区。2005年8月,撤销城厢镇、来安乡,并入众兴镇。2012年1月,泗阳县自主撤销来安、城厢、史集三个社区,设立来安街道、城厢街道、史集街道。2020年7月,撤销众兴镇,设立城厢街道、众兴街道、来安街道(包括原八集乡全境);撤销三庄乡,设立三庄镇;撤销爱园镇、里仁乡,设立新的爱园镇;撤销卢集镇、高渡镇,设立新的卢集镇;撤销王集镇、南刘集乡,设立新的王集镇;撤销穿城镇、张家圩镇,设立新的穿城镇;并将原众兴镇的杨集、林苗圃、大兴3个居民社区划归临河镇管辖。 [2] 泗阳县在2012年设立的史集街道废。 区划详情 截至2020年7月,泗阳县辖3个街道、9个镇、1个乡和2个乡镇级园区,县府驻众兴街道。 [2] [4] 乡镇(街道)行政村居数量(个)面积(平方千米)人口(万人)驻地众兴街道2191.320.4杨圩社区城厢街道1452.56.8南园社区来安街道25113.88.5来安社区三庄镇22121.57.5史集社区爱园镇21106.59.6果树实验场社区卢集镇191458.1卢集社区王集镇2713311.5王集社区穿城镇191128.06穿城社区临河镇1776.96.3临河社区新袁镇1054.34.5新集社区李口镇1665.855.3李口社区裴圩镇676.866.4裴圩社区庄圩乡748.534.8庄圩社区泗阳棉花原种场04.30.4-泗阳农场25.680.44-总计2261208.02108.6-参考资料: [2] [4] (调整的区域人口为参考资料人口,未调整的区域人口为《宿迁年鉴2018》显示的人口) 地理环境 位置境域 泗阳县地处江苏省北部,介于东经118°20′—118°45′,北纬33°23′—33°58′之间,东界淮安市淮阴区,北邻沭阳县,西与宿城区、宿豫区毗邻,南濒洪泽湖,与泗洪县、盱眙县、洪泽区隔湖相望,总面积1418平方千米 [3] 。 地形地貌 泗阳县境内无山丘,属黄泛冲积平原。总地势西高东低,地面相对高度大多介于12米—17米之间 [3] 。 土壤 泗阳县境内土壤分为三个类型:潮土、砂礓土、黄棕壤土。潮土面积最大,分布最广,占总面积的83.2%。土壤质量较差,四、五级占87.5%,中低产田面积较大 [3] 。 气候 泗阳县位于北温带南缘,属北亚热带季风过渡气候。境内气候温和、光照充足,雨量充沛,无霜期长,四季分明,一般年均气温14.4℃左右。 [3] 水文 泗阳县系淮河流域,境内水网密布,有京杭大运河、废黄河、刘柴河、黄码河、六塘河、高松河、沙礓河、淮沭新河等大小河道有30多条,总长近700公里。京杭大运河横穿泗阳县全境,成为天然的“分水岭”,运河以南,北高南低,河流皆入洪泽湖,属淮河水系;运河以北,南高北低,河流皆入新沂河,属沂、沭、泗水系。 [3] 自然资源 植物资源 泗阳县是国内引种意大利杨树最早的地区,也是全国唯一的“中国杨树之乡”。截至2015年末,泗阳县拥有成片林60多万亩,活立木蓄积量达600多万立方米,森林覆盖率达30.7%。 [3] 矿产资源 泗阳县地下矿藏有泥炭总量为44.5万吨,还有芒硝、黄沙、石英、石油等。 [3] 水资源 泗阳县水域面积50.1万亩,其中洪泽湖区域水面45万亩。可利用水资源主要有地表径流(天然降雨)、过境水和地下水。年降水量为960毫米,过境水以运河为最,地下水资源比较丰富。 [3] 人口 截至2015年,泗阳县常住人口户数26.89万户,总人口106.76万人。总人口中,男性55.82万人,女性50.94万人,男女性别比为109.81:100。人口出生率14.4‰,死亡率5.7‰,自然增长率8.7‰,人口密度为753人/平方千米 [3] 。泗阳县是多民族地区,汉族人口占总人口的99%以上。截至2015年末,境内有33个少数民族9500多人,主要有回、苗、彝、壮、满、哈尼、布依等族;少数民族中,人口最多的是回族,占少数民族总人口的90%以上 [3] 。截至2018年末,泗阳县户数为27.08万户,户籍人口为106.79万人 [1] 。 经济 综述 2018年,泗阳县实现地区生产总值479.22亿元,增长6.9%;一般公共预算收入25.5亿元,税收占比80.4%;工业开票销售、工业增值税分别增长24.98%、13.6% [8] 。2019年,泗阳县地区生产总值破500亿元、增长7.5%;实现一般公共预算收入25.75亿元、增长1.13%(剔除减税降费影响2.4亿元),税收占比81.08%;社会消费品零售总额127.8亿元、增长7.4%;城乡居民人均可支配收入达30006元、18113元,分别增长8.4%、8.8%;全面小康综合实现度达91.84% [11] 。 第一产业 2018年,泗阳县实现农林牧渔业总产值117.2亿元, 按可比价计算,比上年增长4.7%。其中:农业总产值61.9亿元、林业总产值7.9亿元、牧业总产值17.1亿元、渔业总产值25.6亿元、农林牧渔服务业总产值4.7亿元,占比分别为52.8%、6.7%、14.6%、21.8%和4% [12] 。粮食生产2018年,泗阳县粮食播种面积143.1万亩,比去年减少0.1万亩;油料播种面积3.3万亩,减少1万亩;蔬菜(含菜用瓜)面积29.8万亩,增加0.4万亩。粮食总产量62.7万吨,减产0.5万吨。其中,夏粮总产26.1万吨,减产0.8万吨;秋粮总产36.5万吨,增产0.2万吨。分品种看,小麦总产26.1万吨,减产0.8万吨,亩产373千克,亩均比去年减少10千克;水稻总产29.6万吨,减产0.3万吨,亩产550千克,亩均比去年增加5千克。全年粮食平均单产438千克/亩,较上年减产3千克/亩 [12] 。畜牧业生产2018年,泗阳县生猪出栏48.5万头,同比减少2.2%;年末存栏23.5万头,减少20.6%。2018年,家禽出栏601.0万只,同比下降0.2%;年末存栏244万只,下降18.6%;禽肉产量6988吨,较上年持平;禽蛋产量21200吨,下降0.9% [12] 。特色农业2018年,泗阳县建成2000亩以上单品高效农业示范基地20个、新增产业结构调整面积5.1万亩,农业主导特色产业种植面积超48.5万亩。新建成家庭农场集群服务中心4个,新引进市级以上农业龙头企业6家,土地适度规模经营比例超50%。全年新增“三品一标”农产品39个,绿色优质农产品占比超45% [12] 。2019年,泗阳县新增高效农业(渔业)面积4.6万亩,新建高标准农田7.7万亩,42个农业重大项目完成投资20.3亿元;新增市级以上农业龙头企业9家,全县绿色优质农产品占比超80% [13] 。 第二产业 2018年,泗阳县实现规模以上工业总产值269.4亿元,同比增长15.0%,规上工业增加值58.5亿元,同比增长7.9%。实现工业用电量17亿千瓦时,同比增长19.1%。分产业来看,全县列统工业2+1产业主要有家居制造、纺织服装、食品包装,全年分别实现产值45.4亿元、112.7亿元、16.9亿元,增速分别为-0.5%、32.9%、2.2%,占总产值的比重分别为16.9%、41.8%、6.3% [12] 。2018年末,泗阳县列统总承包和专业承包的建筑业企业达62家,全年完成建筑业总产值170.2亿元,比上年增长12.0%;完成竣工产值165.0亿元,比上年同期增长29.9%;房屋建筑施工面积1105.1万平方米,比上年增长24.1%;房屋建筑竣工面积480.9万平方米,比上年增长29.7% [12] 。 第三产业 国内市场发展2018年,泗阳县实现社会消费品零售总额119.0亿元,同比增长7.1%。其中,城镇实现社会消费品零售额85.6亿元,增长9%;农村实现社会消费品零售额33.4亿元。增长2.5%。按行业分:批发、零售、住宿、餐饮四个行业分别实现社会消费品零售额42.4、64.3、1.6、10.7亿元,分别增长11.3%、6.7%、2.6%、-4.4%。按规模分:限额以上单位实现社会消费品零售额29.3亿元,增长8.0%;限额以下单位实现社会消费品零售额89.7亿元,增长6.8% [12] 。现代服务业2018年,泗阳县完成新桂湾水系调整、滨湖路南延等重点旅游工程建设,新创建省三星级乡村旅游点2个,全年游客接待量增长16%。新发展农村电商服务站70个、“淘宝村”7个,新增各类网店2100余家,“一村一品一店”标准村占比提高到75% [12] 。对外贸易2018年,泗阳县完成外贸进出口总额48783万美元,同比增长18.7%,其中:出口46928万美元,增长18.1%。实际利用外资到账5600万美元,增长73.1% [12] 。 交通运输 公路 泗阳县境内省道347、325、245、330、267、国道343和G2513徐淮高速公路穿越泗阳县,与京沪、宁连、宁徐、沿海高速连接互通。 铁路 途经泗阳县境内的铁路有3条,分别是新长铁路、宿淮铁路和徐盐高速铁路,境内设有站点—泗阳站和庄圩站。 航运 泗阳境内航运河流有中运河、成子河航道,境内设有港口—泗阳港和卢集渔港。 [14] 公共交通 公交截至2014年,泗阳县有公交线路40余条,城市公交及城乡公交覆盖全县及宿迁市洋河新区,镇村公交已实现乡镇客运村村通。2012年,旅游公交线路“游1”路开通,投入营运的公交车为双层旅游大巴,线路函盖泗阳城区大部分景点。出租车截至2014年,泗阳运营的出租车约400辆,车型以索纳塔为主。为适应广大市民日益增长的出行需求,通过展开出租车新增扩容,2015年,泗阳运营的出租车将达到500辆。公共单车泗阳公共自行车是苏北第一个建设城市公共自行车系统的县级单位。截至2013年末,泗阳县共投放县公共自行车1300辆,使用范围覆盖了整个城区。为了确保车辆的有效使用和管理,还专门设立了1个管理服务中心和1个车辆调度维修中心。2014年,泗阳县启动了二期公共自行车投放工程,新增30个站点,投放500辆自行车 [15] 。 社会事业 教育事业 综述截至2015年末,泗阳县有成型幼儿园75所,其中省优质幼儿园47所,市优质幼儿园22所;完全小学34所、办学点42个,其中省级实验小学4所;特殊教育学校1所;初中23所,其中省级示范初中9所;中等专业学校2所,其中四星级普通中专1所,三星级普通中专1所;普通高中4所,其中四星级普通高中2所,三星级普通高中2所;乡镇成人教育中心16所。全县有教职工12948人,其中专任教师10104人,在校学生(含幼儿园)180108人 [16] 。学前教育截至2015年末,泗阳县有成型幼儿园75所,其中省优质幼儿园47所,市优质幼儿园22所。教职工2999人,其中专任教师2048人;幼儿38137人,入园率95.3% [16] 。义务教育截至2015年末,泗阳县有完全小学34所,办学点42个,其中含九年一贯制学校3所、省级实验小学4所;初中23所,其中省级示范初中9所;特殊教育学校1所。义务教育阶段学校有教职工8142人,其中专任教育6614人;义务教育阶段在校生11.92万人,入学率100%;小学、初中巩固率分别为100%和99.43%,初中毕业生升学率98% [16] 。普高教育截至2015年末,泗阳县有普通高中4所,省四星级2所、三星级2所。教职工1232人,其中专任教师1013人,共有教学班273个,在校学生16103人。2015年,泗阳县普通高考报考人类5472人,本二以上达线2929人,达线率53.52%,全市前列,考取清华大学3人、北京大学1人 [16] 。职业教育截至2015年末,泗阳县有江苏省泗阳中等专业学校和泗阳县霞飞中等专业学校2所普通中等专业学校。拥有国家级实训基地1个,省级示范专业6个,市级示范专业8个。有教职工575人,其中专任教师393人,在校生6673人。18个中专专业在校生1500名,参加江苏省普通高校对口单招520人,本科录取40人 [16] 。民办教育截至2015年末,泗阳县拥有各级各类民办教育机构113所,其中,民办中、小学12所(县城7所,农村5所),民办幼儿园86所,民办早教机构9所,非学历教育培训机构6所。民办学校有在校生61325人,占全县在校总数的34.07%,其中高中人数14531人,占总数的47.43%。民办教师有2010人 [16] 。 科技事业 2019年,泗阳县新增省级工程(技术)研究中心4家以上、企业院士工作站1家、产学研合作项目20个;净增国家高新技术企业6家、省民营科技型企业10家,规上工业企业研发机构建有率46%以上,高新技术产业产值占比20%以上;新增专利申请量2000件以上。新引进高层次创新创业人才及团队25个以上 [17] 。 文体事业 2019年,泗阳县已建成“县有图书馆、文化馆、博物馆、乡镇(街道)有综合文化站、村(居、社区)有文化活动室及农家书屋”三级公共文化设施网络体系,设施覆盖率达到95%以上。县文化馆、图书馆被文化部评为国家一级馆。境内16个乡镇文化站有国家一级站2个,二级站3个,三级站5个。境内有国家文物重点保护单位1处,省级文物保护单位1处,市县级文物保护单位22处 [18] 。2019年,泗阳县举办了“平原林海”自行车赛等品牌赛事,开发漂流、摩托艇等参与型体育项目,倡导全民健身新时尚,年内城乡社区体育设施覆盖率提升到80% [19] 。 医疗卫生 截至2019年末,泗阳县共有卫生健康机构455个,其中三级乙等中医院1个,二级医院3个;一级医院41个;乡镇(街道)卫生健康服务中心19个;村居卫生机构250个。基本公共卫生补助经费提高到65元 /人,新卫生应急暨120急救指挥中心建成使用。2019年,运南区域医疗卫生中心一期工程建成投用,县中医院门急诊综合楼主体完工,新创成省示范村卫生室30个。 [20] 社会保障 2019年,泗阳县新增“五险”参保7万人,养老、医疗保险等主要险种参保率稳定在98%以上。建成留守儿童关爱之家15个、残疾人之家40个,发放各项救助资金2.34亿元,社会救助综合改革试点工作通过民政部评估验收,“急诊救助”创新成果在全国推广。运北养老服务中心投入运营,新建标准化以上社区居家养老服务中心30家,被认定为省级居家和社区养老服务创新示范区。对学生、困难群众等群体发放猪肉价格补贴900万余元 [21] 。 历史文化 云渡桃雕 泗阳是中国民间(桃雕)艺术之乡。云渡桃雕是省非物质文化遗产。泗阳古称桃源县,县内有桃园镇、桃源滩、桃源祠、状元墩。状元墩上下是桃树,花开时节,遍地火红。云渡桃雕已有300多年的历史,其种类包括浮雕和镂雕,方法分为粗雕、中雕和细雕。粗雕只具大致轮廓;中雕线条分明,局部镂空;细雕玲珑剔透,观赏性高。云渡桃雕被当地百姓赋予了“避邪纳福”的文化内涵,广泛用于婴儿配饰、男女手串、家庭装饰等方面。桃雕造型主要有十二生肖、十八罗汉、猴子背鱼、熊猫啃竹等。 [22] 新袁柳编 新袁柳编是新袁及其周边乡镇的一种传统手工编织技艺。柳编采用杞柳为原料,主要技法有平编、纹编、勒编、砌编、缠边五种。柳编制品以造型美观、花样繁多,简便实用而普遍被该地群众作为生产生活、家居装饰用品。随着编制技艺的日臻完善,新袁柳编也由最初的粗加工演变为精加工,同时,也由乡亲邻里相互馈赠之物转变为市场销售产品。新袁柳编无毒、卫生、精致、美观。 [8] 文物古迹 三庄汉墓群 三庄汉墓群是古泗水国的重要遗址,位于江苏省泗阳县三庄乡东部。分布于东西2500米,南北7500米的范围内,计40余座。古墓坐落有序,并处南北同一轴线,高低起伏,逶迤连绵。2013年5月4日,国务院公布第七批全国重点文物保护名单,三庄汉墓群成功入选“第七批国保”名单。 [23] 风景名胜 综述 泗阳县是旅游景点比较多的县,境内有4A级景区2个(中国杨树博物馆、妈祖文化园),其它级景区和游乐园主要有中国棉花博物馆、成子湖旅游度假区、大禾庄园、泗水河风景区、洪泽湖斗争纪念馆、国润大观园、运河风光带、泗阳城南植物园、城市森林公园、锅底湖热带风暴水上乐园、五里湖游乐园、泗阳欢乐世界等。 主要景点 中国杨树博物馆泗阳县是中国南方型杨树的发源地。中国杨树博物馆是国家4A级旅游景点、也是泗阳第一个国家4A级景点。中国杨树博物馆是中国唯一以杨树为主题博物馆,总占地面积约9650平方米。展馆内主要展示杨树引种暨良种繁育资料和实物、杨树文化资料、杨树培育成果以及杨树制品等。馆内有1976年1月定植现仍存活的4株品种对比试验意杨,其中最干大1株树高45米、胸径106厘米、单株立木材积16.3立方米,是专家论证为名副其实的“中国意杨王”。馆内绿地5866平方米,绿地上植有各类杨树新品种、银杏、红枫等。此外,馆内建有花岗岩群雕1座,人物造型为对中国杨树产业发展作出杰出贡献的领导、专家和基层科技人员代表,以纪念他们所作出的贡献。 [23] 妈祖文化园京杭大运河漕运文化——妈祖文化园是泗阳县文化旅游产业的重大项目。相传,妈祖又称天妃、天后、天上圣母,是历代船工、海员、旅客、商人和渔民共同信奉的神祇。泗阳自古就是运河上重要的漕运要冲,供奉妈祖神像的天后宫就是由福建闽商在泗经商时所建,已有三百多年历史。妈祖文化园总投资1.6亿元,该文化园三面环水,风景秀美,其莲花广场建有世界首座三面妈祖圣像,像高32.3米。 [23-24] 中国棉花博物馆中国棉花博物馆位于棉花原种场境内,博物馆占地总面积35亩,建筑面积4000平方米,其中主馆面积3200平方米,棉花科研玻璃温室800平方米。泗阳棉花原种场培育的泗阳系列棉花品种,推广面积在全国居第二位,建有棉花育种基因库。 [23] 成子湖旅游度假区泗阳成子湖生态旅游度假区位于泗阳县城南部、洪泽湖西北部,总面积约63平方公里。度假区内生态环境优美,拥有森林、湖泊、湿地、温泉、休闲渔业、休闲农业等自然旅游资源,以及古石花县遗址、新时期时代遗址、报墩岛、龙眼滩等人文旅游资源。 [23] 南园风景区南园风景区是国家3A级旅游风景区,是泗阳县重点建设的青少年科普基地、爱国主义教育基地、文化产业基地和休闲旅游基地。景区内涵盖中国地文馆、张相文故居。景区位于泗阳县城厢街道南园居委会,总投资3000万元,占地48亩,主要为缅怀中国近代地理学先驱、中国地理学会发起者张相文先生,他是第一个提出将秦岭淮河作为中国南北地理分界线的地理学家。该项目建有张相文故居、中国地文馆等核心景观,其中的中国地文馆由泗阳县与中国地学会共同建设,主要用于普及传播地理科学知识。 [23] 奥林区克生态公园奥林区克生态公园是国家3A级旅游景区,是泗阳县首次引入湿地造园理念建设的生态式环保型森林公园。公园位于城北文化新城东侧,南临文城路,总投资6000万元,占地770亩,其中水面300亩。 [23] 爱园烈士陵园爱园烈士陵园原址在泗阳县爱园镇,始建于民国三十三年(1944年),由淮海行政公署主任李一氓筹划、建立并命名为爱园,以此悼念抗日救国英勇牺牲的烈士,褒扬烈士的爱国主义精神,教育与激励当时的军民继续团结奋战。中华人民共和国建立后,泗阳县人民政府为便于社会各界凭吊先烈,1953年将爱园迁至泗阳县城现址。爱园公园是宿迁市级文化保护单位和爱国主义教育基地和红色旅游景点区。园林主体建筑是“昭忠祠”。园的东北角是烈士墓地,在书有“忠魂园”围墙内的高丘上,耸立着“死难烈士万岁”的纪念碑。烈土墓前建有烈士碑廊,分立东西,碑廊为仿古回廊。泗阳烈士陵园占地280亩,有健身场、游乐场、国防园等多项游玩设施,国防园陈列有坦克、榴弹炮、高射炮等武器装备。 [23] 名优特产 泗阳膘鸡泗阳膘鸡是泗阳特产之一。农家婚丧喜庆,多以膘鸡作为“头景”上桌,客人评论厨师手艺如何,也都是以膘鸡的制作为标准。膘鸡制作相当讲究,它选用瘦猪肉糊、鸡蛋黄、馒头屑、淀粉,用盐、葱、姜、胡椒粉、味精等佐料搅拌均匀,然后摊在百叶上,厚约一寸厚,再用肥猪肉糊与去皮的山药糊、鸡蛋清、葱白、淀粉等搅拌均匀后摊在其上,厚约半寸。做好后将其放入蒸笼,蒸熟后,上层洁白如玉,下层红如玛瑙。一般先改刀成片,配以菠菜、姜葱等佐料,青、红、白三色相映。 [22] 御珍酒御珍酒产于泗阳县。民国四年(1915年),御珍酒在南洋劝业会上一举夺得巴拿马国际金奖。2005年3月,45°浓香型“百年御珍”酒被指定为“人民大会堂宴会专用酒”。 [22] 穿城大饼穿城大饼饼大而厚,中间厚度可达八寸,重达十五斤。穿城大饼烙制技术特殊也特殊,烙制大饼不用平底锅,用的是圆底铁锅,烙出的饼才能中间厚边口薄些。烙的火必须用木柴文火,所以一块饼从入锅到烙熟,得三柱香的工夫。烙饼人必须有耐心,才能达到饼熟而不焦的效果。穿城流传俗语叫"性急烙不得大饼"。 [22] 八集小花生八集小花生是泗阳名特产之一。因产于江苏省泗阳县八集乡,而得名。八集小花生壳薄,肉嫩,口感好,富含钙、铁、镁、锌等微量元素,含油量高达40%-43%。经过炒制,具有白、香、甜、脆的特点。1999年,“八集小花生”成为注册商标,产品畅销大江南北。2011年,八集小花生入选全国农产品地理标志产品保护行列。 [22] 丁庄大菜丁庄大菜(即黄花菜)产于江苏泗阳三庄镇。《泗阳县志》记载:“金针菜,一名黄花菜,又名安神菜、丁庄大菜。蒸半熟,曝干,销售 甚广。”泗阳优种“大乌嘴”黄花菜就有很多优点,它分蘖快,栽后三四年即进入盛产期。其花莛粗壮,高达一米三,五个分杈较长。“小满”出莛,“芒种”盛蕾,“夏至”开始采收。 采收期约50天。花蕾大,长十二厘米,色泽黄绿,嘴尖而有较大的黑紫色斑块,故称“大乌嘴”。其干制率和产量也优于一般品种。 [22] 泗阳白酥梨江苏省泗阳县泗阳白酥梨果实大型,平均单果重350克,最大的达1500克,果实近圆柱形,果皮黄色,稍带浅褐色,充分成熟为金黄色。其果果心小,果肉酥脆爽口、皮薄多汁、味道浓甜而香。果实中含有糖类、有机酸、矿物质和多种维生素,营养价值很高。 [22] 王集小团饼王集小团饼,又称“月亮饼”,是江苏省泗阳县王集镇的特色食品其加工原料是小麦面粉,直径约15厘米,厚度约3、4厘米,价格和普通大饼差不多。 [22] 新袁羊肉 新袁羊肉是江苏的一道汉族名菜。新袁羊肉有“四绝”,一是质优味美;二是四季皆宜;三是食其系列;四是烹艺独特。尤其是吃夏令羊肉才是新袁一绝。由于羊肉膻味较大,大部分地区一般在冬季吃羊肉,并佐以尖嘴椒、胡椒、生姜、葱白等辛辣配料烹制。 [22] 著名人物 姓名荣誉/称号刘世勋南宋名将林大木明代书法家卢延兰织花机改造者韩恢陆军上将胡明复数学家胡刚复物理学家张相文地理学创始人参考资料: [3] 荣誉称号 2015年,泗阳县获得了国家园林县城称号 [6] 。2020年4月14日,泗阳县入选2020-2021年水系连通及农村水系综合整治试点县; [25] 同年5月29日,泗阳县入选县城新型城镇化建设示范名单。 [26]
|
[
"泗阳膘鸡、御珍酒、穿城大饼、八集小花生、丁庄大菜、泗阳白酥梨、王集小团饼、新袁羊肉等。"
] | 11,283
|
multifieldqa_zh
|
zh
| null |
ccadc21540e5c32f812be87b10763649c0484c90011118f0
|
钢铁项目的设备订购进展如何?
|
各位代表:
现在,我代表市人民政府向大会作政府工作报告,请予审议,并请各位政协委员和其他列席会议的同志提出意见。
2008年工作回顾
2008年是大事多、喜事多的一年,是极不平凡、极其重要的一年,是面对严重自然灾害和国际金融危机的一年。我们全面落实科学发展观,认真贯彻党的十七大、十七届三中全会和胡锦涛总书记、吴邦国委员长视察广西及温家宝总理、张德江副总理亲临我市的重要指示精神,切实按照郭声琨书记、马飚主席对我市的战略定位和发展要求,在市委的正确领导下,紧紧抓住《广西北部湾经济区发展规划》批准实施和钢铁、核电项目落户等重大历史机遇,落实市委提出的“两个定位”、“三个兴市”、“四大产业”、“五大基地”和刻苦攻坚跨越发展三年计划的战略部署,积极应对国际国内复杂形势和重大自然灾害的严峻挑战,全面对接国家发展战略,举全市之力推进钢铁、核电两个特大项目的前期工作,大力实施“项目建设推进年”,掀起新一轮大开发、大建设热潮,促进全市经济社会又好又快发展,较好地完成了市四届人大四次会议确定的目标任务,大事办成了,喜事办好了,难事克服了,人气兴旺了,主要经济指标增幅保持在全区前列,各项社会事业全面发展,边疆巩固安宁,社会和谐稳定,人民安居乐业,防城港市的发展掀开了崭新的一页。
经济社会发展保持良好势头,主要指标实现历史性突破。初步统计,全市生产总值、财政收入、规模以上工业总产值、金融机构本外币存贷款余额、房地产投资等指标增幅名列全区第一,外贸进出口总额、港口货物吞吐量、海关税收、资金净流入量、农民人均纯收入等指标总量位居全区第一。全市生产总值突破200亿元,达到212.18亿元,增长20.1%,实现连续8个季度20%以上的快速增长;人均GDP突破3500美元;财政收入突破20亿元,达到21.92亿元,增长39.1%;全部工业总产值突破300亿元,达到327.51亿元,增长43.9%,规模以上工业总产值突破200亿元,达到277.18亿元,增长50.9%;年末金融机构存款余额173.82亿元,比年初增长37.7%,年末贷款余额83.42亿元,比年初增长29.4%;房地产完成投资29.22亿元,增长78%;外贸进出口总额完成22.07亿美元,占广西的六分之一强,增长51.3%;港口货物吞吐量完成5626万吨,占广西沿海港口总量三分之二强,增长11.3%;海关税收67.94亿元,占广西的62.1%,增长40.3%;已成为广西资金净流入最多的市,全年达到185亿元,占全区的23.5%;农民人均纯收入4474元,增长18%。城镇居民人均可支配收入14364元,增长18.1%。全社会固定资产投资完成146.05亿元,增长41.1%。
三次产业协调发展,经济发展支撑力明显增强。产业结构进一步优化,三次产业比重由2007年的20∶47.1∶32.9调整为17∶49.9∶33.1,工业高速增长,主导地位进一步增强。防城港电厂一期工程投入商业运行,益海大豆浓缩蛋白、农垦防城分公司精制糖等一批工业项目顺利投产;粮油加工、冶金、制糖、化工等重点行业快速发展,其中粮油加工产值超130亿元,钢铁产值超30亿元;产值超亿元的企业达到36家,同比增加7家。交通运输、金融服务、房地产等第三产业发展加快,有效促进了消费需求,社会消费品零售总额完成38.15亿元,增长23.7%。社会主义新农村建设扎实推进,县域经济实力不断增强。东兴市、防城区被评为“2007年度广西经济发展十佳县(市、区)”。全市农业总产值58.6亿元,增长5.1%。县域生产总值139.6亿元,增长18%,占全市生产总值65.8%。经济林、糖料蔗和服务大项目的种植、养殖基地发展迅速。
全面对接北部湾发展规划,总体发展思路更加明确。结合开展继续解放思想大讨论活动,全面对接《广西北部湾经济区发展规划》,调整和完善了总体发展思路。以“滨海、门户、生态”和“组团式”城市等新理念,确定了“三岛三湾一核心六组团”的城市新格局,《防城港市城市总体规划》已上报自治区人民政府审批。经积极谋划,中心城区规划面积由原定的70平方公里增至140平方公里,人口由50—60万增至超100万,极大拓展了城市发展空间。积极配合自治区做好北部湾经济区城镇群、大型组合港建设等专项规划。重点编制和修编了企沙工业区总体规划、市旅游业发展总体规划、土地利用总体规划、海洋功能区划等30多项重要规划。
钢铁核电项目取得重大突破,奠定跨越发展基础。我市乃至全区各族人民期盼已久,有史以来投资最大,一期总投资686亿元的防城港钢铁基地项目和装机600万千瓦、总投资近700亿元的红沙核电项目分别在2008年3月17日和10月10日获得国家同意开展前期工作。市委、市政府迅速成立钢铁核电项目推进工作总指挥部,举全市之力把两大项目作为“天字号工程”奋力推进。强化组织协调,坚持前期工作、现场工作、后勤保障、社会治安统筹推进。积极配合自治区做好用地用海、环保评价、水土保持、岸线利用等前期工作,项目报批核准工作基本完成。实行市四家班子领导和部门包干负责制,在中直、区直单位积极参与和各区(县、市)大力支持下,在全市范围内抽调上千名干部驻村入户,开展深入细致的群众工作,全面推进征地拆迁安置,仅用5个多月就完成了钢铁项目7300多亩900多户的征地拆迁安置任务;企沙工业区“两区域两支撑”项目加快推进,水电路网全面开工,现场数十座山头已夷为平地,上下游配套产业规划编制及招商引资工作顺利启动,重型机械制造及修造船等一批项目在抓紧洽谈落实。核电项目征地拆迁协议签订已超过80%,仅用2个月就基本贯通了核电进厂道路,12月20日自治区隆重举行了核电项目前期工程启动仪式。16个配套社会事业项目前期工作和地方建材、副食品供应等后勤保障工作扎实推进。在征地拆迁安置过程中,我们统筹城乡发展,关注群众利益,出台利民政策,实现了“文明搬迁、和谐搬迁”。两大项目的快速平稳推进,创造了“防城港速度”,得到了自治区党委、政府和区内外社会各界的充分肯定。
“项目建设推进年”活动扎实开展,发展后劲不断增强。坚持大中小项目并举等“五个并举”和市四家班子分工负责制,强化督促落实和检查协调,实现了项目建设新突破。投资3000万元以上的重大项目已开工66项,建成或基本建成20项。沿海基础设施建设大会战一期项目基本完成,防城南站至企沙铁路等二期实施项目完成投资88%。市污水处理厂、东兴市给水工程等一批自治区50周年大庆项目顺利推进。投融资工作取得重大突破。成立了市融资工作组,发挥城投公司、土地储备中心等市本级融资平台的作用,落实了7亿多元贷款,与开行、建行初步达成600亿元合作意向。与广西北部湾国际港务集团、广西投资集团、上海宝冶建设有限公司等大型国企建立投资合作关系。集中市本级2000万元财力有效推进一批重大项目前期工作。工程招投标和投资评审等制度进一步规范,核减资金2.08亿元。
城市建设全面展开,城区面貌明显改观。以城市中心区为重点的城市建设全面拉开大幕,东西大道、南北大道、迎宾路和西湾广场周边街道亮化绿化工程已竣工,兴港大道改造工程、中心区环路工程、阳光海岸、金海湾商住区、仙人山公园、红树林保护工程等一批项目开工建设。市中级法院、检察院进驻新址办公。防城区防港路、防钦路等道路整治改造工作基本完成,大西南商贸城等一批房地产项目建设加快。上思县、东兴市以及企沙镇、江平镇等城镇化稳步推进。城市建成区面积34.09平方公里,同比增长6.2%,城镇化率达44.5%。运用BT融资方式吸引近3亿元社会资本参与一批城建项目建设。土地清理整治工作全面推进,历史遗留问题逐步解决。
港口生产建设加快,核心竞争力持续增强。企沙半岛岸线利用重新定位,建设10亿吨大港列入规划。港口建设完成投资10亿元。10万吨级西湾航道工程完成建设任务,16、17号5万吨级泊位进入收尾阶段,18-22号7-15万吨级泊位水工工程基本完成,开始设备安装,501、502号5万吨级泊位等一批新开工项目推进顺利。全市港口货物吞吐量完成5626万吨,其中防城港货物吞吐量完成3701万吨,增长22.1%。集装箱吞吐量完成22.57万标准箱,增长30.4%。成功开行防城港至昆明物流中心海铁集装箱联运五定班列。
招商引资力度加大,对外开放水平不断提高。积极参与第五届中国—东盟博览会和商务与投资峰会、第三届泛北部湾经济合作论坛、第四届桂台经贸合作交流会,主动组团赴武汉、大连、唐山曹妃甸、上海、南京、深圳、港澳地区及东盟、日本等地考察推介、招商洽谈,充分利用中越边境(东兴—芒街)商贸·旅游博览会等平台,进一步拓展同境外及国内沿海发达地区的交流与合作。与越南下龙市结为友好城市。建立健全招商引资项目大兑现保障机制,建立联席会议部门会审的项目落户机制,引进区外境内资金43.94亿元,增长79.7%,外商直接投资额5095万美元。呈现城市知名度不断提高,海内外政要和重要客商纷至沓来,投资领域和投资项目明显增多,人气越来越旺的喜人局面。
和谐防城港建设取得新突破,各项社会事业全面发展。财政对民生的投入力度不断加大,农林水发展资金增长55.4%、社会保障和就业资金增长37.9%、医疗卫生资金增长67.3%。发放各类支农补贴14518万元,受益农户10.28万户;减轻农民负担14759万元,农民人均减负246元。落实城市义务教育学生免除杂费政策,实现了城乡义务教育全部免除学杂费。整村推进扶贫开发取得新成效,解决了近3000名农村贫困人口的温饱问题,减少了农村低收入贫困人口4000多人。城镇新增就业人数21300多人,农村劳动力转移就业新增19800多人。全力做好年初冰冻灾害、夏秋“黑格比”台风灾害的防灾救灾工作,灾区民房重建基本完成。组织发动全市向四川汶川地震灾区捐款捐物合计1900多万元,人均数居全区第一。社会保险覆盖范围进一步扩大,参保人数达到32.37万人。钢铁、核电项目被征地农民首次纳入城镇企业职工社保和城市低保范围;做到被征地农民转移培训就业、养老保险与征地拆迁工作同步进行,并在住房保障、就业等方面制定优惠政策;安排上亿元推进安置点建设;向钢铁、核电项目被征地农民提供400多个公益性岗位,组织培训2812人,培训后转移就业1797人,办理社会养老保险804人,办理城市低保3180人,解决被征地农民后顾之忧。提高职工住房公积金标准,规范了公务员津贴补贴,改善了干部职工福利待遇。
市政府年初承诺的8件事关民生的实事如期完成。保障城市低保对象20719人,月人均补差131.1元;保障农村低保对象25911人,月人均补差42.5元,均超额完成预定任务。新型农村合作医疗参合率达89.35%,超过自治区85%的要求;有24600人次得到农村医疗救助,城市医疗救助试点工作稳步推进。实施农村公路项目47个,完成投资1.2亿元;新增农村饮水安全人口3.36万人;建成沼气池8092座;解决边境3公里以内120个自然村通广播电视难问题。学校食堂、卫生室、运动场等项目竣工114个。完成1055户困难归侨危房改造。新开工建设廉租住房418套,建成108套,实施廉租住房保障3093户。市金海湾商住区动工建设。
市职业教育中心、整合医院创“三甲”等社会公益项目抓紧推进。东兴市获得“自治区卫生城市”荣誉称号。开展打击“两抢两盗”犯罪等百日专项行动,保持打击走私高压态势,取得明显成效。深入开展“领导干部公开大接访活动”,带动解决一大批信访问题。安全生产事故总数、伤亡人数、经济损失呈下降趋势。特别是北京奥运会、自治区成立50周年大庆等重大活动举办期间均未发生影响社会和谐稳定的突出问题和事件。人口计生工作稳步推进,人口自然增长率9.94‰。国土资源和海洋利用管理等工作力度加大,支撑经济发展的能力明显提高。节能减排工作扎实开展,主要污染物排放量控制在目标范围内。科技、文化、旅游、体育、民族、宗教、外事、侨务、统计、人民防空、国有资产监督管理、物价、地震、气象、档案、修志等工作取得新进展。红十字会、妇女儿童、老龄、残疾人等事业取得新成绩。双拥工作深入开展。精神文明和民主法制建设得到加强。
服务型政府建设取得新成效,发展环境明显改善。大力实施“效能提升工程”,规范化服务型政府建设成效明显,全市作风效能建设活动高质量、高标准地顺利通过自治区检查验收。组织开展全民评议机关效能活动,90%以上市直单位获优秀等次,评议、整改情况通过媒体向社会公布。加强制度建设,健全了人事管理、机构编制、城市规划、土地储备管理等运作机制。加强部门协调配合,规范行政审批行为,优化政务服务中心办事流程,强化行政效能电子监察,首问责任制等“三项制度”得到全面落实,工作效率明显提高,市本级行政审批事项办理时限平均缩减7天,比自治区的规定减少50.14%。防东、沙企一级公路等收费站整合已获自治区批准,改善了通行条件,提升了对外形象。落实优惠政策,清理、废除和完善各种规章制度111项,实行挂牌服务,开设企业绿色通道,企业对我市投资环境满意度近80%,对我市经济发展潜力满意度达88%。维护政府诚信,市本级财政偿还历史债务资金9700万元。自觉接受人大和政协监督,共办理并答复市四届人大四次会议期间人大代表提出的议案、建议、批评和意见96件,办复率100%;办理并答复市政协四届三次会议期间政协委员提案149件,办复率100%。
各位代表!
过去一年,我市经济社会发展取得的成绩来之不易!这是党中央、国务院亲切关怀的结果,是自治区党委、自治区人民政府和市委正确领导的结果,是市人大、市政协有效监督和大力支持的结果,是中直、区直单位和驻我市部队支持帮助的结果,是全市广大干部群众和各族各界人士抢抓机遇谋发展、放开思想想问题、放开手脚干事业、争当开放开发排头兵的结果。在此,我谨代表市人民政府,向全市广大干部群众,向解放军指战员、武警官兵和公安民警,向各民主党派、工商联、无党派人士、人民团体,向所有关心、支持、参与我市现代化建设的各界人士和海内外朋友,表示衷心的感谢和崇高的敬意!
在充分肯定成绩的同时,我们也要清醒地看到,经济社会发展中一些事关发展全局的问题尚未得到根本性解决,主要表现在:一是经济总量不大、实力不强的问题依然突出;二是城市功能不全、基础设施落后,“有港无市”的问题依然突出;三是缺乏主导产业支撑和大型骨干企业带动,抵御风险能力不强的问题依然突出。同时,还存在着建设资金筹措难、一些项目推进不够快,节能减排压力大,高层次高技能人才缺乏和个别部门行政效能不高、部分干部服务意识不强等问题。对这些问题,我们必须高度重视,在今后工作中努力加以解决。
2009年工作总体要求和奋斗目标
今年是新中国成立60周年,也是我市实施刻苦攻坚跨越发展三年计划、加快实现“十一五”规划目标的关键一年。由于国际金融形势异常严峻,何时见底难以预料,今年制约经济发展的不确定因素增多,金融危机的负面作用日益凸显,我市面临着许多前所未有的困难。去年四季度以来,港口货源减少,货物滞港严重,直接影响港口吞吐量增长,延缓了向亿吨大港快速迈进的步伐。新投产的工业项目不多,部分工业产能受限,食用油、蔗糖等产品价格下跌,企业利润大幅下滑,工业高速增长带动经济快速发展的格局面临严峻挑战。边境小额贸易税收政策调整和增值税转型,将使今年财政收入同比减收3亿元以上,财政收入高速增长的态势已经改变;同时,为了扩大内需和支持项目建设,财政支出的压力更大。农民工失业返乡和重大项目被征地农民增多,导致社会保障、就业安排和社会稳定压力增大。粤港澳等沿海发达地区企业效益下滑,导致民间资本流动性不足,我市承接产业转移和招商引资难度加大。
在充分估计和清醒认识今年我市面临严峻形势的同时,我们更要看到加快发展的积极因素和有利条件,看到危机中蕴含的许多重大发展机遇,增强战胜困难的信心和决心。一是我国经济平稳较快增长的基本面和长期趋势没有变。国家实行积极的财政政策和适度宽松的货币政策,投资4万亿元刺激经济增长,出台一系列扩大内需、促进增长的政策,效应逐步显现。自治区实行6000亿元的超常规投资计划,把今后几年要开工的项目集中到今年开工建设,继续加快北部湾经济区重大基础设施和重点产业园区建设,这对经济增长将起到极大的促进作用。二是北部湾经济区优先发展的格局没有变。自治区出台了《关于促进广西北部湾经济区开放开发的若干政策规定》,国务院还将专门出台加快广西发展的政策措施。北部湾经济区正奋力前行、加速发展,逐步成为引领、辐射和带动全区加快发展的龙头。三是我市加速崛起、持续快速健康发展的态势没有变。钢铁、核电两个特大项目全面推进的大局已定,大投入大产出促进工业化、城镇化快速发展的格局已定,刻苦攻坚跨越发展三年计划全面实施的步骤已定,加上我市得天独厚的区位优势、港口优势和近几年发展形成的良好基础条件,广大干部群众心齐气顺,对我市经济发展的热情越来越高,信心越来越足,干劲越来越大。这些都为我市跨越发展提供了强力支撑。可以说,这场危机正好给了我们发挥后发优势,发力赶上发达地区的难得机会。防城港市已经站在新的发展起点上!
根据市委的统一部署,今年政府工作的总体要求是:全面贯彻党的十七大和十七届三中全会精神,以邓小平理论和“三个代表”重要思想为指导,深入学习实践科学发展观,紧紧抓住广西北部湾经济区全面开放开发等重大机遇,全面实施刻苦攻坚跨越发展三年计划,以保持经济持续快速增长为首要目标,以扩大内需为基础,以增加投资为保障,以调整结构为主线,以钢铁、核电两大项目为引领,以工业化、城镇化为主导,以改善民生、构建和谐为根本,以“项目建设攻坚年”为主题,大力实施产业发展和城市建设“双百工程”,解放思想,开拓创新,迎难而上,乘势而为,推动经济社会又好又快发展,为加快把我市建设成为广西北部湾经济区生态友好、开放度高、活力迸发的新兴港口工业城市和重要门户城市,实现“一年一个样,五年大变样,十年进入全国沿海开放城市先进行列”的宏伟目标而努力奋斗。
2009年我市经济社会发展的主要目标为:地区生产总值增长17%以上;财政收入达到25亿元以上,增长14%以上;全社会固定资产投资增长70%以上;工业总产值增长18%以上;社会消费品零售总额增长20%以上;外贸进出口总额增长10%以上;引进区外境内资金增长30%以上;外商直接投资增长20%以上;港口货物吞吐量增长16%以上;城镇居民人均可支配收入增长12%以上;农民人均纯收入增长10%以上;城镇新增就业人数15000人,城镇登记失业率控制在4%左右;人口自然增长率控制在11‰以内;万元生产总值能耗、主要污染物排放量控制在自治区要求范围内。
上述目标中,人口自然增长率、万元生产总值能耗、主要污染物排放量是约束性指标,必须想方设法完成;其他指标是预期性的、指导性的,在实际工作中我们还要朝更高目标迈进。只要我们同心同德,加倍努力,做到“出手要快、出拳要重、措施要准、工作要实”,化压力为动力、化挑战为机遇、化危机为转机、化潜在优势为现实经济增长力,就一定能够有效应对各种复杂局面,就一定能够抓住并用好诸多历史机遇,就一定能够实现科学发展、跨越发展!
2009年主要工作任务
今年,我们要紧紧围绕中央、自治区关于扩大内需保增长的重大决策,按照市委提出的“促增长、增投资、扩内需、调结构、抓城建、上产业”的要求,坚持产业发展优先、城市建设优先、港口发展优先、可持续发展优先,把大幅度增加投资、上一大批项目作为工作的重中之重,做到“月月有开工,季季有竣工”,以非常信心、非常谋划、非常力度、非常措施、非常办法、非常政策,重点抓好以下工作:
一、坚定不移抓引领,举全市之力继续推进钢铁核电两大项目
钢铁、核电两个特大项目是我市跨越发展的主要希望和根本保障所在。必须举全市之力奋力推进,实现年内全面开工建设。
全力推进征地拆迁安置工作。坚持“文明搬迁、和谐搬迁”,尽快完成钢铁项目配套路网、配套产业区和核电项目厂区、非居住区等征地拆迁安置。安排好临时安置点群众生活,加快推进永久安置区建设。
全力推进主体工程建设。千方百计加大投资,加快推进钢铁项目陆域形成、配套码头、土建、厂房等建设,全面启动炼铁系统高炉、焦化、烧结等工程,加快设备订购,完成海域吹填,完善厂区道路、排水等设施。核电项目要做好现场“四通一平”,加快项目申报、工程准备、设计采购、施工展开、核岛负挖和主体工程开工等各项工作。
全力推进上下游配套项目。围绕建设钢铁能源基地的目标,加大上游和下游配套项目招商力度,开工建设一批上下游产业项目。与广西北部湾经济区管理委员会办公室联合组织力量,开展钢铁项目产业链深度研究,加紧规划千亿元产业集群。加快建设钢铁上游和下游产业区、交通物流支撑、城建与社会事业支撑的“两区域两支撑”基础设施项目。
|
[
"钢铁项目的设备订购正在加快进行。"
] | 8,651
|
multifieldqa_zh
|
zh
| null |
ef415a65d666203c6325a5c30b694b0bb2562192aa01e7d9
|
《桂林电子科技大学学生社团指导教师聘任及考核办法(试行)》的实施时间是什么时候?
|
'桂林电子科技大学文件桂电〔2021〕20 号关于印发《 》的通知 各单位、各部门:现将《桂林电子科技大学学生社团指导教师聘任及考核办 法(试行)》印发给你们,请认真遵照执行。 桂林电子科技大学 2021 年 5 月 11 日 — 1 —
第一章 总 则第一条 为贯彻落实中共教育部党组、共青团中央印发的《高 校学生社团建设管理办法》以及自治区党委教育工委、共青团广 西区委印发的《贯彻落实<高校学生社团建设管理办法>实施细则》 相关精神,进一步加强学校学生社团建设与管理,结合学校实际, 特制定本办法。第二条 本办法适用于桂林电子科技大学所有学生社团。第二章 学生社团指导教师聘任条件第三条 社团指导教师原则上从本校工作人员中选聘,鼓励校 领导、党员中层领导干部和思想政治理论课教师担任社团指导教 师。1名指导教师原则上最多指导2个学生社团,1个学生社团根据 需要可配备1—2名指导教师。第四条 社团指导教师的产生,由校团委审核把关并颁发聘 书,聘期为1年,有关聘任材料在校团委备案。第五条 社团指导教师应该满足以下条件:(一)坚持党的基本路线和教育方针,有较强的政治鉴别力 和高度的政治责任感,具有较强的分析问题和解决问题的能力;(二)具有高尚的师德师风,坚持以德施教、以德立身,作 风正派、廉洁自律,具备强烈的事业心和责任感;— 2 —
(三)热爱学生和学生工作,为人师表,爱岗敬业,具有良 好的职业道德和健康的心理素质,具有强烈的责任心、使命感和 奉献精神;(四)坚持原则,讲求团结,服从领导,顾全大局,办事公 道;(五)身心健康,热爱从事学生社团工作。第三章 学生社团指导教师职责第六条 社团指导教师负责学生社团的思想政治工作,要把思 想政治工作融于各项活动中,教育引导学生坚持四项基本原则, 树立正确的世界观、人生观、价值观。第七条 贯彻执行学校立德树人工作的总体要求,积极配合学 校相关部门做好学生社团的管理工作,加强与社团团工委及校团 委的联系,维护学生社团利益。第八条 积极参与学生社团的建设和管理,指导学生社团的组 建、章程制定及修改,并对学生社团负责人的更换提出建议。指 导学生制定社团工作计划。第九条 加强对社团日常活动的管理,引导社团规范化发展。 根据学校相关管理办法要求定期指导学生社团开展活动,出席并 监督社团活动的开展,保证活动的质量和效果,促进学生社团健 康、持续、稳定发展。第十条 结合自身教学科研,定期为学生开设专题讲座,组织 学生开展有意义、有创意、可延续并具有一定影响力的品牌活动。— 3 —
第十一条 每月至少组织学生社团开展符合其特点、促进学生 社团发展、丰富校园文化生活的各类社团活动1次以上。每学期至 少开展4次对社团全体成员的指导培训活动。指导学生课外活动尤 其是校外活动时,应对学生进行安全教育。第四章 学生社团指导教师考核办法第十二条 社团指导教师的培训指导工作由社团团工委负责 登记,校团委备案。未申报的培训指导活动视为未进行,不计入 社团指导教师工作量。第十三条 社团指导教师的业绩由学校学生社团建设管理评 议委员会负责考核,每年度考核一次。第十四条 社团指导教师具体的考核细则如下:(一)关心社团发展,指导社团制定规章制度、工作计划等, 确定本社团工作重点并做好相应工作总结;(二)做好培训计划,设计好培训目标、方式和内容,按要 求给所带社团上好培训课;(三)指导学生社团实施大学生素质拓展计划,指导学生社 团积极参加校内外各类竞赛及活动,并取得优异成绩;(四)对学生的优良事迹或严重过失,做好记录,及时表扬 或批评;(五)出席社团指导教师会议,并协助学校处理有关社团活 动之特殊问题与重大事件;(六)监督社团日常活动开展及经费使用等情况,确保社团 — 4 —
在开展活动期间不发生意识形态和安全稳定等问题,协助社团处 理好日常工作中遇到的困难和问题;(七)关心社团成员的成长,参与社团干部的培养,协助做 好社团考核及各项评优工作。第十五条 指导教师工作考核等级分为优秀、良好、合格、不 合格四个等级,其中优秀等级的比例不超过15%,考核等级为优 秀的指导教师可参评当年度社团优秀指导教师。第十六条 学校每年度对优秀指导教师进行表彰奖励。凡考核 结果为良好及以上的,按每年2000元标准全额享受学生指导教师 津贴;考核结果为合格的,发放70%的学生指导教师津贴;考核 结果为不合格的,不予发放指导教师津贴,并取消其指导教师资 格。第十七条 学生社团指导教师工作视同本科生班主任工作经 历,享受相应待遇,指导学生社团情况纳入教师思想政治工作和 师德师风表现中。第五章 附 则第十八条 本办法自公布之日起实施。第十九条 本办法由校团委制定并负责解释。桂林电子科技大学校长办公室 2021 年 5 月 12 日印发— 5 —
'
|
[
"从公布之日起实施。"
] | 2,041
|
multifieldqa_zh
|
zh
| null |
42488c48a2a20024449c358c413d36278cb4bcd65af349ad
|
Web方式使用时需要安装什么控件?
|
'VPN 使用说明VPN 是为满足师生在家通过电信宽带等接入访问校内图书馆数字资源而专 门设计的解决方案。现提供两种 VPN 的使用方式:Web 方式和客户端方式。Web 方式适合师生临时在某台机器上使用 VPN 时使用,师生只需在界面上 输入学校邮箱的用户名和密码,按提示操作(详细见下面 Web 方式操作说明), 不需要安装客户端程序和设置,操作简便。客户端方式适合师生固定在一台机器上使用 VPN 时使用,第一次使用需要 安装客户端程序和设置,以后每次使用 VPN,只需要运行客户端程序,输入用 户名和密码即可。建议师生在家使用客户端方式,首次使用安装和设置复杂一 些,以后每次使用都十分方便。一、Web 方式使用说明1、打开 https://vpn.shnu.edu.cn 登录界面,出现 VPN 登录页面,请输入 学校邮箱的帐户名和密码进行登录。2、输入正确的帐号和密码登录成功后,请点击安装 AchiveX 控件。
3、安装好后出现如图所示,同时在任务托盘处出现红色字母 A,说明你已 成功登录 vpn,可以正常使用学校数字资源。4、使用结束后请点击右上方的“注销”按钮,断开连接。
二、客户端方式使用说明1、下载“VPN 客户端”后,进行解压缩,点击安装文件进行安装,点击 “下一步”,选择“我接受”后进行客户端的安装。
2、点击“完成”按钮,弹出连接对话框。
3、点击“配置文件”--“创建”,请按照以下信息填写后,点击“确定” 保存设置。说明:输入的用户名和密码即学校邮件的用户名和密码。上面以 test@shnu.edu.cn 邮箱为例。在用户名中请输入邮箱的帐户名即为 test,密码 中请输入邮箱的密码。4、设置完成并保存后,点击“连接”,即可登录 VPN。
5、登录成功后,电脑屏幕的右下端出现红色字母 A,红色为连接成功,灰 色为断开连接 。请在使用结束后,双击红色字母 A 后,断开连接,退出客户端。6、以上是第一次使用 VPN 的操作,以后每次使用只需要运行桌面上的 VPN 客户端程序 ,点击连接,即可登录 VPN。三、Mac OS 系统 VPN 使用方法1、Mac OS 系统(版本 10.11.0 以上的操作系统)安装 vpn 首先需前往 AppStore 中下载客户端 MotionPro,打开 AppStore 后可在右上角搜索框中搜索 MotionPro;也可以点击此处下载客户端2、客户端 MotionPro 下载完成后点击安装;
3、客户端安装完成后点击打开,将会弹出如下窗口,请右键窗口内空白处 选择 Add,添加 vpn 帐号信息;4、按照如下信息进行设置:SiteName 为自选命名,可以填写为:上师大 vpnHost 请填写:vpn.shnu.edu.cnUsername:如果是学生请填写 10 位校园卡卡号,如果是教职工请填写学校 教师邮箱帐号Save Password:请先勾选保存密码,然后输入统一身份认证密码(学生初 始密码为 8 位生日)填写完毕后点击 OK
5、点击 OK 后将会在空白处出现连接选项,如下图,请双击名称为上师大 vpn 的选项;6、当 Status 状态为 Connected 时,表示 VPN 连接成功。
四、移动智能终端 VPN 使用方法(一)IOS 智能终端 VPN 操作说明1、下载并安装 VPN 客户端软件(苹果系统 VPN 客户端名称为 MotionProPlus,可以通过 AppStore 软件平台下载安装官方版软件,目前版本是 1.2.7, 图标右下方有个“+”的 APP,开发商:Array Networks,如下图:
2、安装完成后打开 MotionPro Plus,选择左下角的“网关”选项再点击 右上角的“+”号添加 VPN 连接,如下图:3、按照下图输入标题、网关、用户名等信息(注意:学生用户名为 10 位 校园卡卡号,教师用户名为学校邮箱名称,端口默认 443,证书不需要填写)。 信息输入后点击右上角的“存储”,如下图:
4、点击“登录”,输入统一身份认证密码,再点击“登录”,如下图:5、连接成功后,手机屏幕右上角显示 vpn 图标,如下图:(二)Android 智能终端 VPN 操作说明1、下载并安装 VPN 客户端软件(安卓平台 VPN 客户端名称为 MotionPro,
可以通过国内的华为应用市场、360 手机助手下载安装官方版软件,目前版本 是 2.3.4,其在国内的厂商名称:华耀(中国)科技有限公司),如下图:2、安装成功后打开客户端,选择“网关”选项右上角的“+”号添加 VPN 连接,如下图:3、按照下图输入标题、网关、用户名等信息(注意:学生用户名为 10 位 校园卡卡号,教师用户名为学校邮箱名称,端口默认 443,证书不需要填写)。
信息输入后点击“确定”,如下图:4、点击“登录”,输入统一身份认证密码,再点击“登录”,如下图:5、弹出“连接请求”提示框,点击“确定”后,连接成功,如下图:
'
|
[
"AchiveX控件。"
] | 2,104
|
multifieldqa_zh
|
zh
| null |
792f26d086a06374cef8563d1d858ffcfcd3b5c82574555a
|
韩庚哪一年在哪个音乐颁奖礼上获得了全球最佳艺人奖?
|
韩庚(中国内地影视男演员、流行乐歌手、舞者)
韩庚(Han Geng),1984年2月9日生于黑龙江省牡丹江市,中国内地影视男演员、流行乐歌手、舞者、商人、赛车手 ,毕业于中央民族大学舞蹈系。2005年,作为Super Junior唯一的中国籍成员正式出道,并成为第一位正式在韩国出道的中国人 。2008年,担任Super Junior-M的队长 。2009年,与SM公司解约并回国发展 。2010年,推出首张个人音乐专辑《庚心》 。2011年,凭借电影《大武生》获得第二届纽约中国电影节亚洲最受欢迎艺人奖 。2012年,推出第二张个人音乐专辑《寒更》 ;同年,获得MTV欧洲音乐奖全球最佳艺人奖 。2013年,获得第26届儿童选择奖颁奖礼亚洲最受欢迎艺人奖 ;同年,其主演的青春爱情电影《致我们终将逝去的青春》取得了7.26亿人民币的票房成绩。2014年,获得第22届世界音乐大奖最佳男艺人奖 。2015年,其主演的青春爱情电影《万物生长》上映 ;同年,推出第三张个人音乐专辑《三庚》 。2016年,主演科幻动作剧《失忆之城》 。2019年,担任街舞选拔类节目《这!就是街舞第二季》的明星队长 。
早年经历 韩庚出生于黑龙江省牡丹江市。1990年,韩庚就读于黑龙江省牡丹江市光华小学。1996年,年仅12岁的韩庚进入了中央民族大学的中专班学习,主修民族舞蹈,并额外学习了芭蕾、武术 [15] ;在校期间,他还多次随团到美国、俄罗斯、中国港澳台等地演出。1999年,作为赫哲族青少年代表参加了国庆50周年阅兵仪式。2000年,获得“孔雀奖”中国少数民族舞蹈大赛第二名 [16] 。2001年,韩庚参加了韩国S.M.Entertainment公司在中国举行的“H.O.T.China Audition Casting”选拔活动,以3000:1的比例在众多参选者中脱颖而出 [17] 。2002年,系统学习了56个民族舞蹈的韩庚,从中央民族大学毕业,并在毕业汇报晚会上跳了九支舞蹈,除了最后的群舞《踏上征途》,其他八支舞蹈均为韩庚领舞。 杂志写真(一)(65张) 杂志写真(二)(45张) 杂志封面(21张) 街拍(6张) 演艺经历 2003年3月,年仅19岁的韩庚只身前往韩国进入S.M.Entertainment,开始了其练习的生涯,经历了2年多的演唱、舞蹈、演技、声乐、语言等多方面的练习和培训,并多次以个人身份在韩国参加了T台show以及各类服装杂志的拍摄 [1] 。2005年11月6日,韩庚作为Super Junior唯一的中国籍成员正式出道,并成为第一位正式在韩国出道的中国人 [1] ;12月5日,随Super Junior推出组合首张韩语正规专辑《SuperJunior 05》 [18] 。2006年4月24日,韩庚以歌手身份回到中国;6月16日,出席青岛中韩文化节。2007年2月,参加凤凰卫视明星访谈类节目《鲁豫有约》的录制;10月2日,加入Super Junior的子组合Super Junior-M,并在组合中担任队长,从而开展其在华语乐坛的演艺事业 [2] 。2008年3月30日,获得娱乐大典颁奖典礼年度时尚男艺人奖 [19] ;4月8日,随Super Junior-M推出组合出道单曲《迷》;5月2日,随Super Junior-M推出组合首张正规专辑《迷》 [20] ;同年,与容祖儿、黄奕、张峻宁合作主演青春励志偶像剧《青春舞台》,在剧中饰演热爱跳舞的男主角夏磊,并为该剧演唱了片头曲《青春梦想》,这也是他的首部电视剧作品 [21] 。2009年,随Super Junior举行亚洲巡回演唱会;5月1日,随Super Junior参加“成龙的朋友们北京鸟巢演唱会”;9月23日,随Super Junior-M推出组合首张迷你专辑《Super Girl》 [22] ;12月21日,与SM公司解约并回国发展 [3] 。 2010年7月17日、18日,在北京北展剧场连续两天举办“庚心个人演唱会” [23] ;7月27日,推出首张个人音乐专辑《庚心》,收录了包括《飞蛾扑火》、《My Logo》等在内的10首歌曲 [4] ;10月18日,获得第10届CCTV-MTV音乐盛典内地年度最受欢迎男歌手奖 [24] ;12月,出版个人首本概念书《韩庚1221》 [25] ;12月19日,获得第3届音乐风云榜新人盛典年度最佳新人奖 [26] 。2011年2月2日,首次登上中央电视台春节联欢晚会的舞台,与窦骁、周冬雨等共同表演开场歌舞《回家过年》 [27] ;3月1日,韩庚凭借电影《大武生》获得第5届华鼎电影盛典最具期待演员奖 [28] ;3月18日,获得第18届东方风云榜全能艺人奖,而歌曲《My Logo》则获得了十大金曲奖 [29] ;4月11日,获得第11届音乐风云榜年度盛典年度最受欢迎男歌手奖 [14] ;4月24日,获得Music Radio音乐之声Top排行榜内地最受欢迎新人奖、内地全能艺人奖 [30] ;同年,韩庚正式以演员身份出席了上海电影节 [31] 、纽约中国电影节等,并首赴印度尼西亚宣传 [32] ;9月9日,其主演的民国动作电影《大武生》上映,在片中饰演从小背负着家仇的孟二奎,这是他的首部电影作品;11月11日,凭借电影《大武生》获得第二届纽约中国电影节亚洲最受欢迎艺人奖 [5] 。2012年1月,赴意大利拍摄前导画册以及杂志写真,并出席了米兰时装周 [33] ;1月22日,再次登上中央电视台春节联欢晚会,独自表演创意节目《除夕的传说》;7月13日,推出第二张个人音乐专辑《寒更》,收录了包括《狂草》、《小丑面具》等在内的10首歌曲 [6] ;9月12日,获得《男人装》杂志百期嘉年华盛典最具影响力人物奖 [34] ;11月12日,获得MTV欧洲音乐奖全球最佳艺人奖,成为EMA历史上首位获奖的华人歌手 [7] 。 2013年1月14日,获得新浪微博之夜年度风尚人物奖 [35] ;3月23日,获得第26届儿童选择奖颁奖礼亚洲最受欢迎艺人奖 [8] ;4月14日,获得第13届音乐风云榜年度盛典最佳舞曲歌手奖、内地最受欢迎男歌手奖等5项大奖 [36] ;4月26日,其主演的青春爱情电影《致我们终将逝去的青春》上映,最终以7.26亿人民币的票房成绩收官;6月29日,出席巴黎男装周2014春夏Dior homme秀 [37] ;之后,与杰瑞米·埃尔卡伊姆、阿丽丝·德·朗克桑合作主演爱情电影《寻找罗麦》 [38] 。2014年1月31日,其主演的都市爱情喜剧电影《前任攻略》上映,最终票房在排片不足5%的情况下破亿 [39] ;5月27日,获得第22届世界音乐大奖最佳男艺人奖,成为第一位获邀在WMA颁奖典礼表演的华人歌手 [9] ;6月27日,其参演的科幻动作电影《变形金刚4:绝迹重生》全球上映,并为该片演唱主题曲《谁Control》,这也是好莱坞电影史上首次将中文歌曲作为电影主题曲 [40] 。2015年4月17日,其与范冰冰搭档主演的青春爱情电影《万物生长》上映,在片中饰演表面流氓痞气、内心脆弱良善的男主角秋水,该片上映6天票房便突破1亿人民币 [10] ;11月6日,举行个人出道十周年演唱会;11月20日,推出第三张个人音乐专辑《三庚》,收录了包括《夜伴三庚》、《痞夫之勇》等在内的10首歌曲 [11] ;与此同时,他还正式宣布《三庚》是其最后一张唱片,并为此举行了封盘仪式,另外他还制作了纪念出道十周年的纪录影片《卸装》 [41] ;此外,他还为动画电影《哆啦a梦:伴我同行》中的成年时期大雄配音 [42] 。 2016年4月9日,凭借专辑《三庚》获得第16届音乐风云榜年度盛典年度最佳全能艺人奖、年度最佳男歌手奖,而歌曲《I don't give a 屑》则获得了年度最佳音乐录影带奖 [43] ;同年,主演周显扬执导的奇幻动作电影《大侦探霍桑》,在片中饰演男主角霍桑 [44] ;9月14日,其与唐嫣搭档主演的魔幻爱情电影《大话西游3》上映,在片中一人分饰三角,分别饰演了至尊宝、六耳猕猴和孙悟空 [45] ,该片最终以超过3.6亿元人民币的票房成绩收官;同年,主演伊力奇执导的科幻动作剧《失忆之城》,在剧中饰演性格不羁、玩世不恭的末日战士李雷,这不仅是他时隔8年后回归电视荧屏之作,也是他首次触及幕后、担任制片人的作品 [12] 。2017年6月23日,出席中国成都·金砖国家电影节,并获得“电影节友好使者”的称号 [46] ;7月28日,其出演的革命历史电影《建军大业》上映 [47] ;12月18日,获得时尚COSMO美丽盛典年度最美人物奖 [48] ;12月27日,加盟《这!就是街舞》,担任明星队长 [49] ;12月29日,其主演的爱情喜剧电影《前任3:再见前任》上映 [50] ,票房突破19亿 [51] 。2018年1月7日,出席“MOMO直播17惊喜夜”,演唱歌曲《痞夫之勇》,完成了个人的开年首秀 [52] ;1月10日,推出个人单曲《I Don’t Give A 屑》(Remix版),该歌曲以混音的形式重新演绎 [53] ;与此同时,他还担任了优酷视频街舞选拔类综艺节目《这!就是街舞第一季》的明星队长 [54] ;9月9日,主演电影《闻烟》在云南开机,该片由著名作家辛酉同名小说改编,由《入殓师》导演泷田洋二郎带领奥斯卡主创团队匠心打造 [55] 。2019年1月10日,韩庚现身上海杜莎夫人蜡像馆为自己的蜡像揭幕。作为2019年第一个入驻杜莎夫人蜡像馆的明星,此次韩庚的蜡像定格了他舞动的瞬间,这也是蜡像馆首次以动态的形式呈现蜡像 [56] ;5月,担任优酷视频街舞选拔类综艺节目《这!就是街舞第二季》的明星队长 [13] 。2020年1月5日,与王晓晨主演的都市情感剧《还没爱够》(又名;《爱我,你敢吗?》)江苏卫视播出,在剧中饰演恐婚青年陈炯 [57-58] ;1月7日,主演的电影《三叉戟》正式杀青 [59] ;7月31日,主演的古装剧《浣溪沙》在横店开机 [60] 。9月12日,韩庚等往季队长也宣布将加盟10月3日《这!就是街舞》决赛盛典冠军之夜。 [61] 2012英国行(12张) 2011泰国行(18张) 活动照(一)(39张) 活动照(二)(20张) 个人生活 2017年4月20日,韩庚在某汽车品牌赛事部门的帮助下,在英国获得了赛车执照,并以该品牌车队车手的身份,参加中国超级跑车锦标赛,完成其个人赛车生涯首秀 [62] 。2018年2月9日,韩庚在微博正式公布与卢靖姗的恋情。 [63] 2019年12月31日,韩庚、卢靖姗在绿洲发文官宣结婚喜讯,“你好,我的爱人”,呼应公布恋情时的“你好,我的男孩”“你好,我的女孩” [64] 。同日,两人在新西兰举行婚礼。 [65] 主要作品 参演电影 三叉戟[59] 2020 主演黄志忠 大侦探霍桑2019-01-25 饰演霍桑 导演周显扬 真·三国无双[66] 2019 饰演关羽 导演周显扬 闻烟[55] 2019 饰演柳见三 导演泷田洋二郎 我们永不言弃[67] 2019 饰演周始 导演周显扬 解码游戏[68] 2018-08-03 饰演李浩铭 导演李海龙 寻找罗麦[69] 2018-04-13 饰演赵捷 导演王超 主演杰瑞米·埃尔卡伊姆 前任3:再见前任[70] 2017-12-29 饰演孟云 导演田羽生 建军大业2017-07-28 饰演张学良(客串) 导演刘伟强 罗曼蒂克消亡史2016-12-16 饰演赵先生(客串) 导演程耳 大话西游32016-09-14 饰演至尊宝/六耳猕猴 导演刘镇伟 夏有乔木雅望天堂2016-08-0571 饰演唐小天 导演赵真奎 万物生长2015-04-17 饰演秋水 导演李玉 智取威虎山3D2014-12-23 饰演姜磊(特别出演) 导演徐克 变形金刚4:绝迹重生2014-06-27 饰演韩庚(客串) 导演迈克尔·贝 主演马克·沃尔伯格 前任攻略2014-01-31 饰演孟云 导演田羽生 致我们终将逝去的青春2013-04-26 饰演林静 导演赵薇 快乐大本营之快乐到家2013-01-18 饰演贝克汉姆(客串) 导演傅华阳 第一大总统2011-09-30 饰演胡汉民 导演王才涛 大武生2011-09-09 饰演孟二奎 导演高晓松 建党伟业2011-06-15 饰演邓小平(客串) 导演韩三平、黄建新 花美男连锁恐怖事件[72] 2007 导演李卷 主演金希澈、金基范 参演电视剧 还没爱够[73] 2020-01-05 饰演陈炯 导演王迎 主演王晓晨、叶祖新、张晓晨 失忆之城2017 饰演李雷 导演伊力奇 青春舞台2009-01-19 饰演夏磊 导演余淳 浣溪沙2020 饰演范蠡 导演高翊浚 参演微电影 时间剧名备注2011《跳还是不跳》网易2010年终策划,明星贺岁微电影2012《梦想在继续》音乐风云榜“梦想”微电影《凡事不平凡之人脉篇》非凡系列微电影《凡事不平凡之游戏篇》2013《把乐带回家2013》百事群星贺岁微电影2014《有一天之看不见的画》华谊公益系列微电影2016《卸装》纪录电影,明星空间首发,每周四更新一集 参演网络剧 时间剧名备注2012《为渴望而创》青春励志网剧,客串2015《屌丝男士4》搜狐网剧 音乐专辑 三庚 2015-09-20 寒更 2012-07-29 庚心 2010-07-27 音乐单曲 歌曲名称 发行时间歌曲简介北京欢迎你 2008 2008年迎奥运百名歌手同唱歌曲 青春梦想 2009 2008年央视假日剧《青春舞台》主题曲 &黄奕 世界看中国 2010 2010年上海世博会中国元素主题歌 不能忘却的纪念 2010 2010年纪念圆明园罹劫150周年主题歌 &谭晶 大手小手 2010 MusicRadio音乐之声Kappa1200助学主题曲 亚运有我精彩之吉 2010 2010年广州亚运会亚运歌曲 &周笔畅 虹 2010 2011年第26届世界大学生运动会火炬之歌 我是火焰 2010 2010年广州亚运会亚运志愿者歌曲 回家过年 2011 2011年央视兔年春晚开场歌曲录音室独唱版 孩子 2011 2011年为打拐行动救救孩子的公益歌曲 如梦令 2011 电影《大武生》主题曲 最好的未来 2012 爱佑基金&奥迪宝贝之家,关爱孩子主题曲 &张靓颖 北京祝福你 2012 伦敦奥运会献礼歌曲,群星及录音室独唱版 最佳听众 2012 专辑《寒更》番外单曲 &萧亚轩 第一课 2012 CCTV《开学第一课》主题曲 云图 2013-01 电影《云图》同名中文推广曲 X-man 2013-07 夏日运动单曲,特步广告曲 那个女孩 2014-01 电影《前任攻略》主题曲 谁control 2014-06 电影《变形金刚4》主题曲 忍者神龟 2014-11 电影《忍者神龟》中文版主题曲 有多少爱可以重来 2015-03 电影《万物生长》片尾曲 &张靓颖 我们是共产主义接班人 2015-06 电影明星齐唱少先队之歌 一生所爱 2016-07 电影《大话西游3》推广曲 I Don’t Give A屑 (Remix版) 2018-01-10 - 配音作品 时间剧名角色性质2015《哆啦a梦:伴我同行》成年大雄3D动画电影 演唱会记录 举办时间 演唱会名称 总场次 2010-07-17 《庚心》演唱会 2 场 ▪ 2010-07-17 中国北京 北展剧场 1 场 ▪ 2010-07-18 中国北京 北展剧场 2 场 2012 寒更·庚心世界巡回演唱会 ▪ 2012-07-28 中国/北京 五棵松体育馆 ▪ 2012-08-18 中国/上海 上海大舞台 ▪ 2012-09-15 中国/辽宁沈阳 铁西体育场 ▪ 2012-10-13 中国/广东深圳 深圳湾体育中心体育场 2015-11-06 十周年演唱会 1 场 ▪ 2015-11-06 北京 参演MV 年份歌手歌曲名称2006年张力尹&金俊秀《Timeless》(上下)2007年张力尹《I Will》(星愿)张力尹《幸福的左岸》
|
[
"韩庚于2012年在MTV欧洲音乐奖获得了全球最佳艺人奖。"
] | 6,696
|
multifieldqa_zh
|
zh
| null |
36bb21a3d48300f6b781991afb4ce2ae1bec990c4686ac17
|
郑永涛购买的房屋位于哪个小区?
|
郑永涛与漳平市奇峰房地产开发有限公司商品房销售合同纠纷一审民事判决书
原告郑永涛与被告漳平市奇峰房地产开发有限公司商品房销售合同纠纷一案,本院于2017年4月19日立案后,依法适用普通程序,公开开庭进行了审理。原告郑永涛委托诉讼代理人陈懿乾到庭参加诉讼,被告漳平市奇峰房地产开发有限公司经传票传唤,无正当理由拒不到庭参加本案诉讼。本案现已审理终结。
郑永涛向本院提出诉讼请求:1、判令被告限期为原告办理漳平市菁××××东路(香樟美地)小区6幢206号房的土地使用权证并以商品房总价款216000元、按日万分之一标准计算,支付自2014年4月21日起至判决书指定办理权属登记手续履行期满之日止的逾期办证违约金;2、判令被告立即向原告交付漳平市菁××××东路(香樟美地)小区6幢206号房屋所有权证原件;3、本案诉讼费、保全费由被告承担。2017年8月10日在法庭上当庭变更为:1、被告限期为原告办理漳平市菁××××东路(香樟美地)小区6幢206号房的不动产登记证书并以商品房总价款216000元、按日万分之一标准计算,支付自2014年4月22日起至判决书指定办理权属登记手续履行期满之日止的逾期办证违约金;二、本案诉讼费、保全费由被告承担。事实与理由:被告以出让方式取得位于漳平市菁××××、编号为101/7247的地块的土地使用权。国有土地使用权证号为漳国用(2011)第1075号。该地块土地面积为21580平方米,规划用途为商住用地,土地年限自2006年1月25日至2076年1月24日。
2012年12月22日,原告与被告签订了《商品房买卖合同》购买了被告开发的位于漳平市菁××××东路(香樟美地)小区6幢206号房屋,《商品房买卖合同》约定商品房单价为每平方米3038.83元,建筑面积71.08平方米,商品房价款按建筑面积计算,总金额为216000元,合同第5条约定计价方式为以建筑面积为依据进行面积确认及面积差异处理。合同第8条约定出卖人应当在2013年12月31日前将商品房交付买受人使用(实际交房时间是2014年1月21日)。合同第14条约定出卖人应在商品房交付使用后60日内,向当地房屋权属登记机关办理房屋所有权初始登记,并将办理权属登记需由出卖人提供的资料交付买受人。如因出卖人原因,买受人不能在商品房交付使用后90日内取得房屋权属证书,双方同意按下列第2项处理‘买受人不退房,出卖人自逾期之日起每日按买受人已付款的0.01%向买受人支付违约金。’合同签订后原告依约支付了购房首付款及其他相关费用和手续材料,履行了全部合同义务。
2017年3月30日,原告经向漳平市政府行政服务中心工作人员询问后得知被告早在2014年1月份就已办理了涉案房屋产权证,但被告仅将该房屋产权证复印件交付给原告,未将房屋产权证原件交付原告。由于被告项目地块不具备土地分割条件且未交付应缴款项导致至今未能办理土地使用权证。
综上,被告的行为已构成违约,被告应依照商品房买卖合同约定承担相关责任并按照合同约定支付原告违约金,为了维护自己的合法权益,原告根据《民事诉讼法》的相关规定提起诉讼,由于政策变化变更了诉请恳请贵院判如所请。
漳平市奇峰房地产开发有限公司未答辩。
本院经审理认定事实如下:被告以出让方式取得位于漳平市菁××××、编号为101/7247的地块的土地使用权。国有土地使用权证号为漳国用(2011)第1075号。该地块土地面积为21580平方米,规划用途为商住用地,土地年限自2006年1月25日至2076年1月24日。2012年12月22日,原告与被告签订了《商品房买卖合同》购买了被告开发的位于漳平市菁××××东路(香樟美地)小区6幢206号房屋,《商品房买卖合同》约定商品房单价为每平方米3038.83元,建筑面积71.08平方米,商品房价款按建筑面积计算,总金额为216000元,合同第5条约定计价方式为以建筑面积为依据进行面积确认及面积差异处理。合同第8条约定出卖人应当在2013年12月31日前将商品房交付买受人使用(实际交房时间是2014年1月21日)。合同第14条约定出卖人应在商品房交付使用后60日内,向当地房屋权属登记机关办理房屋所有权初始登记,并将办理权属登记需由出卖人提供的资料交付买受人。如因出卖人原因,买受人不能在商品房交付使用后90日内取得房屋权属证书,双方同意按下列第2项处理‘买受人不退房,出卖人自逾期之日起每日按买受人已付款的0.01%向买受人支付违约金。’合同签订后原告依约支付了购房款216000元,在2014年1月21日依照被告的“交房通知”交缴其他相关费用(其中税费款5342元、购房差价款699元)和手续材料,履行了全部合同义务。漳平市奇峰房地产开发有限公司未按合同约定将房产证和土地证交付给原告。现因政策变化,房产证和土地证已改为向漳平市不动产登记中心办理不动产权证书。
2017年8月1日,漳平市不动产登记中心出具了证明,“经核实,漳平市奇峰房地产开发有限公司,建设项目名称:奇峰佳苑(香樟美地),国有土地使用权证号:漳国用(2011)第1075号,该项目缴齐相关税费(公共维修基金、契税、登记费)后即可办理不动产权证书。”
上述事实有郑永涛提供的商品房买卖合同及其补充协议一份、销售不动产统一发票二张、房屋登记信息证明一份、2014年1月21日交接房时的缴费凭证五份、本院调取的漳平市不动产登记中心的证明一份予以佐证。
本院认为,郑永涛与漳平市奇峰房地产开发有限公司签订的《商品房买卖合同》及《合同补充协议》系双方当事人真实意思表示,且内容及形式未违反法律、行政法规禁止性规定,该合同合法有效,双方当事人均应按照合同约定履行各自的义务。郑永涛已依约向漳平市奇峰房地产开发有限公司支付了购房款216000元,漳平市奇峰房地产开发有限公司2014年1月21日交付了商品房,但漳平市奇峰房地产开发有限公司未按约定办理房产证和土地证交付给原告,且逾期超过90日,郑永涛有权依照合同约定要求漳平市奇峰房地产开发有限公司继续履行办证义务并支付违约金(自2014年4月22日起到办证登记机关登记核发证书之日止按购房款216000元的每日万分之一计算)。漳平市奇峰房地产开发有限公司经本院依法传唤,无正当理由拒不到庭,本院依法缺席审理和判决。
综上所述,对郑永涛的诉讼请求,本院予以支持。依照《中华人民共和国合同法》第八条、第六十条、第一百零七条,《中华人民共和国民事诉讼法》第一百四十四条、第二百五十三条之规定,判决如下:
一、漳平市奇峰房地产开发有限公司应在本判决生效后一个月内为郑永涛办理漳平市菁××××东路(香樟美地)小区6幢206号房的不动产登记证书;
二、漳平市奇峰房地产开发有限公司应于本判决生效之日起十日内向郑永涛支付违约金(自2014年4月22日起到办证登记机关登记核发证书之日止按购房款216000元的每日万分之一计算)。
如果未按本判决指定的期间履行给付金钱义务,应当依照《中华人民共和国民事诉讼法》第二百五十三条之规定,加倍支付迟延履行期间的债务利息。
案件受理费537元,由漳平市奇峰房地产开发有限公司负担。
如不服本判决,可在判决书送达之日起十五日内,向本院递交上诉状,并按对方当事人的人数提出副本,上诉于福建省龙岩市中级人民法院。
一、附本案适用的主要法律条文及申请执行提示
《中华人民共和国合同法》
第八条依法成立的合同,对当事人具有法律约束力。当事人应当按照约定履行自己的义务,不得擅自变更或者解除合同。
依法成立的合同,受法律保护。
第六十条当事人应当按照约定全面履行自己的义务。
当事人应当遵循诚实信用原则,根据合同的性质、目的和交易习惯履行通知、协助、保密等义务。
第一百零七条当事人一方不履行合同义务或者履行合同义务不符合约定的,应当承担继续履行、采取补救措施或者赔偿损失等违约责任。
《中华人民共和国民事诉讼法》
第一百四十四条被告经传票传唤,无正当理由拒不到庭的,或者未经法庭许可中途退庭的,可以缺席判决。
第二百五十三条被执行人未按判决、裁定和其他法律文书指定的期间履行给付金钱义务的,应当加倍支付迟延履行期间的债务利息。被执行人未按判决、裁定和其他法律文书指定的期间履行其他义务的,应当支付迟延履行金。
第二百三十九条申请执行的期间为二年。申请执行时效的中止、中断,适用法律有关诉讼时效中止、中断的规定。前款规定的期间,从法律文书规定履行期间的最后一日起计算;法律文书规定分期履行的,从规定的每次履行期间的最后一日起计算;法律文书未规定履行期间的,从法律文书生效之日起计算。
二、主动履行生效法律文书提示
具有金钱给付内容的生效法律文书,履行义务人可以在生效法律文书确定的履行期间内将相应的款项直接支付给权利人或通过法院转交给权利人。款项转入或存入法院指定的履行款账户时,应当在转入或存入后及时告知案件承办人,并提供银行转入或存入凭证复印件。
生效法律文书确定应当负担诉讼费的当事人,应当在法律文书生效后七日内自觉将诉讼费缴交至法院指定的诉讼费账户,并向案件承办人提供银行转入或存入凭证复印件,否则法院将依法定程序向当事人追缴。
履行义务人未及时告知已自动履行,导致案件进入执行程序,造成负担执行费用、列入失信被执行人名单等一切后果自负。
履行款账户(开户行:福建漳平民泰村镇银行股份有限公司;开户单位:漳平市人民法院;账号:56×××28)。
支付款项时,请在摘要栏写明案件承办人、案号、当事人姓名。
漳平市人民法院财务室咨询电话:0597-7523957。
|
[
"漳平市菁××××东路(香樟美地)小区。"
] | 3,962
|
multifieldqa_zh
|
zh
| null |
7b881944ef167a57f2ef7c39784bfff3b1f36f0b1bb4f64c
|
2012年全市规模以上工业企业的增加值增长了多少?
|
各位代表:
现在,我代表市人民政府向大会作工作报告,请予审议,并请市政协委员和其他列席会议的同志提出意见。
一、2012年政府工作回顾
2012年是撤地设市后的第一年,也是我市经济社会发展取得显著成效的一年。在省委、省政府和市委的坚强领导下,在市人大和市政协的监督、支持下,市人民政府紧扣主基调、主战略,抢抓国发2号文件和武陵山片区扶贫攻坚规划的历史性机遇,努力克服国内经济下行等不利因素影响,加快“三化”同步,推进“一业”振兴,全面完成了市一届人大一次会议确定的各项目标,开创了发展提速、转型加快、结构向优、活力增强、民生改善的新局面。
2012年,是发展速度明显加快、经济保持高位运行的一年。预计,全年地方生产总值447亿元,增长17%,实现了人均GDP破万元。全社会固定资产投资700亿元,增长65.1%;财政总收入63.73亿元,增长25.89%;公共财政收入36.57亿元,增长28.73%;社会消费品零售总额106.2亿元,增长18%;城镇居民人均可支配收入16338元,增长18%;农民人均纯收入4802元,增长20%。固定资产投资增速全省第二,城镇居民人均可支配收入增速全省第一,旅游总收入增速全省第三,税收收入增速全省第四,农民人均纯收入增速全省第六。
2012年,是基础设施大为改善、发展条件不断夯实的一年。交通运输建设突飞猛进。长昆铁路加快建设,铜玉城际铁路实质性开工前期准备有序推进;铜大高速建成通车,新增高速公路56公里,结束了铜仁中心城区与外界无高速公路连接的历史;杭瑞高速铜仁段、思剑高速加快建设,铜仁至松桃、沿河至德江、江口至石阡高速实质性开工,铜仁至怀化、铜仁环城高速前期工作基本完成,在建高速公路里程513.1公里;实施国省干道改造60公里,完成通村油路建设1426公里,通村油路率从上年的22.5%提高到31%;铜仁凤凰机场改扩建工程实质性开工,铜仁至贵阳航班加密至每天往返8个班次,至广州航线复航实现周往返4个班次;乌江航道整治工程和通航设施建设加快推进。水利建设“三位一体”规划深入实施。松桃道塘、石阡花山水库已下闸蓄水,德江长丰水库建设加快,江口鱼粮、玉屏白岩河、印江栗子园、松桃盐井、思南过水湾5座中型水库开工建设,实施71座水库除险加固工程,万山小云南、大兴水利枢纽工程等8座中型水库和松桃陆家坝、玉屏青山冲等5座小(1)型水库项目前期工作有序开展。全年新增解决农村饮水安全34万人,新增、改善、恢复灌溉面积14万亩,增加烟水配套灌溉面积5.45万亩,农村人均有效灌溉面积达到0.62亩;完成石漠化治理面积138.96平方公里,森林覆盖率达到52.98%,提高1.51个百分点。电力、通信等基础设施建设加快推进。沙沱电站准备下闸蓄水,铜松500千伏输电线路工程等6个项目开工建设,电力保障能力进一步加强;全市移动电话拥有率达42%,移动通信基站达3900个,互联网用户达14万户。
2012年,是发展质量不断提升、经济结构更加优化的一年。预计三次产业结构由上年的28.93:27.93:43.14调整为26.80:29.50:43.70,实现由农业经济向工业经济实质性转型,经济增长的协调性不断增强,质量进一步提高。工业经济平稳较快增长。启动建设黔东工业聚集区,推动工业经济集群发展。全市12个工业园区开工建设基础设施项目119个,完成投资83.9亿元,基本实现“五通一平”,建成标准厂房120万平方米,园区基础设施建设取得阶段性突破;大兴工业园区被认定为省级高新技术产业园区,大龙开发区被省确定为“511”产业示范园区,碧江区、印江县、沿河县工业园区被认定为省级经济开发区。开工、续建工业项目507个,建成投产204个,创年度投产工业项目历史最好水平,全市规模工业企业从上年的236家增加到368家,完成规模以上工业增加值70亿元,增长21%。在工业经济总量快速扩张的同时,轻重工业比例从上年的19.8:80.2调整为28.2:71.8,工业结构持续调优、效益继续向好;民营经济所占比重由上年的45%提高到48%,县域经济比重由上年的70%提高到75%,经济活力更加增强。现代农业稳步推进。以实施“三个万元”工程为抓手,以现代农业产业园区建设为载体,加快发展茶叶、蔬果、核桃、中药材、油茶五大主导产业,全市粮经比从上年的47:53调整为43:57,茶园面积达103.5万亩,居全省第二。规划建设畜牧产业示范区8个、生态环保型网箱养殖示范园区3个、特种野猪养殖场176个、竹鼠养殖场233个、大鲵人工养殖场31个,肉类总产量25.4万吨,增长12.79%。规划建设农业产业园区28个,松桃县、江口县扶贫产业示范园区被列为省级试点;新增县级以上龙头企业134家、农民专业合作社535家,农产品加工转化率提高到34.3%;组建茶叶行业协会,启动茶叶品牌整合工作。完成烟叶收购70.49万担。预计农林牧渔业总产值197亿元,增长9.8%。以文化旅游产业为核心的服务业快速增长。启动环梵净山“金三角”文化旅游创新区建设,成功举办市第一届旅发大会、贵州梵净山文化旅游节、中华龙舟大赛等节会赛事,在央视、凤凰卫视等高端媒体开展了铜仁形象宣传,梵净山、大明边城、石阡温泉群创建为国家4A级景区,万山汞矿遗址列入中国申报世界文化遗产预备名录,预计全年旅游收入158.8亿元,增长75.5%。现代物流、会展、商贸等服务业加快发展,公路旅客周转量和货物周转量分别增长67.9%和52.8%,预计服务业增加值195亿元,增长20%。
|
[
"2012年全市规模以上工业企业的增加值增长了21%。"
] | 2,348
|
multifieldqa_zh
|
zh
| null |
41b0f7faa4092101f2c594de7fa8de1603bfe516a745f0ff
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.